VPN Through Proxy Server for unblockable anonymity?

dylan1951

Commendable
Aug 20, 2016
7
0
1,520
I am connected to a very restrictive network which blocks a lot of websites and ports. The network has also blocked a lot of major shared VPN IP addresses.

I know you can get a dedicated IP address for your VPN (which wouldn't be blocked) but there are upsides to sharing an IP address with thousands of other people. Such as you can't easily be singled out.

So I was thinking what if you created a server connected to paid public, encrypted VPN service with a shared IP, that kept a couple of ports open not using the VPN which could be connected to your laptop where ever you are and be used as a proxy.

If this were possible it would mean the restrictive router wouldn't block the connection to the proxy because it isn't a known shared IP, and everyone on the internet that you connect to would only see the shared public IP of your vpn, so you couldn't be singled out in the crowd.

I am completely missing something or wouldn't this be great?
 
Solution
Although you might be able to build some custom thing yourself discussing details is not allowed on this forum.

Instead let me explain how the company I work for manages to block most things. First high end firewalls have great subscription services for many categories. You just click the box for a category called anonymizers and it pretty much blocks huge lists of proxy and vpn sites. It also blocks huge numbers of hosting sites so it stops many of the home built vpn.

The firewalls also do deep packet inspection on any connection that is not encrypted. This lets them detect most forms of proxy. It also of course directly blocks IPSEC and PPTP. This leave ssl. Almost all the vpn you find uses OPENVPN. openvpn does...
Although you might be able to build some custom thing yourself discussing details is not allowed on this forum.

Instead let me explain how the company I work for manages to block most things. First high end firewalls have great subscription services for many categories. You just click the box for a category called anonymizers and it pretty much blocks huge lists of proxy and vpn sites. It also blocks huge numbers of hosting sites so it stops many of the home built vpn.

The firewalls also do deep packet inspection on any connection that is not encrypted. This lets them detect most forms of proxy. It also of course directly blocks IPSEC and PPTP. This leave ssl. Almost all the vpn you find uses OPENVPN. openvpn does not actually use SSL but something close. When the SSL sessions are analyzed you can detect this non standard SSL traffic and block it. It will also detect many other things that attempt to use the SSL improperly.

This leave things that use proper SSL. There are not a lot of things that use actual sslvpn. A couple expensive commercial boxes from cisco or juniper. Still even this does not prevent you from being detected and blocked. The firewalls will also call out unusual traffic. They can look at the patterns in the encrypted traffic and detect what they think is VPN type of traffic. It can also detect what it thinks is simple proxy traffic running over https. There are a number of article on how this is done. A company can then use a man in the middle attack with their own certificate server to decrypt the HTTPS. This is completely legal inside a company and they can rig the end devices to not produce warnings.

Pretty much a strong network tech can defeat pretty much anything you can think of.
 
Solution