Qubes-vpn-support
algo
Our great sponsors
Qubes-vpn-support | algo | |
---|---|---|
16 | 155 | |
123 | 28,298 | |
- | 0.6% | |
0.0 | 6.7 | |
4 months ago | 24 days ago | |
Shell | Jinja | |
GNU General Public License v3.0 only | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Qubes-vpn-support
-
Does anyone have a currently working sys-vpn guide?
Clone the following repo in /home/user: git clone https://github.com/tasket/Qubes-vpn-support
- Best way to have a anti leak vpn on qubes?
-
Qubes 4.1 / Fedora 35 VPN Qube Issues
This is closely based on the Qubes-vpn-support project.
-
Using different Vpn configs ( from different providers ) on different AppVMs ?
Yes you can do that. First clone a debian-11 template to something like "debian-11-vpn", then start it and install openvpn/wireguard and stop it. After that, create an AppVM (with provides network enabled) per provider based on that new template, you can choose to use Network Manager (by adding it in the services tab in the qube settings) or by using Tasket scripts. Once the 3 qubes are good to go, you can attach anything you want to them and it will proxy the traffic trough the VPN provider of your choice.
-
What is currently the best way to create a NetVM cube that uses the Wireguard protocol?
I rolled by own app-vm (debian 11 with wireguard). Set it to use sys-firewall. Used this tutorial: https://github.com/tasket/Qubes-vpn-support/wiki/Wireguard-VPN-connections-in-Qubes-OS
-
NordVPN / Persistent Proxy
Qubes-vpn-support
- I cant Install openvpn on debian 10 Template
-
Wireguard on Qubes using debian-11-minimal template
# apt install git $ git clone https://github.com/tasket/Qubes-vpn-support.git # bash /home/user/Qubes-vpn-support/install
- Kernel version and Wireguard
-
Trouble using Wireguard with qubes-tunnel / qubes-vpn-support
So if I understand correctly this guide should pretty much work after in doing debian-10:~$ sudo apt-get install wireguard wireguard-tools wireguard-dkms -t unstable
algo
- Show HN: WireHole New UI Makes Managing WireGuard Clients Easy
-
Wireguard with Algo VPN on VPS with tunnel-all traffic
Since we're already presuming you have a functional PFSense box with Wireguard installed and a VPS stood up, now you need to get Algo installed on the VPS. I'm not going to write this part out in detail, but basically you need to follow the procedures here to get Algo installed. However, *before* running ./algo you probably want to edit some of the config.cfg settings. I disabled IPSec (which saves a bunch of package installs and prevents a bunch of failures I saw on some of my VPSs), set my reduce_mtu setting to 80 just to prevent any MTU issues down the line, turned off DNS encryption, and renamed my users to the servers in question (for example: pfsense, vps_server, etc)
-
Best Platform to run Stable Diffusion REMOTELY: Answers Needed
Check out the command line args for Auto1111, it talks about a gradio setup that can be accessed remotely. There's a time limit on gradio links though, I think. You could also set up a vpn that will allow you to access your PC remotely, then run A1111 with the --listen command and access it that way. I've done this with an Algo VPN on Azure and a Wireguard client for Windows for Android, but any VPN that lets you access your PC remotely would work.
-
School does not allow VPN
One way you could try to get around is building your own VPN service, like this: https://github.com/trailofbits/algo/blob/master/README.md
-
Internet Kill switch not working
Things I have tried so far: Clear network cache and reset adapters - IDK it fix aprevious problem I had https://github.com/trailofbits/algo/discussions/14504
- Any servers working in Russia left?
-
Ubuntu Port Forwarding on Oracle. Is it just broken??? HELP!
(I can simply install Algo and get the Wireguard tunnel working, easy peasy... But from there, I can never get Plex port 32400 open... so I'm just trying from scratch now...)
-
Wireguard docker container - route traffic to host
Maybe try running algo vpn (following the road-warrior setup) in a VM instead? It has very light requirements. https://github.com/trailofbits/algo/blob/master/docs/deploy-to-ubuntu.md
- Quick VPN Setup with AWS Lightsail and WireGuard
- Onlyfans'in Türkiye'de yasaklanması için CİMER'e şikayet kampanyası başlatıldı.
What are some alternatives?
qubes-tunnel - Integration of vpn tunnels for Qubes OS
streisand - Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
openvpn-install - OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
Contents - Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions are welcome !
Visual Studio Code - Visual Studio Code
docker-openvpn-client - OpenVPN client with killswitch and proxy servers; built on Alpine
pivpn - The Simplest VPN installer, designed for Raspberry Pi
qubes-wireguard - Wireguard VPN setup for Qubes OS