On 05/27/2017 06:09 PM, rob_66 wrote:
Hash: SHA512

Hello all.

What do you think would produce the best balance between security and

1. Running AirVPN's client 'Eddie' in sys-netVM.

2. Putting AirVPN's OpenVPN config into Turris Omnia 2 GB router.

3. Setting up a VPN gateway in Qubes as described in Qubes' docs.

Hardware: Asus »Zenbook«, Intel i5-5200U, 2.20 GHz, 12 GB RAM.

Any hint is very much appreciated.

Best regards,

Best overall approach is to download your service's openvpn config files and continue with the doc instructions or the slightly fancier setup here:


The one at the link (my own project) configures the link as a systemd service... gives you more control. The anti-leak measures are the same.

I haven't looked at 'Eddie' but usually these proprietary tools assume you are configuring a traditional PC. OTOH, Qubes proxyVMs are akin to _routers_ so protection features in Eddie et al might not work. (Anyway it would go in a proxyVM, not sys-net.) There was some discussion here I think about Mullvad and that service's special tool, and ultimately it was better to download the config files and use the Qubes-specific instructions.

As for Turris Omnia router setup, it depends on how much you trust the security of that router -- generally, openvpn is safer in Qubes than in router hardware (even the 'impressive' ones).


Chris Laprise, tas...@openmailbox.org
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
For more options, visit https://groups.google.com/d/optout.

Reply via email to