OpenVPN
wg-easy
Our great sponsors
OpenVPN | wg-easy | |
---|---|---|
81 | 186 | |
9,945 | 7,136 | |
2.7% | - | |
9.2 | 5.8 | |
7 days ago | 12 months ago | |
C | HTML | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OpenVPN
-
Ask HN: Who is hiring? (October 2023)
OpenVPN is hiring! https://openvpn.net/
C++ Developer in the United States. Full-time| Fully remote| Flexible work schedules
Link to look at vacancy details and apply:
-
Are there any work arounds for the Netflix new "household" system?
How you connect to your modem will depend on the device you are using, but for windows laptops as an example you download the OpenVPN program and input your modem details there, much like you would any other vpn service. I think there would be some guides on youtube. https://openvpn.net/
-
Can i use PFSense to control incoming user connections (without a vpn?)
I just started playing with CloudConnexa for remotely managing my second pFSense. Really nice and is free for up to 3 concurrent users. https://openvpn.net. Can also self-host OpenVPN access server with a free 2 concurrent license.
-
Is the 7spotlight Markle family interview airing now? Is anyone watching and can provide comment? 👀📺
If anyone is being blocked check out free OpenVPN
-
gluetunvpn docker help
It is likely an issue with the 'cipher' options, if any, that are in your ".opvn" file. This is telling you that the opvn setting is not finding a matching cipher it is allowed to use. The fix per the message would be to add the Servers cipher to your options. https://github.com/OpenVPN/openvpn-gui/issues/381 https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/cipher-negotiation.rst
-
Is it possible for a sysadmin to block only some packets from a VPN connection ?
I too haven't used the client-nat directive in some years (I currently implement 1:1 NAT with pfsense to access my network because I'm too lazy to change the networks subnet from the default) so I decided to retest and it does appear that OpenVPN Connect clients do not properly support the client-nat directive but the traditional OpenVPN server/clients still do. I've just tested this on OpenVPN 2.6.3 Server, OpenVPN 2.6.1 GUI for Windows from openvpn.net, and OpenVPN Connect iOS 3.3.3 and only the OpenVPN Connect client has any difficulty. Difficulty being that you can use client-nat successfully but it has to be configured server-side it can't be pushed to or setup on the client (OpenVPN Connect) side. The Server and Windows (non-OpenVPN Connect) clients work an any setup whether it's configured server-side, pushed to the client, or set up in the client config.
-
WebUI not accessible, even with port opened
Ask openvpn.net for commercial support: https://support.openvpn.com/
-
My Installed App as Developer
OpenVPN is a VPN client that I used primarily for work. We used VPN to connect to the dev server and we are using VPN. I also sometimes used that to open websites that got blocked in Indonesia like Reddit.
-
minexmr2.com updated to p2pool v3.1, monerod v0.18.2.0, and ready for Mar 18 p2pool (not monero) hardfork
I connect all the servers with secure OpenVPN private network. And block unused ports anywhere with ufw.
-
A little server help would be appreciated (a bit out of my depth)
Ensure remote access is by VPN only like the site-to-site with Ubiquitis gear, WireGuard or OpenVPN and there could be a paid option I just don't know.
wg-easy
-
Admin-Friendly Mesh VPN with WireGuard?
After browsing through, I've noticed that three options seem to be gaining traction: Netmaker, wg-easy, and headscale. I'm curious to know if these solutions are interchangeable, and if there are specific reasons to choose one over the others. I'd also like to understand if they are complete stacks, meaning, once set up, could I easily replace one admin GUI with another, or would I need to tear down and rebuild the VPN?
-
VPN to bypass Country blocms
WireGuard is the solution to everything! It has an app and they can easily login via a QR code that you send them. For the server I would recommend wg-easy, there you can manage all user accounts in a web interface.
-
Wireguard without VPS?
I use this, https://github.com/WeeJeWel/wg-easy
-
What are some security/VPN features you would like to see in UniFi Network?
Dashboard with access to the QR and config files for clients as well as bandwidth data. Even something as simple as wg-easy would be great.
- Self hosted public DNS Server
-
Build your own private WireGuard VPN with PiVPN
I run wg-easy https://github.com/WeeJeWel/wg-easy for this sort of thing. I use the docker container, and it's great. "Just works".
Also, unrelated, I just decided I don't like the sentiment of "PiMyProjectName" branding. I know most projects don't just run on a Pi, and that the intent is to say "you can self-host thing", but at this point if you want to run a home server sort of thing, just buy some cheap 100-200 dollar minipc thing. That's how much you'd pay for a Pi now anyway, and it comes with such great features as:
* just establishing an ssh connection doesn't take multiple seconds
* the ethernet doesn't go over a usb hub
* it doesn't run on an sd card that is going to fail within a year
I'm pretty dismissive of ARM chips for homelab stuff at this point. There's super cheap minipcs with "real" processors that will just destroy even an expensive ARM board.
Pi's shine with their ability to run both a real/full Linux and also do gpio type stuff that otherwise is usually an arduino board. I don't have anything against low-level programming but damn is it just a lot more fun to do in python. I love the Rpi zero w 2 products for this, just enough juice to run wifi and a python loop, plus the gpio pins. Too bad they've been sold out for literally years.
- Seft-host VPNs recommendation regarding power efficiency
-
[Wireguard] Le serveur ne peut pas faire un ping au client
J'ai installé Wireguard Server sur un VPS en utilisant [https://github.com/weejewel/wg-easy Peer to Peer Ping, mais je ne peux pas ping-ping à des pairs du serveur.
-
Using AWS EC2 as a proxy server to bypass a Minecraft VPNGuard server block or run a Minecraft server from your home while hiding the public IP
To expand: I'd recommend wireguard it's super easy to run with docker, openvpn is way more annoying to setup The Github page for wg-easy docker image
-
Today is a lovely day to setup my new media server. X220 i5, 512GB msata SSD (slow af), 1TB internal HDD, and another terabyte in the dock. Installing Ubuntu server 22.04 LTS. Any fun ideas for what to do with it, aside from a Jellyfin server and samba share?
for wireguard im using wg-easy
What are some alternatives?
tinc - a VPN daemon
wg-manager - A easy to use WireGuard dashboard and management tool
Pritunl - Enterprise VPN server
wg-gen-web - Simple Web based configuration generator for WireGuard
ocserv
wireguard-ui - Wireguard web interface
tailscale - The easiest, most secure way to use WireGuard and 2FA.
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
openvpn3-linux - OpenVPN 3 Linux client
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
pivpn - The Simplest VPN installer, designed for Raspberry Pi