Hi everyone!
Two years ago our school implemented an SSL inspection tool called ContentKeeper. It’s super annoying; it’s an allow list, not a block list, so we can’t even access legitimate websites like HackerRank (a lot of computer science websites are blocked, which is exactly my major -_-). I’ve been able to get around it through a WireGuard VPN running port 53, however in the past few days they blocked that too. I’ve tried for 2 days, and I think I’m almost out of options. Before I attempt to implement my own VPN protocol (without encryption, just to break past the block on everything for now), do you guys have any suggestions on how to bypass such a restricted network?
Here are some details and things that I’ve tried:
- ContentKeeper normally requires you to install a certificate so they can perform the MITM that they need to filter out content. When you install it, it gets rid of SSL errors only on a handful of websites
- ssh -D as a SOCKS proxy does indeed remove the SSL errors, however it doesn’t get past the blocked websites (administration is super reluctant to allow anything so we just gave up trying). This workaround doesn’t work on iOS, however.
- Shadowsocks doesn’t work*. The asterisk is because I’ve gotten it to randomly work a few minutes some times, then it’s back to blocked. I’ve heard about trying on port 443 and I’ll try it tomorrow.
- WireGuard is blocked by ContentKeeper, but I’m not sure if it is a firewall. Here’s a screenshot of what I get as soon as I stop using it:
What the block page looks like
When the school blocked all outbound UDP ports except port 53, this page would come up when WireGuard disconnected. We can still use wireguard, however, even while blocked (“isolated” for a minute), and even on the guest login-required WiFi. Therefore I suspect ContentKeeper is not blocking wireguard, it’s just a straight up all UDP port blocking firewall. I don’t know if this is true, nor can I conform that all UDP outbound ports are blocked, but I tried some common ones and WireGuard still does not work.
- OpenVPN, even with port 443, does not work
- There is limited signal inside the building so data doesn’t work in most places
- Outbound ping is blocked
- ZeroTier is detected and blocked
- Edit: all Remote Desktop software that I know of are blocked
- Edit: I want to avoid cloud-based remote desktops as much as possible, especially VNC. They’re too difficult to use effectively, but if everything else fails, I will resort to it
Do you guys have any suggestions on how to deal with this? Hopefully I’m not violating any rules on the subreddit, I’ve never done anything illegal with unrestricted network access, I promise. If you need me to test anything, I’ll be doing that tomorrow in school.
Edit: Thanks for all of your suggestions! I’ll be trying these today, I’ll update each one if it works:
TOR (will probably get called down to office LOL) ((Blocked, but interestingly it did successfully discover an exit node)u/pass-the-word)- Shadowsocks on port 80 (u/thebighuski), or 443 (yay both ports appear to be working with Outline Server, works across mobile devices as well)
- OpenVPN + tls-crypt + scramble patch over port 443 (u/MyCalculations) (having issues setting this up)
- IPV4 tunnel through DNS (u/Azz0uzz)
TrojanVPN protocol (Does not work with CDN since unknown domain names are blocked by default. Might try CloudFront that gives me a custom amazon-based URL.u/lacksfor)- SSH Port Forwarding for RDP (u/atl-hadrins) Works, but only for laptops and is expensive
WireGuard over port 123 ((Unless there are more ports that might work, WireGuard has been completely blocked)u/kahr91), 443 (failed) (u/regorsec)- Tunneling DNS over SSH (u/glockfreak)
Switching DNS servers (Didn’t do anything when combined with an ssh -D socks proxyu/pkx616)- Softether VPN (u/xnyg)
- Microsoft SSTP
v2ray (web socket + TLS + Cloudflare CDN) (Cloudflare does not work since custom DNS is blocked.u/Heclalava)
Edit [some number n>10]: I’ve found that Shadowsocks (with Outline Server) on port 80 or 443 works perfectly, so I’m considering this network successfully bypassed. However I’ll keep testing things (and responding to comments) if anyone sees this and has the same issue!
Again, thanks for all of your help!