Connecting to PIA using OpenVPN through Gargoyle (1.8.1) on Netgear router
Using the information found in this link as the basis I performed the following...
Configure Client Manually: Selected
In the configuration box enter the following details. Most come from the ovpn file you downloaded with the modification to the auth-user-pass line to tell it to use the login credentials file you just created...
Download the Ovpn file for the server
Using the following link download the ovpn file for the server you wish to connect to. Open the file in a text editor as you'll need to copy out some details.Create a username and password file
SSH onto the router using its network address (i.e. ssh [email protected])cd /etc/openvpnOn the first line enter your username. On the second line enter the password. Save and exit the file.
vim auth.txt
<esc>:wqAlternatively you can create the file on your desktop and then copy to the device using the scp command, making sure it goes in the /etc/openvpn folder. Windows users will need to use putty or some other app to allow them to perform this part.
Fill in the Details on the OpenVPN router settings page
OpenVPN Configuration: OpenVPN ClientConfigure Client Manually: Selected
In the configuration box enter the following details. Most come from the ovpn file you downloaded with the modification to the auth-user-pass line to tell it to use the login credentials file you just created...
client
dev tun
remote aus.privateinternetaccess.com 1198 udp
remote aus.privateinternetaccess.com 502 tcp
resolv-retry infinite
nobind
persist-key
persist-tun
setenv CLIENT_CERT 0
cipher aes-128-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
auth-user-pass /etc/openvpn/auth.txt
In the CA Certificate box use the value from between the <ca></ca> tags in the ovpn file. Make sure to include the BEGIN CERTIFICATE line through to the END CERTIFICATE line. These will be correctly handled by OpenVPN.
In the Client Certificate and Client Key boxes you can add the information found in the link at the start, in particular where (at the bottom in point 5) in links to this page.
The section between the <cert></cert> tags goes in the Client Certificate box. The bit between the <key></key> tags goes in the Client Key box.
I'm not sure that what is in these two boxes is particularly relevant as I believe the setenv CLIENT_CERT 0 line makes them redundant.
What counts is that the CA Certificate is correct along with your username and password.
In the Client Certificate and Client Key boxes you can add the information found in the link at the start, in particular where (at the bottom in point 5) in links to this page.
The section between the <cert></cert> tags goes in the Client Certificate box. The bit between the <key></key> tags goes in the Client Key box.
I'm not sure that what is in these two boxes is particularly relevant as I believe the setenv CLIENT_CERT 0 line makes them redundant.
What counts is that the CA Certificate is correct along with your username and password.