Openvpn is blocked where i live, what can i do?

so i’m trying to connect to TryHackMe’s openvpn servers from my local machine and i can’t connect to them and this the log

2023-06-16 22:18:15 OpenVPN 2.6.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]

2023-06-16 22:18:15 library versions: OpenSSL 3.0.8 7 Feb 2023, LZO 2.10

2023-06-16 22:18:15 TCP/UDP: Preserving recently used remote address: [AF_INET]18.202.129.195:1194

2023-06-16 22:18:15 Socket Buffers: R=[212992->212992] S=[212992->212992]

2023-06-16 22:18:15 UDPv4 link local: (not bound)

2023-06-16 22:18:15 UDPv4 link remote: [AF_INET]18.202.129.195:1194

2023-06-16 22:18:15 TLS: Initial packet from [AF_INET]18.202.129.195:1194, sid=ffac422c faf462f3

2023-06-16 22:19:15 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2023-06-16 22:19:15 TLS Error: TLS handshake failed

2023-06-16 22:19:15 SIGUSR1[soft,tls-error] received, process restarting

2023-06-16 22:19:15 Restart pause, 1 second(s)

so after some researching i found out that openvpn and many other VPNs are blocked where i live

i’ve tried many things like setting up my own openvpn server on a different port and use as a kind of a relay between me and their vpn server but this failed

what i found to be working is to use a ssh tunnel with the remote server being connected to Tryhackme’s vpn the thing is

90% of the time it fails to use any terminal based-tool as it was not configured to proxy the connection and it is not stable

browser works fine tho and how i tackled this by installing a Kali image on a google cloud VM instance and used it with the browser configured to route traffic through the ssh tunnel proxy and it worked kind of okay-ish

the thing is this setup is annoying and sometimes it gets confusing when i try work with some tools like Burpsuite

what can be done in this situation to maybe try and bypass that block or what other solutions that may work

Try a TCP connection, put it on a https port like 443 or 8443.

If even that fails, install a proxy server on your openvpn server machine and connect to that via the http-proxy option (see here ). That should make the traffic your client generates virtually indistinguishable from a general HTTPS connection and evade filtering.

Hello Op
Were u able to find any solution to this?

I ended up getting a box in AWS then ssh to that box and use it, for any thing that would require a browser i would use a ssh tunnel then use the proxy in my browse,
You can use AWS as well i believe you might be able to get kali instances on it ,

1 - Get any kind of cloud based VM and make it your attacker machine but it’s totally controlled by you and you ahould be able to get it for free

2 - set it up with kali if available, if not get any linux machine that suits your personal preferences and install the tools that you would need

3 - when you SSH into your VM just append - D 8888 to your ssh command so it should look like this
ssh user@vm -D 8888

4 - change the proxy in your browser to Socks5 localhost 8888

and then connect to the VPN from the VM and it will work and you will be able to use your browser aswell

it worked great for me that way and did not have any problems,
but i didn’t give bypassing the UDP block anymore tries although i believe there should be a way to do it but the above solution did the job for me.

That’s if your asking about TryHackMe ofc