Tunneling through a hostile proxy?