I’m travelling for the moment, and usually I just access my home network with tailscale and it has always worked flawlessly. But the hotel I’m staying at apparently blocks VPN connections, I can’t use my regular VPN for work on their network either and I’ve tried obfuscation,different ports etc. nothing seems to work and it never connects.

How can I circumvent this, if at all? I’m staying for several weeks, so this is a pretty bug issue.

  • koalaSunrise@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 months ago

    Several weeks… might just be worth it to take a walk and find another hotel. Then cancel the rest of your nights at hotel#1 and cite their internet blocking policy of VPNs for the reason for cancelling the remainder of your stay, as it prevents you and many other professionals from working.

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 months ago

    I had the same situation, my hotel used fortinet and they blocked almost everything

    Even VPNs that used to work in China were blocked

    I used my phone 4g hotspot to initialize the tailscale connection, which was blocked, I chose my server as an exit point, then I switched back to the WiFi. Amazingly, once logged in to tailscale, it kept connected to my server.

    Then for added safety I used my kasm install to stream a Firefox browser running on my server

    I don’t really understand this, why would a hotel pay thousands and thousands of euro for a “Chinese internet experience” that is going to piss off every single customer

  • Max-P@lemmy.max-p.me
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    Best bet is probably going to be using something like OpenVPN on port 443 in TCP mode, which basically looks like regular HTTPS. It’s a hotel, I doubt they’re going to be doing deep analysis to detect signs it’s OpenVPN. It’s detectable easily but they wouldn’t spend the money on that advanced of a firewall.

    My guess is they went for an allowed list of ports rather than blocked, so it lets DNS (53), HTTP (80), HTTPS (443), probably also POP/IMAP/SMTP (110, 995, 143, 993, 465)

    • ExcessShiv@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Yeah this actually works, but only specifically for openvpn on 443 in TCP mode…anything wireguard is blocked regardless of port.

      • Max-P@lemmy.max-p.me
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        Yep there’s a reason I reached directly for that configuration. WireGuard uses UDP, that’s one of the first things that gets blocked.

        Turns out that’s also the kind of protocol corporate VPNs use, reusing port 443 over TCP. They call those “SSL VPN”. They get to weed out all commercial VPNs used to bypass their firewalls as well as most torrent/game activity while still mostly catering to their business guests.

  • Konraddo@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    It’s a headache most of the time so you might consider purchasing a local SIM card for 4/5G connection instead (and share connection via mobile phone) in the future.

  • spirinolas@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    This advice is what it is, but I work in a school and Tailscale also seems to be (unintentionally) blocked. After a while I realized it was only the login server that was blocked. If I login using my phone data I can go back to the regular network and it works.

    • ExcessShiv@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      This did the trick, ingot my tailscale to stay connected by using my phone AP to log on and then switched to hotel WiFi…thanks

  • Nibodhika@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    If all you want is ssh the easiest and cheapest way might be to hire a VPS, connect to it and connect to tailscale there. Just ensure you have very strict rules on ssh and you should be safe enough.

    Exposing web services in this manner is also easy using Caddy, but be careful since the services would then be publicly available.

  • r00ty@kbin.life
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    I mean, while they can block most things, to give people a usable experience they’re going to allow http and https traffic through, and they can’t really proxy https because of the TLS layer.

    So for universal chance of success, running openvpn tcp over port 443 is the most likely to get past this level of bad. I guess they could block suspicious traffic in the session before TLS is established (in order to block certain domains). OpenVPN does support traversing a proxy, but it might only work if you specify it. If their network sets a proxy via DHCP, maybe you could see that and work around it.

    I did have fun working around an ex gf’s university network many years ago to get a VPN running over it. They were very, very serious about blocking non-standard services. A similar “through” the proxy method was the last resort they didn’t seem to bother trying to stop.

    • sem@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      2 months ago

      What can you do if the school has a whitelist of domains they accept HTTPS (443) connections for?

  • Mikelius@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I’ve had this issue many times as well. I’ve found changing the MTU would help since it seems some filter specific ranges. Doesn’t always work but I’ve had more success than failure doing so

  • TheHolm@aussie.zone
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    2 months ago

    Usually it can be solved by talking to hotel stuff. you are paying for that service and can expect it be suitable for any legal use.