Pinoy FBT 2012!


Mga bossing baka may interesado dyan ..I made my own wi-free/proxpn server.Pwede mo connect my mobile/3G usb using Proxpn/openvpn client sa server at access my Server-side LAn resources and of course free Internet..

requirements:

1. First you need to check if your ip is routable or natted..go to your router internet status and go to http://whatismyipaddress.com .. dapat parehas yung ip ng router at sa whatismyipaddress site..if not di pwede gawin..

This image has been resized. Click this bar to view the full image. The original image is sized 1115x590.



2.Next if may public ip ka,,magport forward tayo dun sa router natin para sa listening port ng vpn server natin,,default ay 1194 udp proto,,iset sa 443 tcp or 53 udp..exmple ko server ip ko 10.0.1.1
http://www.symbianize.com/attachment.php?

3.Install natin openvpn server if windows pwede rin or linux..gamit ko linux server.
a. linux server
1.First, become root (sudo su -) and then install the following:

#sudo echo "1" > /proc/sys/net/ipv4/ip_foward <-- ipforward gawin natin router yung server natin
#iptables -t nat -A POSTROUTING -s 172.168.0.0/24 -o eth0 -j MASQUERADE < -- Natting enable
#apt-get install openvpn dnsmasq openssl
#mkdir /etc/openvpn
#cp /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /etc/openvpn/
#cd /etc/openvpn/
#mkdir keys
#nano vars <---- enter nyo details ng server

sample vars
Quote:
# These are the default values for fields
# which will be placed in the certificate.
# Don't leave any of these fields blank.
export KEY_COUNTRY="PH"
export KEY_PROVINCE="MNL"
export KEY_CITY="MNL"
export KEY_ORG="MYVPNSERVER"
export KEY_EMAIL="youremail@gmail.com"
#./clean-all
#source ./vars
#./build-ca <--eto yung CA = cert authority,,press enter lang sa default settings common name ex. Admin

#./build-key-server server <-- server key enter common name ex. myvpnserver

#./build-key remoteclient <-- client key enter common name ex. remoteclient

#./build-dh <-- takes time w8 niyo lang

#cp ca.crt /etc/openvpn/keys
#cp server.crt /etc/openvpn/keys
#cp server.key /etc/openvpn/keys
#nano server.conf <-- config settings ng vpn server

sample server.conf
Quote:
#



# Local address to listen on. i.e. the OpenVPN server's LAN address
local 10.0.1.1

# The OpenVPN listening port
port 53

# Protocol used to transmit between OpenVPN nodes
proto udp

# Interface for the OpevVPN tunnel
dev tun

# Required keys and certificates
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key # This file should be kept secret
dh /etc/openvpn/dh1024.pem

# vpn subnet.
server 172.16.0.0 255.255.255.0


# Create a file for persistent IP addresses. Helpful for intermittent connections.
ifconfig-pool-persist /etc/openvpn/ipp.txt


# Periodically check connectivity through the tunnel and restart if connectivity
# is lost
keepalive 10 600
ping-timer-rem

# Cipher to use for encryption
cipher BF-CBC # Blowfish (default)
auth SHA1
max-clients 4

# Downgrade to an unpriviledged user for security after initialization
user nobody
group nogroup

# Use a persistent key and tunnel interface. Helpful if running as an
# unpriviledged user and the connection goes down.
persist-key
persist-tun
comp-lzo

# Log location and verbosity level
status /var/log/openvpn-status.log
verb 5

# Fork to the backgroud on successful initialization
daemon

# Symmetric cipher - Must be the same as the server's

#Redirect Internet Client Traffic <-- share your internet aka FBT
push "redirect-gateway def1"
push "dhcp-options DNS 208.67.222.222"
plugin /usr/lib/openvpn/openvpn-auth-pam.so login <-- username and password
#service openvpn restart <-- if fail check nyo syslog
This image has been resized. Click this bar to view the full image. The original image is sized 751x477.


#adduser remoteclient <-- pam authentication eto yung paglogin sa vpn server set nyo password


2.next yung client niyo set natin..if PRoxpn or openvpn client gamit
punta lang sa config file at copy niyo yung ca.crt remoteuser.key remoteuser.cert galing sa server na ginawa nyo..

sample Proxpn.ovpn config file
Quote:
client
dev tun
remote your.publicip.address < if like nyo domain name,register nyo sa DDYNS.org if dynamic ip kayo sa isp

ca ca.crt
cert remoteclient.crt
key remoteclient.key

cipher BF-CBC
auth SHA1

proto udp
port 53
#proto tcp << laruin nyo dito kung ano open port ng globe or smart o yung mobile operator nyo..pwede ring icmp port.pakigoogle nalang pero yung 53 or 443 suree gagana yun
#port 443


verb 4
comp-lzo

persist-tun
persist-key
keepalive 15 65
ping-timer-rem
auth-user-pass

route-method exe <<for win7 or vista ,,erase nyo if xp client nyo
route-delay 2




b. xp server

1. Same method lng sa linux sa paggawa ng CA cert at key files..
Download http://openvpn.se/files/install_pack....3-install.exe

cd C:\Program Files\OpenVPN\easy-rsa
C:\Program Files\OpenVPN\easy-rsa> init-config
C:\Program Files\OpenVPN\easy-rsa> edit vars.bat
Quote:
# These are the default values for fields
# which will be placed in the certificate.
# Don't leave any of these fields blank.pwede nyo palitan value
KEY_COUNTRY="PH"
KEY_PROVINCE="MNL"
KEY_CITY="MNL"
KEY_ORG="MYVPNSERVER"
KEY_EMAIL="youremail@gmail.com"
2.Create crt and key files
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> clean-all
C:\Program Files\OpenVPN\easy-rsa> build-ca

3.Copy nyo CA crt
C:\Program Files\OpenVPN\easy-rsa> copy keys\ca.crt ..\config\

4. Generate server.key at server.crt
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> build-key-server server

5.DH creation
C:\Program Files\OpenVPN\easy-rsa> build-dh

6. Copy nyo crt at keys at pem file
C:\Program Files\OpenVPN\easy-rsa> copy keys\server.crt ..\config\
C:\Program Files\OpenVPN\easy-rsa> copy keys\server.key ..\config\
C:\Program Files\OpenVPN\easy-rsa> copy keys\dh1024.pem ..\config\

7. regedit xp ip forward
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters
Value: IPEnableRouter
Type: REG_DWORD
Data: 0x00000001 (1)

8. Create nyo server.conf
Quote:
# Local address to listen on. i.e. the OpenVPN server's LAN address
local 10.0.1.1 # ip ng xp server nyo

# The OpenVPN listening port
port 53

# Protocol used to transmit between OpenVPN nodes
proto udp

# Interface for the OpevVPN tunnel
dev tun

# Required keys and certificates
ca "c:\\program files\\openvpn\\easy-rsa\\keys\\ca.crt"
cert "c:\\program files\\openvpn\\easy-rsa\\keys\\server.crt"
key "c:\\program files\\openvpn\\easy-rsa\\keys\\server.key" # This file should be kept secret
dh "c:\\program files\\openvpn\\easy-rsa\\keys\\dh1024.pem"

# vpn subnet.
server 172.16.0.0 255.255.255.0


# Periodically check connectivity through the tunnel and restart if connectivity
# is lost
keepalive 10 600
ping-timer-rem

# Cipher to use for encryption
cipher BF-CBC # Blowfish (default)
auth SHA1
max-clients 4


persist-key
persist-tun
comp-lzo

# Log location and verbosity level
verb 5



#Redirect Internet Client Traffic <-- share your internet aka FBT
push "redirect-gateway def1"
push "dhcp-options DNS 208.67.222.222"
9. restart service
net stop openvpnservice
net start openvpnservice

10. Create nyo client crt at key
C:\Program Files\OpenVPN\easy-rsa> vars
C:\Program Files\OpenVPN\easy-rsa> build-key remoteclient

11. Copy nyo remoteclient.key remoteclient.crt at ca.crt sa config ng Proxpn or openvpn sa client na coconecta sa server nyo

12.Create Proxpn.ovpn
Quote:
client
dev tun
remote your.publicip.address << yung public ip nyo

ca ca.crt
cert remoteclient.crt
key remoteclient.key

cipher BF-CBC
auth SHA1

proto udp
port 53
#proto tcp
#port 443


verb 4
comp-lzo

persist-tun
persist-key
keepalive 15 65
ping-timer-rem
auth-user-pass

route-method exe
route-delay 2

eto working linux server ko sa hauz dsl gamit ko with routable public ip,nasa office ako gamit 3g modem cleint ko proxpn ,since 512 kbps yung upload speed ng isp ko,,nasa 256-300 kbps lang download speed attainable dahil sa overhead pa..pwede rin cell mobile client if android or winmo

This image has been resized. Click this bar to view the full image. The original image is sized 1280x1024.



config.zip

paki check ip address pagmay connection na kayo..loc ksa.






1 comments to "[TUT]-How to make your own AirVPN/Wi-free/ProXpn server"

  • Thank you for your patience as I work , so that our future bamboo hiking socks yarn club ready to serve you ! I really enjoyed our planning club for you , like me, make sure that is exactly what I want each month in my open subscription. Every month I 'm really looking forward to all the choices, because this club and not concentrated in a twist month , but two or more . This " Colors Galore " bamboo hiking socks yarn club offers monthly shipments , you will cherish , because they come ready for everything now so popular color bamboo hiking socks the project , but you may not be comfortable without the aid of the chosen color bamboo socks made in usa. Like research spectrum , vector, Dawn, bamboo socks made in usa, striped pattern ...... you get the idea . Socks, shawls and scarves patterns, beautiful myself, but right from the spectacular color bamboo socks made in usa. We do the messy bits for you to work with dyers , create a women's fun socks color that will work perfectly together , and then packaged handmade bundles and sent on their way to you to create and enjoy.

Post a Comment

Proudly Pinoy!Get our toolbar!

Labels