• pishadoot@sh.itjust.works
    link
    fedilink
    arrow-up
    3
    ·
    3 hours ago

    There’s a few ways to “detect” VPN traffic, and you’re missing some but port blocking is one of them. Rerouting over 443 is a possible workaround, but depending on the network architecture they can still detect VPN traffic using deep packet inspection.

    Blocking ports is a very simple mechanism to prevent things and it doesn’t take long for a business to grow into IT management that involves more sophisticated methods like DPI.

    VPN protocols have distinguishable packet headers/metadata/handshakes/etc. DPI can easily identify and block those, or any other known protocols, if they have it configured to do so.

    • zephiriz@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 hour ago

      Ah nice to know. I’m just an amateur hobbyists. I just remember years ago the company I worked for(somewhat large) blocked ports 80 and 443 but left almost everything else open. Stop employees from browsing the web. I went home hosted a web page served on some random high port that worked as a proxy and loaded pages I wanted then used it to play flash ( shows my age) games at work to kill time. Looking back guess I could of gotten into some shit but no longer work for them. It was a fun time though.