Jump to content
TorGuard

Search the Community

Showing results for tags 'torguard'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • The Lounge
    • TorGuard News
    • Introductions
    • General Stuff
    • Member Tutorials
    • TorGuard Reviews
  • TorGuard Software Releases
    • Network Status
    • TorGuard Client Releases
    • Android Client Releases
    • iOS App Releases
    • Chrome Extension Releases
    • Firefox Extension Releases
  • TorGuard VPN Support
    • VPN Questions and General Support
    • VPN Windows Support
    • VPN Mac Support
    • VPN Linux Support
    • VPN Router Support
    • iOS VPN Support
    • Android VPN Support
  • TorGuard Proxy Support
    • Proxy Questions and General Support
    • Firefox Extension Support
    • Chrome Extension Support

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 19 results

  1. Hi, Long time consumer here. I had received a copyright strike & I did some testing & After me voluntarily choosing to disconnect torguard the killswitch set to my torrent client takes about 10 - 15 seconds to see that that killswitch terminates torrent client after disconnect. I have torguard version 0.3.77.
  2. So, in the TorGuard Windows client v0.3.78 I use the internet kill switch in the Network tab. I mainly connect via USB tethering and Wi-Fi so I have selected that two interfaces. And I have set "Enable disabled interfaces before connecting" to "yes" in the General tab. But everytime I try to connect a dialog box popup saying "One or more interfaces can not be activated properly. Please activate them manually before continuing." Up to this point the TorGuard tray icon remains red. When I click "OK" in the aforementioned dialog box the internet connects automatically without me having to do anything. Is this a bug? I have added an Imgur album here due to TorGuard's file size limit.
  3. LEDE - OPENWRT TORGUARD VPN SETUP Regards Mike OK - I decided to put this up on the TorGuard Forum as I could not find a tutorial anywhere with specific step by step instructions for getting Torguard OPENVPN working with OpenWrt/ Lede. In advance, I want to thank the excellent support team at TorGuard ( especially Mike & Andy ) for assisting me with getting my Lede/Openwrt VPN router up and running. I use davidc502 firmware which is described as Moderately Customized LEDE Development Builds found here - https://davidc502sis.dynamic-dns.net/releases/ and here - https://davidc502sis.dynamic-dns.net/snapshots/ -- davidc502's forum found here - https://forum.openwrt.org/viewtopic.php?id=64949&p=164b - Dave's builds are for Linksys WRT1900AC v1 Linksys WRT1900AC v2 Linksys WRT1900ACS Linksys WRT3200ACM Linksys WRT1200AC models ONLY !!! One of the many benefits of using Dave's custom firmware is that it comes with many pre-installed and configured software packages - including OpenVpn and Dnscrypt - I use both in conjunction on my router. For full list of packages see Dave's configuration seed found here - https://davidc502sis.dynamic-dns.net/releases/config.seed - However, the guide tutorial here will work on any and every OpenWrt/ Lede firmware based router. I also tested this with Lede stable firmware ( current version 17.01.4 ) found here - https://lede-project.org/downloads - Anyway - here we go - this is Mike's detailed original answer to my inquiry concerning my request for assistance in setting up OpenVpn on OpenWrt /Lede. I have added a few edits in order to make this more comprehensible and easier to implement. This guide will work Guaranteed if you follow instructions step by step. Mike // Staff Thank you, can you check if the steps below works ok for you 1) Then in Luci Gui go to System > Software, do update first ( ssh command opkg update ) then search for openvpn and install openvpn-openssl and luci-app-openvpn. ( uci ssh command - opkg install openvpn-openssl luci-app-openvpn ) These are necessary - Luci is GUI frontend for Openwrt - it comes pre-installed with davidc502's firmware. Also installed on Lede stable. 2) Here you Generate OpenVpn config on https://torguard.net/tgconf.php?action=vpn-openvpnconfig choosing openwrt. 3) Login using ftp client like winscp to the router (openwrt) and the config file downloaded from the tool to be uploaded to box and renamed as /etc/config/openvpn To make this simpler - you can copy and paste the newly generated text file to a text file on your desktop and /or download config file to your desktop. Install nano ( preferred text editor ) - opkg install nano - if you need to install nano - ( if not already there / comes pre-installed in davidc502's builds ) to your router. SSH into router then type ( copy and paste ) -" nano /etc/config/openvpn " ( without parenthesis ) - erase all contents of file ( hold Ctrl + k ) and replace ( copy and paste ) with contents of config file you copied and downloaded earlier. Sample of my /etc/config/openvpn config file - adjust yours as you see fit but stick with config from https://torguard.net/tgconf.php?action=vpn-openvpnconfig as your basic guide - config openvpn 'TorGuard_AES256GCM_SHA256' option client '1' option dev 'tun' option proto 'udp' option resolv_retry 'infinite' option nobind '1' option persist_key '1' option persist_tun '1' option ca '/etc/openvpn/torguard/ca.crt' option remote_cert_tls 'server' option tls_auth '/etc/openvpn/torguard/ta.key 1' option cipher 'AES-256-GCM' option comp_lzo 'adaptive' # AS of March 2018 and OpenVpn 2.4.5 use option compress 'lzo' otherwise you can not connect option verb '4' option fast_io '1' option auth_user_pass '/etc/openvpn/torguard/userpass.txt' option remote_random '0' option auth 'SHA256' option reneg_sec '0' option port '1195' list remote 'ny.east.usa.torguardvpnaccess.com' option sndbuf '393216' option rcvbuf '393216' option enabled '1' option keepalive '10 120' option auth_nocache '1' option tls_client '1' option setenv 'CLIENT_CERT 0' option tls_version_min '1.2' option tls_cipher 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384' option ncp_ciphers 'AES-256-GCM:AES-128-GCM' option tun_mtu '1500' option tun_mtu_extra '32' option ncp_disable '1' option engine 'dynamic' option mute_replay_warnings '1' option disable_occ '1' option keysize '256' option mssfix '1450' option script_security '2' option reneg_bytes '1073741824' option mute '20' option pull '1' option log '/tmp/openvpn.log' Then hit Ctrl + o - you will be asked to write file - hit enter to save file - then Ctrl + x to close file and go back into shell 4) create folder /etc/openvpn/torguard and add under it the ca.crt, ta.key from https://torguard.net/downloads/ta.key and https://torguard.net/downloads/ca.crt and create new file userpass.txt where in it put on first line your vpn username and second you vpn password. Create /etc/openvpn/torguard folder ( in ssh session into router - type - " mkdir /etc/openvpn/torguard " ( without parenthesis ) - in order to proceed - opkg install wget ( if you need to install wget ) ssh into router use wget ( install wget if not already there / comes pre-installed in davidc502's builds ) to issue following commands in order to install necessary files to /etc/openvpn/torguard folder which you just created : type the following commands in shell A - " wget -P /etc/openvpn/torguard https://torguard.net/downloads/ta.key " ( without parenthesis ) - copy and paste - ( ta.key is downloaded to /etc/openvpn/torguard folder ) B - " wget -P /etc/openvpn/torguard https://torguard.net/downloads/ca.crt " ( without parenthesis ) - copy and paste - ( ca.crt is downloaded to /etc/openvpn/torguard folder ) C - type ( copy and paste ) " nano /etc/openvpn/torguard/userpass.txt " ( without parenthesis ) - in new text file type ( copy and paste ) in first line your TorGuard Vpn username and on second line your TorGuard Vpn password - Then hit ( Ctrl + o ) - you will be asked to write file - hit enter to save file - then ( Ctrl + x ) to close file and go back into shell - userpass.txt is now added under /etc/openvpn/torguard/ folder as well Now - these commands are required from my past experience - still in SSH type ( copy and paste ) chmod 0777 /etc/openvpn/torguard/ta.key chmod 0777 /etc/openvpn/torguard/ca.crt chmod 0400 /etc/openvpn/torguard/userpass.txt There are two alternative methods available in order to create the necessary openvpn network interface and complimentary firewall rules. The first one I will feature is through the command line shell - using uci commands. The second is simply done through the Luci Web GUI. Personally, I use the uci command line approach as I feel the firewall rules for the vpn connection are more secure in nature using this method. For the sake of this tutorial, consider command line - uci - Scenario A - and Luci Web Gui method - Scenario B. Both will create an interface and working firewall rules and in the end - and leave you with a working TorGuard OpenVpn configuration and subsequent connection. GUARANTEED ! Remember this is either A or B - not A AND B !!! - you can not use both. It is one or the other. Scenario A - TorGuard OpenVpn Network Interface Creation and Setup via command line - uci uci set network.myvpnc=interface uci set network.myvpnc.proto=none uci set network.myvpnc.ifname=tun0 uci commit network TorGuard OpenVpn Firewall Rules Setup via command line - uci uci add firewall zone uci set [email protected][-1]=zone uci set [email protected][-1].name=myvpnc_fw uci set [email protected][-1].network=myvpnc uci set [email protected][-1].input=REJECT uci set [email protected][-1].output=ACCEPT uci set [email protected][-1].forward=REJECT uci set [email protected][-1].masq=1 uci set [email protected][-1].mtu_fix=1 uci add firewall forwarding uci set [email protected][-1]=forwarding uci set [email protected][-1].src=lan uci set [email protected][-1].dest=myvpnc_fw uci commit firewall reboot Scenario B - TorGuard OpenVpn - Luci ( Web Gui ) Network Interface Creation and Setup and Firewall Rules Setup 1 ) Back on Luci ( Lede/OpenWrt Gui ). Go to Network > Interfaces and add new interface name the interface " MYVPN " - make sure the " Protocol of the new interface " at top of page is set to " Unmanaged " and at bottom of page select " Custom " and enter " tun0 " ( tun number zero ) in the field next to custom radio button. Click On Submit then Save and Save and Apply Settings 2 ) Go to Network > Firewall section, click add " new zone " and make it to " "accept " ( all three up top - accept all options ) input/output/forward/masquarde, ( check " masquerade " box under where you accepting all . Then choose - enter check mark in box next to interface VPN ( Covered networks ). Then in bottom box " Inter-Zone Forwarding " ( Allow forward to destination zones: ) = LAN and then ( Allow forward from source zones: ) = LAN This means click both radio buttons next to lan in last section on firewall " newzone " you just created. Lastly, Click On Save and Save and Apply Settings - 3 ) Go to Services > Openvpn and start the VPN service. All should be up and running after this. Support said they would post this in tutorials for Openwrt/Lede firmware. As I said, I just put this up to save folks time if they run TorGuard VPN. By the way, it is an excellent VPN service. Easier setup than PIA VPN - specifically on Lede/Openwrt. Again - thanks to TorGuard Support. Let us know if you have any further questions. Regards Mike LEDE - OPENWRT TORGUARD VPN SETUP
  4. TorGuard

    Year Review

    Introduction Hello, I have been a TorGuard customer for roughly a year now, since last April. I’ve experienced some of the worst VPN providers and some of the best; the last VPN service I was with was good but expensive, so I went on the prowl to seek something that had a better price for what I was getting. One main reason that made me decide to choose TorGuard as my primary provider, was their prices. The VPN package alone isn’t much of a deal breaker, but the “Privacy Bundle†is. You get access to all TorGuard’s HTTPS/HTTP/SOCKS proxies plus their VPN service for a couple bucks more which is totally a steal. It’s much cheaper to purchase a subscription yearly instead of monthly, this is where I decided it would be cost effective in the long run. Next reason was that they do not log or monitor any user traffic, besides the automated security measures they have put in place to protect their network from outgoing spam or ddos. They offer free DNS servers in USA and France which also have no logs, you can rest assured whatever you are accessing isn’t being monitored by a third entity. You cannot go wrong with choosing TorGuard as a VPN provider, they provide top notch support to all customers, good reasonable pricing and fast servers all around the globe. Available connection methods: ovpn/pptp/l2tp/anyconnect/sstp/ssl/http/socks/ssh — Up to 5 simultaneous connections. They offer many different pre-defined openvpn configurations as well as a custom generator to fine tune as per your liking. Ports can be forwarded to most server locations instantly from the portforward dashboard, simply enter the port you want to forward and the server IP. Your VPN account uses separate login details(different from dashboard/forums) for enhanced privacy and security, the user/password can be changed at any time from the client dashboard. You aren't required to enter any identifiable information upon signing up, you could put your name as John Doe if you wanted, become anonymous with TorGuard. VPN Client Software TorGuard's VPN client is easy to navigate, sporting a minimalist interface to access all vital components. It is loaded with a lot of different configurable settings and features. The main features that stand out in the client are the following: DNS/WebRTC/IPV6 leak protection, killswitch, stealth proxies, built in anyconnect support. The client works well on Windows 10, all features I've tested do their job as advertised. The client supports: Windows, Mac OSX, Ubuntu 86/64bit, Redhat 86/64bit, Arch 86/64bit, and of course if you do not want to use the client you can always use the provided .ovpn configs (for your router or another configuration setup, etcetera). Ciphers/Encryption Specs: Customer Service Support normally responds to tickets within two hours or less, with the exception sometimes it may take up to 24 hours depending how busy they are; best time frame I have found was between the hours of 5am and 6pm. Staff are responsive, they do their best to help you with what ever problem you may have. Livechat is more intended for pre-sales questions, since staff cannot confirm who you are if you try to ask a question related to your account, such support related questions should be directed to a ticket instead. Staff frequently update their blog to announce latest security concerns for various different topics and as well new features to keep you informed regarding their services: https://torguard.net/blog/category/torguard-updates/ Servers/Speed I am not aiming for maximize speed, instead, to achieve a strong layer of protection with TorGuard's services. My ideal setup looks like this: My Computer > TorGuard VPN(TCP, AES-256) > TorGuard Proxies(Load Balanced) > Tor Network. While this setup is not the best for speed, it does still work really well and can download stuff at reasonable rates. TorGuard servers are very reliable, I've been connected to a single VPN server location for weeks at a time; would be longer, but I end up changing locations/settings often. There is no bandwidth limits on any of the servers, TorGuard doesn't throttle users, you get unlimited bandwidth. Each month I find myself using over 1 terabyte DL/UL and haven't been restricted in anyway. TorGuard is the perfect choice for Torrents and or as a general VPN provider. The major selling point is the amount of servers you get access to, TorGuard claims to have over 1600 servers, available to 54+ different countries! End This review was not endorsed or paid for: it is solely based off my personal observations and information provided by TorGuard. Thank you for reading, hopefully you have gained some insight for how the services are like. If you want to try TorGuard out yourself, they offer a 7 day refund if for any reason you are unsatisfied with the service. Have a nice day. Check this out: Real Questions of Anonymity other VPN Service Provider’s Won’t Answer
  5. Requirements openwrt (or any openwrt based firmware like LEDE openwrt) tor libevent2-openssl libevent2 libminiupnpc libnatpmp tor-geoip (optional) tor-fw-helper (optional) Description In this guide I will install and create tor on my openwrt router. My Wireless is isolated. You can change these setting as you wish, take only care that nobody from outside can reach your LAN's. At the end of this post is a script doing everything for you. You need only to adapt the script for your settings. For this guide, my router's lan ip is 192.168.1.3 This setup works for those who do use only proxy/socks product, vpn products or mix of them. It is very high grade of anonimity if all this works in some VPN, like TorGuard's which does work perfectly! What will we have at the end of this setup tor socks5 server on router's lan IP:9050 (in this example 192.168.1.3:9050) (you can set your system, browser or anything else to use socks5 which goes always over tor) Simple usage by joining WLAN (no need to setup anything on any device) set specific LAN port to go always through Tor, (especially usefull for those who use C-Lines for Card Sharing) Isolated Wireless Network (which is secured and can't communicate with LAN devices) Traffic is sent through TorGuard's proxy/socks5 (all tor's traffic sent through socks ot https proxy, Torguard Proxy port: 6060, TorGuard socks5 ports: 1080/1085/1090) (in this guide, we set only .onion and .exit urls to go over tor, all other pages will go over TorGuard's socks/proxy used by tor) (We also restrict usage on port 80 and 443 for the case that you need to hide from your ISP/VPN provder, TorGuard does not block) (if you are not using VPN, then you do hide the traffic from your ISP in using socks and from your socks provider by using only ports 80/443) (even if this setup is higly secure, consider using as addition obfsproxy which I will not cover in this guide) (socks5/proxy acts also as a fallback if your VPN stops working) This setup works if you are connected to a VPN (like TorGuard and openvpn, my router is currently in TorGuard's VPN) Installation of required packages: opkg update opkg install libevent2-openssl libevent2 libminiupnpc libnatpmp tor tor-fw-helper tor-geoip Create Tor interface with static IP 172.x.x.x Create DHCP server for tor interface Create 5Ghz and 2,4Ghz isolated wireless interfaces Add firewall zone and configure firewall for tor Configure tor with TorGuard services Download geoip and geoipv6 Reboot your router Script installing tor requirements, creating interface, configuring firewall If you are connected with TorGuards VPN and everything runs over VPN, then your tor might be inactive if it starts before openvpn during the boot because openvpn changes routes and tor needs to be restarted. In this case you can edit openvpn's start scripts, or tor's startscripts or simply adding this command under System->Startup section "Local Startup" # Put your custom commands here that should be executed once # the system init finished. By default this file does nothing. sleep 10 /etc/init.d/tor reload /etc/init.d/tor restart exit 0 How to get geoip and geoipv6 files TorGuard works blazing fast with Tor Network (!!!TORGUARD TEAM IS AMAZING, THANKS FOR GREAT SERVICES!!!) Thats it, enjoy tor network.
  6. The VPN router contest is back again! Enter now to win a high speed VPN router and one year VPN service with TorGuard. This contest is only open to TorGuard Forum members and you can enter by replying directly to this thread. Winners will be chosen at random on February 16th, 2015 and notified via private message. The Netgear R7000 Nighthawk WiFi Router is a wireless networking masterpiece with plenty of power to go around. This router brings the future of networking to your home or office with a high powered dual-core processor that runs at 1GHz, making it one of the fastest 802.11ac routers from Netgear to date. Read more about this VPN Router here... Good luck!!!
  7. OpenConnect Client Guide For Windows: For Android: Usefull Links/Guides: INFO: Please login to your account to find actuall server list and choose your server. All openvpn/l2tp/pptp hostnames work with anyconnect on port 22. Anyconnect hostnames use port 443.
  8. Looks like a nice 🕳ï¸, what's going on ? Since today I see more than 1 DNS server on DNS leak, these are all torguards, which I actually really like to see 8.0.11.12 DNS-8-0-11-15.Chicago1.Level3.net Level 3 Communications United States 8.0.11.15 cns3.Chicago2.Level3.net Level 3 Communications United States 8.0.11.0 DNS-8-0-11-8.Chicago1.Level3.net Level 3 Communications United States 8.0.10.6 DNS-8-0-11-11.Chicago1.Level3.net Level 3 Communications United States 8.0.10.11 DNS-8-0-11-9.Chicago1.Level3.net Level 3 Communications United States 8.0.10.7 DNS-8-0-10-1.Chicago1.Level3.net Level 3 Communications United States 8.0.11.8 DNS-8-0-11-14.Chicago1.Level3.net Level 3 Communications United States 8.0.10.3 DNS-8-0-11-4.Chicago1.Level3.net Level 3 Communications United States 8.0.10.13 DNS-8-0-10-2.Chicago1.Level3.net Level 3 Communications United States 8.0.10.1 DNS-8-0-11-6.Chicago1.Level3.net Level 3 Communications United States 8.0.11.11 DNS-8-0-10-12.Chicago1.Level3.net Level 3 Communications United States 8.0.11.9 DNS-8-0-10-6.Chicago1.Level3.net Level 3 Communications United States 8.0.10.9 DNS-8-0-10-11.Chicago1.Level3.net Level 3 Communications United States 8.0.11.7 DNS-8-0-11-12.Chicago1.Level3.net Level 3 Communications United States 8.0.11.14 DNS-8-0-10-3.Chicago1.Level3.net Level 3 Communications United States 8.0.11.4 DNS-8-0-10-7.Chicago1.Level3.net Level 3 Communications United States 8.0.10.2 DNS-8-0-10-9.Chicago1.Level3.net Level 3 Communications United States 8.0.11.6 DNS-8-0-10-13.Chicago1.Level3.net Level 3 Communications United States 8.0.10.12 DNS-8-0-11-7.Chicago1.Level3.net Level 3 Communications United States 8.0.11.5 DNS-8-0-11-5.Chicago1.Level3.net Level 3 Communications United States So, is it just on me/my server or is this implemented already on most servers?
  9. TorGuardWRT + OpenVPN + TorGuardApp + Extras more info following in coming days. Please leave your comments. Further discussion, descriptions, guides will follow only on corresponding github project page. I may or may not reply in this thread. As replacement of a discussion board where you would like to discuss with me about this project, it will be on slack channel. Please follow github for more info, github will be updated in next few days.
  10. Not bad at all for simply connecting but as you see, even connecting to torguard brings issues if your ISP is spying on you. This is very good example of something, where other tests show you that everyhing is ok but this test clearly shows you that your ISP is hijacking DNS. You need to have Java installed on your pc to run these tests, it does not work in chrome, but on firefox it does even if using combination of proxifier and foxyproxy (because java tool does all the job, not the browser itself) TEST NOW WITH ANALYZR Good article in german explaining it a little bit and includes the test itself. Send your tests to TorGuard support, they will help you very fast with any leaks, problems or even unintentionally missconfigured device like to open ports which you do not want at all opened. Here is one example (it provides a link which you can send to torguard support if your tests show any issues): More test results (example):
  11. Hi, I made this Script to start uTorrent after 60 seconds while my VPN Connection is trying to connect. timeout 15 start c:\Users\USERNAME\AppData\Roaming\uTorrent\uTorrent.exe exit Since I noticed it takes some time to get my Dedicated IP address. TorGuard started the Script a little to early I hope someone have use for it Best Regards, BrooBee
  12. The TG Vpn update of November 19, 2016 has somehow changed my Adapter Settings for my ethernet, wfi, and it's very own TAP windows adapter settings affecting no response from the DNS Server. So basically, I could not connect to the internet (by ethernet or wifi) and I figured it out by myself on how to fix the issue. I had to make sure that I had to change IPv4 and IPv6 Settings on said adapters to obtain IPv4 and IPv6 addresses and DNS Server Addresses automatically and it would fix the issue... BUT then the settings would change so I have to figure out which adapter had the settings changed, whether be it TG (TAP) adapter or my own Ethernet or wifi adapters, I have to manually fix it. Is this some kind of glitch??? or error?
  13. Ok, so, I've re-installed Linux Mint 18 about 6 times, and I've finally figured out at what step my connectivity get's completely killed: After installing TorGuard, and then after disabling it after having had it enabled. Expected Behavior (Linux Mint 17.3 did this): After using TorGuard, click disconnect on the TorGuard client. Normal network connectivity is restored. Current Behavior (Linux Mint 18 does this): After using TorGuard, click disconnect on the TorGuard client. Normal network connectivity is not restored. Websites cannot be browsed. Teamviewer has no connection. Checking for updates yields in a "red X" icon indicating no internet. I will note that I can still VNC into port 5900 while on my local network when this is down and not working, but my description above for what is not working is still accurate, even when VNC'd in. My network connection is "manual", and I have a static IP, Netmask, Gateway, and Google DNS. This works just fine until I install TorGuard and then disconnect after a happily VPN'd session on the machine. Here's a thread I found (it's recent and relavant) on the LinuxMint forums in regards to this exact issue. Just thought I'd make devs aware on the Torguard end, since it might be something we can change on this end to help ensure reliability.
  14. A noob question- can we enable file sharing and network discovery, along with Torguard? This is for streaming media over at home, and printer sharing? Or does it have any risk with VPN?
  15. Hello without sounding stupid I wanted to know if I start using the Torguard app while using mobile data can i still have a decent bandwidth and speed (High Speed mobile data)? I've tried using the Torguard app once but didn't notice anything different and uninstalled it and now I want to give it another shot if it will help me conserve at least 80% of my mobile data.
  16. i am a noob with linux. running kali linux followed these instructions: Setting up an OpenVPN client for Ubuntu/Debian/Mint, CLI edition. These instructions do not use Network Manager. For the purposes of this tutorial we’ll presume you’ve been given your TorGuard zip file from our downloads page here. Install the requisite packages: sudo apt install openvpn Unzip your config file in your home directory: cd ~ unzip TorGuardPRO.zip Move all files to /etc/openvpn/ sudo cp ~/TorGuardPRO/* /etc/openvpn/ Re-name the .ovpn config files to .conf, Example: server.ovpn to server.conf, run the bellwo command to rename them all to .conf. cd /etc/openvpn rename -v ’s/\.ovpn/\.conf/’ *.ovpn Run your configs like so: cd /etc/openvpn/ openvpn server.conf For stopping and starting the openvpn service, use the commands below: sudo service openvpn start or stop or restart At the: rename -v ’s/\.ovpn/\.conf/’ *.ovpn command i recieved the following error: rename -v ’s/\.ovpn/\.conf/’ *.ovpn Unrecognized character \xE2; marked by <-- HERE after { #line 1 <-- HERE near column 15 at (user-supplied code). and i don't know where to go off of from here.
  17. I'm having a hard time understanding what the viscosity is for and how it works differently the torguard. When I open Viscosity I can see all the servers I can connect to including PPTP and L2TP but I cant connect to them because I am already connected to the VPN app by torguard. In some tutorials like the one where I can exclude certain IP addresses (which I need) it tells me to use Viscosity and duplicate a connection and exclude it there and thats it I dont even have to connect to it, or setting up a killswitch which I just found out I can do with the Torguard App. I also have options to connect to connection automatically through Viscosity but I already have the VPN app set to connect automatically and also configured with the proxies. Soo are they essentially the same thing? Can I just use Viscosity and not use the Torguard app? Also when would I have to set up an L2TP or PPTP? Is just having torguard enough to protect my privacy along with setting up the proxies for bitorrent and browsers? Also the only reason I even needed viscosity is to exclude the ip address of this game I play because I was getting huge ping lag and support told me to use viscosity and different dns
  18. Avatar_GW

    MikroTik/RouterOS & OpenVPN?

    Greetings! I made the (potential) mistake of buying a MikroTik Router (MikroTik CRS125-24G-1S-IN) without doing much more research than it gets good reviews. It's been a painful experience trying to learn how to configure it, and I've now got to the point where I'm trying to get OpenVPN set-up for all internet bound traffic. The most helpful Guide I've seen is from HideMyAss on YouTube that basically does exactly what I'm trying to do. They import 2x crt file and 1x key file. I've imported the ca.crt and set-up the rest, but I get a "TLS Failed" error whenever I try to use the certificate. Some goggling implies I'm missing a key and/or crt file - not surprising, since I didn't import a key file. Are there additional crt files and a key file that i need to use? Is there a guide on how to set-up a MikroTik/RouterOS device with TorGuard OpenVPN? If not, a "What to do differently" in comparison to the HMA one would be good. Regards,
  19. Hello. I've been using the Anonymous Torrent Proxy service for nine months now, and I have a suspicion that I've been making a mistake in my usage. I have Bittorrent, and my settings on it are configured. I also have the Torguard application. I always open the Torguard application before opening Bittorrent, and I've been under the impression that it's needed to have Bittorrent connect through the proxy. After mistakenly leaving the default on Bittorrent to open on start up, I accidentally had it running for some time today without having opened Torguard. Despite this, the "Check My IP" torrent was giving me the "Success" message in it's trackers. This leads me to suspect. Do configured torrent clients work through the proxy even without the Torguard application open and connected? Is my privacy secure running Bittorrent on it's own with the settings correct? Have I exposed my private information at any point? Any help on this topic would be greatly appreciated. Thank you.
×