-
-
Notifications
You must be signed in to change notification settings - Fork 407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(providers): ovpn.com
support
#2537
base: master
Are you sure you want to change the base?
Conversation
dc2ac01
to
998cb92
Compare
Any movement on this? |
7f106b1
to
b67d204
Compare
- CA - TLS auth - TLS crypt (for singapore) - `allow-compression asym` - `replay-window 256` - remote-cert-tls server - move aes256gcm as preferred cipher
Yes, but note you can already use it, it works fine with Wireguard and should from today work fine with openvpn. See instructions in the PR body. |
Nice, I'll have to try soon. I had trouble previously where using just wireguard plain without gluetun does work for whatever reason. |
Currently using ovpn.com credentials with the VPN_SERVICE_PROVIDER=custom -- hoping to be able to enable VPN_PORT_FORWARDING but it doesn't look like this pull addresses OVPN's static IPv4 offering with port forwarding. I'm open to looking into how to integrate this. Can someone confirm whether or not this PR will address port forwarding for OVPN.com? |
Fix #495
Run it with image tag
:pr-2537
.Wireguard
docker run --cap-add=NET_ADMIN -e VPN_SERVICE_PROVIDER=ovpn -e VPN_TYPE=wireguard \ -e WIREGUARD_PRIVATE_KEY=MFDyavQNdjUhvNfVIxoeLk6azofLwJ+xiPGDtOLrQUQ= \ -e WIREGUARD_ADDRESSES="10.64.222.21/32" \ -e SERVER_CITIES=amsterdam qmcgaw/gluetun:pr-2537
OpenVPN
I need an Openvpn configuration file to know what settings they use. Right now I just know their ciphers supported, although this may be sufficient.
Status
MULTIHOP_ONLY=on