@ParSulTang said in X-ray VPN implementation in future releases of pfSense+:
This is an absolutely essential technical feature in 2025.
All what follows is purely hypothetical, just me thinking here.
What if I had a company based in the US and I create firewalls with VPN support ?
If my client base start to express the need for a 'new' of VPN, I would surely investigate the possibility of implementing it. So, no worries. these forum post have alredy been seen by the 'makers' ^^
As a VPN is a piece of software that goes deep into the system, it has to be reviewed first. Adding a possible unknown flaw into the (a) system that advertises network security will create bad publicity.
And, again, this is me talking, the usage case is clearly mentioned above. This VPN goes clearly against law that exist in certain countries. And we're not talking 'Luxembourg' here. Countries sited above have 'long arms' and are very capable of reacting if some one does something they don't like.
Also, let's face it : you ask this firewall company to do something special for the chinese market ?
Let's say : you see the smile onmy face ? What's in it for them ? [ I mean, more then having the 'firewall' cloned massivily on all low bud dvices coming from these countries ? ]
Btw : using https traffic to hide traffic is, I fully agree, is probably one of the best way of hiding traffic. The only visible thing that is left to see for the IDP tools would be the destination IP and port. If the IP gets known as a xray VPN server, it's game over. If I was working as a "great wall" administrator and I saw loads of https traffic to a server that doesn't host a site with known frequently requested info, using domain names that didn't exist some weeks ago, I would simply block the IP and see what happens.
Typically, the xray vpn server should hide itself behind a big public domain names like ccn.com or microsoft.com (etc) but I'm pretty sure they won't allow this.
@ParSulTang said in X-ray VPN implementation in future releases of pfSense+:
This is an absolutely essential technical feature in 2025.
So, stop waiting. Get a copy of FreeBSD, fire up a VM and install it, add your xray stuff, and done ^^
Maybe counter productive but : don't tell what you are doing. As long as you are 'the only one' doing this, you'll be "flying below the radar" and this VPN will work for you a long time. If the 'secret' comes out for the big public, it will dealt with.
Example : TOR is very known, and guess what : since a year or two, no more news outlets about it. Like "some one" (read : our governement) doesn't care anymore.
This can only maen one thing ....
Forum admins : if there is to much 'politics' in my post, feel free to zap it. I understand.