this post was submitted on 17 Nov 2024
19 points (95.2% liked)

Selfhosted

40219 readers
909 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Hey everyone, I was wondering about possible solutions to reach my home network when travelling. At the moment, I have a Wireguard VPN to my home router running OpenWRT. However, this is increasingly useless as Wireguard connections (even on port 80 and 443) are being blocked by hotels etc. (presumable DPI?). I have read about Shadowsock being a possible solution but struggled setting it up on my OpenWRT router.

Are there any other options? Preferably those that can run on an OpenWRT router, or on a server at home.

Any help is much appreciated.

top 6 comments
sorted by: hot top controversial new old
[–] just_another_person@lemmy.world 11 points 16 hours ago

The issue is more likely to be your port selection and UDP being discarded on networks with captive portals that generally only allow certain ports and traffic. Try using some other common UDP service ports like 53/DNS if not already in use, or maybe 5060/SIP, or even other common VPN ports.

Unless they're running L7 hardware in the hotels, I doubt they're doing any kind of packet inspection.

[–] MTK@lemmy.world 2 points 12 hours ago

Double VPN, first one is orbot/psiphon and then your VPN.

Easy on Linux, not so easy on other platforms, especially non-rooted android or iphones

[–] cron@feddit.org 5 points 16 hours ago

Maybe try some TLS-based VPN? This should work almost anywhere, because it looks like a standard HTTPS connection.

Wireguard - even on port 443 - is special as it uses UDP protocol and not the more widely used TCP protocol.

[–] rearview@lemmy.zip 4 points 15 hours ago

Tailscale/Headscale + DERP may work as they relay packets through a typical HTTP server. Just make sure your router has some space to download the binary - for MIPS they're like ~60MB or something iirc.

[–] ExcessShiv@lemmy.dbzer0.com 1 points 12 hours ago* (last edited 12 hours ago)

I recently had massive issues reaching my home network from hotel WiFi. I couldn't even connect my regular VPN on their WiFi, I tried a bunch of stuff with different ports, TCP/UDP, different protocols, nothing seemed to work even for my proton VPN.

I managed to get mullvad running though, then I could connect with tailscale (with mullvad VPN still running) and then disable mullvad after tailscale connected. Tailscale then didn't drop the connection.

Weird work around, but it was consistent.

[–] ThorrJo@lemmy.sdf.org 1 points 13 hours ago

Not sure if Wireguard over obfs4proxy is doable easily on OpenWRT yet, but it may be an option