NOTE: Server domain name: lt.fuckrkn1.xyz | RU-config server domain name: ru.fuckrkn1.xyz
Instructions
Download vpnclient.p12 file to your device.
Download ikev2_config_import.cmd file and put it in the same folder as
vpnclient.p12 file.
Right-click on the file ikev2_config_import.cmd, select Properties. Click on
Unblock at the
bottom, then click on OK.
Right-click on the file ikev2_config_import.cmd, select Run as administrator.
After these steps, a terminal window will open.
Choose the VPN client name (or just press Enter, it will choose the file's name)
Enter domain name of the server - lt.fuckrkn1.xyz
Choose the VPN connection name (or just press Enter, script will choose default name)
Press any key to finish script. To connect to the VPN: Right-click on the
wireless/network icon
in your system tray, open settings, go to the VPN, select the new entry, and click
Connect.
Next, securely transfer the generated .p12 file from the repository to your Linux computer.
After
that, extract the CA certificate, client certificate and private key. Replace vpnclient.p12
in the
example below with the name of your .p12 file.
# Example: Extract CA certificate, client certificate and private key.
# You may delete the .p12 file when finished.
# Note: You may need to enter the import password, which can be found
# in the output of the IKEv2 helper script. If the output does not
# contain an import password, press Enter to continue.
openssl pkcs12 -in vpnclient.p12 -cacerts -nokeys -out ikev2vpnca.cer
openssl pkcs12 -in vpnclient.p12 -clcerts -nokeys -out vpnclient.cer
openssl pkcs12 -in vpnclient.p12 -nocerts -nodes -out vpnclient.key
rm vpnclient.p12
# (Important) Protect certificate and private key files
# Note: This step is optional, but strongly recommended.
sudo chown root.root ikev2vpnca.cer vpnclient.cer vpnclient.key
sudo chmod 600 ikev2vpnca.cer vpnclient.cer vpnclient.key
Instructions
Go to Settings -> Network -> VPN. Click the + button.
Select IPsec/IKEv2 (strongswan).
Enter anything you like in the Name field.
In the Gateway (Server) section, enter Your VPN Server IP (or DNS name) for
the Address. / you can find it
here.
Select the ikev2vpnca.cer file for the Certificate.
In the Client section, select
Certificate(/private key) in the Authentication drop-down menu.
Select Certificate/private key in the
Certificate drop-down menu (if exists).
Select the vpnclient.cer file for the
Certificate (file).
Select the vpnclient.key file for the
Private key.
In the Options section, check the
Request an inner IP address checkbox.
In the Cipher proposals (Algorithms) section, check the
Enable custom proposals checkbox.
Leave the IKE field blank .
Enter aes128gcm16 in the ESP field.
Click Add to save the VPN connection information.
Turn the VPN switch ON.
Oculus
Instructions
In order to install applications, you need to activate developer mode on Oculus
Quest 2
(see activation guide here).
After this step you can install third-party applications (i.e. sideloading). Then you need to
transfer vpnclient.sswan
to your device (the process of installation is the same as on Android).
This can be done via internal browser or by using adb. Download the file to your PC, then
push it to the device:
adb push vpnclient.sswan /sdcard/
The next step is strong swan installation. Download apk from here and install it with the next
command: adb install -g -r strongSwan-2.3.3.apk
Unfortunately, the built-in file manager is quite truncated, so when you click on import vpn
profile nothing will happen (that’s why strong swan is installed via adb). Therefore, a
couple of additional steps need to be taken.
Download any decent file manager (I personally use Mixplorer) and install it with
the command:
adb install -g -r mixplorer.apk
Put on your VR headset and repeat the remaining steps as when installing on android.
Now when you click on import VPN profile Mixplorer will be used to navigate and select a
file.