On Tuesday, September 18, 2018 at 12:02:51 PM UTC+2, Wolf moon wrote: > On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов wrote: > > On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote: > > > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon wrote: > > > > Hi guys New to Qubes ( which is an amazing feat of cyber security > > > > engineering ) all working fine and learning my way around it. > > > > > > > > My only issue is logging into my vpn service. > > > > > > > > I have followed the Qubes instructions ( which the images are different > > > > to Qubes 4.0 and after searching the net on this matter someone said > > > > that this is a shot of the previous Qubes so not helpful there ) I also > > > > contacted my vpn service on the matter. They read up on the Qubes > > > > instructions and emailed me back a step by step guide but still no joy. > > > > > > > > My vpn service works well on my Raspberry Pi 3 in the command line ( > > > > which I found simple instructions for elsewhere on the internet ) and > > > > works fine on my windows 10 system as its got an app interface you > > > > download. > > > > > > > > Its just Qubes I am having issues with. I am by no means a hardcore > > > > techy, I am learning and not afraid or unfamiliar using the command > > > > line in linux. > > > > > > > > I have contacted the Qubes team after trying my best effort to resolve > > > > this on my own as I know they are a small team of 5 or so last time I > > > > checked. > > > > > > > > Any help and advice would be greatly appreciated. > > > > > > > > Best, > > > > > > > > Wolf Moon > > > > > > Okay guys so I am signed up to Nordvpn. ( To note: I always update > > > everything in Qube manager ) > > > > > > I started off by google searching how to set up a vpn on qubes. I dont > > > have every forum page be it google groups or reddit page saved I read > > > unfortunately. > > > > > > But they generally instructed me to do go through the steps to set up a > > > vpn as Qubes instructs on their page > > > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager > > > > > > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI > > > scripts > > > > > > What I was referencing referring to the diagram/photo being outdated or > > > of the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It > > > just comes up looking different which is what one of the OPs mentioned on > > > one of the how to guides I found. > > > > > > Moving forward. > > > > > > Certain commands didn't work like sudo which after googling one forum > > > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used > > > instead which is what I used. > > > > > > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > > > > sys-net > > > Appvm > > > > > > From there the rest of the instructions didn't work on Qubes for me. > > > > > > Apart from downloading the nord config files successfully which are in my > > > nordvpn documents folder with all the server addresses as txt files eg > > > uk648.nordvpn.comtcp443.ovpn > > > > > > Also was instructed to download nano reader and a few other things. > > > > > > My cd ls in my nordvpn terminal is as follows > > > > > > Desktop Music Templates nano.save > > > Documents Pictures Videos openvpn-client.ovpn.txt > > > Downloads Public auth-user-pass pass.txt > > > > > > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn > > > set up instructions I added vpn-handler-openvpn to services in the appvm > > > I named Nordvpn ) > > > > > > So from there comes Nordvpns reply ( they were very helpful before > > > helping me successfully setting up my vpn link on my Raspberry Pi ) > > > > > > I received this email: > > > > > > Hello, Adam, > > > > > > I have checked your OS documentation and it would be great if you could > > > test out the following setup: > > > Disable any auto-starting service that comes with the software package. > > > For example for OpenVPN. > > > sudo systemctl disable openvpn.service > > > You may also wish to install nano or another simple text editor for > > > entering the scripts below. Now run the following command to create VPN > > > directory: > > > sudo mkdir /rw/config/vpn > > > Enter the directory using the following command: > > > cd > > > /rw/config/vpn > > > > > > Then our website - https://nordvpn.com/servers/#recommended , on the > > > server picker you will see recommended server number. Then open > > > https://nordvpn.com/ovpn/ website and download recommended server file. > > > You can download directly to device and transfer to your VM or use > > > command to download from the hyperlink: > > > sudo wget > > > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn > > > (Change the last line of server name to download the correct file). Then > > > rename downloaded file to client.ovpn > > > The VPN client may not be able to prompt you for credentials when > > > connecting to the server. Create a file in the /rw/config/vpn folder with > > > your credentials and using a directive. For example for OpenVPN, edit: > > > auth-user-pass > > > to: > > > auth-user-pass pass.txt > > > > > > Save file /rw/config/vpn/client.ovpn. Make sure a /rw/config/vpn/pass.txt > > > file actually exists. > > > sudo nano /rw/config/vpn/pass.txt > > > Add: > > > username > > > password > > > Replace username and password with your actual username and password. > > > Test your client configuration: Run the client from a CLI prompt in the > > > ‘vpn’ folder, preferably as root. For example: > > > sudo openvpn --cd /rw/config/vpn --config client.ovpn > > > Watch for status messages that indicate whether the connection is > > > successful and test from another VPN VM terminal window with ping. > > > ping 8.8.8.8 > > > ping can be aborted by pressing the two keys ctrl + c at the same time. > > > DNS may be tested at this point by replacing addresses in > > > /etc/resolv.conf with ones appropriate for your VPN (although this file > > > will not be used when setup is complete). Diagnose any connection > > > problems using resources such as client documentation and help from your > > > VPN service provider. Proceed to the next step when you’re sure the basic > > > VPN connection is working. > > > > > > Set up the VPN’s autostart. > > > sudo nano /rw/config/rc.local > > > Clear out the existing lines and add: > > > #!/bin/bash > > > VPN_CLIENT='openvpn' VPN_OPTIONS='--cd /rw/config/vpn/ --config > > > openvpn-client.ovpn --daemon' > > > su - -c 'notify-send "$(hostname): Starting $VPN_CLIENT..." > > > --icon=network-idle' user > > > groupadd -rf qvpn ; sleep 2s > > > sg qvpn -c "$VPN_CLIENT $VPN_OPTIONS" > > > If you are using anything other than OpenVPN, change the VPN_CLIENT and > > > VPN_OPTIONS variables to match your VPN software. Save the script. Make > > > it executable. > > > sudo chmod +x /rw/config/rc.local > > > Restart the new VM! The link should then be established automatically > > > with a popup notification to that effect. > > > > > > Let us know how it will go! > > > > > > But..starting out I fell over the first hurdle. > > > > > > in the Nordvpn terminal I typed in Sudo systemctl disable openvpn.service > > > > > > message back: Failed to disable unit: Unit file openvpn.service doesn not > > > exist. > > > > > > That is where I am now. > > > > > > Any help and suggestions will be greatly appreciated. > > > > > > Best, > > > > > > Wolf moon > > > > You cannot disable something that does not exist. Just move on to the next > > point. Did you enable the "provides network" option while creating your > > VPN-App? > > > > Creating a new VPN-app is looking like that for me, my apps stand for the > > country: > > > > Name: sys-vpn-austria > > Type: AppVM > > Template: Debian (or course you can use Fedora, but it should be 28, 26 is > > outdated!) > > Networking: default (sys-firewall) > > provides network: enabled > > > > The guide provided seems fine and you could check if the connection works > > but you should include the other scripts as well in order to make sure that > > all traffic is going through your vpn only. > > Yes I did enable provide network sys-net. > > Okay switched to the same settings you have in your vpn. > > Which particular guide are you referring to as there are a few. > > I am lost when you say include other scripts as I do not know what scripts > you are referring to.
I am used to this guide: https://www.qubes-os.org/doc/vpn/ starting here: Set up a ProxyVM as a VPN gateway using iptables and CLI scripts There are scripts for DNS-handling, firewall and autostart included. I do not rename my ovpn-client file but use the original name instead (uk648.nordvpn.comtcp443.ovpn). Just pay attention to insert it whenever "openvpn-client.ovpn" is mentioned. This is important when creating the autostart script (point 6): The script would look like this: #!/bin/bash VPN_CLIENT='openvpn' VPN_OPTIONS='--cd /rw/config/vpn/ --config uk648.nordvpn.comtcp443.ovpn --daemon' su - -c 'notify-send "$(hostname): Starting $VPN_CLIENT..." --icon=network-idle' user groupadd -rf qvpn ; sleep 2s sg qvpn -c "$VPN_CLIENT $VPN_OPTIONS" This approach should be easier but I only tried it once. It did work fine for me: https://github.com/tasket/Qubes-vpn-support -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/861be9ba-5a14-4faf-9f42-75531ab6d334%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.