Connecting Ubuntu to Algo VPN

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP








up vote
1
down vote

favorite












Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?



Would really love to know how to best do this, thanks!










share|improve this question

























    up vote
    1
    down vote

    favorite












    Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?



    Would really love to know how to best do this, thanks!










    share|improve this question























      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?



      Would really love to know how to best do this, thanks!










      share|improve this question













      Does anyone have experience with connecting to an Algo VPN on a Ubuntu 16.04 client (running Gnome)?



      Would really love to know how to best do this, thanks!







      network-manager






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Apr 2 at 23:04









      Zerong Tony Wang

      62




      62




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          0
          down vote













          I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
          And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :

          (Gnome) Network Manager configuration

          In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.



          Go to Settings > Network
          Add a new Network (+ bottom left of the window)
          Select IPsec/IKEv2 (strongswan)
          Fill out the options:
          Name: your choice, e.g.: ikev2-1.2.3.4
          Gateway:
          Address: IP of the Algo VPN server, e.g: 1.2.3.4
          Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
          Client:
          Authentication: Certificate/Private key
          Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
          Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
          Options:
          Check Request an inner IP address, connection will fail without this option
          Optionally check Enforce UDP encapsulation
          Optionally check Use IP compression
          For the later 2 options, hover to option in the settings to see a description
          Cipher proposal:
          Check Enable custom proposals
          IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
          ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
          Apply and turn the connection on, you should now be connected





          share|improve this answer






















            Your Answer







            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "89"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: true,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1021456%2fconnecting-ubuntu-to-algo-vpn%23new-answer', 'question_page');

            );

            Post as a guest






























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            0
            down vote













            I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
            And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :

            (Gnome) Network Manager configuration

            In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.



            Go to Settings > Network
            Add a new Network (+ bottom left of the window)
            Select IPsec/IKEv2 (strongswan)
            Fill out the options:
            Name: your choice, e.g.: ikev2-1.2.3.4
            Gateway:
            Address: IP of the Algo VPN server, e.g: 1.2.3.4
            Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
            Client:
            Authentication: Certificate/Private key
            Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
            Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
            Options:
            Check Request an inner IP address, connection will fail without this option
            Optionally check Enforce UDP encapsulation
            Optionally check Use IP compression
            For the later 2 options, hover to option in the settings to see a description
            Cipher proposal:
            Check Enable custom proposals
            IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
            ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
            Apply and turn the connection on, you should now be connected





            share|improve this answer


























              up vote
              0
              down vote













              I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
              And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :

              (Gnome) Network Manager configuration

              In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.



              Go to Settings > Network
              Add a new Network (+ bottom left of the window)
              Select IPsec/IKEv2 (strongswan)
              Fill out the options:
              Name: your choice, e.g.: ikev2-1.2.3.4
              Gateway:
              Address: IP of the Algo VPN server, e.g: 1.2.3.4
              Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
              Client:
              Authentication: Certificate/Private key
              Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
              Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
              Options:
              Check Request an inner IP address, connection will fail without this option
              Optionally check Enforce UDP encapsulation
              Optionally check Use IP compression
              For the later 2 options, hover to option in the settings to see a description
              Cipher proposal:
              Check Enable custom proposals
              IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
              ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
              Apply and turn the connection on, you should now be connected





              share|improve this answer
























                up vote
                0
                down vote










                up vote
                0
                down vote









                I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
                And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :

                (Gnome) Network Manager configuration

                In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.



                Go to Settings > Network
                Add a new Network (+ bottom left of the window)
                Select IPsec/IKEv2 (strongswan)
                Fill out the options:
                Name: your choice, e.g.: ikev2-1.2.3.4
                Gateway:
                Address: IP of the Algo VPN server, e.g: 1.2.3.4
                Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
                Client:
                Authentication: Certificate/Private key
                Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
                Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
                Options:
                Check Request an inner IP address, connection will fail without this option
                Optionally check Enforce UDP encapsulation
                Optionally check Use IP compression
                For the later 2 options, hover to option in the settings to see a description
                Cipher proposal:
                Check Enable custom proposals
                IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
                ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
                Apply and turn the connection on, you should now be connected





                share|improve this answer














                I tried a little but now i get some problem setting the server, seeing this using strongswan or wireguard you should.
                And this is what says https://github.com/trailofbits/algo/blob/master/docs/client-linux.md :

                (Gnome) Network Manager configuration

                In this example we'll assume the IP of our Algo VPN server is 1.2.3.4 and the user we created is user-name.



                Go to Settings > Network
                Add a new Network (+ bottom left of the window)
                Select IPsec/IKEv2 (strongswan)
                Fill out the options:
                Name: your choice, e.g.: ikev2-1.2.3.4
                Gateway:
                Address: IP of the Algo VPN server, e.g: 1.2.3.4
                Certificate: cacert.pem found at /path/to/algo/configs/1.2.3.4/cacert.pem
                Client:
                Authentication: Certificate/Private key
                Certificate: user-name.crt found at /path/to/algo/configs/1.2.3.4/pki/certs/user-name.crt
                Private key: user-name.key found at /path/to/algo/configs/1.2.3.4/pki/private/user-name.key
                Options:
                Check Request an inner IP address, connection will fail without this option
                Optionally check Enforce UDP encapsulation
                Optionally check Use IP compression
                For the later 2 options, hover to option in the settings to see a description
                Cipher proposal:
                Check Enable custom proposals
                IKE: aes256gcm16-prfsha512-ecp384,aes256-sha2_512-prfsha512-ecp384,aes256-sha2_384-prfsha384-ecp384
                ESP: aes256gcm16-ecp384,aes256-sha2_512-prfsha512-ecp384
                Apply and turn the connection on, you should now be connected






                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Aug 12 at 21:17

























                answered Aug 12 at 21:08









                Scorpion

                11610




                11610



























                     

                    draft saved


                    draft discarded















































                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1021456%2fconnecting-ubuntu-to-algo-vpn%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Popular posts from this blog

                    pylint3 and pip3 broken

                    Missing snmpget and snmpwalk

                    How to enroll fingerprints to Ubuntu 17.10 with VFS491