-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Description
Overview
This is a tracking issue for the various problems users experience when deploying Algo VPN on Google Cloud Platform (GCE). While Google Cloud technically supports VPN deployments, users consistently report significant operational challenges that make it a hostile environment for running personal VPN servers.
Current Known Issues
1. Connection and Deployment Failures
- Google Cloud: Connection reset by peer #14741: SSH connection reset during deployment (macOS Sequoia, Python 3.12.5)
- Unsuccessful Google cloud setup #14600: Cloud-init timeout failures waiting for
/var/lib/cloud/data/result.json
- consider updating gce warning about python 3.8 #14702: Python version compatibility issues in Google Cloud environment
- ansible 9.1.0 not available on gcloud shell #14701: Ansible availability limitations in Google Cloud Shell
2. Geographic Routing Problems
- GCP CE selected country completely different from end one #14464: VMs deployed in completely different regions than selected
- Example: London selection → German IP address
- Example: Taipei selection → "opposite side of the world"
- Results in unexpected latency and increased costs
3. IP Reputation and Blocking Issues
This is the most significant problem affecting Google Cloud deployments.
From our troubleshooting documentation:
When you deploy Algo to a new cloud server, the address you are given may have been used before. In some cases, a malicious individual may have attacked others with that address and had it added to "IP reputation" feeds or simply a blacklist. This happens most frequently with Google.
Specific Problems:
- Google Cloud IP ranges frequently blacklisted by services (e.g., UCEPROTECT)
- Entire network blocks (e.g., 146.148.0.0/17) flagged as suspicious
- Constant CAPTCHA challenges when accessing websites
- Some services completely block Google Cloud IPs
- Ironically, Google's own services often block Google Cloud IPs
4. Google's Anti-VPN Measures
Google Cloud Armor Enterprise categorizes and can block:
- VPN providers: "IP addresses used by low-reputation VPN providers"
- Anonymous proxies: Known proxy service IPs
- Public cloud IP address ranges: Can be blocked to prevent "malicious automated tools"
This creates a situation where Google's security products actively work against Google Cloud customers running VPNs.
Root Causes
- IP Reputation System: Cloud provider IPs have inherently poor reputation due to historical abuse
- No Clean IP Guarantee: Google Cloud doesn't guarantee clean IPs for new instances
- Automated Blocking: Many services automatically flag all cloud provider IPs as suspicious
- Cross-Provider Issues: Google blocks IP ranges from other cloud providers, creating connectivity problems
Impact on Users
- Frequent need to redeploy to get usable IP addresses
- Constant CAPTCHA challenges, especially on Google services
- Some websites completely inaccessible
- Unpredictable geographic routing
- Higher costs due to redeployments and unexpected regions
Current Workarounds
- Redeploy frequently to try getting cleaner IP addresses
- Accept CAPTCHAs as a normal part of browsing
- Use alternative cloud providers with better IP reputation
- Deploy to your own hardware to avoid cloud IP issues entirely
Recommendations
For Users:
- Consider alternatives to Google Cloud for VPN deployments
- Be prepared for significant usability issues if choosing Google Cloud
- Budget for multiple redeployments to find usable IPs
For Algo Project:
- Add prominent warning in documentation about Google Cloud challenges
- Consider removing Google Cloud from "recommended" providers list
- Document specific Google Cloud gotchas in setup guide
- Track Google Cloud deployment success rates
Policy Clarification
Important: Google Cloud Platform does NOT prohibit VPN traffic in their terms of service. The issues are operational, not policy-based:
- VPN connectivity is a supported Google Cloud feature
- Third-party VPN implementations are allowed
- The problems stem from IP reputation and anti-abuse systems, not ToS violations
Contributing
If you experience Google Cloud-specific issues:
- Comment on this issue with your experience
- Include specific error messages from Google or blocked services
- Note which region you deployed to and what IP range you received
- Share any successful workarounds
Status: This is an ongoing issue with no clear technical solution. The fundamental problem is that cloud provider IPs are systematically treated as suspicious by many services, and Google Cloud appears to be the most affected provider.
Labels: gce, google-cloud, documentation, wontfix