Qubes-vpn-support
firezone
Our great sponsors
Qubes-vpn-support | firezone | |
---|---|---|
16 | 74 | |
122 | 6,186 | |
- | 2.9% | |
0.0 | 9.9 | |
4 months ago | 2 days ago | |
Shell | Elixir | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Qubes-vpn-support
-
Does anyone have a currently working sys-vpn guide?
Clone the following repo in /home/user: git clone https://github.com/tasket/Qubes-vpn-support
- Best way to have a anti leak vpn on qubes?
-
Qubes 4.1 / Fedora 35 VPN Qube Issues
This is closely based on the Qubes-vpn-support project.
-
Using different Vpn configs ( from different providers ) on different AppVMs ?
Yes you can do that. First clone a debian-11 template to something like "debian-11-vpn", then start it and install openvpn/wireguard and stop it. After that, create an AppVM (with provides network enabled) per provider based on that new template, you can choose to use Network Manager (by adding it in the services tab in the qube settings) or by using Tasket scripts. Once the 3 qubes are good to go, you can attach anything you want to them and it will proxy the traffic trough the VPN provider of your choice.
-
What is currently the best way to create a NetVM cube that uses the Wireguard protocol?
I rolled by own app-vm (debian 11 with wireguard). Set it to use sys-firewall. Used this tutorial: https://github.com/tasket/Qubes-vpn-support/wiki/Wireguard-VPN-connections-in-Qubes-OS
-
NordVPN / Persistent Proxy
Qubes-vpn-support
- I cant Install openvpn on debian 10 Template
-
Wireguard on Qubes using debian-11-minimal template
# apt install git $ git clone https://github.com/tasket/Qubes-vpn-support.git # bash /home/user/Qubes-vpn-support/install
- Kernel version and Wireguard
-
Trouble using Wireguard with qubes-tunnel / qubes-vpn-support
So if I understand correctly this guide should pretty much work after in doing debian-10:~$ sudo apt-get install wireguard wireguard-tools wireguard-dkms -t unstable
firezone
- WireGuard -based scalable remote access platform
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/firezone/firezone (4.4k stars)
- Anyone centrally managing clients VPN connections/users/settings?
- Upgrading VPN solutions in a remote working Environment
-
Free VPN solutions that support SAML auth?
Firezone might be an option. WG based, easy to deploy. Enterprise features etc. https://github.com/firezone/firezone
- Self-hosted Tailscale alternative?
- [Self Hosted] Hinzufügen von SSO zu unserem selbst gehosteten WireGuard VPN-Server (Firezone)
-
Looking for VPN solution that supports split tunneling & authentication via Google
If you were looking for something other then an openVPN based VPN. Take a look at Tailscale or https://github.com/firezone/firezone which run Wireguard... Tailscale is nice however you don't manage the control plane.
- Wireguard self-hosted solution for large number of users
-
Most used selfhosted services in 2022?
Firezone (https://github.com/firezone/firezone) Wireguard-VPN Server with SSO capability
What are some alternatives?
qubes-tunnel - Integration of vpn tunnels for Qubes OS
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
openvpn-install - OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]
Contents - Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions are welcome !
wireguard-ui - Wireguard web interface
docker-openvpn-client - OpenVPN client with killswitch and proxy servers; built on Alpine
headscale - An open source, self-hosted implementation of the Tailscale control server
qubes-wireguard - Wireguard VPN setup for Qubes OS
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
qubes-app-split-browser - Tor Browser (or Firefox) in a Qubes OS disposable, with persistent bookmarks and login credentials
wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.