TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Raspberry Pi VPN Server: Build Your Own Virtual Private Network

170 pointsby sr2almost 8 years ago

14 comments

oneplanealmost 8 years ago
I&#x27;m not sure that making &#x27;security&#x27; easy in this style helps people. Say you set this up, and you get yourself that nice cosy feeling of security, how does that compare to reality? People used to buy anti-virus software to buy &#x27;security&#x27; and it turned out to not really help against actual problems like zero-day malware. Now, we get VPNs and people that don&#x27;t actually know what they are or how they work or what they&#x27;re for install and &#x27;use&#x27; them (for lack of a better term) and get that sense of security with no backing. How is it secure for them? Is it still secure after one month? Was it secure to begin with?<p>Security isn&#x27;t a thing that you &#x27;buy&#x27; or &#x27;add&#x27;, it&#x27;s something that you &#x27;do&#x27; and &#x27;know&#x27;.<p>Using a VPN server and a VPN client doesn&#x27;t do anything other than getting traffic from A to B over a presumed hostile network. Ideally using asymmetrical encryption to make sure the keys don&#x27;t have to travel the network. Then, you sure probably use that tunnel to send all traffic, not just your p2p or http traffic. Using DNS over the normal network and your &#x27;secret&#x27; stuff over the tunnel still exposes what you are doing and actually makes you more suspicious since you now look like you are trying to hide things (and doing a bad job at it). And what about firewalls, WebRTC hacks, routing tables etc. that now expose your network setup to any software you execute (be it an application or a webpage), or applications that don&#x27;t honor your VPN setup and route packets wherever they want to. What about your OS routing stuff elsewhere? What about that Pi not being setup correctly and you happily using it but still leaking a ton of traffic over the visible network? A user of an easy VPN setup will not know and be covered by a false sense of security.<p>Even if you have perfect instructions and set it up perfectly initially, you would still be vulnerable down the road as new problems arise and mitigations might be available but unknown due to a user not actually knowing what it is or what they are doing.
评论 #14435222 未加载
评论 #14435154 未加载
评论 #14436147 未加载
评论 #14435159 未加载
评论 #14436450 未加载
评论 #14435104 未加载
评论 #14435568 未加载
7ewisalmost 8 years ago
I personally use Streisand [1] hosted on a t2.micro using the AWS Free Tier. Some people also recommend Algo [2]. Both have all their code open sourced on GitHub.<p>I do have a Pi too, but after all these new laws where ISP&#x27;s can sell your Internet history etc. I think it&#x27;s nice to be able to hide traffic from them too.<p>[1] - <a href="https:&#x2F;&#x2F;github.com&#x2F;jlund&#x2F;streisand" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jlund&#x2F;streisand</a><p>[2] - <a href="https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo</a>
ryanlolalmost 8 years ago
The Pi is far too slow to do more than a couple of MB&#x2F;s of vpn traffic so hosting a VPN server on it feels like a rather pointless exercise.<p>A bit more expensive but at least 100x faster option would be <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Supermicro-A1SRi-2558F-Intel-Fanless-Server&#x2F;dp&#x2F;B016VHBA7C&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Supermicro-A1SRi-2558F-Intel-Fanless-...</a><p>And I suppose something like <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Firewall-Micro-Appliance-Gigabit-Barebone&#x2F;dp&#x2F;B01GIVQI3M&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Firewall-Micro-Appliance-Gigabit-Bare...</a> or maybe <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Solana-Tech-pfSense-firewall-router&#x2F;dp&#x2F;B01D6I5VV0&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Solana-Tech-pfSense-firewall-router&#x2F;d...</a> would be an OK cheaper alternative.
评论 #14436582 未加载
评论 #14435228 未加载
评论 #14435554 未加载
评论 #14436598 未加载
评论 #14436522 未加载
nodesocketalmost 8 years ago
I&#x27;ve seen quite a few guides and blog posts using OpenVPN, but very few show how to setup native Cisco ipsec which works out of the box with macOS and iOS without any 3rd party software to configure.<p>Thus, here is a blog post I wrote a bit ago on how to setup a dedicated native Cisco ipsec pi:<p><a href="https:&#x2F;&#x2F;blog.elasticbyte.net&#x2F;setting-up-a-native-cisco-ipsec-vpn-server-using-a-raspberry-pi&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.elasticbyte.net&#x2F;setting-up-a-native-cisco-ipsec...</a>
评论 #14435773 未加载
评论 #14436540 未加载
adampiealmost 8 years ago
Running it with Pi-Hole (<a href="https:&#x2F;&#x2F;pi-hole.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pi-hole.net&#x2F;</a>) makes it a pretty sweet set up.
tonysdgalmost 8 years ago
How much extra security does this actually provide over a subscription-based VPN service? I mean, yeah, I control the physical hardware (assuming my apartment doesn&#x27;t get busted in), but it means I have to make sure everything is configured properly&#x2F;patched&#x2F;etc. Is it really worth all that extra effort? I&#x27;m legitimately curious here.
评论 #14437192 未加载
equaluniquealmost 8 years ago
I built my own IPSec IKEv2 VPN using OpenBSD 6 and a BeagleBone Black. It worked really well and I would do it again. It replaced a FreeBSD 11 Raspberry Pi Model B which had only been doing NAT and VLANs. Never ran into issues with either. I do prefer the OpenBSD pf syntax as well as the ease with which OpenBSD facilitates IKEv2.
MickelCalmost 8 years ago
<a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2017&#x2F;05&#x2F;how-to-build-your-own-vpn-if-youre-rightfully-wary-of-commercial-options&#x2F;?comments=1" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2017&#x2F;05&#x2F;how-to-build-your-ow...</a> here is a guide on building you own vpn. If you are unable to built it then use a paid vpn service. Ivacy vpn is the right option which is cheap and effective.
akosteralmost 8 years ago
A quick setup script for raspbian: <a href="http:&#x2F;&#x2F;www.pivpn.io&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.pivpn.io&#x2F;</a>
cmsimikealmost 8 years ago
I&#x27;ve been using PiVPN[0], which sets up a VPN server for you, but also wraps a lot of the admin commands (creation and revocation of certs, for instance) in easier-to-remember commands.<p>[0] <a href="http:&#x2F;&#x2F;www.pivpn.io&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.pivpn.io&#x2F;</a>
评论 #14435453 未加载
qrbLPHiKpiuxalmost 8 years ago
Am I correct that some security experts don&#x27;t necessarily trust open vpn because of its reliance on TLS?
评论 #14435590 未加载
ex3ndralmost 8 years ago
Does anyone know VPN service (NOT self-hosted server) that could help establish small private networks for multiple PCs without public IP? Right now i should to setup OpenVPN in DigitalOcean, but i really prefer to pay for service here.
mercoraalmost 8 years ago
Does someone know how much bandwidth this is able to handle?
评论 #14435203 未加载
__ddd__almost 8 years ago
Came to say that case is sweet.