On 09/15/2018 05:07 AM, 22...@tutamail.com wrote:
Thanks Chris...I understand now. I just tried it again and below are my logs, while I
don't get the "Operation not permitted (code=1)" error I still get the TLS
error
Fri Sep 14 16:55:06 2018 library versions: OpenSSL 1.0.2l 25 May
On 09/14/2018 03:25 PM, 22...@tutamail.com wrote:
Thank you Anac and Chris, appreciate your suggestions:
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
I did check this...opened the connection to Any/Any but
On 09/13/2018 08:00 PM, Anac wrote:
On 09/14/2018 12:13 AM, 22...@tutamail.com wrote:
Unfortunately I have been under constant attack and a target and the
only solution I see is a fresh rebuild or new computer unless you have
another idea?
On 09/14/2018 12:13 AM, 22...@tutamail.com wrote:
Unfortunately I have been under constant attack and a target and the only
solution I see is a fresh rebuild or new computer unless you have another idea?
You said that Tor was running. When combining Tor with VPN, the VPN's
connection
On 09/07/2018 11:10 AM, 22...@tutamail.com wrote:
Thank you both for your responses...fair question John but I am the OP, lost
access to my old tutamail. Yes my VPN was working fine for a few months however
with a recent update it broke?? Its a little concerning because I did both a
Debian
On 09/06/2018 10:22 AM, 22...@tutamail.com wrote:
It appears as if I am getting a TLS error? Why would this suddenly start?
Wed Sep 5 17:23:39 2018 TLS Error: TLS handshake failed
Wed Sep 5 17:23:39 2018 SIGUSR1[soft,tls-error] received, process restarting
Wed Sep 5 17:23:39 2018 Restart
On 09/05/2018 11:32 AM, 22...@tutamail.com wrote:
Correctionmy TOR is working. Any ideas how to trouble shoot?
Everything has been working fine, however recently my VPN tunnel is failing?
I ran: sudo journalctl -u qubes-tunnel
and I get:
Sep 05 10:17:48 VPN-Mid qtunnel-setup[1138]: Wed
On 05/12/2018 02:10 PM, get wrote:
Hi. script not working more on debian-9/fedora-26. Please fix it.
Tested vpn's : mullvad, privateinternetaccess, expressvpn and multiple random
openvpn.
Guides:
https://github.com/tasket/Qubes-vpn-support
On 05/14/2018 09:09 AM, Chris Laprise wrote:
On 05/12/2018 03:11 PM, JonHBit wrote:
I've updating to 1.4beta4 and switched templates from debian-9 to
fedora-28, but I'm getting the same error - also it seems like openvpn
flag defaults changed, as it now returns an error for the up and down
On 05/06/2018 05:24 PM, morlan.aus...@gmail.com wrote:
Worked great for me with Qubes 4.0 and Fedora 26.
I'm unclear on how to use sys-firewall now though. Should it be sys-net ->
sys-firewall -> VPN -> App?
Thanks.
That arrangement is OK. But you can take sys-firewall out of the path
On 05/12/2018 03:11 PM, JonHBit wrote:
I've updating to 1.4beta4 and switched templates from debian-9 to fedora-28,
but I'm getting the same error - also it seems like openvpn flag defaults
changed, as it now returns an error for the up and down arguments
Did you mean fedora-26?
On Thursday, April 26, 2018 at 6:38:41 PM UTC-7, Chris Laprise wrote:
> On 04/26/2018 05:29 PM, JonHBit wrote:
> > On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
> >> On 04/17/2018 11:42 PM, Chris Laprise wrote:
> >>> On 04/17/2018 09:20 PM, JonHBit wrote:
> >>
>
Strangest thing, I did a fresh installation of Qubes and now I can't get this
to work again?
Sorry for the basic question but is there something I need to do to the fresh
debian template after installation?
I am trying to eliminate all possible issues but to install OpenVPN to the
debian
Sorry correction to my notes:
Using qTunnel:
For Debian proxy, add OpenVPN package to your VPN template:
su
apt-get update && apt-get install openvpn unzip
Download and transfer file to template
https://github.com/tasket/qubes-tunnel.git
cd “Then drag downloaded file into terminal from
Here are my notes/instructions I made based on yours, I drag and drop some
files into terminal(vs purely command lines):
Using qTunnel:
For Debian proxy, add OpenVPN package to your VPN template:
su
apt-get update && apt-get install openvpn unzip
Download and transfer file to template
Adding this to my config:
setenv tunnel_dns '208.67.222.222 208.67.220.220'
instead of:
setenv vpn_dns '208.67.222.222 208.67.220.220'
worked.
Both http://welcome.opendns.com/ and https://www.dnsleaktest.com/ show that
OpenDNS are being used.
I am more then happy to help test, I was
On 04/29/2018 10:14 PM, vel...@tutamail.com wrote:
I just tried this version in 4.0 in the template. Some notes feedback:
1) When I tried changing the DNS to OpenDNS in my config file:
setenv vpn_dns '208.67.222.222 208.67.220.220'
I then went to:
http://welcome.opendns.com/
It failed and
Using debian 9, link indicates "Link is up", I get internet connection,
https://www.dnsleaktest.com/ indicates my VPNs IP(despite "setenv vpn_dns
'208.67.222.222 208.67.220.220'" in my vpn configuration) when I use this
configuration...
V
--
You received this message because you are
Chris/Tasket,
I am currently using this version: https://github.com/tasket/Qubes-vpn-support
"Master version"
I have this running in a proxy AppVM (Not in a template)
Using PIA VPN service
OpenDNS checks out OK
I just tried this version in 4.0 in the template. Some notes feedback:
1) When
On 04/26/2018 05:29 PM, JonHBit wrote:
On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my VPN
On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
> On 04/17/2018 11:42 PM, Chris Laprise wrote:
> > On 04/17/2018 09:20 PM, JonHBit wrote:
>
> >> Worked well for me using a debian-9 template & commit 4e96ca8, only
> >> trouble was that my VPN provider's configs used
> >>
On 04/20/2018 11:14 AM, cicero wrote:
On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the
VPN scripts & the OS are there -- templates don't affect configuration
issues like different locations. In any case, you have a proxyVM which
On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the VPN
scripts & the OS are there -- templates don't affect configuration
issues like different locations. In any case, you have a proxyVM which
contains configurations for the connections
On 04/20/2018 10:04 AM, cicero wrote:
On 04/20/18 03:12, Chris Laprise wrote:
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't
On 04/20/18 03:12, Chris Laprise wrote:
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't really understand how installing it in
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the 3.2
CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning it 1st) would allow me to swich between
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my VPN provider's configs used
/etc/update-resolv-conf and failed silently when it was missing - so
shipping it with
On 04/17/2018 09:20 PM, JonHBit wrote:
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
Hello fellow Qubes users:
Per issue 3503 the Qubes project would like to incorporate VPN features
from Qubes-vpn-support -- which a number of you are already using --
into the Qubes 4.1
29 matches
Mail list logo