by
sysops » Fri Jan 19, 2018 3:05 pm
I recall some discussion about it in the past but don't remember if anyone was able to do it successfully.
One could almost assume that OpenVPN's UDP port (1194) would be blocked or heavily monitored so I'd suggest using TCP on port 443.
You'll need to use the
open-source OpenVPN Community client and download your user locked OpenVPN profile by logging in at
https://ovpn.sonic.net.
In the .ovpn file that downloads, comment all the lines that say "remote ovpn.sonic.net 1194 udp" (there are 7 of them) and leave the one that says "remote ovpn.sonic.net 443 tcp". On top of that, to prevent DNS blocking, change ovpn.sonic.net to whatever it's IP address happens to be before you leave (it shouldn't change and right now points to 209.148.113.36). The line would look like "remote 209.148.113.36 443 tcp".
Doing that will be your best shot at establishing the VPN connection once you arrive.
A backup option would be to lease a $5/month VPS from a hosting company like Linode and giving yourself SSH access on a port higher than 1024 and then using an SSH tunnel as a SOCKS proxy and configuring your supported applications to use that. You could also set up an OpenVPN server on the VPS and tunnel the OpenVPN connection over SSH.
Other services worth looking into are DNSCrypt for encrypting your DNS traffic while there and just making sure you're completely familiar with verifying SSL certificates so that if you access websites over whatever connection is available that you know you're talking to the right service and using strong encryption.