On Tue, 18 Sep 2018 10:17:25 -0700 (PDT)
Wolf moon <adam.paton8...@gmail.com> wrote:

>On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
>> On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:  
>> > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:  
>> > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
>> > > engineering ) all working fine and learning my way around it. 
>> > > 
>> > > My only issue is logging into my vpn service. 
>> > > 
>> > > I have followed the Qubes instructions ( which the images are different 
>> > > to Qubes 4.0 and after searching the net on this matter someone said 
>> > > that this is a shot of the previous Qubes so not helpful there ) I also 
>> > > contacted my vpn service on the matter. They read up on the Qubes 
>> > > instructions and emailed me back a step by step guide but still no joy. 
>> > > 
>> > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
>> > > which I found simple instructions for elsewhere on the internet ) and 
>> > > works fine on my windows 10 system as its got an app interface you 
>> > > download.
>> > > 
>> > > Its just Qubes I am having issues with. I am by no means a hardcore 
>> > > techy, I am learning and not afraid or unfamiliar using the command line 
>> > > in linux. 
>> > > 
>> > > I have contacted the Qubes team after trying my best effort to resolve 
>> > > this on my own as I know they are a small team of 5 or so last time I 
>> > > checked.
>> > > 
>> > > Any help and advice would be greatly appreciated.
>> > > 
>> > > Best,
>> > > 
>> > > Wolf Moon  
>> > 
>> > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
>> > everything in Qube manager )
>> > 
>> > I started off by google searching how to set up a vpn on qubes. I dont 
>> > have every forum page be it google groups or reddit page saved I read 
>> > unfortunately. 
>> > 
>> > But they generally instructed me to do go through the steps to set up a 
>> > vpn as Qubes instructs on their page 
>> > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
>> > 
>> > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
>> > scripts
>> > 
>> > What I was referencing referring to the diagram/photo being outdated or of 
>> > the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It 
>> > just comes up looking different which is what one of the OPs mentioned on 
>> > one of the how to guides I found. 
>> > 
>> > Moving forward.
>> > 
>> > Certain commands didn't work like sudo which after googling one forum 
>> > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used 
>> > instead which is what I used.
>> > 
>> > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
>> > sys-net 
>> > Appvm
>> > 
>> > From there the rest of the instructions didn't work on Qubes for me.
>> > 
>> > Apart from downloading the nord config files successfully which are in my 
>> > nordvpn documents folder with all the server addresses as txt files eg 
>> > uk648.nordvpn.comtcp443.ovpn
>> > 
>> > Also was instructed to download nano reader and a few other things.
>> > 
>> > My cd ls in my nordvpn terminal is as follows 
>> > 
>> > Desktop    Music      Templates       nano.save
>> > Documents  Pictures   Videos          openvpn-client.ovpn.txt
>> > Downloads  Public      auth-user-pass  pass.txt        
>> > 
>> > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn 
>> > set up instructions I added vpn-handler-openvpn to services in the appvm I 
>> > named Nordvpn )
>> > 
>> > So from there comes Nordvpns reply ( they were very helpful before helping 
>> > me successfully setting up my vpn link on my Raspberry Pi )
>> > 
>> > I received this email: 
>> > 
>> > Hello, Adam,
>> > 
>> > I have checked your OS documentation and it would be great if you could 
>> > test out the following setup:
>> > Disable any auto-starting service that comes with the software package. 
>> > For example for OpenVPN.
>> > sudo systemctl disable openvpn.service
>> > You may also wish to install nano or another simple text editor for 
>> > entering the scripts below. Now run the following command to create VPN 
>> > directory:
>> > sudo mkdir /rw/config/vpn
>> > Enter the directory using the following command:
>> > cd 
>> > /rw/config/vpn
>> > 
>> > Then our website - https://nordvpn.com/servers/#recommended , on the 
>> > server picker you will see recommended server number. Then open 
>> > https://nordvpn.com/ovpn/ website and download recommended server file. 
>> > You can download directly to device and transfer to your VM or use command 
>> > to download from the hyperlink:
>> > sudo wget 
>> > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
>> > (Change the last line of server name to download the correct file). Then 
>> > rename downloaded file to client.ovpn
>> > The VPN client may not be able to prompt you for credentials when 
>> > connecting to the server. Create a file in the /rw/config/vpn folder with 
>> > your credentials and using a directive. For example for OpenVPN, edit:
>> > auth-user-pass
>> > to:
>> > auth-user-pass pass.txt
>> > 
>> > Save file /rw/config/vpn/client.ovpn. Make sure a /rw/config/vpn/pass.txt 
>> > file actually exists.
>> > sudo nano /rw/config/vpn/pass.txt
>> > Add:
>> > username
>> > password
>> > Replace username and password with your actual username and password.
>> > Test your client configuration: Run the client from a CLI prompt in the 
>> > ‘vpn’ folder, preferably as root. For example:
>> > sudo openvpn --cd /rw/config/vpn --config client.ovpn
>> > Watch for status messages that indicate whether the connection is 
>> > successful and test from another VPN VM terminal window with ping.
>> > ping 8.8.8.8
>> > ping can be aborted by pressing the two keys ctrl + c at the same time. 
>> > DNS may be tested at this point by replacing addresses in /etc/resolv.conf 
>> > with ones appropriate for your VPN (although this file will not be used 
>> > when setup is complete). Diagnose any connection problems using resources 
>> > such as client documentation and help from your VPN service provider. 
>> > Proceed to the next step when you’re sure the basic VPN connection is 
>> > working.
>> > 
>> > Set up the VPN’s autostart.
>> > sudo nano /rw/config/rc.local
>> > Clear out the existing lines and add:
>> > #!/bin/bash 
>> > VPN_CLIENT='openvpn' VPN_OPTIONS='--cd /rw/config/vpn/ --config 
>> > openvpn-client.ovpn --daemon'
>> > su - -c 'notify-send "$(hostname): Starting $VPN_CLIENT..." 
>> > --icon=network-idle' user
>> > groupadd -rf qvpn ; sleep 2s
>> > sg qvpn -c "$VPN_CLIENT $VPN_OPTIONS" 
>> > If you are using anything other than OpenVPN, change the VPN_CLIENT and 
>> > VPN_OPTIONS variables to match your VPN software. Save the script. Make it 
>> > executable.
>> > sudo chmod +x /rw/config/rc.local
>> > Restart the new VM! The link should then be established automatically with 
>> > a popup notification to that effect.
>> > 
>> > Let us know how it will go! 
>> > 
>> > But..starting out I fell over the first hurdle. 
>> > 
>> > in the Nordvpn terminal I typed in Sudo systemctl disable openvpn.service
>> > 
>> > message back: Failed to disable unit: Unit file openvpn.service doesn not 
>> > exist. 
>> > 
>> > That is where I am now.
>> > 
>> > Any help and suggestions will be greatly appreciated. 
>> > 
>> > Best,
>> > 
>> > Wolf moon  
>> 
>> You cannot disable something that does not exist. Just move on to the next 
>> point. Did you enable the "provides network" option while creating your 
>> VPN-App?
>> 
>> Creating a new VPN-app is looking like that for me, my apps stand for the 
>> country:
>> 
>> Name: sys-vpn-austria
>> Type: AppVM
>> Template: Debian (or course you can use Fedora, but it should be 28, 26 is 
>> outdated!)
>> Networking: default (sys-firewall)
>> provides network: enabled
>> 
>> The guide provided seems fine and you could check if the connection works 
>> but you should include the other scripts as well in order to make sure that 
>> all traffic is going through your vpn only  
>
>I have just found the command to update to fedora 28 via dom 0 on kushal das 
>website
>
>sudo qubes-dom0-update qubes-template-fedora-28
>
>Updating now
>

What that does is install the fedora-28 template.  You can do that.  I did.  
First I upgraded the fedora-26 template to 27 then 28 then I decided to redo 
with the clean 28 template.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180918153138.0760e479%40gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to