Obfuscated SSH tunnel

VPN providers were cracked down, open source anti-censorship tools were eliminated. This is what’s happening in China and has become even more severe than ever. Shadowsocks alone is no longer reliable due to more powerful deep packet inspection implemented at the GFW.

I am now replacing shadowsocks on my gateway with obfuscated SSH tunnel, based on Tor‘s obfsproxy. To the impatient ones, I will first give a concise summary of the necessary steps of my set up. You can follow it without drilling down the details. I will explain in more details later. But please note that you have to follow the other instructions in this blog post to complete the whole set up.

Quick Set up

On your server

Assume your server runs Debian 8 (jessie) or Ubuntu, and its IP is 1.2.3.4, run these commands:

On Raspberry Pi gateway

Edit ~/.ssh/config:

Run these commands:

2 thoughts on “Obfuscated SSH tunnel”

  1. Interesting, will be very hand on my next holiday :-) must have happen recently, last summer the classic openvpn connection did work fine …

    Greeting from berlin,
    雪地

  2. Hello there, nice tutorial. I got an error permission denied on server side when running

    $ obfsproxy –data-dir=/tmp/obfsproxy-temp scramblesuit –password=QWLY42YHB75J3B57XOKYNNFJPOQ7APHL –dest=127.0.0.1:22 server 0.0.0.0:7700

    I also have try to run the command as root, change the folder permission 777, but is shows the same error. Do you have any idea how to get through this? Thank you

Leave a Reply

Your email address will not be published.


9 × = nine