Need Help Bypassing Firewall Restrictions at My School
from Decency8401@discuss.tchncs.de to privacy@lemmy.ml on 24 Aug 23:56
https://discuss.tchncs.de/post/20958711

Hi everyone,

I’m currently facing some frustrating restrictions with the public Wi-Fi at my school. It’s an open Wi-Fi network without a password, but the school has implemented a firewall (Fortinet) that blocks access to certain websites and services, including VPNs like Mullvad and ProtonVPN. This makes it difficult for me to maintain my privacy online, especially since I don’t want the school to monitor me excessively.

After uninstalling Mullvad, I tried to download it again, but I found that even a search engine (Startpage) is blocked, which is incredibly frustrating! Here’s what happened:

Ironically, websites that could be considered harmful, like adult content, gambling sites and online gaming sites, are still accessible, while privacy-tools are blocked.

I’m looking for advice on how to bypass these firewall restrictions while ensuring my online safety and privacy. Any suggestions or alternative methods would be greatly appreciated! (If any advice is something about Linux, it could be a Problem, since my school enforces Windows 11 only PC’s which is really really igngamblingThanks in advance for your help

edit: did some formatting

edit2: It is my device, which I own and bought with my own money. I also have gotten in trouble for connecting to tor and searching for tor, but I stated that I only used it to protect my privacy. Honestly I will do everything to protect my privacy so I don’t care if I will get in trouble.

edit 3: Thanks for the suggestions, if I haven’t responded yet, that’s because I don’t know what will happen.

#privacy

threaded - newest

AmbiguousProps@lemmy.today on 25 Aug 00:04 next collapse

You’ll need to download the client off-network (have you tried the local library for that?) and put it on your PC. If you know how to use docker, you could set up the client via docker and dockerhub which I doubt is blocked, but you’d need to set docker up on windows which I have no experience with.

You can also try wireguard on a non-standard port if there are further blocks. OVPN can also go over 443 which might help.

Really though, it depends on how they’re blocking them. They could be blocking the protocol based on port or deep packet inspection, or they could just be blocking a list of VPN hosts. They could be doing both.

If they’re just blocking hosts, you could set up a vpn relay on a host somewhere else, but that won’t help if they’re blocking the protocol.

MrCamel999@programming.dev on 25 Aug 00:20 next collapse

I’m aware of a network that blocks Mullvad as well, but found a way around it. It went through just fine if I was using a custom DNS server. I used NextDNS for this, but I imagine it would work with Cloudflare or something as well (but I highly recommend NextDNS anyways). Hope this helps!

sturlabragason@lemmy.world on 25 Aug 00:24 next collapse

You can sign up for an AWS account, set up an EC2 instance (a free type, you get one free year) and pull an wireguard image on docker there and connect to that? Unless they are whitelisting IPs I’d imagine this would work.

github.com/linuxserver/docker-wireguard

You can also replace AWS with an external computer of your choice…

fmstrat@lemmy.nowsci.com on 25 Aug 13:50 collapse

Putting this here,too:

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

sturlabragason@lemmy.world on 26 Aug 00:55 collapse

Yeah I wasn’t really thinking about obfuscating that he was using a VPN. Just assumed this was not breaking rules, and only thinking about getting around the blocks and having a working VPN.

eco_game@discuss.tchncs.de on 25 Aug 00:25 next collapse

What worked for me at my old school was using a ShadowSocks proxy. Basically what this does, is it takes all your traffic and just makes it look like random https traffic (AFAIK). ShadowSocks is just a proxy. The description fits the Cloak module, mentioned below.

I believe multiple VPNs support this, for me with PIA VPN it’s in the settings under the name “Multi-Hop” (PIA only supports this on the Desktop App, not on mobile).

This technique is pretty much impossible to block, unless you ban every single VPN ShadowSocks Proxy IP. If that is the case for you (chances are practically 0), you could also selfhost ShadowSocks in combination with the Cloak module, however this method is a lot more complicated.

refalo@programming.dev on 25 Aug 04:29 next collapse

This technique is pretty much impossible to block

How China Detects and Blocks Shadowsocks

EngineerGaming@feddit.nl on 25 Aug 10:47 collapse

Yea, IIRC XRay is the most advanced solution for that now.

refalo@programming.dev on 25 Aug 20:07 collapse

This seems to say it is blocked in China and Russia as well though

EngineerGaming@feddit.nl on 25 Aug 22:09 collapse

Seems like there is nuance though.

fmstrat@lemmy.nowsci.com on 25 Aug 13:47 next collapse

And if you host your own VPN, it’s identifiable as a single destination for your connection.

hperrin@lemmy.world on 27 Aug 04:36 collapse

Shadowsocks doesn’t look anything like HTTPS traffic. It looks like a bare stream cipher over TCP connections to one host with bursts of traffic. HTTPS starts off with a TLS handshake (a client hello, a server hello, the server certificate, then a cipher negotiation and key exchange) before any ciphertext is exchanged. Shadowsocks just starts blasting a ciphertext stream. Even if you run it on port 443, it looks nothing like HTTPS.

Without any sort of cipher negotiation and key exchange, it’s obvious that it’s a stream cipher with a pre shared key, so this would be automatically suspicious. There’s also not really any plausible deniability here. If they probe your Shadowsocks host and see it running there, that’s all the proof they need that you’re breaking their rules. With a VPN, you could at least say it’s for a project, and with SSH, you could say you’re just transferring files to your own machine.

eco_game@discuss.tchncs.de on 27 Aug 07:48 collapse

Yep my mistake, I confused ShadowSocks with Cloak.

RegalPotoo@lemmy.world on 25 Aug 00:28 next collapse

Obligatory “read your schools’ computer use policy before you get yourself in trouble for evading the firewall”

subignition@fedia.io on 25 Aug 00:34 next collapse

Yeah, you probably don't want to risk getting caught for that. There is a possibility you could be criminally charged (regardless of how stupid you might think that is, it happens) when the school finds out what you're doing. And if you're using school-issued hardware they're very likely to find out what you're doing.

Decency8401@discuss.tchncs.de on 25 Aug 23:17 collapse

I don’t know where to find the policy regarding the network. The computer isn’t school property, I own it which is more frustrating because I have to uninstall (Just disabeling it and the Killswitch won’t work) any VPN to start using the network.

RegalPotoo@lemmy.world on 26 Aug 01:45 next collapse

It might be your computer, but it’s their network - they get to set the rules as to how it gets used.

possiblylinux127@lemmy.zip on 26 Aug 02:06 collapse

Ask for it especially if you are getting in trouble

Steve@communick.news on 25 Aug 00:30 next collapse

Have you tried the “Stealth” protocol option ProtonVPN has?
It’s intended to bypass VPN blocks. Sometimes it works.

scarilog@lemmy.world on 26 Aug 08:46 collapse

Windscribe has a Websocket tunnel option. Haven’t been on a network that’s been able to block this mode yet.

hperrin@lemmy.world on 25 Aug 03:19 next collapse
  1. Sign up for Digital Ocean.
  2. Get the cheapest VM (called Droplets on DO) you can get.
  3. Install Ubuntu on it.
  4. SSH into it and open a SOCKS proxy (ssh -D 8080 <yourdropletip> on Linux, use PuTTY on Windows).
  5. Configure Firefox to use localhost:8080 as a SOCKS5 proxy.
  6. Win.

Bonus points if you set up Cockpit to manage everything over the web (localhost:9090 over your proxy), that way you don’t need to learn all about sudo apt whatever.

Aradia@lemmy.ml on 25 Aug 06:56 next collapse

hetzner.com is cheaper, I think.

Deckweiss@lemmy.world on 25 Aug 09:00 collapse

netcup as well

Aradia@lemmy.ml on 26 Aug 06:51 collapse

That’s nice, for 0,50 monthly less you have more hard drive (14GB more) but you lose 2GB of RAM compared to Hetzner.

EDIT: For VPN over HTTP, you don’t need more than this.

EngineerGaming@feddit.nl on 25 Aug 10:46 next collapse

There is also sshuttle if you want to route everything through SSH, but not tried personally.

fmstrat@lemmy.nowsci.com on 25 Aug 13:49 collapse

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

hperrin@lemmy.world on 25 Aug 20:18 collapse

It’s an open WiFi network. They’re probably not even able to identify which device is used by which person. Even if they could, why would they be monitoring everyone’s traffic looking for users who only visit one resource? That’s an extremely unlikely scenario.

The worst they’d see is that this device is using a lot of SSH traffic. There’s nothing suspicious about that. SSH is perfectly normal.

fmstrat@lemmy.nowsci.com on 26 Aug 00:07 next collapse

Again these are all assumptions. These are risks that do not need to be taken when there are better methods.

hperrin@lemmy.world on 26 Aug 00:52 collapse

These aren’t assumptions. OP states it’s an open WiFi network in their post, and unless you name your computer after yourself, all the network admins can see is your MAC address. And what is suspicious about SSH traffic? And what better way is there? VPN traffic will look more suspicious.

What do you do for a living? I’m a software and network engineer, so this is in my realm of expertise. All the network admins will see is OP’s MAC and that they’re sending a lot of SSH traffic to a Digital Ocean IP (if they even bother to sniff their traffic). This is how I, as a network engineer, have personally bypassed content filters.

fmstrat@lemmy.nowsci.com on 26 Aug 03:02 collapse

You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven’t even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid’s (or adult’s) well being.

Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.

hperrin@lemmy.world on 26 Aug 04:22 collapse

I helped out with my high school network and SSH absolutely would not have looked suspicious. I can’t say for this school, but that was a regular part of the curriculum in mine. Even if it wasn’t, what are you gonna do as a net admin? You have zero evidence that a student is doing something malicious.

I feel like you’re a script kiddy who got called out for being overly confident online, and now you’re grasping at straws. I literally gave you two outs, and you doubled down every time. There is nothing suspicious about SSH traffic, even in a high school network, let alone a college network, and if you think there is, you’re 100% brand new to the industry.

You still haven’t given any alternative that would look any less suspicious than SSH traffic, and you still haven’t given any method a net admin could use to identify your machine from the countless others that connect to an open WiFi network.

In fact, let’s test you. There’s something that old versions of Firefox will expose, even through a SOCKS proxy. What is it, and what did Firefox introduce to prevent that?

fmstrat@lemmy.nowsci.com on 26 Aug 14:25 collapse

He literally said he had already been identified. Read.

hperrin@lemmy.world on 26 Aug 17:51 collapse

They said they got in trouble for Tor, they didn’t say their machine was identified. Even if it was, yet again, there’s nothing suspicious about SSH traffic. SSH traffic looks like work (because it usually is).

And I’ll ask you again, since you avoided the question, what better way is there? What would look more innocent than SSH?

fmstrat@lemmy.nowsci.com on 27 Aug 03:54 collapse

I guess they magically knew it was them? And there you go again with “work.” Shadowsox has already been mentioned for randomized https traffic. Feel free to learn from the other comments.

hperrin@lemmy.world on 27 Aug 04:17 collapse

I mean, they could have used their eyeballs, but we don’t know, because he didn’t say.

Shadowsocks would work, but I feel like bare stream ciphers over TCP are a dead giveaway that you’re bypassing content restrictions. Especially if they probe that host and see it running. But, what do I know? It’s just my job five days a week.

See: lemmy.world/comment/12008875

0x0@programming.dev on 26 Aug 14:57 collapse

There’s nothing suspicious about that. SSH is perfectly normal.

In a business? Sure.

In a school? Not so much.

hperrin@lemmy.world on 26 Aug 17:58 collapse

It very much is. I used it regularly in both high school and college. In high school it was just how I connected to other machines. One of my teachers taught me how to use it. In college we were told to use it by the professor, so at least one entire class was using it for every assignment. That’s pretty normal in any school that has programming or networking courses.

SSH is usually used for work, so it just looks like someone working. Tor is used for nefarious purposes, so it will always look suspicious. VPNs are used to bypass content restrictions, so they will always look suspicious.

refalo@programming.dev on 25 Aug 04:34 next collapse

If it’s any school like mine was, where people actively look at all the traffic going through their network, it’s a losing battle. And I say this as both a huge privacy advocate and a long-time network engineer.

Anything even remotely resembling a tunnel, VPN or proxy is going to make you stand out in their monitoring, because they will see constant traffic between you and the same host on the other end… traffic that practically never stops. In my day the school even force-reset SSH and RDP sessions after a while (or maybe it was actually ALL tcp sessions, not sure).

It doesn’t matter what protocol or technique you use at that point because they can either block whatever IP/ports you use, every time you change it, or threaten/shut off your service.

possiblylinux127@lemmy.zip on 26 Aug 02:04 next collapse

There are tools that can reasonably get around that technically. You just need to make it look like https traffic.

I say this as it is possible to bypass the great firewall in China which was likely build on a much bigger budget

refalo@programming.dev on 26 Aug 02:08 collapse

too much https traffic could also look suspicious, which they could then block…

possiblylinux127@lemmy.zip on 26 Aug 04:09 collapse

It wouldn’t be that much traffic. It would just be https going to random IPs which looks like regular browsing. If you start blocking thing you will create lots and lots of issues plus angry users.

I also doubt they have some guy watching every connection for an entire school.

Mubelotix@jlai.lu on 26 Aug 07:52 collapse

i2p would stand

fuckwit_mcbumcrumble@lemmy.dbzer0.com on 25 Aug 04:39 next collapse

Is this a school issued computer or your own on their network? Never assume you have any privacy on a computer that isn’t your own. Even if you do get a VPN on there they probably have software on the laptop to monitor your actual screen which is far more privacy invasive than seeing that you accessed lemmy 500 times in an hour.

bdonvr@thelemmy.club on 25 Aug 06:17 next collapse

Seriously, ever heard of Intel AMT? It gives administrators such deep access to the computer that they can view and control your screen (regardless of OS you’re using), power the device on remotely, etc.

MangoPenguin@lemmy.blahaj.zone on 25 Aug 17:06 collapse

AMT does at least put a large flashing red/yellow border around your screen if someone is accessing it remotely.

Decency8401@discuss.tchncs.de on 25 Aug 23:28 collapse

It is my own laptop. If I could, I would use tails constantly as I do at Home but the school enforces MS356 which doesn’t work on Linux. The thing that upsets me the most is that I used happily my VPN for one and a half years and out of nowhere it got blocked. I had some discussions with the school, because I thought that this is a really dumb move. But they refused to unblock it, but still it was an attempt.

Charger8232@lemmy.ml on 25 Aug 04:46 next collapse

Hi! Back in high school, me and a few close friends formed a small hacking group aimed at hacking the school WiFi. We succeeded, and reported the vulnerabilities we found along the way to the school. Our school had a policy where students who managed to hack something would be let off the hook if they reported exactly how they did it. I managed to land a job for the school district as a result of our fiasco. I don’t recommend anyone do that, but I managed to get lucky.

Anyways, once we had access to the WiFi we wanted to get around the network wide filter. Proton VPN worked for a while, but quickly got blocked. Dual booting into Tails on school computers didn’t work until the 6.0 update. To my knowledge, it still works.

However, for our phones, the thing that worked was changing the DNS. We found out the network wide filter the school boasted so highly about was only a DNS filter that resolved hostnames to a “blocked” page. Find a good PRNS and change your device’s DNS to match. If you want a search engine, try to find an unblocked SearXNG instance.

Good luck!

P.S. Don’t forget: Tor is portable on Windows devices :)

InputZero@lemmy.ml on 25 Aug 15:08 next collapse

This is the best answer. You didn’t go charging through their system with complete disregard. You made the IT staff like you first, then broke through their system. That’s social engineering at it finest here people, and is the first skill any great hacker needs to learn. Please do good with this skill.

possiblylinux127@lemmy.zip on 26 Aug 02:02 collapse

You want DNS over https

sovietknuckles@hexbear.net on 25 Aug 05:39 next collapse

If your school blocks VPN connections, that usually means that they’re specifically blocking OpenVPN traffic and/or WireGuard traffic. So if you use a VPN provider that supports OpenConnect (which looks like regular HTTPS traffic over port 443 to your school, there’s a good chance that it will not be blocked.

That’s what I do when I’m on open Wi-Fi networks that block everything but HTTP or HTTPS traffic. It’s not as fast as UDP OpenVPN, let alone WireGuard, but it frees me from the restrictions of whatever Wi-Fi network I’m on.

Aradia@lemmy.ml on 25 Aug 06:53 next collapse

There is a way, it’s called SSH over HTTP, I think there are many guides on the internet. I hope this works.

EDIT: I don’t know how to do that on Windows or if it’s possible but maybe with a virtual machine… sorry.

lnxtx@feddit.nl on 25 Aug 11:06 next collapse

If you don’t need a speed and full functionality of the Internet.
Try bridges for the Tor Browser.

brainw0rms@hexbear.net on 25 Aug 11:27 next collapse

At the risk of sounding contrarian/lame, you should probably not be doing any of this especially if you don’t own the hardware you’re using (as mentioned by another commenter).

You don’t specify if this is university or middle/high school, but either way you are not entitled to and should not expect any privacy on a network you don’t control. Even if you are able to set up a VPN to mask your internet activity, your school’s network administrators almost certainly can tell that you are using a VPN, which itself sounds like it would be a violation of your school’s network policy and will most likely land you in trouble. Indeed, your repeated attempts to access blocked sites have likely already raised some flags.

Even the workarounds that others here have mentioned (like routing VPN traffic over port 443) are inadequate for a network that is being actively monitored. Believe me, it is very easy to tell when someone is connecting to a VPN this way.

I would quit while you’re ahead until you can afford your own hardware/internet connection, and then maybe worry about any notion of privacy. Use your school’s internet for what it was intended.

Decency8401@discuss.tchncs.de on 25 Aug 23:36 collapse

I have gotten in trouble for using a VPN I’m the past but it was just a little talk and then they were cool with it. The thing is, that it is my device and at the school I don’t have a strong enough signal for my phone. So I can’t just make a hotspot and use that as WiFi. I need to use the WiFi to get my things done but I will not use the WiFi if I can’t protect my privacy. I know that this sounds pretty stupid but I won’t comply with my school.

shortwavesurfer@lemmy.zip on 25 Aug 12:41 next collapse

I’m assuming you probably have a smartphone. In which case, I would just use your Wi-Fi hotspot instead.

ReversalHatchery@beehaw.org on 25 Aug 14:10 next collapse

Which means the mobile data plan, which doesn’t sound that easy anymore. Where I live (EU) mobile data plans are either quite limited in data cap or expensive, and for a lot of years now they are just shutting it down when yours ran out, instead of slowing it down.

Decency8401@discuss.tchncs.de on 25 Aug 23:38 collapse

I tried this but my signal isn’t strong enough to get thorugh the walls. In some classrooms it works, but it’s more like a 50/50 chance to stay connected.

shortwavesurfer@lemmy.zip on 25 Aug 23:48 next collapse

Yeah, fair enough

possiblylinux127@lemmy.zip on 26 Aug 02:00 collapse

Why does it need to go though walls?

Also if the signal is a problem just use a physical cable

scarilog@lemmy.world on 26 Aug 08:54 collapse

Physical cable to the nearest cell tower?

possiblylinux127@lemmy.zip on 26 Aug 15:43 collapse

What? WiFi doesn’t use a tower. Your phone is the access point.

AsudoxDev@programming.dev on 25 Aug 14:39 next collapse

Use Tor with bridges, or orbot if you want to use apps.

ResoluteCatnap@lemmy.ml on 25 Aug 14:46 next collapse

Here are some good rule of thumbs for work and schools:

  • do not connect to their networks with your personal devices, ever.

  • Only use work/ school devices on their own network.

  • Do not do anything personal on those networks. only do work/school related tasks. This means don’t log into any non school/work accounts.

  • If for some reason they don’t have a device for you but require you to use their network, then leave your personal devices at home claiming you don’t own one and make them accommodate you.

You cannot expect privacy in these situations, and by going to the extreme lengths to try to get it then you will ironically just paint a bigger target on your back if any network admin cares. In some cases this can cost you your job or get you in trouble with the school.

InputZero@lemmy.ml on 25 Aug 15:06 next collapse

Please read Charger8283’s reply. It’s the best one. You’re thinking small, how do I break out of their system, that will only land you in trouble. You should think big like how Charger8283 thought and break the system altogether.

If you first find vulnerabilities and report them to your school, later when you find another one you don’t tell them about it until they ask. Keep it a secret and use it for a while. Just pretend like you weren’t ready to tell them because you didn’t understand it yet.

Sometimes it pays off to play nice and stupid.

Decency8401@discuss.tchncs.de on 25 Aug 23:32 collapse

Well it certainly would be cool to break the system but I honestly don’t have the skills for that. I don’t even know how I could possibly do that.

InputZero@lemmy.ml on 26 Aug 14:11 collapse

Yeah you already do. I’m assuming that you’re in a public highschool. This advice becomes bad advice when there is any money on “the table”. NEVER do this at a university, private, chartered school, and absolutely NEVER do this to the person who will be giving you a paycheck.

I’ll repeat this to be clear to everyone reading this. Do not do anything on a computer or network someone else owns that they don’t allow when money you have, or money you could have gotten could be taken away.

When I said break the system I didn’t mean become so smart at computers that you can just walk past any barrier in any code. That’s impossible. Breaking the system means learning to understand the people who enforce it and working with them to get yourself around it. It means talking to the IT person, getting them to like you, then getting them to show you how to get around a firewall or tunnel out of a network or at least letting you try without getting into huge trouble.

possiblylinux127@lemmy.zip on 26 Aug 01:58 next collapse

Don’t use the WiFi if you don’t like the rules

Reddfugee42@lemmy.world on 26 Aug 03:29 collapse

Thank you, Supernintendo Chalmers

Tinkerer@lemmy.ca on 26 Aug 02:25 next collapse

If you try to browse to the tailscale website does it work?

If it does you could setup tailscale with an exit node at your house and tunnel your connection that way? Everything would then be coming from your home internet. I have had good success with tailscale being able to punch a hole through some pretty filtered firewalls.

CommanderCloon@lemmy.ml on 26 Aug 03:11 next collapse

Sounds like DNS blocking. Use DoH, won’t be as good as a VPN but it will stop the sniffing which allows them to block domains

Midnight1938@reddthat.com on 26 Aug 16:47 collapse

Whats DoH? Department of health?

Nighth4wk@discuss.tchncs.de on 26 Aug 18:27 collapse

DNS over HTTPS

jjjalljs@ttrpg.network on 26 Aug 03:31 next collapse

You’re going to get in trouble and it’s not worth it.

Don’t do personal stuff on their network. What are you even trying to look at via the school network?

If you’re concerned about privacy while doing school stuff, use another device, or maybe a VM. Do they provide computers for students?

You might get off with a warning because you’re young (I assume you’re like 16), but bypassing network security stuff as an adult at work will often get you fired.

Mubelotix@jlai.lu on 26 Aug 07:47 collapse

I beg to differ. Everyone should have a right to access a free Internet. The censorship they are taking about is so broad that it cannot be accepted. In France the school could get highly punished if they dared to make comments on their harmless Internet activity

jjjalljs@ttrpg.network on 26 Aug 15:11 collapse

The rights everyone should have is irrelevant to the reality. You can’t steal a sandwich and be like “everyone should have the right to food!”. I mean you can, but you’ll still be punished.

Is this the hill for this kid to die on? Probably not. If they were trying to change the system for everyone to be more just, maybe.

Mubelotix@jlai.lu on 26 Aug 16:36 collapse

You will not be punished for stealing a sandwich where I live. The judge would laugh at the plaintiff

Foofighter@discuss.tchncs.de on 26 Aug 17:11 collapse

That’s not the point? The school provides a service and is (probably) not obliged to do so. If the school sets rules on this services, it’s OPs choice to either use or not use that service. 🤔

Mubelotix@jlai.lu on 26 Aug 18:17 collapse

Shall we be content to obey them, or shall we endeavor to amend them, and obey them until we have succeeded, or shall we transgress them at once?

jwt@programming.dev on 26 Aug 21:19 collapse

Noli equi dentes inspicere donati.

Mubelotix@jlai.lu on 26 Aug 23:12 collapse

If this is public school and you are a citizen, you should

jwt@programming.dev on 26 Aug 23:23 collapse

Nope.

0x0@programming.dev on 26 Aug 14:50 next collapse

Don’t use the school’s wi-fi? I’m sure there are other options to you.

Gemini24601@lemmy.world on 26 Aug 19:59 next collapse

Seems like Tor snowflake is a proxy that makes your internet traffic appear as a video call. Its purpose is to circumvent censorship, but it may get around firewalls as well. I have no experience bypassing firewalls using snowflake, but it may be a viable option (someone correct me if I’m wrong) snowflake.torproject.org

StarlightDust@lemmy.blahaj.zone on 26 Aug 20:50 next collapse

DNS over HTTPS is your best bet because they can’t Man In The Middle and replace it (DNS Poison) like good old DNS. They will still be able to see the IP addresses you are connecting to unless you proxy those connections. nativeproxy uses Chromium’s stack so it is much harder to detect. There are UI frontends for it if you prefer but I’ve never used them. ProtonVPN also has a stealth protocol that I’ve heard is good, though I don’t know too much about it.

Good on you for trying to get around it. That kind of curiosity is a great way to develop your lateral thinking skills. You didn’t ask for a lecture and people giving you one should go back to stack overflow comments. If you want to take the risks of it, that is up to you and you are likely to fuck up. That being said, you aren’t the only person likely go get in trouble if you fuck up and, unlike you, IT will depend on their job financially. If you do it well enough and make sure you don’t get caught by someone seeing your screen or blagging around the school that you did it, that won’t be an issue.

IT departments also read comments in threads like this to find the current trends of how students are trying to get around their web blockers so keep in mind that you will need to keep your skills up to date.

Melody@lemmy.one on 26 Aug 22:26 next collapse

Typically, using your own VPN should suffice. Depending on your situation you can do other things as well. If you are unable to download these tools on the school network in question; do not attempt to do so again. Use a public or other network connection elsewhere to obtain the tools you need to bypass their crap.

For example, NextDNS could be helpful. By running their client app; ( github.com/nextdns/nextdns/wiki/Windows ) you can make sure all your DNS requests are encrypted. Similarly you could simply set up a local DNS server that you point Windows at which can redirect those requests over DNS-Over-(HTTPS or TLS) to a DNS provider of your choosing.

Analog@lemmy.ml on 28 Aug 06:01 collapse

Airvpn, then use their advanced config to create a 443 tcp tunnel out to a single server. Then use that server’s IP in your OpenVPN config file. Route all traffic including dns inside the tunnel.

Traffic will look like all other web traffic - encrypted on standard web ports. You won’t even need to do a DNS lookup to start with and airvpn uses generic rDNS so it’s not super easy to figure out from their perspective.