Free VPN Tools
UltraVPN - A Free VPN Powered by the Community
What is tinc?
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others. In addition, tinc has the following features:
Linux 下的VPN 客户端 ,仅此而已 。
4.http://www.freeswan.org/
The FreeS/WAN team is proud to announce the arrival of 2.06, the project's final release of its freely redistributable IPsec for Linux. Here are a few of its notable features, as documented in the CHANGES file:
也是 linux 下的VPN
5.http://www.packetix.net/en/vpn/admin/vpnclient.aspx
Client Installation for VPN Online Test Environment
You need to install the PacketiX VPN Client on you local PC to create a VPN connection to the Virtual Hub "alexzhang".
You can install and configure the client by hand, or the ActiveX control on this page to install and configure it automatically.
PacketiX VPN Client 2.0 also operates on platforms with Linux kernel 2.4 or later. However, the Linux version of VPN Client has numerous limitations, and currently it cannot be operated using a GUI. Therefore, the Linux version of VPN Client is recommended for use only by users with a very strong understanding of the Linux operating system and networks.
When using a Linux server to configure a connection between bases or a remote access VPN, normally this can be achieved using the local bridge functions of the Linux version of VPN Server, and the Linux version of VPN Client does not need to be used.
Welcome to Hotspot Shield!
- Secure your web session with HTTPS encryption.
- Hide your IP address for your privacy online.
- Access all content privately without censorship; bypass firewalls.
- Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices and ISP hubs.
- Works on wireless and wired connections alike.
- Secure your data & personal information online.
Using HotSpot Shield under Linux |
Written by Dirk Tilger | |
Tuesday, 31 March 2009 13:26 | |
Why?A friend of mine is promoting Linux in his company and for a certain number of applications he would like to use a public VPN service. Hotspot Shield is apparently one of the most widely known ones out there, so naturally people are asking whether it could run under Linux. What makes you think it could run? If you take a closer look at Hotspot Shield, one could quickly get the impression it's easy to make it run under Linux and while you're at it you might in fact believe for quite a while that you are on a successful track. However, it's not that easy as it turns out and the author of this text eventually gave up on it. However, if you're still determined you might actually get it to work and we'll present an idea at the end of this text on what to do. Until then I just give you an idea stones that lay on the way to give you an idea what not to try. Why not. If you take a look into the binaries folder after installing Hotspot Shield, you get this or a similar look: After the installation your first obstacle would be a Windows service trying to bind to port 895 - which is restricted to root under any decent Linux/Un*x system and this inaccessible, since you are not running wine as root (are you?). You can figure that out by enable tracing for winsock and executing the service executable openvpnas.exe (with the -debug parameter) directly. I bypassed this first obstacle by patching wine to assign a non-privileged port. People seem to look often for a solution to the root-ports problem, so one positive outcome of this experiment will be a wine patch. Once it's pretty I will submit it to wine-patches mailinglist for inclusion. Should it get rejected, it will be posted here. openvpn.exe appears to be the OpenVPN executable. If you understand the inner workings of wine a little bit more you will understand that OpenVPN is not likely to run out of the box, since within wine it will have a hard time creating a new network device on the kernel level. So, replacing openvpn.exe was my first candidate and I thought a good one: it's GPL licensed and thus open. You can start native applications on your machine through wine, thus replacing openvpn.exe with a native OpenVPN should have done the trick. After quite some time of configuring and writing a wrapper around OpenVPN I had to find out that AnchorFree had done modifications to openvpn.exe. While I could address some of them with a wrapper (though one that had to rewrite network packets) in other aspects the modified openvpn.exe does not behave according to the manual of the GPL one and then it becomes really nasty to figure things out. While grumbling over the GPL violation I found out more or less by accident that OpenVPN is dual-licensed and this modification is in fact allowed. How it could in fact work: ideas for someone else With the openvpn.exe turning out not being a good cutting point for an interoperability patch, there is still an option left. The main problem of Hotspot Shield not running in wine is that it won't be able to load a network driver into the kernel of the host OS. This particular driver, the ethernet network tap however came in fact from the Unix world and had been ported to Windows. So the remaining option would be to implement the Windows interface of the TAP-Win32 driver and map its calls to the native TAP driver. For me that is more time worth spending. OpenVPN has to support both the traditional Un*x TAP driver and the Windows driver. Accesses to both of them can be found in tun.c (at least for the prelease 2.1 branch in the SVN repository). An implementation of a wine TAP driver therefore could largely be done with copy and paste. If you look for example for open_tun (which opens the TUN/TAP device), you will find implementations for:
Superficially looked at the open_tun implementation for WIN32, it doesn't substantially look different besides that we know that the functions to call have different names and slightly different semantics:
Therefore a TAP implementation for wine:
Since OpenVPN's tun.c is already doing the majority of the work, the actual implementation could be largely pasted from the above mentioned file. 7.PacketiX.NET vpn client installation on linuxrecently i'm been using packetix.net vpn and the speed is quite good... unfortunately there's not many guide on how to use the client on linux, so i'm writing one. this gonna be very long..so bear with me till the end ..huhu 0. to make things easier, lets transform into root 1. now, make a folder name vpn and download the vpnclient file from their web http://packetix.net/en/secure/install/ 2. now to compile this files, you need zlib, openssl, readline and ncurses. 3. once finish,extract the file and continue with compile 5. inside vpncmd 6. now configuring your connection....read..and follow Select 1, 2 or 3: 2 Specify the host name or IP address of the computer that the destination VPN Client is operating on. Connected to VPN Client "localhost". *** now lets configure our account and connection VPN Client>niclist VPN Client>accountcreate VPN Client>accountlist VPN Client>accountconnect *** wait for awhile and list the account again VPN Client>accountlist *** set this as default connection everytime vpnclient started VPN Client>AccountStartupSet 7. now check for connection... note the value of _0 at the end of vpn 7. get dhcp from vpn root@bur8:~/vpnclient> ifconfig vpn_0 now you can start routing you connection to vpn.. route del default for more about how to do advance routing in linux please refer tohttp://lartc.org/howto/index.html 8.UltraVPN 注册帐号。 widows篇: 下载UltraVPN http://ultravpn.fr/download/ultravpn-install.exe 安装和设置可以看的alonweb安装使用教程 两者几乎一样。 Ubuntu篇: 1. 获取ca证书和帐号配置文件。这一步有二个渠道完成。 2. 安装OpenVPN。 $ sudo apt-get install network-manager-openvpn3. 建立VPN连接。这一步也有两种方式完成。导入式:右键点击网络连接图标,选择“编辑连接…”,切换到标签“VPN”, 点“导入“,选择第2步获取的client.ovpn文件(也可以选择stealthy connect.ovpn文件,用于创建安全连接),在弹出的编辑界面中填好第1 步注册的用户名、密码,”CA 认证”选择第2步获取的”ca.crt”文件,点”应用”完成。 4. 连接VPN。左键点击网络连接图标,在“VPN Connections“中选择第2步创建的连接,在这里会弹出一个提示: 如果网络连接图标出现一个小锁, 就说明连接成功了,访问一下www.google.com看是不是变成法国的了。 BlackVPN 打开blackVPN官方网站 http://www.blackvpn.com/,进行免费申请blackVPN账号 第一项 InviteCode 邀请码输入 GetUp再依次输入你的邮箱,名,姓等等完成注册。 然后网站会随机反馈给你户名和密码 username/login: XXXXX password:XXXXX 记住上面这两个。 接下来的步骤和UltraVPN一样。 导入的文件为blackvpn.zip 里面有三个设置 blackvpn_netherlands.conf blackvpn_uk.conf blackvpn_usa.conf 任选一个,三个的连接速度会不一样,选其中快的 证书在ssh文件夹里ca.crt |
没有评论:
发表评论