We raise our VPN and disable logs

Man

Professional
Messages
3,070
Reaction score
606
Points
113
VPN is an indispensable attribute of our craft. Beginners and not only often have the question "Which VPN service to choose for work and surfing?" - none of the services can be recommended, since each of them can log and transmit data on request. It is impossible to check this for sure, because we do not have access to the server organizing the connection. The most reliable way is to raise personal VPN servers to which we will have access, we will be able to monitor their activity and, most importantly, personally disable logs. However, the reliability of the server itself is also important, in this article I will recommend some providers that, in my opinion, remain reliable at the moment, and they have not been noticed working with services, but this does not mean that it will always be so.

To set up a personal VPN, we will need a remote server. You can take the cheapest one, with kvm or light kvm virtualization, with the latest version of the ubuntu system, without RDP.
You can specify any data when registering. You can pay with crypto.
*Do not pay for the server with personal details that can make you anonymous. Create a separate wallet for payment, which will contain the crypto after the mixer.

Utilities that will be needed for setup:
After purchasing the server, open Putty. Enter the IP of the purchased server, click "Open".
PuTTY Configuration.png


Login: enter root

Next, enter the password for the server (* the password is not displayed when entered)

Update the system on the server by entering:
Code:
apt update && apt upgrade -y

We see this table - click OK
Pending kernel upgrade.png


Next, we enter reboot to reboot the server
Daemons using outdated libraries.png


Click OK. The server may hang (turn off) for a few minutes, you need to wait .

Next, download outline manager and client.

Open it, select set up anywhere

Click on Share and copy the key to the client

When installing the client, be sure to install the network adapter (if you do not install it, an error will pop up when trying to connect)

We try to connect to the server, check if the IP has changed. If everything is fine, we proceed to disabling logs.
  • We clean and block files not related to vpn, these are files that record the connection to the server via sssh and other protocols.
    To do this, go to the /var/log folder on the server, with the command: cd /var/log
  • After that, we will clean three files - btmp, lastlog, wtmp. To do this, so as not to clean manually, you can write it like this:
    Code:
    :>lastlog
    :>btmp
    :>wtmp
  • Now let's set a ban on recording for them like this:
    Code:
    sudo chattr +i lastlog
    sudo chattr +i wtmp
    sudo chattr +i btmp
  • After this, we will delete the remaining files (there will be three errors, this is normal):
    Code:
    rm -r /var/log
  • And we'll disable system logs like this:
    Code:
    systemctl disable rsyslog
    systemctl disable syslog.socket
  • Next, check the contents of the files.
    Enter the command cat lastlog - if nothing is displayed, then everything has been deleted.

In my opinion, the most reliable option for surfing is TorBox. We roll a VPN on top of TorBox according to the instructions in this article only if you need to get to resources that are not allowed from TOR traffic. And we get an ideal combination of security and anonymity for surfing the network.
 
Top