![]() ![]() Connect to WireGuard: This script allows you to connect to the VPN server via WireGuard, or create a WireGuard config file by setting environment variable PIA_CONNECT=false.Get DIP details: This script will provide necessary connection details to use a dedicated IP.It will write the token and its expiration date to /opt/piavpn-manual/token for reference. Get a token: This script allows you to get an authentication token with a valid 'PIA_USER' and 'PIA_PASS'.If called without specifying PREFERRED_REGION this script writes a list of servers within lower than MAX_LATENCY to a /opt/piavpn-manual/latencyList for reference. This script can reference get_token.sh with use of PIA_USER and PIA_PASS. The script can also trigger VPN connections, if you specify VPN_PROTOCOL=wireguard or VPN_PROTOCOL=openvpn doing so requires a token. Get region details: This script will provide server details, validate PREFERRED_REGION input, and can determine the lowest latency location.VPN_PROTOCOL - wireguard or openvpn openvpn will default to openvpn_udp_standard, but can also specify openvpn_tcp/udp_standad/strong.PREFERRED_REGION - the region ID for a PIA server.AUTOCONNECT - true/false this will test for and select the server with the lowest latency, it will override PREFERRED_REGION.MAX_LATENCY - numeric value, in seconds.Used when only creating config file for wireguard. PIA_CONF_PATH - path of wireguard config file to be written.Set to false to only create configuration file. PIA_CONNECT - true/false connect to VPN after configuration has been created.DIP_TOKEN - your PIA dedicated IP token (can be purchased in the client control panel).Variables available for one-line calls include: Prompt based connection: This script allows connections with a one-line call, or will prompt for any missing or invalid variables.Here is a list of scripts you could find useful: Sudo VPN_PROTOCOL=wireguard DISABLE_IPV6=yes DIP_TOKEN=no AUTOCONNECT=true PIA_PF=false PIA_DNS=true PIA_USER=p0123456 PIA_PASS=xxxxxxxx. The easiest way to trigger a fully automated connection is by running this oneliner: The functionality is controlled via environment variables, so that you have an easy time automating your setup. ![]() The scripts also contain a lot of comments, just in case you require detailed information regarding how the technology works. In order to help you use VPN services and PF on any device, we have prepared a few bash scripts that should help you through the process of setting everything up. This service can be used only AFTER establishing a VPN connection. In case you require port forwarding on native clients, please follow this documentation in order to enable port forwarding for your VPN connection. The easiest way to set this up is by using a native PIA application. PF) allows you run services on your own devices, and expose them to the internet by using the PIA VPN Network. ThePowerTool/PIA-NetworkManager-GUI-Support We can not guarantee the quality of the code found within these 3rd party repos, but we can create a centralized list so it's easy for you to find repos contain scripts to enable PIA services for your system. Some users have created their own repositories for manual connections, based on the information they found within this repository. The functionality of the scripts within this repository has been tested and confirmed on the following operating systems and GNU/Linux distributions: We can not guarantee the quality of the code in the 3rd Party Repos, so use them only if you understand the risks. That is why we link 3rd Party repos in this README. Though we support research of open source technologies, we can not provide official support for all FOSS platforms, as there are simply too many platforms (which is a good thing).This repo is really fresh at this moment, so please take into consideration the fact that you will probably be one of the first users that use the scripts.For battle-tested security, please use the official PIA App, as it was designed to protect you in all scenarios.This means you should have good understanding of VPN and cybersecurity in order to properly configure your setup. These scripts do not enforce IPv6 or DNS settings, so that you have the freedom to configure your setup the way you desire it to work.Port Forwarding is disabled on server-side in the United States.(only for WireGuard) wireguard-tools ( wg-quick and wireguard kernel module).In order for the scripts to work (probably even if you do a manual setup), you will need the following packages: We hope you will enjoy forking the repo and customizing the scripts for your setup! Table of Contents The code also has a lot of comments, so that you find all the information you might need. The scripts were written so that they are easy to read and to modify. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |