Good luck with it!
Type following command into terminal:
curl -O https://raw.githubusercontent.com/nezavisimost/FuckRKN1/main/client-conf/install.sh && bash install.sh && rm install.sh
We have a script for auto-installation of VPN profile. Download the script and run it (script doesn't work for NixOS yet)
To configure your Linux computer to connect to IKEv2 as a VPN client, first install the strongSwan plugin for NetworkManager:
sudo apt-get update
sudo apt-get install network-manager-strongswan
sudo emerge --sync
sudo emerge net-vpn/networkmanager-strongswan
sudo pacman -Syu # upgrade all packages
sudo pacman -S networkmanager-strongswan
sudo dnf install NetworkManager-strongswan
sudo yum install epel-release
sudo yum --enablerepo=epel install NetworkManager-strongswan
Add the following lines to /etc/nixos/configuration.nix
(for example, to the section # List services that you want to enable:
):
services.dbus.packages = [ pkgs.networkmanager pkgs.strongswanNM ];
networking.networkmanager = {
enable = true;
plugins = [ pkgs.networkmanager_strongswan ];
};
and then run
# nixos-rebuild switch
Download vpnclient.p12 🇱🇻 or vpnclient.p12 🇷🇺 according to required location. After that go to directory of vpnclient.p12
file and extract the CA certificate, client certificate and private key.
# Example: Extract CA certificate, client certificate and private key.
# You may delete the .p12 file when finished.
# Note: You may need to enter the import password, which can be found
# in the output of the IKEv2 helper script. If the output does not
# contain an import password, press Enter to continue.
# Note: If you have unsupported error, add -legacy flag
openssl pkcs12 -in vpnclient.p12 -cacerts -nokeys -out ikev2vpnca.cer
openssl pkcs12 -in vpnclient.p12 -clcerts -nokeys -out vpnclient.cer
openssl pkcs12 -in vpnclient.p12 -nocerts -nodes -out vpnclient.key
rm vpnclient.p12
# (Important) Protect certificate and private key files
# Note: This step is optional, but strongly recommended.
sudo chown root.root ikev2vpnca.cer vpnclient.cer vpnclient.key
sudo chmod 600 ikev2vpnca.cer vpnclient.cer vpnclient.key
You can then set up and enable the VPN connection:
- Go to Settings -> Network -> VPN. Click the + button.
- Select IPsec/IKEv2 (strongswan).
- Enter anything you like in the Name field.
- In the Gateway (Server) section, enter
Your VPN Server IP
(or DNS name) for the Address. (lt.fuckrkn1.xyz
) - Select the
ikev2vpnca.cer
file for the Certificate. - In the Client section, select Certificate(/private key) in the Authentication drop-down menu.
- Select Certificate/private key in the Certificate drop-down menu (if exists).
- Select the
vpnclient.cer
file for the Certificate (file). - Select the
vpnclient.key
file for the Private key. - In the Options section, check the Request an inner IP address checkbox.
- In the Cipher proposals (Algorithms) section, check the Enable custom proposals checkbox.
- Leave the IKE field blank.
- Enter
aes128gcm16
in the ESP field. - Click Add to save the VPN connection information.
- Turn the VPN switch ON.
If after turning VPN on you get prompt that requests password for decrypting private key, check #127 for fix.