We raise our own VPN

Father

Professional
Messages
2,602
Reaction score
807
Points
113
We buy the cheapest VPS for example:

KVM virtualization is a must!
Enough and 256 MB of RAM for 5 devices
[Premium] KVM SSD

After the purchase, the login data on the control panel will be sent to the mail, we put the debian of the latest version, there should be no problems with it.

We go via SSH (what is SSH, etc. we find out in Google, software for connecting to SSH Putty):

We update the system:
Code:
apt-get update
Code:
apt-get upgrade

Next, run the automatic VPN installer / configurator:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh

We follow the instructions, there will not be anything difficult, you can just press Enter and agree with everything in the flesh until the end of the installation, but I advise you to change the port at the beginning to your own.

After installation, our VPN config will be in the root directory.
We download it, for example, through the FileZilla program.

In order to create a config for a new device, simply run the installer script again:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh

And enter the name of the new config, the config will also appear in the root folder

Setting up openVPN on Windows (hide IP):
Download and install OpenVPN

Run as administrator, a VPN icon will appear in the tray, right-click on it and import our config downloaded from the server.

We connect.

Setting up openVPN on ubuntu (hide IP):

We'll have to work in the terminal: Install openVPN
Code:
sudo apt-get install openvpn

Create a config file

Install the nano editor (you can use any):
Code:
sudo apt-get install nano
- during installation, confirm with the "y" button

Create and edit the config:
Code:
sudo nano /etc/openvpn/config.conf

Open the config downloaded from the VPS server with a text editor, copy everything that is there and paste it into the terminal into the created config.conf file

Press Ctrl + O to save and ctrl + x to exit

Launch:
Code:
sudo openvpn --config /etc/openvpn/config.conf

If you want to start VPN automatically after every system reboot:
Code:
sudo openvpn --config /etc/openvpn/config.conf

Anonymity of this method:

2 ways to disable logging:

Removing rsyslog:[
Code:
apt-get remove rsyslog

"Disable" rsyslog:
Code:
echo "if \ $ programname == 'openvpn' then ~"> /etc/rsyslog.d/openvpn.conf
/etc/init.d/rsyslog reload

This VPN is perfect for everyday use everywhere if you want:
  • Hide your real IP
  • Hide your activity from the provider
  • Use in various cafes and collective farm WI-FI networks
  • Use to bypass locks on various resources

Tip: Create 2 configurations for yourself to use them constantly. On the PC and on the phone.

Who, after configuration, does not have a connection to the server via OpenVPN, try when executing the command:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
Select TCP over UDP

Error solution:
ERROR: The certificate of `raw.githubusercontent.com 'is not trusted.
ERROR: The certificate of `raw.githubusercontent.com 'hasn't got a known issuer.

Run command:
Code:
sudo apt-get install ca-certificates

Definition of a tunnel (two-way ping often on 2ip.ru shows when checking). Cut down using iptables:
Code:
# iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
# iptables -A INPUT -p icmp --icmp-type echo-reply -j DRO
# iptables -A INPUT -p icmp --icmp-type echo-request -j REJECT

These commands will block ICMP packets without any error messages from the server.

When using a VPN, I advise you to increase your anonymity using DNS from CloudFlare (when installing a script on a VPS, choose DNS 1.1.1.1) or already in the system, change:
Code:
1.1.1.1
1.0.0.1
2606: 4700: 4700 :: 1111
2606: 4700: 4700 :: 1001
 
  • Like
Reactions: Man
Top