Connecting Ubuntu to Algo VPN

 Clash Royale CLAN TAG#URR8PPP
Clash Royale CLAN TAG#URR8PPP up vote
1
down vote
favorite
Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?
Would really love to know how to best do this, thanks!
network-manager
add a comment |Â
up vote
1
down vote
favorite
Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?
Would really love to know how to best do this, thanks!
network-manager
add a comment |Â
up vote
1
down vote
favorite
up vote
1
down vote
favorite
Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?
Would really love to know how to best do this, thanks!
network-manager
Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?
Would really love to know how to best do this, thanks!
network-manager
network-manager
asked Apr 2 at 23:04


Zerong Tony Wang
62
62
add a comment |Â
add a comment |Â
 1 Answer
 1
 
active
oldest
votes
up vote
0
down vote
I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :
(Gnome) Network Manager configuration 
 
In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.
Go to Settings > Network
Add a new Network (+ bottom left of the window)
Select IPsec/IKEv2 (strongswan)
Fill out the options:
 Name: your choice, e.g.: ikev2-1.2.3.4
 Gateway:
 Address: IP of the Algo VPN server, e.g: 1.2.3.4
 Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
 Client:
 Authentication: Certificate/Private key
 Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
 Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
 Options:
 Check Request an inner IP address, connection will fail without this option
 Optionally check Enforce UDP encapsulation
 Optionally check Use IP compression
 For the later 2 options, hover to option in the settings to see a description
 Cipher proposal:
 Check Enable custom proposals
 IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
 ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
Apply and turn the connection on, you should now be connected
add a comment |Â
 1 Answer
 1
 
active
oldest
votes
 1 Answer
 1
 
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
0
down vote
I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :
(Gnome) Network Manager configuration 
 
In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.
Go to Settings > Network
Add a new Network (+ bottom left of the window)
Select IPsec/IKEv2 (strongswan)
Fill out the options:
 Name: your choice, e.g.: ikev2-1.2.3.4
 Gateway:
 Address: IP of the Algo VPN server, e.g: 1.2.3.4
 Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
 Client:
 Authentication: Certificate/Private key
 Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
 Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
 Options:
 Check Request an inner IP address, connection will fail without this option
 Optionally check Enforce UDP encapsulation
 Optionally check Use IP compression
 For the later 2 options, hover to option in the settings to see a description
 Cipher proposal:
 Check Enable custom proposals
 IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
 ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
Apply and turn the connection on, you should now be connected
add a comment |Â
up vote
0
down vote
I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :
(Gnome) Network Manager configuration 
 
In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.
Go to Settings > Network
Add a new Network (+ bottom left of the window)
Select IPsec/IKEv2 (strongswan)
Fill out the options:
 Name: your choice, e.g.: ikev2-1.2.3.4
 Gateway:
 Address: IP of the Algo VPN server, e.g: 1.2.3.4
 Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
 Client:
 Authentication: Certificate/Private key
 Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
 Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
 Options:
 Check Request an inner IP address, connection will fail without this option
 Optionally check Enforce UDP encapsulation
 Optionally check Use IP compression
 For the later 2 options, hover to option in the settings to see a description
 Cipher proposal:
 Check Enable custom proposals
 IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
 ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
Apply and turn the connection on, you should now be connected
add a comment |Â
up vote
0
down vote
up vote
0
down vote
I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :
(Gnome) Network Manager configuration 
 
In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.
Go to Settings > Network
Add a new Network (+ bottom left of the window)
Select IPsec/IKEv2 (strongswan)
Fill out the options:
 Name: your choice, e.g.: ikev2-1.2.3.4
 Gateway:
 Address: IP of the Algo VPN server, e.g: 1.2.3.4
 Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
 Client:
 Authentication: Certificate/Private key
 Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
 Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
 Options:
 Check Request an inner IP address, connection will fail without this option
 Optionally check Enforce UDP encapsulation
 Optionally check Use IP compression
 For the later 2 options, hover to option in the settings to see a description
 Cipher proposal:
 Check Enable custom proposals
 IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
 ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
Apply and turn the connection on, you should now be connected
I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :
(Gnome) Network Manager configuration 
 
In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.
Go to Settings > Network
Add a new Network (+ bottom left of the window)
Select IPsec/IKEv2 (strongswan)
Fill out the options:
 Name: your choice, e.g.: ikev2-1.2.3.4
 Gateway:
 Address: IP of the Algo VPN server, e.g: 1.2.3.4
 Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
 Client:
 Authentication: Certificate/Private key
 Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
 Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
 Options:
 Check Request an inner IP address, connection will fail without this option
 Optionally check Enforce UDP encapsulation
 Optionally check Use IP compression
 For the later 2 options, hover to option in the settings to see a description
 Cipher proposal:
 Check Enable custom proposals
 IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
 ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
Apply and turn the connection on, you should now be connected
edited Aug 12 at 21:17
answered Aug 12 at 21:08
Scorpion
11610
11610
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1021456%2fconnecting-ubuntu-to-algo-vpn%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password