Linux - How can I circumvent VPN censorship by masking the VPN traffic?

    In some countries (like China, Iran, Vietnam…), the government utilizes a very restrictive firewall and enforces local ISPs to throttle & block the VPN traffic via Deep Packet Inspection. You can workaround that with the help of Obfsproxy by masking the VPN traffic:

    Our IVPN Linux client includes obfsproxy support. Check it out here
    1. Install Python’s pip tool:

      sudo apt-get install python2.7 python-pip python-dev build-essential
    2. Install Obfsproxy:

      pip install obfsproxy
    3. For Obfsproxy our servers listen to port TCP 5145. Open .ovpn config file you use to connect with any text editor and adjust line 3 from proto udp to proto tcp & port in the line 4 from 2049 to 5145.
      Resolve the server name specified in line 4:


      and replace with the IP address from the output.

    4. In the same .ovpn file add the following lines in the bottom:

      socks-proxy 1050
      route xx.xx.xx.xx yy.yy.yy.yy

      Where “xx.xx.xx.xx” - the resolved IP address from the previous step, & “yy.yy.yy.yy” - the IP address of your default gateway, which can be identified by running the following command:

      ip route | grep default
    5. Save the changes, start Obfsproxy, and keep this Terminal window open:

      sudo obfsproxy obfs3 socks
    6. Connect to IVPN with the Obfsproxy applied and keep this Terminal window open:

      sudo openvpn --config Servername.ovpn
    7. Press Ctrl+c inside each Terminal window to close the OpenVPN and obfsproxy connections when finished.

    Related Articles

    Still have questions?

    Get in touch and we'll get back to you in a few hours.

    Contact support

    Interested in privacy?

    Read our latest privacy news and keep up-to-date on IVPN services.

    Visit IVPN Blog
    Spotted a mistake or have an idea on how to improve this page?
    Suggest an edit on GitHub.