PIA Iptables Manager *NEW*
PIA Iptables Manager
Current Version: 0.4
Hey everyone!
I recently updated to v0.4. I'm also working on an android version which will hopefully be available soon. This latest update is way more lightweight than before and doesn't require any set-up.
Features
Current Version: 0.4
Hey everyone!
I recently updated to v0.4. I'm also working on an android version which will hopefully be available soon. This latest update is way more lightweight than before and doesn't require any set-up.
Features
- Kill-Switch protection.
- DNS leak protection.
- No coding required. Simply download the file and follow the instructions.
- Configures iptables for the currently connected VPN server. (Should work with other VPN providers as well.)
- Clean interface simplifies management.
- Easy Iptables control.
- Simple status check. (Updated)
- Single file rather than dealing with multiple scripts.
Verified Operating Systems
- Ubuntu 12.04
- Raspbian Wheezy
- Linux Mint 14
- Xubuntu 12.04
- (Theoretically any OS using Bash)
Download | Changelog
PIA Iptables Manager v0.4 | Source
- Pia-iptm is now standalone. No other files are generated or used.
- Rework: adjusts iptables for currently connected VPN server instead of all PIA servers (should work with other VPN providers).
- Status function improved to detect actual current iptables configuration.
PIA Iptables Manager v0.3 | Source
- Removed initial-setup menu option. Intial set-up now runs automatically when the script is first run.
- Required scripts are now generated to /.pia/ instead of /pia/ so the folder is hidden to avoid clutter.
- Reworked Status function into 2 parts; f_Status which returns a value and f_PrintStatus which prints the status based on results from f_Status.
- Reworked Quit function to automatically deactivate the service before closing the program if its not already inactive.
- Updated thread with source code for different versions, list of verified operating systems, and updated screenshots.
PIA Iptables Manager v0.2 | Source
- Changed name from 'PIA Kill-Switch Manager' to 'PIA Iptables Manager'
- Added 'Status' function to check/display the status of the Iptables
- Required scripts are now generated in /pia/ rather than ~/vpn/
- Renamed some Menu options
PIA Kill-Switch Manager v0.1 | Source
- Initial release
- Download the latest version of pia-iptm and place it anywhere you want.
- Open terminal navigate to the directory of the file. You can use the 'cd' command to change the directory and 'ls' to view the current directory.
- Once you are in the correct location you can launch it with 'sudo sh pia-iptm'.
- Important: On your first launch make sure you perform the intial set-up; option 5. Initial set-up now runs automatically on the first time. This creates the required scripts to provide full functionality. Initial set-up is not required. The script is standalone meaning you don't need any type of set-up. Just run the script and everything should function properly.
Instructions
- Connect to VPN server of choice.
- Open terminal and navigate to directory holding pia-iptm file.
- Launch pia-iptm. 'sudo sh pia-iptm'
- Select option 1 to activate the service.
- Once finished with VPN, close the VPN connection.
- Select option 2 to deactivate the service and reset iptables or option 6 which will deactivate the service and close the script.
- Select option 5 to close the script and return to terminal.
Donate
I spent quite a bit of time on this and I plan on keeping it updated. I'll leave a bitcoin address here in case anyone enjoys it enough to consider donating. Donate: 1MMgC7fD91bGsc8AnFNAd2DfV9n1gBfMfn
Comments/Suggestions
Please leave comments/suggestions in the forum below. You can also PM me or email me directly at [email protected]. I appreciate any feedback you can give. I want to try to keep this bug-free and as user friendly as possible and that begins with you feedback!
Comments
So thanks to u/elfer90 I think i have figured out a working IPtables killswitch script for PIA vpn. This actually should work for most vpn's because it calls and finds out your WAN IP than plugs that into the script. I set this up to trigger when OpenVPN starts that way it auto plugs into IPtables then i run a script when OpenVPN stops to remove it from iptables..
vpnon.sh
Then vpnoff.sh when openvpn stop
IP=$(wget https://duckduckgo.com/?q=whats+my+ip -q -O - | grep -Eo '([0-9]{1,3}[\.]){3}[0-9]{1,3}')
I also tried your script VPNON.SH meno but when i run it i get the following error:
Bad argument `DROP'
Try `iptables -h' or 'iptables --help' for more information.
any help with this greatly appreciated. I have only been using linux for 1 month so am still a beginner.
Thankyou.
If you replace line 24 with the line DePingus added above you should be fine.
For everyone else i've googled around for dns/ipleak sites and none of them have been able to bypass my vpn IP. What distro are you using to get these leaks and what sites are you using to check?