<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>VPN</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Bypassing Deep Packet Inspection: Tunneling Traffic Over TLS VPN</title>
  <link>https://www.linuxjournal.com/content/bypassing-deep-packet-inspection-tunneling-traffic-over-tls-vpn</link>
  <description>  &lt;div data-history-node-id="1340827" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img loading="lazy" src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/bypassing-deep-packet-inspection-vpn.jpg" width="850" height="500" alt="Bypassing Deep Packet Inspection" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/dmitriy-kuptsov" lang="" about="https://www.linuxjournal.com/users/dmitriy-kuptsov" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Dmitriy Kuptsov&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;In some countries, network operators employ deep packet inspection techniques to block certain types of traffic. For example, Virtual Private Network (VPN) traffic can be analyzed and blocked to prevent users from sending encrypted packets over such networks.&lt;/p&gt;

&lt;p&gt;By observing that HTTPS works all over the world (configured for an extremely large number of web-servers) and cannot be easily analyzed (the payload is usually encrypted), we argue that in the same manner VPN tunneling can be organized: By masquerading the VPN traffic with TLS or its older version - SSL, we can build a reliable and secure network. Packets, which are sent over such tunnels, can cross multiple domains, which have various (strict and not so strict) security policies. Despite that the SSH can be potentially used to build such network, we have evidence that in certain countries connections made over such tunnels are analyzed statistically: If the network utilization by such tunnels is high, bursts do exist, or connections are long-living, then underlying TCP connections are reset by network operators.&lt;/p&gt;

&lt;p&gt;Thus, here we make an experimental effort in this direction: First, we describe different VPN solutions, which exist on the Internet; and, second, we describe our experimental effort with Python-based software and Linux, which allows users to create VPN tunnels using TLS protocol and tunnel small office/home office (SOHO) traffic through such tunnels.&lt;/p&gt;

&lt;h2&gt;I. INTRODUCTION&lt;/h2&gt;

&lt;p&gt;Virtual private networks (VPN) are crucial in the modern era. By encapsulating and sending client’s traffic inside protected tunnels it is possible for users to obtain network services, which otherwise would be blocked by a network operator. VPN solutions are also useful when accessing a company’s Intranet network. For example, corporate employees can access the internal network in a secure way by establishing a VPN connection and directing all traffic through the tunnel towards the corporate network. This way they can get services, which otherwise would be impossible to get from the outside world.&lt;/p&gt;

&lt;h2&gt;II. BACKGROUND&lt;/h2&gt;

&lt;p&gt;There are various solutions that can be used to build VPNs. One example is Host Identity Protocols (HIP) [7]. HIP is a layer 3.5 solution (it is in fact located between transport and network layers) and was originally designed to split the dual role of IP addresses - identifier and locator. For example, a company called Tempered Networks uses HIP protocol to build secure networks (for sampling see [4]).&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/bypassing-deep-packet-inspection-tunneling-traffic-over-tls-vpn" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 11 Feb 2021 17:00:00 +0000</pubDate>
    <dc:creator>Dmitriy Kuptsov</dc:creator>
    <guid isPermaLink="false">1340827 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>RV Offsite Backup Update</title>
  <link>https://www.linuxjournal.com/content/rv-offsite-backup-update</link>
  <description>  &lt;div data-history-node-id="1340746" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Having an offsite backup in your RV is great, and after a year of use,
I've discovered some ways to make it even better.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
Last year I wrote a feature-length article on the data backup system I
set up for my RV (see Kyle's &lt;a href="https://www.linuxjournal.com/content/diy-rv-offsite-backup-and-media-server"&gt;"DIY
RV Offsite Backup and Media Server"&lt;/a&gt; from the June 2018 issue of
&lt;em&gt;LJ&lt;/em&gt;). If you haven't read that article yet, I recommend
checking it out first so you can get details on the system. In summary,
I set up a Raspberry Pi media center PC connected to a 12V television
in the RV. I connected an 8TB hard drive to that system and
synchronized all of my files and media so it acted as a kind of
off-site backup. Finally, I set up a script that would attempt to sync
over all of those files from my NAS whenever it detected that the RV was on
the local network. So here, I provide an update on how that
system is working and a few tweaks I've made to it since.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
What Works&lt;/span&gt;

&lt;p&gt;
Overall, the media center has worked well. It's been great to have all
of my media with me when I'm on a road trip, and my son appreciates
having access to his favorite cartoons. Because the interface is
identical to the media center we have at home, there's no learning
curve—everything just works. Since the Raspberry Pi is powered off
the TV in the RV, you just need to turn on the TV and everything fires
up.
&lt;/p&gt;

&lt;p&gt;
It's also been great knowing that I have a good backup of all of my
files nearby. Should anything happen to my house or my main NAS, I know
that I can just get backups from the RV. Having peace of mind about
your important files is valuable, and it's nice knowing in the worst
case when my NAS broke, I could just disconnect my USB drive from the
RV, connect it to a local system, and be back up and running.
&lt;/p&gt;

&lt;p&gt;
The WiFi booster I set up on the RV also has worked pretty well to
increase the range of the Raspberry Pi (and the laptops inside the RV)
when on the road. When we get to a campsite that happens to offer WiFi,
I just reset the booster and set up a new access point that amplifies
the campsite signal for inside the RV. On one trip, I even took it out
of the RV and inside a hotel room to boost the weak signal.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/rv-offsite-backup-update" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 07 Aug 2019 21:15:00 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1340746 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>The Fight for Control: Andrew Lee on Open-Sourcing PIA</title>
  <link>https://www.linuxjournal.com/content/fight-control-andrew-lee-open-sourcing-pia</link>
  <description>  &lt;div data-history-node-id="1339842" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/doc-searls" lang="" about="https://www.linuxjournal.com/users/doc-searls" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Doc Searls&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;
When I learned that our new sister company, Private Internet
Access (PIA), was opening its source code, I immediately wanted to
know the backstory, especially since privacy is the theme of this month's
&lt;em&gt;Linux Journal&lt;/em&gt;. So I contacted Andrew Lee, who founded PIA, and an interview
ensued. Here it is.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;DS:&lt;/strong&gt; What made you start PIA in the first place? Did you have a particular
population or use case—or set of use cases—in mind?
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;AL:&lt;/strong&gt; Primarily PIA was rooted in my humble beginnings on IRC where it had
quickly become important to protect one's IP from exposure using an IRC
bouncer. However, due to jumping around in various industries thereafter, I
learned a lot and came to an understanding that it was time for privacy to
go mainstream, not in the "hide yourself" type of sense, but simply
in the "don't watch me" sense.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;DS:&lt;/strong&gt; Had you wanted to open-source the code base all along? If not, why now?
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;AL:&lt;/strong&gt; We always wanted to open-source the code base, and we finally got
around to it. It's late, but late is better than never. We were incredibly
busy, and we didn't prioritize it enough, but by analyzing our philosophies
deeply, we've been able to re-prioritize things internally. Along with
open-sourcing our software, there are a lot of great things to come.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;DS:&lt;/strong&gt; People always wonder if open-sourcing a code base affects a business
model. Our readers have long known that it doesn't, and that open-sourcing
in fact opens more possibilities than leaving code closed. But it would be
good to hear your position on the topic, since I'm sure you've thought
about it.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;AL:&lt;/strong&gt; Since Private Internet Access is a service, having
open-source code
does not affect the business' ability to generate revenue as a company
aiming for sustainable activism. Instead, I do believe we're going to end
up with better and stronger software as an outcome.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;DS:&lt;/strong&gt; Speaking of activism, back in March, you made a very strong statement,
directly to President Trump and Congress, with a two-page ad in &lt;em&gt;The New
York Times&lt;/em&gt;, urging them to kill off SESTA-FOSTA. I'm
curious to know if we'll be seeing more of that and to hear what the
response was at the time.
&lt;/p&gt;



&lt;p&gt;
&lt;strong&gt;AL:&lt;/strong&gt; Absolutely! We ran a few newspaper campaigns, including one for the
Internet Defense League. It's a very strong place to mobilize people for
important issues for society. As a result of the campaign, many tweets from
concerned Americans were received by President Trump. I would say it was a
success, but from here it's up to our President. Let's hope he does the
right thing and vetoes it. That said, if the bill is signed in its current
form [which it was after this interview was conducted], the internet is
routing, and the cypherpunks have the power of the
crypto. We will decentralize and route around bad policy.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/fight-control-andrew-lee-open-sourcing-pia" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 30 May 2018 13:08:08 +0000</pubDate>
    <dc:creator>Doc Searls</dc:creator>
    <guid isPermaLink="false">1339842 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
