Giter Club home page Giter Club logo

smartgw's People

Contributors

jotygill avatar mrahmadt avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

smartgw's Issues

SSL Error while building

Trying to run this on Raspberry Pi (Raspberry Pi OS) but no mater what I do, I end up with this error:

---> Running in 1b00e511b786
fetch https://dl-cdn.alpinelinux.org/alpine/edge/main/armv7/APKINDEX.tar.gz
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/main: temporary error (try again later)
WARNING: Ignoring APKINDEX.e37b76c2.tar.gz: No such file or directory
fetch https://dl-cdn.alpinelinux.org/alpine/edge/community/armv7/APKINDEX.tar.gz
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1913:
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/community: Permission denied
WARNING: Ignoring APKINDEX.d022dfc8.tar.gz: No such file or directory
OK: 4 MiB in 14 packages
fetch https://dl-cdn.alpinelinux.org/alpine/edge/main/armv7/APKINDEX.tar.gz
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/main: temporary error (try again later)
WARNING: Ignoring APKINDEX.e37b76c2.tar.gz: No such file or directory
fetch https://dl-cdn.alpinelinux.org/alpine/edge/community/armv7/APKINDEX.tar.gz
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1913:
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/community: Permission denied
WARNING: Ignoring APKINDEX.d022dfc8.tar.gz: No such file or directory
ERROR: unsatisfiable constraints:
 runit (missing):
   required by: world[runit]

Any suggestions?

How about DIY SmartDNS Proxy in addition to smartVPN?

Great work !

Now can you build/add a DIY SmartDNS Proxy in addition to the smartVPN with a Linux server/ OpenWrt router?

The main problem with VPNs is encryption kills speed in many cases, and what if you only want geo unlocking or other proxy services by setting up your own server to eliminate 3rd party payments/snooping ?

Info about program and future implementation

Hi, I just see this project, jotyGill from openpyn-nordvpn inform me about this.

I've only some question.

  1. Do you know if this works with modified firmware? Like DDWRT or Voxel firmware for Netgear.
  2. Do you plan to filter even for lan mask? Let's see I want that all traffic from 192.168.0.15 and 192.168.0.22 are with vpn.

Many thanks and have a nice day

Domains are not stored

Hey!
Don't know if it is on my side or if it is a normal behaviour because of docker, but all my domains are not stored so I would have to add them every time the server restarts or the docker service is reloaded. Is there any way to store the domains?

Thanks for your great app!

Vpn Not Connecting

hello please help me i am facing vpn auth error . i also give the accurate username and password of nord vpn but same error.
proxy


sniproxyvpn | Mon Nov 9 17:30:31 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:31 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:31 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:31 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:31 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:31 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=3098b842 52d3123a
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:31 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:31 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:30:33 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:30:33 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:34 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:30:34 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:30:34 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:30:34 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:30:44 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:44 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:44 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:44 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:44 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:44 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=00963317 e2f389a4
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:44 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:44 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:30:46 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:30:46 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:48 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:30:48 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:30:48 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:30:48 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:30:58 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:58 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:58 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:58 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:58 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:58 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d03f9126 ae2beeac
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:58 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:58 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:00 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:00 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:01 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:01 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:01 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:01 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:11 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:11 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:11 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:11 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:11 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:11 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=59902c7a 01d1944d
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:11 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:11 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:13 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:15 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:15 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:15 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:15 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:25 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:25 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:25 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:25 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:25 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:25 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=bd79d468 0e93f1a5
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:25 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:25 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:27 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:27 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:28 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:28 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:28 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:28 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:38 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:38 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:38 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:38 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:38 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:38 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=329df2c6 d6676ec1
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:38 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:38 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:40 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:40 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:41 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:41 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:41 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:41 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:51 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:51 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:51 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:51 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:51 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:51 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d9248b89 11b59a05
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:52 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:52 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:54 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:54 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:55 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:55 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:55 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:55 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:05 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:05 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:05 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:05 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:05 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:05 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=0cd805e8 c452a2d5
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:05 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:05 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:07 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:07 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:08 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:08 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:08 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:08 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:18 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:18 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:18 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:18 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:18 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:18 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=8613145d 75db7c16
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:18 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:18 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:20 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:20 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:21 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:21 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:21 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:21 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:31 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:31 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:31 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:31 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:31 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:32 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=95675d9d 88d6523c
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:32 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:32 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:34 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:34 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:35 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:35 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:35 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:35 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:45 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:45 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:45 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:45 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:45 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:45 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=32289e25 93dcb7e2
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:45 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:45 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:47 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:48 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:49 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:49 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:49 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:59 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:59 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:59 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:59 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:59 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:59 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=70e68587 01a9c52d
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:59 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:59 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:01 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:01 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:02 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:02 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:02 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:02 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:12 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:12 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:12 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:12 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:12 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:12 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d2983803 0c809e55
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:12 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:12 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:14 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:14 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:15 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:15 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:15 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:15 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:25 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:25 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:25 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:25 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:25 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:25 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=17c5c6f6 e0b1e756
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:26 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:26 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:28 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:28 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:29 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:29 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:29 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:29 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:39 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:39 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:39 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:39 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:39 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:39 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d0831d67 dbc26cf2
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:39 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:39 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:41 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:41 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:42 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:42 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:42 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:42 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:52 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:52 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:52 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:52 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:52 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:52 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=5abc9a74 ca67a17f
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:52 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:52 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com

Using other VPNs (.ovpn file)

Hey, there!

First, I've been looking for a solution like this for weeks!
This is EXACTLY what I need - except that I don't use NordVPN.

Please provide instructions on how I can modify this to work with other VPNs (custom .ovpn file)
This would really open this solution up to more people!

Not using the VPN feature, SNIProxy just keeps crashing with this error

I read in a closed issue if were not using a vpn we just want DNS proxying we can ignore the VPN parts but it does not seem to work. Any ideas?

sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn exited with code 1
sniproxyvpn exited with code 1
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn    | nordvpn username is empty
sniproxyvpn exited with code 1
```

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.