On 09/15/2018 05:07 AM, 22...@tutamail.com wrote:
Thanks Chris...I understand now. I just tried it again and below are my logs, while I
don't get the "Operation not permitted (code=1)" error I still get the TLS
error
Fri Sep 14 16:55:06 2018 library versions: OpenSSL 1.0.2l 25 May
Thanks Chris...I understand now. I just tried it again and below are my logs,
while I don't get the "Operation not permitted (code=1)" error I still get the
TLS error
Fri Sep 14 16:55:06 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Enter Auth Username: My username
Enter Auth
On 09/14/2018 03:25 PM, 22...@tutamail.com wrote:
Thank you Anac and Chris, appreciate your suggestions:
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
I did check this...opened the connection to Any/Any but
Thank you Anac and Chris, appreciate your suggestions:
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
I did check this...opened the connection to Any/Any but this didn't seem to be
the issue. I also eliminated
On 09/13/2018 08:00 PM, Anac wrote:
On 09/14/2018 12:13 AM, 22...@tutamail.com wrote:
Unfortunately I have been under constant attack and a target and the
only solution I see is a fresh rebuild or new computer unless you have
another idea?
On 09/14/2018 12:13 AM, 22...@tutamail.com wrote:
Unfortunately I have been under constant attack and a target and the only
solution I see is a fresh rebuild or new computer unless you have another idea?
You said that Tor was running. When combining Tor with VPN, the VPN's
connection
Thanks again for the help Chris...see my notes below:
IIRC you only need to specify the IP address of a regular system
interface, which in this case is eth0. So do a 'sudo ip addr' and look
up the eth0 'inet' address and put 'local ' in the config.
There's a chance this might work.
-
On 09/07/2018 11:10 AM, 22...@tutamail.com wrote:
Thank you both for your responses...fair question John but I am the OP, lost
access to my old tutamail. Yes my VPN was working fine for a few months however
with a recent update it broke?? Its a little concerning because I did both a
Debian
Thank you both for your responses...fair question John but I am the OP, lost
access to my old tutamail. Yes my VPN was working fine for a few months however
with a recent update it broke?? Its a little concerning because I did both a
Debian and Dom0 update. When trying to update Dom0 I was not
On 09/06/2018 04:22 AM, 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
> It appears as if I am getting a TLS error? Why would this suddenly start?
>
> Wed Sep 5 17:23:39 2018 TLS Error: TLS handshake failed
> Wed Sep 5 17:23:39 2018 SIGUSR1[soft,tls-error] received, process restarting
On 09/06/2018 10:22 AM, 22...@tutamail.com wrote:
It appears as if I am getting a TLS error? Why would this suddenly start?
Wed Sep 5 17:23:39 2018 TLS Error: TLS handshake failed
Wed Sep 5 17:23:39 2018 SIGUSR1[soft,tls-error] received, process restarting
Wed Sep 5 17:23:39 2018 Restart
It appears as if I am getting a TLS error? Why would this suddenly start?
Wed Sep 5 17:23:39 2018 TLS Error: TLS handshake failed
Wed Sep 5 17:23:39 2018 SIGUSR1[soft,tls-error] received, process restarting
Wed Sep 5 17:23:39 2018 Restart pause, 5 second(s)
Wed Sep 5 17:23:44 2018 TCP/UDP:
On 09/05/2018 05:32 AM, 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
> Correctionmy TOR is working. Any ideas how to trouble shoot?
>
>
> Everything has been working fine, however recently my VPN tunnel is failing?
>
> I ran: sudo journalctl -u qubes-tunnel
>
> and I get:
>
>
On 09/05/2018 11:32 AM, 22...@tutamail.com wrote:
Correctionmy TOR is working. Any ideas how to trouble shoot?
Everything has been working fine, however recently my VPN tunnel is failing?
I ran: sudo journalctl -u qubes-tunnel
and I get:
Sep 05 10:17:48 VPN-Mid qtunnel-setup[1138]: Wed
Correctionmy TOR is working. Any ideas how to trouble shoot?
Everything has been working fine, however recently my VPN tunnel is failing?
I ran: sudo journalctl -u qubes-tunnel
and I get:
Sep 05 10:17:48 VPN-Mid qtunnel-setup[1138]: Wed Sep 5 10:17:48 2018 All
connections have been
Everything has been working fine, however recently my VPN tunnel is failing?
I ran: sudo journalctl -u qubes-tunnel
and I get:
Sep 05 10:17:48 VPN-Mid qtunnel-setup[1138]: Wed Sep 5 10:17:48 2018 All
connections have been connect-retry-max (7) times unsuccessful, e
Sep 05 10:17:48 VPN-Mid
Just got this going, awesome Tasket. Thank you again Qubes team for what you
do!
Works like a charm...the only feedback is the newly updated "Qubes Manager" is
sometimes "buggy" with the VPNApVM. I don't believe it impacts performance.
Some notes:
-Qubes 4.0
-Worked in Fedora28 and Debian9
On 05/12/2018 02:10 PM, get wrote:
Hi. script not working more on debian-9/fedora-26. Please fix it.
Tested vpn's : mullvad, privateinternetaccess, expressvpn and multiple random
openvpn.
Guides:
https://github.com/tasket/Qubes-vpn-support
On 05/14/2018 09:09 AM, Chris Laprise wrote:
On 05/12/2018 03:11 PM, JonHBit wrote:
I've updating to 1.4beta4 and switched templates from debian-9 to
fedora-28, but I'm getting the same error - also it seems like openvpn
flag defaults changed, as it now returns an error for the up and down
On 05/06/2018 05:24 PM, morlan.aus...@gmail.com wrote:
Worked great for me with Qubes 4.0 and Fedora 26.
I'm unclear on how to use sys-firewall now though. Should it be sys-net ->
sys-firewall -> VPN -> App?
Thanks.
That arrangement is OK. But you can take sys-firewall out of the path
On 05/12/2018 03:11 PM, JonHBit wrote:
I've updating to 1.4beta4 and switched templates from debian-9 to fedora-28,
but I'm getting the same error - also it seems like openvpn flag defaults
changed, as it now returns an error for the up and down arguments
Did you mean fedora-26?
On Thursday, April 26, 2018 at 6:38:41 PM UTC-7, Chris Laprise wrote:
> On 04/26/2018 05:29 PM, JonHBit wrote:
> > On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
> >> On 04/17/2018 11:42 PM, Chris Laprise wrote:
> >>> On 04/17/2018 09:20 PM, JonHBit wrote:
> >>
>
On Saturday, May 12, 2018 at 11:10:27 AM UTC-7, get wrote:
> среда, 18 апреля 2018 г., 0:13:29 UTC+3 пользователь Chris Laprise написал:
> > Hello fellow Qubes users:
> >
> > Per issue 3503 the Qubes project would like to incorporate VPN features
> > from Qubes-vpn-support -- which a number of
среда, 18 апреля 2018 г., 0:13:29 UTC+3 пользователь Chris Laprise написал:
> Hello fellow Qubes users:
>
> Per issue 3503 the Qubes project would like to incorporate VPN features
> from Qubes-vpn-support -- which a number of you are already using --
> into the Qubes 4.1 release.
>
> I've set
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
> Hello fellow Qubes users:
>
> Per issue 3503 the Qubes project would like to incorporate VPN features
> from Qubes-vpn-support -- which a number of you are already using --
> into the Qubes 4.1 release.
>
> I've set up a
>
> 1)
> can you update your templates otherwise?
Yes I can update my templates
> 2)
> sudo apt-get install openvpn should have nothing to do with the later
> step of install the tasket scrip-let . (not the tunnel) just
> the VPN script on GitHub
I was just hoping to make sure
On 05/05/18 04:32, velcro-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
Strangest thing, I did a fresh installation of Qubes and now I can't get this
to work again?
Sorry for the basic question but is there something I need to do to the fresh
debian template after installation?
I am
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
> Hello fellow Qubes users:
>
> Per issue 3503 the Qubes project would like to incorporate VPN features
> from Qubes-vpn-support -- which a number of you are already using --
> into the Qubes 4.1 release.
>
> I've set up a
Strangest thing, I did a fresh installation of Qubes and now I can't get this
to work again?
Sorry for the basic question but is there something I need to do to the fresh
debian template after installation?
I am trying to eliminate all possible issues but to install OpenVPN to the
debian
Sorry correction to my notes:
Using qTunnel:
For Debian proxy, add OpenVPN package to your VPN template:
su
apt-get update && apt-get install openvpn unzip
Download and transfer file to template
https://github.com/tasket/qubes-tunnel.git
cd “Then drag downloaded file into terminal from
Here are my notes/instructions I made based on yours, I drag and drop some
files into terminal(vs purely command lines):
Using qTunnel:
For Debian proxy, add OpenVPN package to your VPN template:
su
apt-get update && apt-get install openvpn unzip
Download and transfer file to template
Adding this to my config:
setenv tunnel_dns '208.67.222.222 208.67.220.220'
instead of:
setenv vpn_dns '208.67.222.222 208.67.220.220'
worked.
Both http://welcome.opendns.com/ and https://www.dnsleaktest.com/ show that
OpenDNS are being used.
I am more then happy to help test, I was
On 04/29/2018 10:14 PM, vel...@tutamail.com wrote:
I just tried this version in 4.0 in the template. Some notes feedback:
1) When I tried changing the DNS to OpenDNS in my config file:
setenv vpn_dns '208.67.222.222 208.67.220.220'
I then went to:
http://welcome.opendns.com/
It failed and
Using debian 9, link indicates "Link is up", I get internet connection,
https://www.dnsleaktest.com/ indicates my VPNs IP(despite "setenv vpn_dns
'208.67.222.222 208.67.220.220'" in my vpn configuration) when I use this
configuration...
V
--
You received this message because you are
Chris/Tasket,
I am currently using this version: https://github.com/tasket/Qubes-vpn-support
"Master version"
I have this running in a proxy AppVM (Not in a template)
Using PIA VPN service
OpenDNS checks out OK
I just tried this version in 4.0 in the template. Some notes feedback:
1) When
On 04/26/2018 05:29 PM, JonHBit wrote:
On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my VPN
On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
> On 04/17/2018 11:42 PM, Chris Laprise wrote:
> > On 04/17/2018 09:20 PM, JonHBit wrote:
>
> >> Worked well for me using a debian-9 template & commit 4e96ca8, only
> >> trouble was that my VPN provider's configs used
> >>
On 04/20/2018 11:14 AM, cicero wrote:
On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the
VPN scripts & the OS are there -- templates don't affect configuration
issues like different locations. In any case, you have a proxyVM which
On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the VPN
scripts & the OS are there -- templates don't affect configuration
issues like different locations. In any case, you have a proxyVM which
contains configurations for the connections
On 04/20/2018 10:04 AM, cicero wrote:
On 04/20/18 03:12, Chris Laprise wrote:
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't
On 04/20/18 03:12, Chris Laprise wrote:
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't really understand how installing it in
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the 3.2
CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning it 1st) would allow me to swich between
I installed this in a App/proxy 4.0 VM, as I am familiar with the 3.2
CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning it 1st) would allow me to swich between
geolocations ...
So, I used the AppVM, then I simply cloned the 1st one
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my VPN provider's configs used
/etc/update-resolv-conf and failed silently when it was missing - so
shipping it with
On 04/17/2018 09:20 PM, JonHBit wrote:
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
Hello fellow Qubes users:
Per issue 3503 the Qubes project would like to incorporate VPN features
from Qubes-vpn-support -- which a number of you are already using --
into the Qubes 4.1
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
> Hello fellow Qubes users:
>
> Per issue 3503 the Qubes project would like to incorporate VPN features
> from Qubes-vpn-support -- which a number of you are already using --
> into the Qubes 4.1 release.
>
> I've set up a
47 matches
Mail list logo