Unless you ate limited by wireguard - I would highly recommend it, especially on low power (cheap device). In my experience I get, 3-5x better traffic through them when connecting home while traveling.
One thing to note - you will most likely need some place with public IP/registered-name as a gateway. My home IP is not stable, so I hop through my publicly reachable linode instance with .org name. If you do not want to maintain your public infrastructure to connect through. I would recommend checking: https://tailscale.com/ openwrt (as well as about almost nay linux distro) has package for it: https://tailscale.com/ hope that helps, Tomas On Sun, 2022-02-20 at 19:53 -0800, Russell Senior wrote: > this is a uci-defaults script for an openvpn client (from circa May > 2018, you need to provide your own value for > openvpn.foo.remote=${your-openvpn-server}, and you need to provide > your own /etc/openvpn/keys/ca.crt, /etc/openvpn/keys/client.crt, and > /etc/openvpn/keys/client.key'): > > #!/bin/sh > > uci batch <<EOF > > delete openvpn.custom_config > delete openvpn.sample_server > delete openvpn.sample_client > > set openvpn.foo=openvpn > set openvpn.foo.enabled=1 > set openvpn.foo.client='1' > set openvpn.foo.dev='tun' > set openvpn.foo.proto='udp' > set openvpn.foo.remote=${your-openvpn-server} > set openvpn.foo.resolve_retry='infinite' > set openvpn.foo.nobind='1' > set openvpn.foo.persist_key='1' > set openvpn.foo.persist_tun='0' > set openvpn.foo.keepalive='10 120' > set openvpn.foo.remote_cert_tls=server > set openvpn.foo.ca='/etc/openvpn/keys/ca.crt' > set openvpn.foo.cert='/etc/openvpn/keys/client.crt' > set openvpn.foo.key='/etc/openvpn/keys/client.key' > set openvpn.foo.compress='lzo' > > commit openvpn > > add firewall zone > set firewall.@zone[-1].input='ACCEPT' > set firewall.@zone[-1].forward='REJECT' > set firewall.@zone[-1].output='ACCEPT' > set firewall.@zone[-1].name='vpn' > set firewall.@zone[-1].masq='1' > set firewall.@zone[-1].mtu_fix='1' > set firewall.@zone[-1].network='vpn' > > add firewall forwarding > set firewall.@forwarding[-1].dest='vpn' > set firewall.@forwarding[-1].src='lan' > > commit firewall > > EOF > > No warranty! > > On Sun, Feb 20, 2022 at 7:10 PM Russell Senior > <russ...@personaltelco.net> wrote: > > > > I am not sure what it's called, tunnel maybe? It is feasible. These > > days wireguard is maybe the "cooler" option. Over at Personal Telco > > land, we are still using OpenVPN because it can handle broadcast or > > multicast traffic or something, which wireguard can't, and we need > > it > > for the dynamic routing protocol (OLSR) we use. But, I could > > probably > > give you an OpenWrt config that would work (not from memory, but > > looking at previous examples). > > > > -- > > Russell Senior > > russ...@personaltelco.net > > > > On Sun, Feb 20, 2022 at 6:57 PM Eric House <eeho...@eehouse.org> > > wrote: > > > > > > I'm visiting my daughter in Spain next month, and thought it'd be > > > fun to > > > leave her with a little device that takes her home, as it were: a > > > GL-MT300N-V2 that when connected via Ethernet to her ISP's WAN > > > port becomes > > > a wifi access point that routes all its traffic through our place > > > in > > > Corvallis. > > > > > > I've joined residences using OpenVPN before, but a quick look at > > > the docs > > > suggests that most users of VPNs on OpenWRT are connecting to a > > > commercial > > > VPN host rather than to another OpenWRT instance. > > > > > > First question: is what I want to do feasible/possible? (I > > > suspect that the > > > $25 device I'm starting with will not support a heavy load very > > > well. > > > That's ok: she can upgrade if the concept works out.) > > > > > > Second, is there a name for what I'm trying to do? Usually when I > > > can't > > > find answers on Google it's because I don't know what to ask for. > > > > > > Thanks! > > > > > > --Eric