http://ciisqbg45nggykdl6rjdrq3wc64csga4vkphu66qsi65mypeitqedoad.onion/blog/https-tunnels
With stunnel now running in the background, start OpenVPN with the command: sudo openvpn /etc/openvpn/ssl.conf Once that's connected, you're all done. All of your traffic will now appear to be HTTPS traffic. Technical details Those of you experienced with stunnel will probably notice that we're not doing anything to verify the server's TLS certificate, or the CA certificate.