Jump to content
TorGuard

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. etlnhl

    TorGuard Certificate and Network Upgrades

    Nah - not true. I run my own mail server and have control over the SPAM engine and I never received this mail. I also just went back through the archives ( I delete nothing ! ) and nope - nothing received on this subject. Also I do not remember asking you not to send me emails, why would I ? you don't send many and it is critical that I know if anything regarding my service will change. Seriously, own up - this change, whilst beneficial and important, has been mishandled. Regards
  4. Over the last few weeks (or maybe more) I have been suddenly become unable to connect tot he Sydney server from my Mageia Linux desktop - all I get is a "WAIT" status no matter how long I wait! Yet I can connect to it from my Windows 7 laptop no problem! It was working previously (as it was to the Melbourne server - till that disappeared I understand). I am currently running v3.96.0, but same thing happened on v3.95.1 & v3.95.0 What might be causing this? Any help greatly appreciated.
  5. Yesterday
  6. Support

    TorGuard Location Changes

    On occasion, we review data centre security/quality amongst other issues where we either host our own hardware or lease bare metal servers - on occasion we may decide to move to a new Datacenter, we have decided to change a few locations due to some concerns so as a heads up the following locations will be changed over the coming month: Brazil Mexico South Korea Chile Costa Rica These locations may be temporarily removed until we have hardware in a DC we see fit for purpose but do not worry we will replace them as soon as possible. Regards
  7. Support

    TorGuard Certificate and Network Upgrades

    I would suggest open a support ticket on our main desk so we can look at that https://torguard.net/submitticket.php Regards
  8. Parsley

    Melbourne Server

    Hi Treebear! Glad to see another Tassie user! How are the speeds you're getting when connecting to Sydney/NZ? Internet speeds in Aus are already extremely slow.. Cheers!!
  9. That Linksys seems okay spec wise except it appears that it does not support OpenVPN, but maybe it can be flashed with DDWRT. Thats a definite deal breaker if thats the case. I would take the AC86U any day. They are fit for purpose and one of the only home router's that are capable of delivering high performance OpenVPN functionality. Merlin f/w offers a plethora a key OpenVPN settings unavailable with stock Asus f/w. So, Merlin firmware is an absolute key essential must have for asus routers. Actually, OpenVPN support has been added to this router. Check here for a review: https://www.smallnetbuilder.com/wireless/wireless-reviews/32856-linksys-wrt1900acs-dual-band-gigabit-router-reviewed?showall=&start=1
  10. Hi ,and thanks for the reply. I was looking into this router and did wonder if the stock firmware was suitable.The Linksys wrt3200acm was another possibility.
  11. Perhaps it's time to upgrade to a newer router. I would recommend looking at Asus AC86U and Merlin firmwre for it. The AC86U has a powerful processor 1800, and hardware acceleration which improves OpenVPN performance immensly. And more to point, VERY simple to setup OpenVPN on this router.
  12. Maria Duarte

    TorGuard Certificate and Network Upgrades

    I cannot connect to any of my residential or streaming IP's. Am I the only one with this issue?
  13. Last week
  14. How do I remove port 8081 from the VPN software. I require that port to be open on my local internet connection for remote access. With the VPN off the remote access works fine, but with the VPN enabled i lose all access to port 8081 via the local internet connection, and thus lose all access to my machine. This used to work fine with the Viscosity VPN but it does not work at all with TG Desktop v3.96.0 Any help to fix this would be greatly appreciated. cheers
  15. dani1

    Problem with payment - Ticket (#326531)

    Hi, No, the problem hasn't been solved yet. I was advised to wait, as the payments would probably clear after a couple of days, but they didn't, they were made effective and now, my banks and I are trying to recover the charges by lodging a claim to Visa. But it is a slow process and I am still waiting. Bit disappointed because my bank said it would have been easier to cancel them while they were still showing as pending.
  16. Dear Community, This tutorial guide details dead simple GUARANTEED process to get WIREGUARD Client up and running on pfSense Firewall. Some of you may remember my work with GETDNS and STUBBY. This installation is for commercial WireGuard Clients ONLY ! - where creation of keys and how to exchange them is not needed. The keys are generated and managed by your WireGuard VPN service provider - in my case - TorGuard. 1 - This is what I did and it worked out great. First go to https://pkg.freebsd.org/FreeBSD:11:amd64/latest/All/ as pfSense is based on FreeBSD 11 - the current WireGuard release is version - July 2019 wireguard 0.0.20190702 . To get started install bash # pkg install bash ( as it is need by WireGuard-GO ). Scroll down page on FreeBSD package website ( find wireguard and wireguard-go ) Then issue these commands: # pkg add -f https://pkg.freebsd.org/FreeBSD:11:amd64/latest/All/wireguard-go-0.0.20190517.txz and # pkg add -f https://pkg.freebsd.org/FreeBSD:11:amd64/latest/All/wireguard-0.0.20190702.txz - As I said, this will install latest versions of these packages. W are now ready to get this going and up and running. Just follow these steps below: 2 - To begin you need to get your WIREGUARD configuration files from the TORGUARD website. To do so login your TORGUARD account then go to Tools ( along the top of Login Page ) from drop Down Menu click on Enable WIREGUARD Access. You will then be in your TorGuard Account Area. You will see this message along the top : Below is a list of WireGuard VPN Servers, Please click enable in front of the servers you like to connect to, and use the returned keys shown to connect. Currently, TORGUARD offers WIREGUARD Servers in USA - New York ( quite actually situated in Clifton, New Jersey ), Asia - Singapore and Europe - UK. Click on your preferred Server - Enable WIREGUARD. This will result in a green box below the now grayed out box - which states now Disable WIREGUARD- naturally leave your server enabled as you want to connect to the now enabled server. Next, Download Config file as the box allows you to do now that you have enabled your WIREGUARD Server. You will also see in the adjoining box the following : Location VPN Server Keys Manage USA - New York 1 159.xx.xxx.xx:xxx Server Public key: 62lKu9HsDVbyiPenApnc4sfmSYTHOVfFgL3pyB+cBL4= Your Private Key: cE2ecALeE5B+urJhDrJlVFmf38cJLAvqekONvjvpqUA= Your Address: 10.xx.x.xxx/24 3 - Now I used this guide as the template for my manual installation of WIREGUARD on OPNsense see here : https://genneko.github.io/playing-with-bsd/networking/freebsd-wireguard-quicklook/ I will make this simple for you step by step. You may sing and / or hum along as we proceed. A- First - configure WireGuard Client. TorGuard, AzireVPN, VPN.ac, Mullvad, IVPN, are commercial VPN providers which offer LIVE ! WireGuard Services now. I use TorGuard here is a sample file. Keys are dummies - only used for illustrative purposes in this tutorial- Use your real WireGuard configuration file here: Create file by command line - # nano /usr/local/etc/wireguard/wg0.conf - and enter the configuration file below ( copy and paste ) - substitute your real one. Save and Close. Done with this file. # TorGuard WireGuard Config [Interface] PrivateKey = foxZRnIh9gZpWnl+zEiKa0EJ2rdCGroMWm02gaxSc9Q= ListenPort = 51820 DNS = 104.223.91.210 Address = 10.xx.x.xxx/24 [Peer] PublicKey = 62lKu9HsDVbyiPenApnc4sfmSYTHOVfFgL3pyB+cBL4= AllowedIPs = 0.0.0.0/0 Endpoint = 159.xx.xx.xxx:xxx PersistentKeepalive = 25 B - Secondly, run command via SSH # wg-quick up wg0 ( wireguard-go is in package and this action creates wireguard interface ) You may also run # wireguard-go wg0 to create wg0 - however, I prefer to use the first method mentioned here. 4 - Configure WireGuard Service with rc.d - for automatic startup/shutdown of the tunnel. In order to achieve this there’s already an rc.d script /usr/local/etc/rc.d/wireguard which came with the wireguard package. You need to issue this command : # mv /usr/local/etc/rc.d/wireguard /usr/local/etc/rc.d/wireguard.sh then enter the file - # nano /usr/local/etc/rc.d/wireguard.sh Then go to bottom of file - lines 46 and 47 - change : ${wireguard_enable="NO"} to : ${wireguard_enable="YES"} and then add wg0 on line 47 : ${wireguard_interfaces=""} to : ${wireguard_interfaces="wg0"} ( wgZero ) - Save and Close - Make it executable, I run two commands - it works for me: # chmod a+x /usr/local/etc/rc.d/wireguard.sh # chmod 744 /usr/local/etc/rc.d/wireguard.sh - Done with this file. 5 - Now head to pfSense WEBGUI in order to configure Wireguard Interface ( created earlier ) and FireWall Rule. First, go to Interfaces > Assignments -you will see wg0 interface - click (+) add button /symbol. Once the wg0 interface is listed as OPT ( 1 - 2 depending on your setup ) - Click underneath it - - enter check in " Enable interface " - and enter description - I call mine " WIRE " - DO NOTHING ELSE HERE ! Save and Apply - Done with this phase. Second - Firewall Rule - go to Firewall > NAT > Outbound > Once on this Landing Page put a Dot in radio button Hybrid outbound NAT rule generation - Click on Save - Do Not - Repeat Do Not Click Save and Apply At This Time - Instead Click on Add Square with Up Arrow (underneath Mappings ) on the page which opens change Interface from WAN in drop down menu to your Wireguard ( wg0 ) Interface which you created and labeled previously - in this example " WIRE " . Next - Change Source Address to " LAN NET " . You must manually enter your LAN NET . For example if your LAN Address is 192.168.11.10 - then enter 192.168.11.0/ 24 . Finally, set ( leave ) Translation/target to Interface address. Enter " Description -e.g. " Made For Wire " now Click " Save " at bottom of page. You will be taken back to Firewall:Nat:Outbound Landing Page - Click on " Apply Changes " in right upper hand corner - Done with Firewall Rule for LAN. Repeat this Firewall Rule Operation for all of your other LAN Interface Subnets if you choose to do so. 6 - Your WireGuard Client is now installed and ready - you must enter command # /usr/local/etc/rc.d/wireguard.sh restart in order to start it up. Lastly, issue command # wg show which prints out your WireGuard Connection statistics and configuration. Sample output for wg show below: interface: wg0 public key: cE2ecALeE5B+urJhDrJlVFmf38cJLAvqekONvjvpqUA= private key: (hidden) listening port: 51820 peer: 62lKu9HsDVbyiPenApnc4sfmSYTHOVfFgL3pyB+cBL4= endpoint: 159.x.xxx.xxx:xxx allowed ips: 0.0.0.0/0 latest handshake: 1 minute, 46 seconds ago transfer: 3.35 MiB received, 859.23 KiB sent persistent keepalive: every 25 seconds 7 - The Catch 22: Good and Bad News. When you reboot your pfSense FireWall, the WireGuard interface will be removed. Further you will be asked and required to " Assign Interfaces " again. You will see this message : Network interface mismatch - Running interface assignment option - In order to get your WireGuard VPN up and running again simply follow these steps after reassigning your vlans ( if you have any ), WAN, and LAN interfaces. All your network configurations will have been preserved including your firewall rules, addresses and so on. A - Remember your WireGuard interface ( wg 0 ) was removed on reboot. so, simply repeat this step to add it again: In the pfSense WEBGUI go to Interfaces > Assignments -you will see wg0 interface - click (+) add button /symbol. Once the wg0 interface is listed as OPT ( 1 - 2 depending on your setup ) - Click underneath it - - enter check in " Enable interface " - and enter description - I call mine " WIRE " - DO NOTHING ELSE HERE ! Save and Apply - Done with this phase. B - In order to get WireGuard up and running again - simply issue this command once again - # /usr/local/etc/rc.d/wireguard.sh restart You do not have to recreate any of your Firewall Rules as they are all still there. Your WireGuard VPN connection is now reestablished. Last Notes and Thoughts: I realize that this implementation is not perfect albeit it works. I run OpenVPN on pfSense as well. You must disable OpenVPN client before and when running WireGuard. I will write up a tutorial to switch between OpenVPN and WireGuard on pfSense. Currently, I am running WireGuard on pfSense 2.5.0 Development SnapShot VmWare Machine. pfSense 2.5.0 is based on FreeBSD 12 - so you must modify url's thusly and get the packages from : https://pkg.freebsd.org/FreeBSD:12:amd64/latest/All/ If anyone can provide me with a solution that will allow WireGuard interface ( wg0 ) the ability to survive a reboot; I will be most appreciative and edit this tutorial to include that solution. Peace and Grace Be Unto All God's Creation
  17. GaMbi

    Selecting Fastest Server

    4 years later
  18. Support

    IP set up changing to port 80.

    Dave, we have a fix coming today for the duplicate IP issue It will be pushed within the next 2 hours. Regards
  19. Got instructions to setup my router to use VPN but being totally computer-ignorant can not make the connection. Is there a simple way to get my router to use Torguard?
  20. bigdave05

    IP set up changing to port 80.

    Is anyone having issue where they have multiple IP's with same set up but different ports. I have three IP's with same set up using ports 433, 80 and 1912. It was all fine until new software and now all keep changing to port 80 and start up, which isn't great as all have same IP now. Torguard don't seem interested as they have said all three can't connect at same time, not really the point tho.
  21. Support

    Melbourne Server

    Hello, We decided to look for a new DC/provider in this area - we will keep users updated when there is an eta on when that will happen. Regards
  22. Support

    Could not block outside DNS-Servers

    Did you try a simple reboot after the update? that normally clears it up. Regards
  23. Treebear

    Melbourne Server

    I am also a Tassie user. Same Issue, Melbourne server disappeared! It was working yesterday 19th July. Was looking at the server status list https://torguard.net/network/ and it doesn't appear there either. Doesn't look good :(
  24. Well that worked! o.0 Been using this vpn for months and I have been using email and and a password that was given to me! so wierd I must be going crazy!
  25. The username and password used to login to the website and the VPN are different. Please try going to > https://torguard.net/managecredentials.php That link should lead you to the page where you can set it up.
  26. This issue is really annoying I'm copying my username and password into the website and I log in fine but when I copy it to the client it says its wrong.😡
  27. I agree as well, such an issue is really important. As much as i enjoy using torguard, I'm sure privacy takes a higher priority.
  28. Parsley

    Melbourne Server

    Indeed it is! How long have you been using torguad from down here? Have been using the Sydney server, but it isnt as fast as melbourne. Just hoping that they add more servers soon!
  29. Flyingturkey

    Could not block outside DNS-Servers

    recently updated torguard a month ago I Hadn't updated in a while and I have been receiving "Could not block outside DNS-Servers, please check your firewall settings" Nothing has been changed in my firewall forever. Running win-7. Not sure what is causing this.
  1. Load more activity
×