Jump to content
TorGuard

Leaderboard

  1. Support

    Support

    Administrators


    • Points

      13

    • Content Count

      2,505


  2. klepp0906

    klepp0906

    Members


    • Points

      2

    • Content Count

      54


  3. Best10VPN

    Best10VPN

    Members


    • Points

      2

    • Content Count

      14


  4. 19807409

    19807409

    Members


    • Points

      2

    • Content Count

      270



Popular Content

Showing content with the highest reputation since 08/22/2020 in Posts

  1. 3 points
    Hey guys, I know you have all been asking for some time for a new design - we are thinking of something like the following for all platforms, let us know your thoughts: Regards
  2. 3 points
    ChangeLog: - All platforms: Responsive UI for WireGuard - All platforms: OpenConnect: Adding DTLS information on UI - All platforms: Enhancing Accessibility Support - All platforms: Improvements in WireGuard reconnecting workflow - All platforms: Fixing bug where WireGuard with Dedicated IP was not able to connect - MacOSX: Show a warning if OS settings are not compatible with TorGuard - MacOSX: exclude local network from firewall restrictions (testing) - Windows: Fixing a bug when multiple WireGuard interfaces are present Downloads
  3. 2 points
    Release torguard-ios-v1.5.1, 2020-08-21 ==================================== - Added OpenVPN Support - Added In-App Purchases by request from Apple - Many Internal Improvements and bug fixes Downloads P.S. If you already have an account you do NOT need to purchase again, please tap "Connect with VPN Credentials" to login directly - we will change the login flow shortly. We are also working on Wireguard for our next release.
  4. 1 point
    I decided to write a simple guide and share it with most before preparing this guide properly and uploading everything to github. This guide will be updated and scripts uploaded to github, after that you will have just to download and run the latest available. Current one is just a scratch and var names as maybe some formatting is not optimal, but this is how I install and use TorGuard Shared, dedicated etc.. (all torguards ips where wireguard is available). I described already in this post how it is done. Enjoy Guide Requirements: OS: OpenWRT with Luci web interface Short description all commands can be copy pasted from codeboxes below, just edit in step 4 like your server, mtu and so on ssh to your router ssh [email protected] install required packages opkg update opkg install luci-app-wireguard Create auto installation script mkdir -p ~/bin cat <<"EOF" | tee ~/bin/tginit.sh #!/bin/sh # Example single usage: tginit.sh "VPNUsername" "VPNPass" "tgwg" "0" "0" "41820" "1420" "AA" "25" "0" "1" "1" "us-la.secureconnect.me:1443 us-la.secureconnect.me:1443 us-atl.secureconnect.me:1443" # Example multi usage: tginit.sh "VPNUsername" "VPNPass" "tgwg" "0" "1" "41820" "1420" "AA" "25" "0" "0" "1" "us-la.secureconnect.me:1443" # Info on multi usage example above: route allowed ip's is disabled for each entry, enable manually genwgkey () { PRIVATE=$(wg genkey) PUBLIC=$(echo "${PRIVATE}" | wg pubkey) } wgettginfo () { #$1 - VPN Username #$2 - VPN Password #$3 - Wireguard Endpoint #$4 - Wireguard Port #$5 - My wireguard public key #wget -O $6 --no-check-certificate https://$1:[email protected]$3:$4/api/v1/setup?public-key=$5 URL="https://${1}:${2}@${3}:${4}/api/v1/setup?public-key=${5}" echo "API: ${URL}" TGINFO=$(wget --no-check-certificate -qO- ${URL}) } cgettginfo () { #$1 - VPN Username #$2 - VPN Password #$3 - Wireguard Endpoint #$4 - Wireguard Port #$5 - My wireguard public key #wget -O $6 --no-check-certificate https://$1:[email protected]$3:$4/api/v1/setup?public-key=$5 URL="https://${1}:${2}@${3}:${4}/api/v1/setup?public-key=${5}" echo "API: https://$1:[email protected]$3:$4/api/v1/setup?public-key=$5" TGINFO=$(curl -k ${URL}) } addwginterface () { # $1 - network internaface, Example: wg0 # $2 - private_key # $3 - listen_port # $4 - addresses # $5 - mtu # $6 - fwmark # add wireguard interface uci delete network.${1} uci commit network uci add network interface uci rename [email protected][-1]=${1} uci set [email protected][-1].proto='wireguard' uci set [email protected][-1].private_key="${2}" uci set [email protected][-1].listen_port="${3}" uci add_list [email protected][-1].addresses="${4}" uci set [email protected][-1].mtu="${5}" uci set [email protected][-1].fwmark="0x${6}" # disable use of builtin IPv6-management uci set [email protected][-1].delegate="${7}" # disabled by default, 0 uci set [email protected][-1].nohostroute="${8}" # add peers uci add network wireguard_${1} uci set [email protected]_${1}[-1].description="${9}" uci set [email protected]_${1}[-1].public_key="${10}" uci add_list [email protected]_${1}[-1].allowed_ips="${11}" uci set [email protected]_${1}[-1].endpoint_host="${12}" uci set [email protected]_${1}[-1].endpoint_port="${13}" uci set [email protected]_${1}[-1].persistent_keepalive="${14}" uci set [email protected]_${1}[-1].route_allowed_ips="${15}" uci commit network # Add created wireguard interface to lan zone (this will overwrite any other [email protected][0].network setting, please recheck if using non default settings) uci set [email protected][${16}].network="${17} ${1}" uci commit firewall } # Each server in a string must be provided by server and port "server:port" and separated by space "srv1:1234 srv2:5678" TGSERVERLIST="${13}" # TorGuard Server List separated by space, "srv1:1234 srv2:5678" # TorGuard credentials VPNUSERNAME="${1}" # TorGuard VPN username VPNPASS="${2}" # TorGuard VPN password WGINTERFACE="${3}" # Wireguard interface name, default: tgwg WGIFNR="${4}" # Wireguard interface number, default 0 NOHOSTROUTE="${5}" # Optional. Do not create host routes to peers, default 0 LISTENPORT="${6}" # Optional. UDP port used for outgoing and incoming packets. MTU="${7}" # Optional. Maximum Transmission Unit of tunnel interface. FWMARK="${8}" # Optional. 32-bit mark for outgoing encrypted packets. Enter value in hex, starting with 0x. KEEPALIVE="${9}" # Optional. Seconds between keep alive messages. Default is 0 (disabled). Recommended value if this device is behind a NAT is 25. USEBUILTINIPV6="${10}" # Use builtin IPv6-management 0 to disable, 1 to enable ROUTEALLOWEDIPS="${11}" # Route allowed IPs, 0 to disable, 1 to enable FIREWALLZONE="${12}" # Assign firewall-zone, 1 is wan, 0 is lan, default: 1 echo " TorGuard VPN username: ${1} TorGuard VPN password: ${2} Wireguard interface name: ${3} Wireguard interface number: ${4} do not create host routes to peers: ${5} UDP port for out-/incoming packets: ${6} Maximum Transmission Unit of tunnel: ${7} 32-bit mark for outgoing packets: ${8} Seconds between keep alive messages: ${9} Use builtin IPv6-management: ${10} Route allowed IPs: ${11} TorGuard Server List: ${12} " # initialize vars PRIVATE="" PUBLIC="" ENDPOINT="" ENDPOINTPORT="" TGINFO="" DESCRIPTION="" TMPPORT=$(( $LISTENPORT - 1 )) TMPFWMARK=$(printf "%x\n" $(( $(printf "%d\n" 0x${FWMARK}) - 1 ))) for i in ${TGSERVERLIST}; do TMPPORT=$(( $TMPPORT + 1 )) TMPFWMARK=$(printf "%x\n" $(( $(printf "%d\n" 0x${TMPFWMARK}) + 1 ))) DESCRIPTION="${WGINTERFACE}${WGIFNR} (TorGuard)" ZONEINTERFACES=$(uci get [email protected][${FIREWALLZONE}].network) ENDPOINT=$(echo $i | awk -F'[:]' '{print $1}') ENDPOINTPORT=$(echo $i | awk -F'[:]' '{print $2}') genwgkey wgettginfo "${VPNUSERNAME}" "${VPNPASS}" "${ENDPOINT}" "${ENDPOINTPORT}" "${PUBLIC}" echo "Private: ${PRIVATE}" echo "Public: ${PUBLIC}" WGPUBLIC=$(echo ${TGINFO} | awk -F'[,]' '{print $1}' | awk -F'[:]' '{print $2}' | sed 's/"//g') && echo "Public key: ${WGPUBLIC}" SERVERIP=$(echo ${TGINFO} | awk -F'[,]' '{print $2}' | awk -F'[:]' '{print $2}' | sed 's/"//g') && echo "Peer server: ${SERVERIP}" CLIENTIP=$(echo ${TGINFO} | awk -F'[,]' '{print $3}' | awk -F'[:]' '{print $2}' | sed 's/"//g') && echo "IP Addresses: ${CLIENTIP}" ALLOWEDIPS=$(echo ${TGINFO} | awk -F'[,]' '{print $4}' | awk -F'[:]' '{print $2}' | sed 's/"//g') && echo "Allowd IPs: ${ALLOWEDIPS}" WGDNS1=$(echo ${TGINFO} | awk -F'[,]' '{print $5}' | awk -F'[:]' '{print $2}' | sed 's/"//g' | sed 's/\[//g') && echo "DNS1: ${WGDNS1}" WGDNS2=$(echo ${TGINFO} | awk -F'[,]' '{print $6}' | awk -F'[:]' '{print $1}' | sed 's/"//g' | sed 's/\]//g') && echo "DNS2: ${WGDNS2}" WGSERVER=$(echo ${TGINFO} | awk -F'[,]' '{print $7}' | awk -F'[:]' '{print $2}' | sed 's/"//g') && echo "Endpoint host: ${WGSERVER}" WGPORT=$(echo ${TGINFO} | awk -F'[,]' '{print $8}' | awk -F'[:]' '{print $2}' | sed 's/"//g' | sed 's/}//g') && echo "Endpoint Port: ${WGPORT}" addwginterface "${WGINTERFACE}${WGIFNR}" "${PRIVATE}" "${TMPPORT}" "${CLIENTIP}" "${MTU}" "${TMPFWMARK}" "${USEBUILTINIPV6}" "${NOHOSTROUTE}" "${DESCRIPTION}" "${WGPUBLIC}" "${ALLOWEDIPS}" "${WGSERVER}" "${WGPORT}" "${KEEPALIVE}" "${ROUTEALLOWEDIPS}" "${FIREWALLZONE}" "${ZONEINTERFACES}" WGIFNR=$(( $WGIFNR + 1 )) done /etc/init.d/firewall restart /etc/init.d/network restart echo "Torguard wireguard initialization finished, please reboot to complete" EOF chmod +x ~/bin/tginit.sh Install wireguard with any TorGuard server (or server list, check the script for more info) . You can delete, reconfigure and rerun in any wished combination TGSERVER="us-la.secureconnect.me:1443" VPNUSERNAME="YourVPNUsername" # Your torguard vpn username (same as in torguard client) VPNPASS="YourVPNPassword" # Your torguard vpn passsword (same as in torguard client) WGINTERFACE="tgwg" # Wireguard interface name, default: tgwg WGIFNR="0" # Wireguard interface number, default 0 NOHOSTROUTE="0" # Optional. Do not create host routes to peers, default 0 LISTENPORT="51820" # Optional. UDP port used for outgoing and incoming packets. MTU="1420" # Optional. Maximum Transmission Unit of tunnel interface. FWMARK="AA" # Optional. 32-bit mark for outgoing encrypted packets. Enter value in hex, starting with 0x. KEEPALIVE="25" # Optional. Seconds between keep alive messages. Default is 0 (disabled). Recommended value if this device is behind a NAT is 25. USEBUILTINIPV6="0" # Use builtin IPv6-management 0 to disable, 1 to enable ROUTEALLOWEDIPS="1" # Route allowed IPs, 0 to disable, 1 to enable FIREWALLZONE="1" # Assign firewall-zone, 1 is wan, 0 is lan, default: 1 # INSTALL TORGUARD, PLEASE CHECK INTERFACES AFTER SCRIPT FINISHES AND REBOOT ~/bin/tginit.sh "${VPNUSERNAME}" "${VPNPASS}" "${WGINTERFACE}" "${WGIFNR}" "${NOHOSTROUTE}" "${LISTENPORT}" "${MTU}" "${FWMARK}" "${KEEPALIVE}" "${USEBUILTINIPV6}" "${ROUTEALLOWEDIPS}" "${FIREWALLZONE}" "${TGSERVER}"
  5. 1 point
    Hi, Apologies for not responding sooner. Weirdly, that behavior has now stopped - it happened about 5 times within the first hour after updating to v4.1.1, but has not happened again in over two days. So, I guess we should just forget about it........................ Unless it happens again! But in answer to your questions: No auto start on boot, and not a laptop, it's Win10 Intel NUC. Apologies for messing you about, & I'll just get my coat.
  6. 1 point
  7. 1 point
    Any updates? I did uninstall the app twice, restarted the phone a few times, and now run it on port 1195 SHA 256. It's better than before but still bad. Interestingly, the phone seems to drain lots energy while idle. I just had it lying around for 2-3 hours and the battery went down from about 60% to 25%. Never happened before. Battery health is excellent. iPhone 6s, iOS 13.6.1 Check out the screenshot. See how it died last night and Safari vs. TorGuard battery usage. Unheard of ...
  8. 1 point
    Yikes! So I've begun toying around with the new addition - WireGuard. After connecting to a few different servers and poking around I noticed that under network connections, each time i connect whether it be to the same server or a different server, it adds another network profile. The ever growing list can be seen under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles. This is going to be problematic, imagine connecting daily or a few times a day over a span of time. Add in the fact I painstakingly keep this clear and remove duplicate profiles with numbers added due to reinstallations that crop up from time to time. In this case, not feasible to have to do so each time you connect. I assume (hope) this is just a bug/oversight and isnt a necessary evil of the new technology? I'd hate to be looking at "torguard-wg 277" a few weeks from now.
  9. 1 point
    This is fixed guys, a new release is coming on Sunday/Monday Regards
  10. 1 point
    Use Anyconnect! https://torguard.net/blog/tag/anyconnect/
  11. 1 point
    if anybody would look up in the log files, you would have seen that on each start torguard creates new public key: sudo /usr/bin/wg show torguard-wg dump your public key is: AAAAAAAAAAAAAAAAAAAAAAAAAA/BBBBBBB/CCCCCCCC= YOURPUBLICKEYDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD= 59496 off TORGUARDSERVERPUBLICKEYEEEEEEEEEEEEEEEEEEEE= (none) TORGUARDIP:1443 0.0.0.0/0 1599674399 11524196 558820 15 This will show you your public key. Then you can type in your browser for a test (you will need to authentificate with your VPN credentials): https://TorGuardServerIPorDomain:1443/api/v1/setup?public-key= And copy those settings which you need for connecting to shared servers server_public_key "TORGUARDSERVERPUBLICKEYEEEEEEEEEEEEEEEEEEEE= " server_ipv4 "10.14.0.1/16" client_ipv4 "10.14.102.149/32" routes "0.0.0.0/0" dns 0 "10.9.0.1" 1 "10.8.0.1" vpn_server_address "TORGUARDIP" vpn_server_port WIREGUARDPORT For more info check your log and maybe ask support for more info, I am not sure that I am posting something that torguard is ok with, so I think I'll just stop on this point ;). For port forwarding, we all have to wait torguard to apply it on their side,, there is no config allowing it.
  12. 1 point
    All residential and cogent UK are available, Cogent US and San Diego will be done for Monday,
  13. 1 point
    I opened a ticket and just received this response: Hello, We currently have an ongoing issue with the browser extensions that we're working to resolve asap. Thanks for your patience. Kind regards TorGuard Advanced Support
  14. 1 point
    Having an amoled black and neon theme would be amazing. It would be cool if there was three themes, neon green, neon blue, neon pink (like private mail).
  15. 1 point
    Really like the modern look of this, very clean and fresh. Maybe look into black and pink similar to PrivateMail, that would look really cool!
  16. 1 point
    You need to open a ticket, and ask for them, if it have been done you will see them in services/your static IP addresses
  17. 1 point
    This is development right now as is ad block and wireguard on iOS yes Regards
  18. 1 point
    Yes we know what to do for this no worries
  19. 1 point
  20. 1 point
    EDIT- I found the answer to my issue - Uncheck the firewall in the network tab, viola' ! (this was in an thread)
  21. 1 point
    just in case anyone comes across this after noticing the same behavior, i spoke with support and they are aware of the bug.
×
×
  • Create New...