VPN FA: Difference between revisions

From Futuragora Wiki
(Created page with "MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora ==server data== IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153 ==Extra services== ===Tor Output=== Tor VPN Port: 90...")
 
No edit summary
Line 1: Line 1:
MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora
MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora


==server data==
==OpenVPN==


IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153
IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153


===Server Admin===
Webmin: https://10.7.0.1:10000
===IRC Private server connection===


==Extra services==
IRC Server


===Tor Output===
===Tor Output===
Line 17: Line 22:
Protocol: Socks5
Protocol: Socks5
</pre>
</pre>
===Server Admin===
Webmin: https://10.7.0.1:10000
===IRC Private server connection===
IRC Server


==Installation openvpn==
==Installation openvpn==
Line 31: Line 27:
sudo apt-get install openvpn
sudo apt-get install openvpn
      
      
Ceate fowarding ip:
<pre>
<pre>
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding  
comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding  
Line 40: Line 37:
source ./vars
source ./vars
./build-key
./build-key
</pre>
</pre>


Line 80: Line 76:
route 10.7.0.32 255.255.255.255 # faos
route 10.7.0.32 255.255.255.255 # faos


</pre>




comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding
client
dev tun
proto udp
# route-nopull
remote 80.86.87.232 1194
resolv-retry infinite # Try to preserve some state across restarts.
persist-key
persist-tun
ca ca.crt
cert 1000he.crt
key 1000he.key
 
ns-cert-type server
comp-lzo
pull dhcp-options
verb 3
 
</pre>


2.


3. Output proxys
3. Output proxys
Line 92: Line 103:




Samba:
==Samba==
Partilhas de pastas, pastas comuns e uploads.
Partilhas de pastas, pastas comuns e uploads.


Line 99: Line 110:
smb://10.7.0.1/dump_share - local de reciclagem e dump
smb://10.7.0.1/dump_share - local de reciclagem e dump


http://wiki.openwrt.org/doc/howto/vpn.openvpn
[[Openwrt]] http://wiki.openwrt.org/doc/howto/vpn.openvpn


....................................................................................................
....................................................................................................
Line 109: Line 120:
cd ~/fa/vpn
cd ~/fa/vpn
sudo openvpn vpn.conf
sudo openvpn vpn.conf
https://leap.se/en/docs/platform (meter no server)




tunctl -t tun1


The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use
The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use
Line 120: Line 128:
ip tuntap add
ip tuntap add
To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using
To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using
tunctl -t tun1
tunctl -t tun1
tunctl -t tun1


Line 128: Line 137:




==Allow Ping Windows==
Tell Windows to allow pings (ICMPv4)
Tell Windows to allow pings (ICMPv4)
Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule...
Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule...
Custom Rule
Custom Rule
All programs
A
ll programs
 
Protocol: ICMPv4
Protocol: ICMPv4
Allow the connection
Allow the connection
Apply to Private profile
Apply to Private profile
Name it.
Name it.
Finally pings were returned.
Finally pings were returned.
client
dev tun
proto udp
# route-nopull
remote 80.86.87.232 1194
resolv-retry infinite # Try to preserve some state across restarts.
persist-key
persist-tun
ca ca.crt
cert 1000he.crt
key 1000he.key
ns-cert-type server
comp-lzo
pull dhcp-options
verb 3

Revision as of 00:36, 20 July 2018

MANUAL VPN - Rede Privada VPN (openvpn) da Futuragora

OpenVPN

IP VPN: 10.7.0.1 | IP Virtual: 192.168.122.153

Server Admin

Webmin: https://10.7.0.1:10000

IRC Private server connection

IRC Server

Tor Output

Tor VPN Port: 9050 Permite usar uma proxy que encaminha o tráfego do browser ou mesmo outras apps pela rede tor através da VPN. Aconselha-se o uso do foxyproxy para o firefox.

Ip: 10.7.0.1
Port: 9050
Protocol: Socks5

Installation openvpn

sudo apt-get install openvpn

Ceate fowarding ip:

comando de fw: echo '1' > /proc/sys/net/ipv4/conf/tun0/forwarding 


Easy RSA

source ./vars
./build-key

Config

File de ligação cliente:

client 
dev tun 
proto udp 
route-nopull 
remote roltel.net 56732 
resolv-retry infinite 
ca ca.crt 
cert win10.crt 
key  win10.key 
comp-lzo 
# pull dhcp-options 
persist-tun 
persist-key 
tun-mtu 1532 

route 10.7.0.1 255.255.255.255 # famain server
route 10.7.0.4 255.255.255.255 # itead_--------- orisis
route 10.7.0.6 255.255.255.255 # osiris
route 10.7.0.8 255.255.255.255 # 
route 10.7.0.10 255.255.255.255 # pcreset
route 10.7.0.12 255.255.255.255 # 1000he  
route 10.7.0.14 255.255.255.255 # reset-home/pi
route 10.7.0.16 255.255.255.255 # ze 
route 10.7.0.18 255.255.255.255 # msantos 
route 10.7.0.20 255.255.255.255 # r0173x
route 10.7.0.22 255.255.255.255 # run /xp
route 10.7.0.24 255.255.255.255 # rebian
route 10.7.0.26 255.255.255.255 # msantos 
route 10.7.0.28 255.255.255.255 # zh
route 10.7.0.30 255.255.255.255 # skeptic
route 10.7.0.32 255.255.255.255 # faos



client 
dev tun 
proto udp 
# route-nopull 
remote 80.86.87.232 1194 
resolv-retry infinite # Try to preserve some state across restarts. 
persist-key 
persist-tun 
ca ca.crt 
cert 1000he.crt 
key 1000he.key 

ns-cert-type server 
comp-lzo 
pull dhcp-options 
verb 3


3. Output proxys 10.7.0.6 (dev DE) porta-10080 10.7.0.18 (lab FR) - 1080


Samba

Partilhas de pastas, pastas comuns e uploads.

smb://10.7.0.1/atomic - mp3datacenter smb://10.7.0.1/datacenter - datacenterfa smb://10.7.0.1/dump_share - local de reciclagem e dump

Openwrt http://wiki.openwrt.org/doc/howto/vpn.openvpn

....................................................................................................

vpn-home.sh

  1. !/bin/bash

echo 'Ligar VPN' cd ~/fa/vpn sudo openvpn vpn.conf


The tuntap documentation is outdated. Also, in newer versions of linux, you might need to use tunctl instead of ip tuntap add To install tunctl on debian Squeeze, install the package 'uml-utilities' which provides the tunctl command. You can add a new tunnel using tunctl -t tun1 tunctl -t tun1

tincd -n myvpn -d5 -D

https://servertutz.wordpress.com/2011/08/14/installing-openvpn-on-centos/


Allow Ping Windows

Tell Windows to allow pings (ICMPv4)

Start Orb > Windows Firewall with Advanced Security Then go to Inbound Rules, and New Rule...

Custom Rule A ll programs

Protocol: ICMPv4

Allow the connection

Apply to Private profile

Name it.

Finally pings were returned.