VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass network firewall systems.
Blocking VPN access can be done a few different ways. Ports that are used by common VPN tunneling protocols, such as PPTP or L2TP, to establish their connections and transfer data can be closed by system administrators to prevent their use on certain networks. Similarly, a service can prohibit access by blocking access from IP addresses and IP address ranges that are known to belong to VPN providers. [1] [2] Some governments have been known to block all access to overseas IP addresses, since VPN use can involve connecting to remote hosts that do not operate under that government's jurisdiction. [3]
As organizations have ramped up efforts to block VPN access which bypasses their firewalls, VPN providers have responded by utilizing more sophisticated techniques to make their connections less conspicuous. For instance, as the Chinese government began using deep packet inspection to identify VPN protocols, the firm Golden Frog began scrambling OpenVPN packet metadata for its popular VyprVPN service in an attempt to avoid detection. [4]
Chinese internet users started reporting unstable connections in May 2011 while using VPNs to connect to overseas websites and services such as the Apple App Store. [5] Universities and businesses began issuing notices to stop using tools to circumvent the firewall.
In late 2012, companies providing VPN services claimed the Great Firewall of China became able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems.
In 2017, telecommunications carriers in China were instructed by the government to block individuals' use of VPNs by February 2018. [6]
In 2024, VPNs were frequently inaccessible during the Two Sessions. [7]
In 2022, the government of India stated VPN providers must log a variety of user data for a minimum of five years. Due to the new ruling, many VPN service providers removed their physical servers from India and instead operate virtual servers, allowing users to still connect to India locations but without falling under the jurisdiction of Indian law. [8]
The government of Iran began blocking access to non-government sanctioned VPNs in March 2013, [9] a few months prior to the 2013 elections, to "prosecute users who are violating state laws" and "take offenders to national courts under supervision of judiciary service". Use of VPNs approved by the government reportedly led to surveillance and inspection of private data. [10]
In July 2017, the State Duma passed a bill requiring the Internet providers to block websites that offer VPNs, in order to prevent the spreading of "extremist materials" on the Internet. [11] [12] It is unclear exactly how Russia plans to implement the regulation; though it seems like both the Federal Security Service (FSB) and ISPs will be tasked with identifying and cracking down on VPNs. In November 2017, BBC made it clear that Russia has not banned VPN usage entirely. VPN usage is only banned when attempting to access sites already blocked by Roskomnadzor or Russia's governing body for telecommunications and mass media communications. [13] Using a VPN for business or personal reasons to access legal sites in Russia is permitted. [14]
Russia has banned various VPN service providers in 2021 [15] and forced Google to delist VPN websites even while Russians continue to download VPNs. [16]
The government of Syria activated deep packet inspection after the uprising in 2011 in order to block VPN connections. [17] The censorship targeted different VPN protocols like OpenVPN, L2TP and PPTP.
The government of Pakistan issued a notice to VPN providers to register their IPs, otherwise their VPN service will be blocked like in China.
In an attempt to curb the use of social media by its citizens, the government of Turkey has considered the complete ban of VPN apps. The Nationalist Movement Party proposed a bill covering such a ban in July 2020. [18] [19] [20]
In an attempt to stop unauthorized access from users outside the United States, Hulu began blocking users accessing the site from IP addresses linked to VPN services in April 2014. In doing so, however, the company also restricted access from legitimate U.S.-based users using VPNs for security reasons. VPN providers such as VikingVPN, NordVPN and TorGuard stated that they would seek ways to address this issue for their customers by speaking directly to Hulu about a resolution and rolling out more dedicated IP addresses, respectively. [21]
Netflix came under pressure from major film studios in September 2014 to block VPN access, as up to 200,000 Australian subscribers were using Netflix despite it not being available yet in Australia. [22] VPN access for Netflix has, like other streaming services, allowed users to view content more securely or while out of the country. Netflix users have also used VPNs as a means of bypassing throttling efforts made by service providers such as Verizon. It is also important to note that all VPNs might slow down internet connection when trying to stream Netflix; however, there are cases where using a VPN might improve connection if a user's ISP has been throttling Netflix traffic. As of June 2018, the Netflix VPN and proxy ban is still active. The CEO of Netflix, Reed Hastings made a comment in 2016 about the VPN market as a whole; “It’s a very small but quite vocal minority. It’s really inconsequential to us.” [23]
The BBC started blocking users connecting via VPNs in October 2015. [24] The BBC is able to detect VPN connections by monitoring the number of simultaneous connections coming from each IP address. If the number of connections from the same IP becomes abnormal the BBC will block future connections from the offending IP address.
BBC iPlayer remains unavailable to UK TV Licence holders connecting from other EU countries. [25] The BBC said that it was "interested in being able to allow UK licence fee payers to access BBC iPlayer while they are on holiday, and welcome the European Union regulation to help make this feasible." [26]
Meta's Threads platform started blocking users from the European Union who used VPNs to bypass the access restriction to the service stemming from the privacy concerns of the app. [27] However, as of December 14, 2023,[ needs update ] the platform was accessible to users in the European Union. [28]
An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Such restrictions can be applied at various levels: a government can attempt to apply them nationwide, or they can, for example, be applied by an Internet service provider to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual user to their own computers. The motive is often to prevent access to content which the computer's owner(s) or other authorities may consider objectionable. When imposed without the consent of the user, content control can be characterised as a form of internet censorship. Some filter software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities.
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.
Virtual private network (VPN) is a network architecture for virtually extending a private network across one or multiple other networks which are either untrusted or need to be isolated.
China censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of their government, and severely restricting freedom of the press. China's censorship includes the complete blockage of various websites, apps, and video games, inspiring the policy's nickname, the Great Firewall of China, which blocks websites. Methods used to block websites and pages include DNS spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections.
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues.
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 optionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded. A SOCKS server accepts incoming client connection on TCP port 1080, as defined in RFC 1928.
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption ('hiding') only for its own control messages, and does not provide any encryption or confidentiality of content by itself. Rather, it provides a tunnel for Layer 2, and the tunnel itself may be passed over a Layer 3 encryption protocol such as IPsec.
Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.
The Great Firewall is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking transmission control protocol (TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed. If one link is closed, more links from the same machine will be blocked by the Great Firewall. The effect includes: limiting access to foreign information sources, blocking foreign internet tools and mobile apps, and requiring foreign companies to adapt to domestic regulations.
OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server applications.
In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. It can, for example, allow private network communications to be sent across a public network, or for one network protocol to be carried over an incompatible network, through a process called encapsulation.
An ICMP tunnel establishes a covert connection between two remote computers, using ICMP echo requests and reply packets. An example of this technique is tunneling complete TCP traffic over ping requests and replies.
An application-level gateway is a security component that augments a firewall or NAT employed in a mobile network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications. In order for these protocols to work through NAT or a firewall, either the application has to know about an address/port number combination that allows incoming packets, or the NAT has to monitor the control traffic and open up port mappings dynamically as required. Legitimate application data can thus be passed through the security checks of the firewall or NAT that would have otherwise restricted the traffic for not meeting its limited filter criteria.
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.
Geo-blocking, geoblocking or geolocking is technology that restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, such as checking the user's IP address against a blacklist or whitelist, GPS queries in the case of a mobile device, accounts, and measuring the end-to-end delay of a network connection to estimate the physical location of the user. The IP address location tracking, a field pioneered by Cyril Houri, the inventor of one of the first systems capable of identifying a user's geographical location via their IP address. is typically used for geo-blocking. This technology have become widely used in fraud prevention, advertising, and content localization, which are integral to geo-blocking applications. The result of the checks is used to determine whether the system will approve or deny access to the website or to particular content. The geolocation may also be used to modify the content provided, for example, the currency in which goods are quoted, the price or the range of goods that are available, besides other aspects.
IPVanish VPN is a US-based VPN service owned by Ziff Davis.
A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.
Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake relay nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake node can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake relay. The node runs whenever the browser or program is connected to the internet.