this post was submitted on 24 Aug 2024
96 points (87.5% liked)

Privacy

32096 readers
682 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Hi everyone,

I'm currently facing some frustrating restrictions with the public Wi-Fi at my school. It's an open Wi-Fi network without a password, but the school has implemented a firewall (Fortinet) that blocks access to certain websites and services, including VPNs like Mullvad and ProtonVPN. This makes it difficult for me to maintain my privacy online, especially since I don't want the school to monitor me excessively.

After uninstalling Mullvad, I tried to download it again, but I found that even a search engine (Startpage) is blocked, which is incredibly frustrating! Here’s what happened:

  • The Wi-Fi stopped working when I had the VPN enabled.
  • I disabled the VPN, but still couldn't connect.
  • I forgot the Wi-Fi network and reset the driver, but still no luck.
  • I uninstalled the Mullvad, and then the Wi-Fi worked again.
  • I tried to access Startpage to search for an up-to-date package for Mullvad, but it was blocked.
  • I used my phone to get the software file and sent it over, but couldn't connect.
  • I searched for different VPNs using DuckDuckGo, but the whole site was blocked.
  • I tried searching for Mullvad, but that was blocked too.
  • I attempted to use Tor with various bridges, but couldn't connect for some unknown reason.
  • I finally settled for Onionfruit Connect, but it doesn't have a kill switch, which makes me uneasy.

Ironically, websites that could be considered harmful, like adult content, gambling sites and online gaming sites, are still accessible, while privacy-tools are blocked.

I'm looking for advice on how to bypass these firewall restrictions while ensuring my online safety and privacy. Any suggestions or alternative methods would be greatly appreciated! (If any advice is something about Linux, it could be a Problem, since my school enforces Windows 11 only PC's which is really really igngamblingThanks in advance for your help

edit: did some formatting

edit2: It is my device, which I own and bought with my own money. I also have gotten in trouble for connecting to tor and searching for tor, but I stated that I only used it to protect my privacy. Honestly I will do everything to protect my privacy so I don't care if I will get in trouble.

edit 3: Thanks for the suggestions, if I haven't responded yet, that's because I don't know what will happen.

top 50 comments
sorted by: hot top controversial new old
[–] RegalPotoo@lemmy.world 116 points 3 months ago (4 children)

Obligatory "read your schools' computer use policy before you get yourself in trouble for evading the firewall"

[–] subignition@fedia.io 44 points 3 months ago

Yeah, you probably don't want to risk getting caught for that. There is a possibility you could be criminally charged (regardless of how stupid you might think that is, it happens) when the school finds out what you're doing. And if you're using school-issued hardware they're very likely to find out what you're doing.

load more comments (3 replies)
[–] ResoluteCatnap@lemmy.ml 55 points 2 months ago* (last edited 2 months ago)

Here are some good rule of thumbs for work and schools:

  • do not connect to their networks with your personal devices, ever.

  • Only use work/ school devices on their own network.

  • Do not do anything personal on those networks. only do work/school related tasks. This means don't log into any non school/work accounts.

  • If for some reason they don't have a device for you but require you to use their network, then leave your personal devices at home claiming you don't own one and make them accommodate you.

You cannot expect privacy in these situations, and by going to the extreme lengths to try to get it then you will ironically just paint a bigger target on your back if any network admin cares. In some cases this can cost you your job or get you in trouble with the school.

[–] Steve@communick.news 29 points 3 months ago* (last edited 3 months ago) (1 children)

Have you tried the "Stealth" protocol option ProtonVPN has?
It's intended to bypass VPN blocks. Sometimes it works.

[–] scarilog@lemmy.world 2 points 2 months ago

Windscribe has a Websocket tunnel option. Haven't been on a network that's been able to block this mode yet.

[–] Charger8232@lemmy.ml 28 points 2 months ago* (last edited 2 months ago) (2 children)

Hi! Back in high school, me and a few close friends formed a small hacking group aimed at hacking the school WiFi. We succeeded, and reported the vulnerabilities we found along the way to the school. Our school had a policy where students who managed to hack something would be let off the hook if they reported exactly how they did it. I managed to land a job for the school district as a result of our fiasco. I don't recommend anyone do that, but I managed to get lucky.

Anyways, once we had access to the WiFi we wanted to get around the network wide filter. Proton VPN worked for a while, but quickly got blocked. Dual booting into Tails on school computers didn't work until the 6.0 update. To my knowledge, it still works.

However, for our phones, the thing that worked was changing the DNS. We found out the network wide filter the school boasted so highly about was only a DNS filter that resolved hostnames to a "blocked" page. Find a good PRNS and change your device's DNS to match. If you want a search engine, try to find an unblocked SearXNG instance.

Good luck!

P.S. Don't forget: Tor is portable on Windows devices :)

[–] InputZero@lemmy.ml 8 points 2 months ago

This is the best answer. You didn't go charging through their system with complete disregard. You made the IT staff like you first, then broke through their system. That's social engineering at it finest here people, and is the first skill any great hacker needs to learn. Please do good with this skill.

[–] possiblylinux127@lemmy.zip 5 points 2 months ago

You want DNS over https

[–] eco_game@discuss.tchncs.de 25 points 3 months ago* (last edited 2 months ago) (4 children)

What worked for me at my old school was using a ShadowSocks proxy. ~~Basically what this does, is it takes all your traffic and just makes it look like random https traffic (AFAIK).~~ ShadowSocks is just a proxy. The description fits the Cloak module, mentioned below.

I believe multiple VPNs support this, for me with PIA VPN it's in the settings under the name "Multi-Hop" (PIA only supports this on the Desktop App, not on mobile).

This technique is pretty much impossible to block, unless you ban every single VPN ShadowSocks Proxy IP. If that is the case for you (chances are practically 0), you could also selfhost ShadowSocks in combination with the Cloak module, however this method is a lot more complicated.

[–] refalo@programming.dev 13 points 3 months ago (1 children)
[–] EngineerGaming@feddit.nl 6 points 2 months ago (2 children)

Yea, IIRC XRay is the most advanced solution for that now.

load more comments (2 replies)
[–] fmstrat@lemmy.nowsci.com 3 points 2 months ago

And if you host your own VPN, it's identifiable as a single destination for your connection.

load more comments (2 replies)
[–] refalo@programming.dev 20 points 3 months ago (2 children)

If it's any school like mine was, where people actively look at all the traffic going through their network, it's a losing battle. And I say this as both a huge privacy advocate and a long-time network engineer.

Anything even remotely resembling a tunnel, VPN or proxy is going to make you stand out in their monitoring, because they will see constant traffic between you and the same host on the other end... traffic that practically never stops. In my day the school even force-reset SSH and RDP sessions after a while (or maybe it was actually ALL tcp sessions, not sure).

It doesn't matter what protocol or technique you use at that point because they can either block whatever IP/ports you use, every time you change it, or threaten/shut off your service.

[–] possiblylinux127@lemmy.zip 3 points 2 months ago* (last edited 2 months ago) (1 children)

There are tools that can reasonably get around that technically. You just need to make it look like https traffic.

I say this as it is possible to bypass the great firewall in China which was likely build on a much bigger budget

[–] refalo@programming.dev 2 points 2 months ago (1 children)

too much https traffic could also look suspicious, which they could then block...

load more comments (1 replies)
load more comments (1 replies)
[–] jjjalljs@ttrpg.network 20 points 2 months ago (1 children)

You're going to get in trouble and it's not worth it.

Don't do personal stuff on their network. What are you even trying to look at via the school network?

If you're concerned about privacy while doing school stuff, use another device, or maybe a VM. Do they provide computers for students?

You might get off with a warning because you're young (I assume you're like 16), but bypassing network security stuff as an adult at work will often get you fired.

[–] Mubelotix@jlai.lu 8 points 2 months ago (1 children)

I beg to differ. Everyone should have a right to access a free Internet. The censorship they are taking about is so broad that it cannot be accepted. In France the school could get highly punished if they dared to make comments on their harmless Internet activity

[–] jjjalljs@ttrpg.network 8 points 2 months ago (6 children)

The rights everyone should have is irrelevant to the reality. You can't steal a sandwich and be like "everyone should have the right to food!". I mean you can, but you'll still be punished.

Is this the hill for this kid to die on? Probably not. If they were trying to change the system for everyone to be more just, maybe.

load more comments (6 replies)
[–] hperrin@lemmy.world 18 points 3 months ago* (last edited 2 months ago) (3 children)
  1. Sign up for Digital Ocean.
  2. Get the cheapest VM (called Droplets on DO) you can get.
  3. Install Ubuntu on it.
  4. SSH into it and open a SOCKS proxy (ssh -D 8080 <yourdropletip> on Linux, use PuTTY on Windows).
  5. Configure Firefox to use localhost:8080 as a SOCKS5 proxy.
  6. Win.

Bonus points if you set up Cockpit to manage everything over the web (localhost:9090 over your proxy), that way you don’t need to learn all about sudo apt whatever.

[–] fmstrat@lemmy.nowsci.com 8 points 2 months ago (11 children)

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

load more comments (11 replies)
[–] Aradia@lemmy.ml 7 points 2 months ago (1 children)

hetzner.com is cheaper, I think.

[–] Deckweiss@lemmy.world 2 points 2 months ago (1 children)
[–] Aradia@lemmy.ml 2 points 2 months ago* (last edited 2 months ago)

That's nice, for 0,50 monthly less you have more hard drive (14GB more) but you lose 2GB of RAM compared to Hetzner.

EDIT: For VPN over HTTP, you don't need more than this.

load more comments (1 replies)
[–] AmbiguousProps@lemmy.today 13 points 3 months ago* (last edited 3 months ago)

You'll need to download the client off-network (have you tried the local library for that?) and put it on your PC. If you know how to use docker, you could set up the client via docker and dockerhub which I doubt is blocked, but you'd need to set docker up on windows which I have no experience with.

You can also try wireguard on a non-standard port if there are further blocks. OVPN can also go over 443 which might help.

Really though, it depends on how they're blocking them. They could be blocking the protocol based on port or deep packet inspection, or they could just be blocking a list of VPN hosts. They could be doing both.

If they're just blocking hosts, you could set up a vpn relay on a host somewhere else, but that won't help if they're blocking the protocol.

[–] Tinkerer@lemmy.ca 10 points 2 months ago

If you try to browse to the tailscale website does it work?

If it does you could setup tailscale with an exit node at your house and tunnel your connection that way? Everything would then be coming from your home internet. I have had good success with tailscale being able to punch a hole through some pretty filtered firewalls.

[–] shortwavesurfer@lemmy.zip 10 points 2 months ago (2 children)

I'm assuming you probably have a smartphone. In which case, I would just use your Wi-Fi hotspot instead.

[–] ReversalHatchery@beehaw.org 6 points 2 months ago

Which means the mobile data plan, which doesn't sound that easy anymore. Where I live (EU) mobile data plans are either quite limited in data cap or expensive, and for a lot of years now they are just shutting it down when yours ran out, instead of slowing it down.

[–] Decency8401@discuss.tchncs.de 3 points 2 months ago (4 children)

I tried this but my signal isn't strong enough to get thorugh the walls. In some classrooms it works, but it's more like a 50/50 chance to stay connected.

load more comments (4 replies)
[–] 0x0@programming.dev 10 points 2 months ago

Don't use the school's wi-fi? I'm sure there are other options to you.

[–] CommanderCloon@lemmy.ml 10 points 2 months ago (1 children)

Sounds like DNS blocking. Use DoH, won't be as good as a VPN but it will stop the sniffing which allows them to block domains

[–] Midnight1938@reddthat.com 2 points 2 months ago (1 children)

Whats DoH? Department of health?

[–] Nighth4wk@discuss.tchncs.de 3 points 2 months ago

DNS over HTTPS

[–] sturlabragason@lemmy.world 10 points 3 months ago* (last edited 3 months ago) (1 children)

You can sign up for an AWS account, set up an EC2 instance (a free type, you get one free year) and pull an wireguard image on docker there and connect to that? Unless they are whitelisting IPs I’d imagine this would work.

https://github.com/linuxserver/docker-wireguard

You can also replace AWS with an external computer of your choice…

[–] fmstrat@lemmy.nowsci.com 5 points 2 months ago (1 children)

Putting this here,too:

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

[–] sturlabragason@lemmy.world 2 points 2 months ago

Yeah I wasn’t really thinking about obfuscating that he was using a VPN. Just assumed this was not breaking rules, and only thinking about getting around the blocks and having a working VPN.

[–] possiblylinux127@lemmy.zip 8 points 2 months ago (1 children)

Don't use the WiFi if you don't like the rules

[–] Reddfugee42@lemmy.world 6 points 2 months ago

Thank you, Supernintendo Chalmers

[–] MrCamel999@programming.dev 8 points 3 months ago

I'm aware of a network that blocks Mullvad as well, but found a way around it. It went through just fine if I was using a custom DNS server. I used NextDNS for this, but I imagine it would work with Cloudflare or something as well (but I highly recommend NextDNS anyways). Hope this helps!

[–] StarlightDust@lemmy.blahaj.zone 6 points 2 months ago* (last edited 2 months ago)

DNS over HTTPS is your best bet because they can't Man In The Middle and replace it (DNS Poison) like good old DNS. They will still be able to see the IP addresses you are connecting to unless you proxy those connections. nativeproxy uses Chromium's stack so it is much harder to detect. There are UI frontends for it if you prefer but I've never used them. ProtonVPN also has a stealth protocol that I've heard is good, though I don't know too much about it.

Good on you for trying to get around it. That kind of curiosity is a great way to develop your lateral thinking skills. You didn't ask for a lecture and people giving you one should go back to stack overflow comments. If you want to take the risks of it, that is up to you and you are likely to fuck up. That being said, you aren't the only person likely go get in trouble if you fuck up and, unlike you, IT will depend on their job financially. If you do it well enough and make sure you don't get caught by someone seeing your screen or blagging around the school that you did it, that won't be an issue.

IT departments also read comments in threads like this to find the current trends of how students are trying to get around their web blockers so keep in mind that you will need to keep your skills up to date.

[–] lnxtx@feddit.nl 4 points 2 months ago

If you don't need a speed and full functionality of the Internet.
Try bridges for the Tor Browser.

[–] Gemini24601@lemmy.world 4 points 2 months ago

Seems like Tor snowflake is a proxy that makes your internet traffic appear as a video call. Its purpose is to circumvent censorship, but it may get around firewalls as well. I have no experience bypassing firewalls using snowflake, but it may be a viable option (someone correct me if I’m wrong) https://snowflake.torproject.org/

[–] fuckwit_mcbumcrumble@lemmy.dbzer0.com 2 points 3 months ago (3 children)

Is this a school issued computer or your own on their network? Never assume you have any privacy on a computer that isn't your own. Even if you do get a VPN on there they probably have software on the laptop to monitor your actual screen which is far more privacy invasive than seeing that you accessed lemmy 500 times in an hour.

load more comments (3 replies)
[–] Melody@lemmy.one 2 points 2 months ago

Typically, using your own VPN should suffice. Depending on your situation you can do other things as well. If you are unable to download these tools on the school network in question; do not attempt to do so again. Use a public or other network connection elsewhere to obtain the tools you need to bypass their crap.

For example, NextDNS could be helpful. By running their client app; ( https://github.com/nextdns/nextdns/wiki/Windows ) you can make sure all your DNS requests are encrypted. Similarly you could simply set up a local DNS server that you point Windows at which can redirect those requests over DNS-Over-(HTTPS or TLS) to a DNS provider of your choosing.

load more comments
view more: next ›