pivpn

The Simplest VPN installer, designed for Raspberry Pi (by pivpn)

Stats

Basic pivpn repo stats
15
4,200
7.8
15 days ago

pivpn/pivpn is an open source project licensed under MIT License which is an OSI approved license.

Pivpn Alternatives

Similar projects and alternatives to pivpn
  • GitHub repo Pi-hole

    A black hole for Internet advertisements

  • GitHub repo dnscrypt-proxy

    dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols. (by DNSCrypt)

  • GitHub repo Nebula

    A scalable overlay networking tool with a focus on performance, simplicity and security

  • GitHub repo Pritunl

    Enterprise VPN server

  • GitHub repo Unbound

    Unbound is a validating, recursive, and caching DNS resolver.

  • GitHub repo wireguard-vyatta-ubnt

    WireGuard for Ubiquiti Devices

  • GitHub repo Homeserver

    Lightweight home server based on microservices, usable as desktop workstation

  • GitHub repo pidisplayworker

    PiHole Lquid Crystal Display Worker

NOTE: The number of mentions on this list indicates mentions on common posts. Hence, a higher number means a better pivpn alternative or higher similarity.

Posts

Posts where pivpn has been mentioned. We have used some of these posts to build our list of alternatives and similar projects - the last one was on 2021-03-31.
  • VNC will not connect when I am not on the same network (ie over 4G or not at home)
    you can tunnel VNC through SSH or VPN, wireguard probably the easiest.. that pivpn.io the other guy linked looks like it supports wireguard.
  • Best router for Wireguard VPN?
    reddit.com/r/openwrt | 2021-04-05
    Rpi4, 8gb, with rasbian lite and http://pivpn.io
  • Setting up a home vpn end point
    reddit.com/r/WireGuard | 2021-04-05
    Check out PiVPN.
  • I created a PiHole + PiVPN + Unbound tutorial
    reddit.com/r/pihole | 2021-03-31
    Okay so from looking at this, the files in the config folder are just copies. The QR code generation uses the config files from /etc/wireguard/configs.
  • PiVPN Wireguard can receive traffic, but doesn't respond. How rude!
    reddit.com/r/VPN | 2021-03-25
    I have forwarded the port (51820) in my Unifi USG, and have gone through the troubleshooting FAQ for PiVPN, which tells me
  • Backing up our iPhones over SFTP (scp)
    I only expose a few services. The rest is only accessible within LAN or via PiVPN (see https://pivpn.io I use the Wireguard version as that's the easiest to setup and allows very high speed).
  • Someone is trying to login as admin
    reddit.com/r/qnap | 2021-03-24
    http://pivpn.io makes really quick work of setting up a vpn
  • VPN clients can't access LAN or WAN?
    reddit.com/r/pivpn | 2021-03-23
    :::: https://github.com/pivpn/pivpn/wiki/FAQ
  • My NAS is under attack. What now?
    reddit.com/r/qnap | 2021-03-22
    Access back thru a vpn like http://pivpn.io
  • A Simple Wireguard Config & Connection Manager [Linux]
    reddit.com/r/VPN | 2021-03-22
    No need for youtube. Just go to https://pivpn.io and you are done with the setup 30sec later, scanning QR code with your phone to connect.
  • PiVPN server & VPN clients can't access LAN
    reddit.com/r/pivpn | 2021-03-22
    :::: PiVPN debug :::: ============================================= :::: Latest commit :::: commit d7771c251418fa443869397d46f93c5b0c197558 Author: 4s3ti <[email protected]> Date: Sat Feb 6 23:04:11 2021 +0100 Merge branch test into master fixes #1234 ci/cd fixes and improvements ============================================= :::: Installation settings :::: PLAT=Raspbian OSCN=buster USING_UFW=0 IPv4dev=eth0 dhcpReserv=1 IPv4addr=192.168.1.26/24 IPv4gw=192.168.1.1 install_user=pi install_home=/home/pi VPN=wireguard pivpnPORT=54321 pivpnDNS1=9.9.9.9 pivpnDNS2=149.112.112.112 pivpnHOST=REDACTED INPUT_CHAIN_EDITED=0 FORWARD_CHAIN_EDITED=0 pivpnPROTO=udp pivpnDEV=wg0 pivpnNET=10.6.0.0 subnetClass=24 ALLOWED_IPS="0.0.0.0/0, ::0/0" UNATTUPG=1 INSTALLED_PACKAGES=(raspberrypi-kernel-headers wireguard-tools wireguard-dkms qrencode unattended-upgrades) ============================================= :::: Server configuration shown below :::: [Interface] PrivateKey = server_priv Address = 10.6.0.1/24 ListenPort = 54321 PostUp = PostDown = ### begin phone ### [Peer] PublicKey = phone_pub PresharedKey = phone_psk AllowedIPs = 10.6.0.2/32 ### end phone ### ### begin laptop ### [Peer] PublicKey = laptop_pub PresharedKey = laptop_psk AllowedIPs = 10.6.0.3/32 ### end laptop ### ============================================= :::: Client configuration shown below :::: [Interface] PrivateKey = phone_priv Address = 10.6.0.2/24 DNS = 9.9.9.9, 149.112.112.112 [Peer] PublicKey = server_pub PresharedKey = phone_psk Endpoint = REDACTED:54321 AllowedIPs = 0.0.0.0/0, ::0/0 ============================================= :::: Recursive list of files in :::: :::: /etc/wireguard shown below :::: /etc/wireguard: configs keys wg0.conf /etc/wireguard/configs: clients.txt laptop.conf phone.conf /etc/wireguard/keys: laptop_priv laptop_psk laptop_pub phone_priv phone_psk phone_pub server_priv server_pub ============================================= :::: Self check :::: :: [OK] IP forwarding is enabled :: [OK] Iptables MASQUERADE rule set :: [OK] WireGuard is running :: [OK] WireGuard is enabled (it will automatically start on reboot) :: [OK] WireGuard is listening on port 54321/udp ============================================= :::: Having trouble connecting? Take a look at the FAQ: :::: https://github.com/pivpn/pivpn/wiki/FAQ ============================================= :::: WARNING: This script should have automatically masked sensitive :::: :::: information, however, still make sure that PrivateKey, PublicKey :::: :::: and PresharedKey are masked before reporting an issue. An example key :::: :::: that you should NOT see in this log looks like this: :::: :::: YIAoJVsdIeyvXfGGDDadHh6AxsMRymZTnnzZoAb9cxRe :::: ============================================= :::: Debug complete :::: ::: ::: Debug output completed above. ::: Copy saved to /tmp/debug.log :::
  • ovpn file for android openvpn connect app?
    reddit.com/r/pivpn | 2021-03-22
    :::: https://github.com/pivpn/pivpn/wiki/FAQ
  • Please help for a newbie
    reddit.com/r/pivpn | 2021-03-16
    Submit a bug here and wait to see what happens.
  • DNS for VPN Server
    reddit.com/r/firewalla | 2021-03-16
    I don't know about on Firewalla itself but if you can't do that then you could just run the pivpn script at pivpn.io and set up a different VPN on the AdGuard home device.
  • Wireguard handshakes and connects to server but not the rest of LAN or WAN
    reddit.com/r/WireGuard | 2021-03-13
    [email protected]:~$ pivpn -d ::: Generating Debug Output [sudo] password for homeserver: Sorry, try again. [sudo] password for homeserver: :::: PiVPN debug :::: ============================================= :::: Latest commit :::: commit d7771c251418fa443869397d46f93c5b0c197558 Author: 4s3ti <[email protected]> Date: Sat Feb 6 23:04:11 2021 +0100 Merge branch test into master fixes #1234 ci/cd fixes and improvements ============================================= :::: Installation settings :::: PLAT=Ubuntu OSCN=focal USING_UFW=0 IPv4dev=enp42s0 install_user=homeserver install_home=/home/homeserver VPN=wireguard pivpnPORT=51820 pivpnDNS1=10.6.0.1 pivpnDNS2= pivpnHOST=REDACTED INPUT_CHAIN_EDITED=1 FORWARD_CHAIN_EDITED=1 pivpnPROTO=udp pivpnDEV=wg0 pivpnNET=10.6.0.0 subnetClass=24 ALLOWED_IPS="0.0.0.0/0, ::0/0" UNATTUPG=1 INSTALLED_PACKAGES=() ============================================= :::: Server configuration shown below :::: [Interface] PrivateKey = server_priv Address = 10.6.0.1/24 ListenPort = 51820 ### begin pavletel ### [Peer] PublicKey = pavletel_pub PresharedKey = pavletel_psk AllowedIPs = 10.6.0.2/32 ### end pavletel ### ============================================= :::: Client configuration shown below :::: [Interface] PrivateKey = pavletel_priv Address = 10.6.0.2/24 DNS = 10.6.0.1 [Peer] PublicKey = server_pub PresharedKey = pavletel_psk Endpoint = REDACTED:51820 AllowedIPs = 0.0.0.0/0, ::0/0 ============================================= :::: Recursive list of files in :::: :::: /etc/wireguard shown below :::: /etc/wireguard: configs keys wg0.conf /etc/wireguard/configs: clients.txt pavletel.conf /etc/wireguard/keys: pavletel_priv pavletel_psk pavletel_pub server_priv server_pub ============================================= :::: Self check :::: :: [OK] IP forwarding is enabled :: [OK] Iptables MASQUERADE rule set :: [OK] Iptables INPUT rule set :: [OK] Iptables FORWARD rule set :: [OK] WireGuard is running :: [OK] WireGuard is enabled (it will automatically start on reboot) :: [OK] WireGuard is listening on port 51820/udp ============================================= :::: Having trouble connecting? Take a look at the FAQ: :::: https://github.com/pivpn/pivpn/wiki/FAQ ============================================= :::: WARNING: This script should have automatically masked sensitive :::: :::: information, however, still make sure that PrivateKey, PublicKey :::: :::: and PresharedKey are masked before reporting an issue. An example key :::: :::: that you should NOT see in this log looks like this: :::: :::: YIAoJVsdIeyvXfGGDDadHh6AxsMRymZTnnzZoAb9cxRe :::: ============================================= :::: Debug complete :::: ::: ::: Debug output completed above. ::: Copy saved to /tmp/debug.log :::