This is useful if you are behind a restrictive firewall that uses SPI to block services rather than plain old port blocking. An SPI firewall is able to distinguish between one packet type and another, without just checking the port that is in use.
You’ll need root access to the OpenVPN Server, as you have to change some of the server config files.
You need to do the folllowing changes:
- change the line proto udp to proto tcp on client and server configuration file
- add socks-proxy localhost 5555 in the OpenVPN client configuration file
- create an SSH tunnel between the client machine and the OpenVPN Server. Assuming you’re running Linux/Unix with the OpenSSH client binary installed then run the command:
ssh -ND5555 firstname.lastname@example.org
Note: If you are using Windows please read what this guy wrote here: http://blog.ramin-hossaini.com/2009/10/06/creating-a-tunnel-and-socks-proxy-with-putty/