tldr; You can now use any UDP or TCP port to connect to Cryptofree
Someone on twitter was asking for more ports to be opened up to help bypass a simple firewall.
Instead of creating a new server-side openvpn instance for each port we wanted open, I thought it'd be better to use iptables to forward all ports to the VPN port. So last night we setup the rules on the cryptofree server to test that out. Seems like it's working as expected. Now you can connect to it on any port (TCP or UDP, for both raw/linux and windows).
Keep in mind, the cryptofree server (windows-cryptofree1-a.cryptostorm.net and linux-cryptofree1-a.cryptostorm.net) is the only one that has this feature. After more testing, we'll eventually do the same on all the other nodes.
To connect to the UDP instance, all you need to change in your config file is the port. Any valid port (1-65534) will work, unless your ISP is firewalling that port. To connect to the TCP instance, you need to remove or comment out the "fragment" and the "explicit-exit-notify" config directives since those are only for UDP.
I did 5 or so test connects to random UDP and TCP ports on the windows instance and each connect seemed to work great, so I'm assuming the raw/linux one works fine too. If someone wants to test those out, feel free to, and please post back here letting me know if it was successful.