Olej писал(а): ↑25 мар 2022, 21:03
Ищем возможность.
Использую вот это
VPN Gate Overview
- Снимок экрана от 2022-03-26 01-14-26.png (186.28 КБ) 1424 просмотра
Идея тут такая:
- выбираем из таблицы любой сервер, у которого в графе
OpenVPN есть заполнение вида:
OpenVPN
Config file
TCP: 1452
UDP: 1602
- скачиваем файл *.ovpn (я делал это для TCP не UDP)
- выполняем команду (от root) openvpn с этим *.ovpn файлом
Выбираю несколько (наугад) из точек входа...
Japan
public-vpn-40.opengw.net
219.100.37.4
Korea Republic of
vpn518848157.opengw.net
175.203.36.109
United Arab Emirates
vpn528942253.opengw.net
5.194.208.137
India
vpn701947059.opengw.net
103.154.55.171
На 2-й точке входа:
Код: Выделить всё
olej@R420:~/2022/rus.linux.net.hist/timeweb/VPN.Gate$ sudo openvpn vpngate_vpn518848157.opengw.net_tcp_995.ovpn
[sudo] пароль для olej:
Sat Mar 26 00:09:49 2022 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 19 2021
Sat Mar 26 00:09:49 2022 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10
Sat Mar 26 00:09:49 2022 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sat Mar 26 00:09:49 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]175.203.36.109:995
Sat Mar 26 00:09:49 2022 Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Mar 26 00:09:49 2022 Attempting to establish TCP connection with [AF_INET]175.203.36.109:995 [nonblock]
Sat Mar 26 00:09:50 2022 TCP connection established with [AF_INET]175.203.36.109:995
Sat Mar 26 00:09:50 2022 TCP_CLIENT link local: (not bound)
Sat Mar 26 00:09:50 2022 TCP_CLIENT link remote: [AF_INET]175.203.36.109:995
Sat Mar 26 00:09:50 2022 TLS: Initial packet from [AF_INET]175.203.36.109:995, sid=557d06c7 1dfd7870
Sat Mar 26 00:09:51 2022 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
Sat Mar 26 00:09:51 2022 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
Sat Mar 26 00:09:51 2022 VERIFY OK: depth=0, CN=*.opengw.net
Sat Mar 26 00:09:52 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Sat Mar 26 00:09:52 2022 [*.opengw.net] Peer Connection Initiated with [AF_INET]175.203.36.109:995
Sat Mar 26 00:09:53 2022 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Sat Mar 26 00:09:53 2022 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.1 10.211.1.2,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.2,redirect-gateway def1'
Sat Mar 26 00:09:53 2022 OPTIONS IMPORT: timers and/or timeouts modified
Sat Mar 26 00:09:53 2022 OPTIONS IMPORT: --ifconfig/up options modified
Sat Mar 26 00:09:53 2022 OPTIONS IMPORT: route options modified
Sat Mar 26 00:09:53 2022 OPTIONS IMPORT: route-related options modified
Sat Mar 26 00:09:53 2022 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Mar 26 00:09:53 2022 Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Mar 26 00:09:53 2022 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Mar 26 00:09:53 2022 Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Mar 26 00:09:53 2022 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Mar 26 00:09:53 2022 ROUTE_GATEWAY 192.168.1.3/255.255.255.0 IFACE=eno1 HWADDR=90:b1:1c:54:3a:46
Sat Mar 26 00:09:53 2022 TUN/TAP device tun0 opened
Sat Mar 26 00:09:53 2022 TUN/TAP TX queue length set to 100
Sat Mar 26 00:09:53 2022 /sbin/ip link set dev tun0 up mtu 1500
Sat Mar 26 00:09:53 2022 /sbin/ip addr add dev tun0 local 10.211.1.1 peer 10.211.1.2
Sat Mar 26 00:09:53 2022 /sbin/ip route add 175.203.36.109/32 via 192.168.1.3
Sat Mar 26 00:09:53 2022 /sbin/ip route add 0.0.0.0/1 via 10.211.1.2
Sat Mar 26 00:09:53 2022 /sbin/ip route add 128.0.0.0/1 via 10.211.1.2
Sat Mar 26 00:09:53 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Mar 26 00:09:53 2022 Initialization Sequence Completed
И добавляется новый интерфейс - tun0:
Код: Выделить всё
olej@R420:~/2022/rus.linux.net.hist/timeweb/VPN.Gate$ ip a s
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 90:b1:1c:54:3a:46 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.14/24 brd 192.168.1.255 scope global noprefixroute eno1
valid_lft forever preferred_lft forever
3: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 90:b1:1c:54:3a:47 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.13/24 brd 192.168.1.255 scope global noprefixroute eno2
valid_lft forever preferred_lft forever
4: team1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000
link/ether ae:75:a9:0b:7d:d0 brd ff:ff:ff:ff:ff:ff
6: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
link/none
inet 10.211.1.1 peer 10.211.1.2/32 scope global tun0
valid_lft forever preferred_lft forever
inet6 fe80::246c:6ab8:2f7:445f/64 scope link stable-privacy
valid_lft forever preferred_lft forever
И начинает идти ping:
Код: Выделить всё
olej@R420:~/2022/rus.linux.net.hist/timeweb$ ping -c5 185.200.243.3 6665
PING 6665 (0.0.26.9) 56(124) bytes of data.
64 bytes from 185.200.243.3: icmp_seq=1 ttl=51 time=484 ms
64 bytes from 185.200.243.3: icmp_seq=2 ttl=51 time=483 ms
64 bytes from 185.200.243.3: icmp_seq=3 ttl=51 time=658 ms
64 bytes from 185.200.243.3: icmp_seq=4 ttl=51 time=665 ms
64 bytes from 185.200.243.3: icmp_seq=5 ttl=51 time=654 ms
--- 6665 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4000ms
rtt min/avg/max/mdev = 483.159/588.704/664.834/86.093 ms
Код: Выделить всё
olej@R420:~/2022/rus.linux.net.hist/timeweb$ speedtest-cli
Retrieving speedtest.net configuration...
Testing from Korea Telecom (175.203.35.201)...
Retrieving speedtest.net server list...
Selecting best server based on ping...
Hosted by China Mobile Zhejiang 5G (Ningbo) [872.67 km]: 591.708 ms
Testing download speed................................................................................
Download: 10.42 Mbit/s
Testing upload speed......................................................................................................
Upload: 7.06 Mbit/s
Это не мои нативные 25 Mbit/s , но тоже очень ничего! Korea Republic нас спасёт!