Streisand
Français
English
OpenVPN
If OpenVPN connections are being blocked in your country, please refer to the OpenVPN (stunnel) instructions instead which will help you wrap your OpenVPN traffic in an encrypted tunnel so it looks like standard TLS traffic.
A note on client files
For security reasons, this OpenVPN has been configured to only allow one client connection per certificate pair. Attempting to re-use client certificates will cause an existing client session to disconnect.
Windows
- Download and run the OpenVPN Windows Installer.
- Click Next and accept the license agreement by selecting I Agree.
- Click Next on the Choose Components screen. Leave all of the default options checked.
- Make note of the Destination Folder. This is where you will place the
52.15.254.140-direct.ovpn
client configuration profile after installation. Click Install.
- A Windows Security notice will appear and ask Would you like to install this device software?. Click Install.
- Click Next on the Installation Complete screen.
- Uncheck Show Readme and click Finish.
- Right-click on the OpenVPN GUI desktop icon and choose Properties.
- Go to the Compatibility tab and click the Run this program as an administrator checkbox in the Privilege Level section.
- Double-click the OpenVPN GUI desktop icon to launch the application.
- Download one of these unified OpenVPN profiles:
- Open the config directory that is located in the Destination Folder. For most users, this will either be in C:\Program Files\OpenVPN\config or C:\Program Files (x86)\OpenVPN\config. You will see a single README file in this directory.
- Drag and drop the downloaded
52.15.254.140-direct.ovpn
file to this location alongside the README.
- Right-click on the OpenVPN icon in your taskbar and choose Connect.
- You will see a log scroll by as the connection is established, followed by a taskbar notification indicating your assigned IP.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
macOS
- Download and open Tunnelblick.
- Type your password to allow the installation process to complete, and click OK.
- Click Launch after the installation is finished.
- Click I have configuration files.
- Download one of these unified OpenVPN profiles:
- Double-click the OpenVPN profile.
- You will be asked to choose whether the profile should be available for all users or only the current user. After making your selection, you will be asked to enter your password.
- Look for the Tunnelblick icon in your menu bar. Click on it, and choose Connect.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Linux
Install OpenVPN:
sudo apt-get install openvpn
OR sudo yum install openvpn
OR esoteric-package-manager hipster openvpn
- If installing OpenVPN via your package manager is not an option, you can also download and compile the OpenVPN source code.
- Download one of these unified OpenVPN profiles:
- Copy the downloaded
52.15.254.140-direct.ovpn
file to the location of your choice. /etc/openvpn/ is a decent option.
- On some distributions, the pushed DHCP DNS option from the OpenVPN server will be ignored. This means that your DNS queries will still be routed through your ISP's servers which makes them vulnerable to what is known as a DNS leak.
- You can test whether or not your DNS is leaking here.
- You can ensure that the correct DNS servers are used by adding the following lines to the top of the
52.15.254.140-direct.ovpn
file:
script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf
Execute OpenVPN, and pass it the .ovpn profile as an option.
sudo openvpn 52.15.254.140-direct.ovpn
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Linux (Ubuntu 16.04)
Due to an issue related to Ubuntu 16.04's NetworkManager you cannot use the OpenVPN plugin. Additionally, you cannot use the version of OpenVPN which is in the default repositories. To fix this issue we must download OpenVPN directly from the projects repository.
- Download one of these unified OpenVPN profiles:
- Copy the downloaded
52.15.254.140-direct.ovpn
file to the location of your choice. /etc/openvpn/ is a decent option.
Add the OpenVPN APT repository to your sources by running the following commands:
curl -s https://swupdate.openvpn.net/repos/repo-public.gpg | apt-key add
echo "deb http://build.openvpn.net/debian/openvpn/stable xenial main" > /etc/apt/sources.list.d/openvpn-aptrepo.list
Update and install OpenVPN with the following command:
sudo apt update && sudo apt install openvpn
After the install is complete, ensure you have OpenVPN version 2.4+ with the following command:
openvpn --version
- On some distributions, the pushed DHCP DNS option from the OpenVPN server will be ignored. This means that your DNS queries will still be routed through your ISP's servers which makes them vulnerable to what is known as a DNS leak.
- You can test whether or not your DNS is leaking here.
- You can ensure that the correct DNS servers are used by adding the following lines to the top of the
52.15.254.140-direct.ovpn
file:
script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf
Execute OpenVPN, and pass it the .ovpn profile as an option.
sudo openvpn 52.15.254.140-direct.ovpn
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Linux (Ubuntu 17.10)
It's preferable to configure Ubuntu using the OpenVPN plugin for NetworkManager. This gives you a nice little interface for connecting, and it properly handles the necessary DNS changes when you connect/disconnect. Unfortunately, the plugin does not support .ovpn profiles, so the list of steps is a little more involved.
- First, download the OpenVPN CA certificate, the certificate
.crt
file, private key .key
file, and TLS authentication key ta.key
file for one of the client profiles below:
- brother-various
- shallow-exotic
- uncle-task
- script-pizza
- rely-inherit
Install the OpenVPN plugin for NetworkManager.
sudo apt-get install network-manager-openvpn-gnome
- Open your System Settings.
- Click the Network tab on the left side.
- Click the + button under VPN.
- Select OpenVPN.
- Enter
streisand-demo-site
for the Name.
- Enter
52.15.254.140
for the Gateway.
- Make sure Certificates (TLS) is selected for the Type.
- Select the
client.crt
file you downloaded for the User Certificate.
- Select the
ca.crt
file you downloaded for the CA Certificate.
- Select the
client.key
file you downloaded for the Private Key.
- Click the Advanced button.
- Go to the General tab.
- Check Use custom gateway port and enter
636
as its value.
- Port
443
is available as an alternative if you are on a network that only allows access to the standard HTTPS port.
- You can also use port
8757
for a UDP connection.
- A combined profile which cycles through UDP port
8757
, TCP port 636
and 443
is also available.
- Check Use a TCP connection unless you have chosen to use the UDP port or the combined profile.
- Go to the Security tab.
- Select
AES-256-CBC
as the Cipher.
- Select
SHA256
as the HMAC Authentication.
- Go to the TLS Authentication tab.
- Under Server Certificate Check choose
verify name exactly
and enter smooth-bonus-maple
as its value.
- Check Verify peer (server) certificate usage signature.
- Go to Additional TLS authentication or encryption.
- Select
TLS-Crypt
as the Mode.
- Select the
ta.key
file you downloaded from the client-files directory for the Key File.
- Click OK.
- Click Add
- Select the VPN in the left-hand menu, and flip the switch to ON. You can also enable/disable the VPN by clicking on the WiFi/Network icon in the menu bar, scrolling to VPN Connections, and clicking on its name.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Linux (Ubuntu 18.04/18.10)
It's preferable to configure Ubuntu using the OpenVPN plugin for NetworkManager. This gives you a nice little interface for connecting, and it properly handles the necessary DNS changes when you connect/disconnect. Unfortunately, the plugin does not support .ovpn profiles, so the list of steps is a little more involved.
- First, download the OpenVPN CA certificate, the certificate
.crt
file, private key .key
file, and TLS authentication key ta.key
file for one of the client profiles below:
- brother-various
- shallow-exotic
- uncle-task
- script-pizza
- rely-inherit
Install the OpenVPN plugin for NetworkManager.
sudo apt-get install network-manager-openvpn-gnome
- Open your System Settings.
- Click the Network tab on the left side.
- Click the + button under VPN.
- Select OpenVPN.
- Enter
streisand-demo-site
for the Connection name.
- Enter
52.15.254.140
for the Gateway.
- Make sure Certificates (TLS) is selected for the Type.
- Select the
ca.crt
file you downloaded for the CA Certificate.
- Select the
client.crt
file you downloaded for the User Certificate.
- Select the
client.key
file you downloaded for the User Private Key.
- Click the Advanced button.
- Go to the General tab.
- Check Use custom gateway port and enter
636
as its value.
- Port
443
is available as an alternative if you are on a network that only allows access to the standard HTTPS port.
- You can also use port
8757
for a UDP connection.
- A combined profile which cycles through UDP port
8757
, TCP port 636
and 443
is also available.
- Check Use a TCP connection unless you have chosen to use the UDP port or the combined profile.
- Go to the Security tab.
- Select
AES-256-CBC
as the Cipher.
- Select
SHA256
as the HMAC Authentication.
- Go to the TLS Authentication tab.
- Under Server Certificate Check choose
verify name exactly
and enter smooth-bonus-maple
as its value.
- Check Verify peer (server) certificate usage signature.
- Go to Additional TLS authentication or encryption.
- Select
TLS-Crypt
as the Mode.
- Select the
ta.key
file you downloaded from the client-files directory for the Key File.
- Click OK.
- Click Add
- Find the VPN and flip the switch to ON. You can also enable/disable the VPN by clicking on the WiFi/Network icon in the menu bar, scrolling to VPN Connections, and clicking on its name.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Android
- Install OpenVPN for Android.
- Download one of these unified OpenVPN profiles:
- Copy the
52.15.254.140-direct.ovpn
file to your phone.
- Launch OpenVPN for Android.
- Tap the folder icon in the lower-right of the screen.
- Select the
52.15.254.140-direct.ovpn
profile that you copied to your phone.
- Tap the save icon (floppy disk) in the lower-right of the screen after the import is complete.
- Tap the profile.
- Accept the Android VPN connection warning.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
iOS
- Download OpenVPN Connect and launch it.
- Download one of these unified OpenVPN profiles:
- Open iTunes on your computer and connect your phone.
- Select your phone, click on the Apps tab, and find OpenVPN under the File Sharing section.
- Drag and drop the downloaded
52.15.254.140-direct.ovpn
file into the file sharing window.
- OpenVPN on your phone will say that 1 new OpenVPN profile is available for import.
- Tap the green + button to import the profile.
- Tap the slider to connect to the OpenVPN server.
- Success! You can verify that your traffic is being routed properly by looking up your IP address on DuckDuckGo. It should say Your public IP address is 52.15.254.140.
Alternate unified profiles for access via port 443
Alternate unified profiles for access via UDP port 8757
Alternate profile that will cycle through UDP port 8757, TCP port 636, and TCP port 443