Coder Social home page Coder Social logo

hackplayers / 4nonimizer Goto Github PK

View Code? Open in Web Editor NEW
608.0 59.0 191.0 2.81 MB

A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)

License: GNU General Public License v3.0

Shell 100.00%

4nonimizer's Introduction

4nonimizer logo

If you like the 4nonimizer, please help us with whatever you want!

Donate

What is 4nonimizer?

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.

This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.

Since version 1.06 the dns resolution requests are done throught DnsCrypt (enable and disable with option enable_dns or disable_dns)

Since version 1.12 the logs of connections vpn saved in sqlite in /logs/

Attention VPN Providers!

If you are a provider, you support OpenVPN and want your VPN to be integrated into 4nonimizer contact the developers at hackplayers @ ymail.com.

Installation

Download the repo using git, execute the command ./4nonimizer install in the directory, and follow the screen instructions, 4nonimizer will move to the directory /opt/ and installed as a service.

This script has full compatibility with Kali Linux, although it has been properly tested and should also work on other distributions like Debian, Ubuntu and Arch (Manjaro). However there could be some bugs, or unexpected performances (please comments if you find any!).

Options

Once installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters:

       ___                   _           _
      /   |                 (_)         (_)
     / /| |_ __   ___  _ __  _ _ __ ___  _ _______ _ __
    / /_| | '_ \ / _ \| '_ \| | '_  ` _ | |_  / _ \ '__|
    \___  | | | | (_) | | | | | | | | | | |/ /  __/ |
        |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_|
                                       By Carlos Antonini & Vicente Motos
                                       Version: 1.06-beta

Usage: 4nonymizer <parameter>
     install: Install the script in run services
     uninstall: Disable run service and remove app directory
     change_provider: Change VPN Provider
     change_ip: Change IP from VPN current
     vpn_status: Check IP and provider VPN running
     update_vpns: Update all ovpn of VPNs
     start: Init the 4nonimizer service
     stop: Stop the 4nonimizer service
     stop_nonet: Stop the 4nonimizer service and shutdown network interfaces
     restart: Restart the 4nonimizer service
     update_app: Update this program via git
     privoxy: Install and configure privoxy with port 8118 (BETA)
     proxychains4: Install and configure proxychains4 for default in the system
     browser: Fire up a firefox browser with profile privoxy -> tor
     test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable
     location: Now you can select a specific country or continent of the vpn peer
     enableboot: You can enable service in boot
     disableboot: You can disable service in boot
     enable_dnscrypt: Enable dnscrypt service
     disable_dnscrypt: Disable dnscrypt service

     help: Help (this screen)

Available VPNs

Currently it supports the following VPN providers:

- 7Proxies https://www.7proxies.com/

- AirVPN https://airvpn.org/

- Cryptostorm https://cryptostorm.is/

- Cyberghost https://www.cyberghostvpn.com/en_US/

- ExpressVPN https://www.expressvpn.com

- FreeVPN https://freevpn.me/

- HideMyAss https://www.hidemyass.com/

- IpPVanish https://www.ipvanish.com/

- NordVPN https://nordvpn.com

- PIA https://www.privateinternetaccess.com/

- ProntonVPN https://protonvpn.com/

- Proxy.sh https://proxy.sh/

- SlickVPN https://www.slickvpn.com

- StrongVPN https://strongvpn.com/

- TorGuard https://torguard.net/

- TunnelBear https://www.tunnelbear.com/

- VPNBook (por defecto) http://www.vpnbook.com/

- VPNGate http://www.vpngate.net/en/

- VPNKeys https://www.vpnkeys.com/

- VPNMe https://www.vpnme.me/

- Vyprvpn https://www.goldenfrog.com/es/vyprvpn

Install a new VPN

To install an additional vpn we have to use the following structure in order to the 4nonimizer be able to integrate and perform operations with it.

First, we have to create the following dir structure /vpn/ within 4nonimizer path:

Alt text

In our example we create the folder /vpntest/ and within it placed all .ovpn files we have. If the files ovpn not have the certificate within each of them we put in the same folder as shown in the example certificate.crt.

In addition, we must place a file named pass.txt containing 2 lines: the first one with the username and the second one with the password, as shown below:

Alt text

If we have correctly performed all steps when we execute the command 4nonimizer change_provider the menu will show our vpn:

Alt text

As you can see in the picture, option [7] it is the vpn we've created.

Getting credencials and ovpn files automatically

If the VPN provider allows automation of credential and/or .ovpn files getting, 4nonimizer has standardized the following scripts names and locations:

- /opt/4nonimizer/vpn/provider/vpn-get-pass.sh

Alt text

- /opt/4nonimizer/vpn/provider/vpn-get-ovpn.sh

Alt text

4nonimizer automatically detect the presence of both scripts and indicate (Auto-pass Login) or (Auto-get OVPN) if it finds in the first line of each file the expression '#4uto' or '#m4nual' depending on the performed actions.

Alt text

Extras

- Execute 'source 4nonimizer' to activate autocompletation of parameters.
- Copy .conkyrc in your home directory to load a 4nonimizer template and execute conky.

References

- http://www.hackplayers.com/2016/08/tuto-enmascarar-ip-linux-vpn-tor.html
- http://www.hackplayers.com/2016/10/4nonimizer-un-script-para-anonimizar-ip.html
- http://www.redeszone.net//2016/10/07/4nonimizer-te-permitira-automatizar-la-conexion-diferentes-vpn-anonimizar-ip/
- http://www.kitploit.com/2016/10/4nonimizer-bash-script-for-anonymizing_10.html
- https://www.digitalmunition.me/2016/10/4nonimizer-bash-script-anonymizing-public-ip-managing-connection-tor-different-vpns-providers/

Videos

- Instalar 4nonimizer Kali Linux https://www.youtube.com/watch?v=FQRuRmMkcDg
- 4nonimizer Navegando de manera segura VPN (Kali Linux 2016.2) https://www.youtube.com/watch?v=6GApaN7fSn8
- devenir anonyme sur kali linux (4nonimizer) https://www.youtube.com/watch?v=Y3puD1Bw3xA
- Anonymizer - How To Hide Your IP address on Kali Linux 2016.2 (Change IP) https://www.youtube.com/watch?v=MNdQD0DCG0A
- Become Anonymous on kali linux 2016.2 https://www.youtube.com/watch?v=IFnhm-rrnEg
- Auto Hide IP with 4nonimizer on KALI Linux 2017 https://www.youtube.com/watch?v=HgqZCm8Wdvw
- Kali Linux - 4nonimizer | Surf Anonymously https://www.youtube.com/watch?v=_mOUQBv4sWs

Versions

Number codename date
1.00-beta .bye-world! 5/10/2016
1.02-beta .evol-time 11/10/2016
1.03-beta .using-latin-i 17/10/2016
1.04-beta .locateit 22/12/2016
1.05-beta .encrypting 03/01/2017
1.06-beta .1st-trial 18/01/2017
1.07-beta .noname 03/05/2017
1.08-beta .falcon 15/08/2017
1.09-beta .rabbit 09/11/2017
1.10 .fresh_air 27/02/2018
1.11 .shhh 17/05/2018
1.12 .sqliting 18/05/2018

¡4nonimize the world!

TODO

- migrate to Python and make the tool multiplatform
- make the code cleaner and more versatile
- save the logs in a bd sqlite
- standardize the names of the ovpn files: read the IP (remote line), get the country and rename the ovpn file accordingly


SPANISH TRANSLATION


4nonimizer logo

Te gusta 4nonimizer, por favor ayudanos con lo que quieras!

Donate

¿Que es 4nonimizer?

Es un script en bash cuyo objetivo es anonimizar (de momento) la IP pública con la que salimos a Internet mediante la gestión del proceso de conexión a TOR y a distintos proveedores VPNs (OpenVPN), ya sean gratuitos o de pago. Por defecto incluye preconfiguradas varias VPN automatizando la conexión a distintos peers y la descarga de credenciales correspondientes (si el proveedor lo soporta). Además por defecto registra en ficheros logs la IP que usamos cada 300 segundos.

Este script se habilita como servicio en sistemas systemd y levanta la vpn por defecto (VPNBook) en el inicio del sistema.

Desde la version 1.06 las resoluciones DNS se hacen a través de DnsCrypt (habilitarlo y desabilitarlo con la opcion enable_dns o disable_dns).

Desde la versión 1.12 los registros de las conexiones vpn se guardan en sqlite en /logs/

¡Atención proveedores de VPN!

Si eres un proveedor, soportas OpenVPN y quieres que tu VPN sea integrada en 4nonimizer contacta con los desarroladores en hackplayers @ ymail.com.

Instalación

Descargar el repositorio mediante git , ejecutar la instruccion ./4nonimizer install dentro del directorio, y seguir las intrucciones por pantalla, 4nonimizer se moverá al directorio /opt/ y se instalará como servicio.

Este script tiene compatibilidad completa con Kali Linux, aunque ha sido probado y debería funcionar correctamente también en otras distribuciones como Debian, Ubuntu y Arch (Manjaro). No obstante podrían darse algunos bugs, o funcionamientos inesperados (¡por favor, comenta si encuentras alguno!).

Opciones

Una vez instalado 4nonimizer, introduce el comando 4nonimizer help para obtener la ayuda, la cual nos muestra todos los parámetros disponibles:

Once installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters:

       ___                   _           _
      /   |                 (_)         (_)
     / /| |_ __   ___  _ __  _ _ __ ___  _ _______ _ __
    / /_| | '_ \ / _ \| '_ \| | '_  ` _ | |_  / _ \ '__|
    \___  | | | | (_) | | | | | | | | | | |/ /  __/ |
        |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_|
                                       By Carlos Antonini & Vicente Motos
                                       Version: 1.06-beta

Usage: 4nonymizer <parameter>
     install: Install the script in run services
     uninstall: Disable run service and remove app directory
     change_provider: Change VPN Provider
     change_ip: Change IP from VPN current
     vpn_status: Check IP and provider VPN running
     update_vpns: Update all ovpn of VPNs
     start: Init the 4nonimizer service
     stop: Stop the 4nonimizer service
     stop_nonet: Stop the 4nonimizer service and shutdown network interfaces
     restart: Restart the 4nonimizer service
     update_app: Update this program via git
     privoxy: Install and configure privoxy with port 8118 (BETA)
     proxychains4: Install and configure proxychains4 for default in the system
     browser: Fire up a firefox browser with profile privoxy -> tor
     test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable
     location: Now you can select a specific country or continent of the vpn peer      enableboot: You can enable service in boot
     disableboot: You can disable service in boot      *enable_dnscrypt: Enable dnscrypt service
     disable_dnscrypt: Disable dnscrypt service
     help: Help (this screen)

VPNs disponibles

Actualmente se soportan los siguientes proveedores VPN:

- 7Proxies https://www.7proxies.com/

- AirVPN https://airvpn.org/

- Cryptostorm https://cryptostorm.is/

- Cyberghost https://www.cyberghostvpn.com/en_US/

- ExpressVPN https://www.expressvpn.com

- FreeVPN https://freevpn.me/

- HideMyAss https://www.hidemyass.com/

- IpPVanish https://www.ipvanish.com/

- NordVPN https://nordvpn.com

- PIA https://www.privateinternetaccess.com/

- ProntonVPN https://protonvpn.com/

- Proxy.sh https://proxy.sh/

- SlickVPN https://www.slickvpn.com

- StrongVPN https://strongvpn.com/

- TorGuard https://torguard.net/

- TunnelBear https://www.tunnelbear.com/

- VPNBook (por defecto) http://www.vpnbook.com/

- VPNGate http://www.vpngate.net/en/

- VPNKeys https://www.vpnkeys.com/

- VPNMe https://www.vpnme.me/

- Vyprvpn https://www.goldenfrog.com/es/vyprvpn

Instalar una nueva VPN

Para poder instalar una vpn adicional tendremos que tener en cuenta la siguiente estructura para que 4nonimizer la integre en el script y pueda realizar operaciones con ella.

Lo primero, deberemos de crear la siguiente estructura en la carpeta /vpn/ dentro de la ruta de 4nonimizer:

Alt text

En nuestro ejemplo creamos la carpeta /vpntest/ y dentro de ella colocamos todos los .ovpn que dispongamos. En caso de que los ficheros ovpn no tuvieran el certificado dentro de cada uno de ellos lo deberemos poner en la misma carpeta como se muestra en el ejemplo certificate.crt.

Además de todo ésto deberemos de colocar un fichero llamado pass.txt que contenga 2 líneas: en la primera el usuario y en la segunda la contraseña, como se muestra a continuación:

Alt text

Si hemos realizado correctamente todos los pasos cuando escribamos el comando 4nonimizer change_provider nos deberá de mostrar nuestra vpn :

Alt text

Como se puede apreciar en la imagen la opcion [7] es la vpn que hemos creado.

Automatización de la obtención de credenciales y ficheros ovpn

Si el proveedor correspondiente permite la automatización de la obtención de credenciales y/o ficheros .ovpn, 4nonimizer tiene normalizado que los scripts correspondientes tengan la ubicación y nombres siguientes:

- /opt/4nonimizer/vpn/provider/vpn-get-pass.sh

Alt text

- /opt/4nonimizer/vpn/provider/vpn-get-ovpn.sh

Alt text

4nonimizer automáticamente detectará la presencia de ambos scripts e indicará (Auto-pass Login) o (Auto-get OVPN) si encuentra en la primera linea de cada fichero la expresión "4uto' o 'm4nual' dependiendo de la función que realicen.

Alt text

Extras

- Ejecuta 'source 4nonimizer' para habilitar el autocompletado de parámetros.
- Copia .conkyrc en tu directorio home para cargar la plantila de 4nonimizer y ejecuta conky.

Referencias

- http://www.hackplayers.com/2016/08/tuto-enmascarar-ip-linux-vpn-tor.html
- http://www.hackplayers.com/2016/10/4nonimizer-un-script-para-anonimizar-ip.html
- http://www.redeszone.net//2016/10/07/4nonimizer-te-permitira-automatizar-la-conexion-diferentes-vpn-anonimizar-ip/
- http://www.kitploit.com/2016/10/4nonimizer-bash-script-for-anonymizing_10.html
- https://www.digitalmunition.me/2016/10/4nonimizer-bash-script-anonymizing-public-ip-managing-connection-tor-different-vpns-providers/

Videos

- Instalar 4nonimizer Kali Linux https://www.youtube.com/watch?v=FQRuRmMkcDg
- 4nonimizer Navegando de manera segura VPN (Kali Linux 2016.2) https://www.youtube.com/watch?v=6GApaN7fSn8
- devenir anonyme sur kali linux (4nonimizer) https://www.youtube.com/watch?v=Y3puD1Bw3xA
- Anonymizer - How To Hide Your IP address on Kali Linux 2016.2 (Change IP) https://www.youtube.com/watch?v=MNdQD0DCG0A
- Become Anonymous on kali linux 2016.2 https://www.youtube.com/watch?v=IFnhm-rrnEg
- Auto Hide IP with 4nonimizer on KALI Linux 2017 https://www.youtube.com/watch?v=HgqZCm8Wdvw
- Kali Linux - 4nonimizer | Surf Anonymously https://www.youtube.com/watch?v=_mOUQBv4sWs

Versiones

Number codename date
1.00-beta .bye-world! 5/10/2016
1.02-beta .evol-time 11/10/2016
1.03-beta .using-latin-i 17/10/2016
1.04-beta .locateit 22/12/2016
1.05-beta .encrypting 03/01/2017
1.06-beta .1st-trial 18/01/2017
1.07-beta .noname 03/05/2017
1.08-beta .falcon 15/08/2017
1.09-beta .rabbit 09/11/2017
1.10 .fresh_air 27/02/2018
1.11 .shhh 17/05/2018
1.12 .sqliting 18/05/2018

¡4nonimiza el mundo!

TODO

- migrar a Python y hacer la herramienta multiplataforma
- hacer el código más limpio y versátil
- guardar los logs en una bd sqlite
- estandarizar los nombres de los ficheros ovpn: leer la ip o el fqdn de la linea remote, obtener el país y renombrar el fichero ovpn en consecuencia
- forzar la resoluciób DNS a través del túnel VPN

4nonimizer's People

Contributors

charly837 avatar doomedraven avatar nestlefox avatar vay3t avatar vmotos avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

4nonimizer's Issues

4nonimizer - Logout/Signout

Hi,

when I'm starting the 4nonimizer over the terminal with:
cmd> 4nonimizer start

it logs me out. When it tries to connect with a VPN it instantly kicks me off and i've to relog. I can't find a solution to this. I never had this kind of issue but I recently updated my OS to Kali Linux 2017.2 and that's when the issue started. After the relog I've to restart the Network-manager because it goes down.

Greets.

Error al no encontrar fichero vpn

tras hacer un update_vpns y luego realizar un test_availability esto borra muchas de las vpn que anteriormente descargo. el caso es que cuando realizas el start te da un error por que no encuentra los ficheros vpn.

Ubuntu 16.04 /opt/

There are no files in the /opt folder and I can't use the 4nonimizer command

[SOLVED]: dig: couldn't get address for 'resolver1.opendns.com': not found

UPDATE: [SOLVED]:

a) There was the damm network-manager started so I stop the service.
b) For a strange reason my computer was not able to reach the DNS's listed below in my resolv.conf file. I just changed to google DNS's and now it's working perfectly.

Just executing the script for the first time and getting this in a Kali Linux (Linux olv 4.0.0-kali1-amd64 #1 SMP Debian 4.0.4-1+kali2 (2015-06-03) x86_64 GNU/Linux)

Looks like dig can not resolve that host.
Any suggestion?

Thanks in advance.

i wanna kow y ye handycaps say it works all vpns

well after running true he script i seen that ye only it set to vpnbook and the other ones are all just for show as i toke my laptop of like all vpns updated apart from vpn book so hackplayers why make a peace shit script

NO CONNECT

sorry guy,
i have this problem but i don't find solution, don't understand.
Please can you help me?

[+] There is a problem starting openvpn. Please, check nohup.out for details

Sun Jun 4 13:23:43 2017 WARNING: file 'pass.txt' is group or others accessible
Sun Jun 4 13:23:43 2017 OpenVPN 2.4.0 [git:master/d73f7253d939e293+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 22 2017
Sun Jun 4 13:23:43 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
Sun Jun 4 13:23:49 2017 ERROR: Failed retrieving username or password
Sun Jun 4 13:23:49 2017 Exiting due to fatal error
Sun Jun 4 13:24:05 2017 WARNING: file 'pass.txt' is group or others accessible
Sun Jun 4 13:24:05 2017 OpenVPN 2.4.0 [git:master/d73f7253d939e293+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 22 2017
Sun Jun 4 13:24:05 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08

Package geoip-bin not in Arch Repo

The package is just called geoip in arch. I was able to fix it myself. but for other users you should consider to modify the packages giving to pacman.

change the line 199 of the current build from:
pacman -S --noconfirm geoip-bin geoip-database curl whois openvpn easy-rsa proxychains-ng tor bzip2 nmap dos2unix unzip dnscrypt-proxy sqlite3

to:
pacman -S --noconfirm geoip geoip-database curl whois openvpn easy-rsa proxychains-ng tor bzip2 nmap dos2unix unzip dnscrypt-proxy sqlite3

4nonimizer stop command

While using 4nonimizer stop command the 4nonimizer service still running in the background.

change_ip bug

when i tried to use change ip command it couldn't find *.ovpn after trying a lot of time different things on the script i found that the SHUF_OVPN variable is wrong so cause it has spaces and thats a problem for a variable :p but its also gets set before the other things that have to been set up already such is the path etc. I simply changed the SHUF_OVPN=$(ls *.ovpn | shuf -n 1 ) TO #SHUF_OVPN=$(ls *.ovpn | shuf -n 1 ) and cd /opt/4nonimizer/vpn/$(cat /opt/4nonimizer/4nonimizer | awk 'NR==67' | awk -F';' '{print $1}' | awk -F'/' '{print $5}')/ ; nohup openvpn $SHUF_OVPN 2&gt; /dev/null &amp; TO cd /opt/4nonimizer/vpn/$(cat /opt/4nonimizer/4nonimizer | awk 'NR==67' | awk -F';' '{print $1}' | awk -F'/' '{print $5}')/ ; nohup openvpn $(ls *.ovpn | shuf -n 1 ) 2> /dev/null & and now works perfect.

There is a problem starting openvpn. Please, check nohup.out for details

[+] There is a problem starting openvpn. Please, check nohup.out for details

Thu Jul 13 01:21:02 2017 TCP_CLIENT link local: (not bound)
Thu Jul 13 01:21:02 2017 TCP_CLIENT link remote: [AF_INET]176.126.237.217:80
Thu Jul 13 01:21:02 2017 TLS: Initial packet from [AF_INET]176.126.237.217:80, sid=77f0a2d2 6e6a06a4
Thu Jul 13 01:21:04 2017 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Thu Jul 13 01:21:04 2017 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Thu Jul 13 01:21:08 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jul 13 01:21:08 2017 [vpnbook.com] Peer Connection Initiated with [AF_INET]176.126.237.217:80
Thu Jul 13 01:21:10 2017 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Thu Jul 13 01:21:11 2017 AUTH: Received control message: AUTH_FAILED
Thu Jul 13 01:21:11 2017 SIGTERM[soft,auth-failure] received, process exiting
Thu Jul 13 02:02:28 2017 WARNING: file 'pass.txt' is group or others accessible
Thu Jul 13 02:02:28 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Thu Jul 13 02:02:28 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Thu Jul 13 02:02:28 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Jul 13 02:02:28 2017 NOTE: --fast-io is disabled since we are not using UDP
Thu Jul 13 02:02:28 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.193.233:80
Thu Jul 13 02:02:28 2017 Socket Buffers: R=[87380->87380] S=[16384->16384]
Thu Jul 13 02:02:28 2017 Attempting to establish TCP connection with [AF_INET]178.162.193.233:80 [nonblock]
Thu Jul 13 02:02:29 2017 TCP connection established with [AF_INET]178.162.193.233:80
Thu Jul 13 02:02:29 2017 TCP_CLIENT link local: (not bound)
Thu Jul 13 02:02:29 2017 TCP_CLIENT link remote: [AF_INET]178.162.193.233:80
Thu Jul 13 02:02:29 2017 TLS: Initial packet from [AF_INET]178.162.193.233:80, sid=4c3ff9e3 22540d5d
Thu Jul 13 02:02:29 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jul 13 02:02:30 2017 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Thu Jul 13 02:02:30 2017 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Thu Jul 13 02:02:34 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jul 13 02:02:34 2017 [vpnbook.com] Peer Connection Initiated with [AF_INET]178.162.193.233:80
Thu Jul 13 02:02:36 2017 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Thu Jul 13 02:02:36 2017 AUTH: Received control message: AUTH_FAILED
Thu Jul 13 02:02:36 2017 SIGTERM[soft,auth-failure] received, process exiting

VPN Book as default?

How did VPN Book end up as default when you could be using Cryptostorm?

Cryptostorm's free service is capped at 256k, but it's completely free.

https://github.com/cryptostorm/cryptostorm_client_configuration_files/tree/master/cryptofree

Paid Cryptostorm customers would be using the first Zero Customer Knowledge VPN. Show up in IRC, buy a token (proof of purchase) with Bitcoin, and there isn't any way you're being logged - Cryptostorm simply makes it a point to never collect enough information to do that in the first place.

Free is free, if developers shoot me a PM I can arrange for some free tokens so you guys can test the rest of the service, too.

AUTH_FAILED error

Hello, I'm using Ubuntu Budgie 17.10.

I install your script by sudo 4nonimizer install and update all vpn providers by sudo 4nonimizer update_vpns.
Then change provider to cryptostorm by sudo 4nonimizer change_provider and then start service by sudo 4nonimizer start.

But get this error:

There is a problem starting openvpn. Please, check nohup.out for details

Sun Feb 25 17:11:50 2018 us=989822 Current Parameter Settings:
Sun Feb 25 17:11:50 2018 us=989831   config = '/opt/4nonimizer/vpn/cryptostorm/cstorm_linux-lisbon_udp.ovpn'
Sun Feb 25 17:11:50 2018 us=989837   mode = 0
Sun Feb 25 17:11:50 2018 us=989842 NOTE: --mute triggered...
Sun Feb 25 17:11:50 2018 us=989854 349 variation(s) on previous 3 message(s) suppressed by --mute
Sun Feb 25 17:11:50 2018 us=989859 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul  3 2017
Sun Feb 25 17:11:50 2018 us=989869 library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
Sun Feb 25 17:11:50 2018 us=990025 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Sun Feb 25 17:11:50 2018 us=990196 LZO compression initializing
Sun Feb 25 17:11:50 2018 us=990254 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Feb 25 17:11:51 2018 us=174702 Data Channel MTU parms [ L:1622 D:1400 EF:122 EB:406 ET:0 EL:3 ]
Sun Feb 25 17:11:51 2018 us=174826 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Sun Feb 25 17:11:51 2018 us=174852 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Sun Feb 25 17:11:51 2018 us=174881 TCP/UDP: Preserving recently used remote address: [AF_INET]109.71.42.163:443
Sun Feb 25 17:11:51 2018 us=174927 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Feb 25 17:11:51 2018 us=174950 UDP link local: (not bound)
Sun Feb 25 17:11:51 2018 us=174971 UDP link remote: [AF_INET]109.71.42.163:443
Sun Feb 25 17:11:51 2018 us=384890 TLS: Initial packet from [AF_INET]109.71.42.163:443, sid=092bbbaa c3b7b0aa
Sun Feb 25 17:11:51 2018 us=385091 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Feb 25 17:11:51 2018 us=702412 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite /  cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, [email protected]
Sun Feb 25 17:11:51 2018 us=702926 VERIFY OK: nsCertType=SERVER
Sun Feb 25 17:11:51 2018 us=702962 VERIFY OK: depth=0, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite /  cryptostorm_darknet, OU=Tech Ops, CN=server, [email protected]
Sun Feb 25 17:11:52 2018 us=260966 NOTE: --mute triggered...
Sun Feb 25 17:11:52 2018 us=261073 1 variation(s) on previous 3 message(s) suppressed by --mute
Sun Feb 25 17:11:52 2018 us=261100 [server] Peer Connection Initiated with [AF_INET]109.71.42.163:443
Sun Feb 25 17:11:53 2018 us=278328 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Feb 25 17:11:53 2018 us=484761 AUTH: Received control message: AUTH_FAILED
Sun Feb 25 17:11:53 2018 us=484838 SIGTERM received, sending exit notification to peer
Sun Feb 25 17:11:56 2018 us=536502 TCP/UDP: Closing socket
Sun Feb 25 17:11:56 2018 us=536599 SIGTERM[soft,exit-with-notification] received, process exiting

and also pass.txt is: (Placed in /opt/4nonimizer/vpn/cryptostorm/pass.txt)

manual
manual

Note:

An other error is that script doesn't update all provider and freeze on updating hidemyass provider.

Thanks for script,
Sorry for my English mistakes!

There is a problem starting openvpn. Please, check nohup.out for details (in using 4nonimizer)

[+] There is a problem starting openvpn. Please, check nohup.out for details

Thu Oct 26 10:12:27 2017 WARNING: file 'pass.txt' is group or others accessible
Thu Oct 26 10:12:27 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Thu Oct 26 10:12:27 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Thu Oct 26 10:12:27 2017 Error reading username from Auth authfile: pass.txt
Thu Oct 26 10:12:27 2017 Exiting due to fatal error
Thu Oct 26 23:20:58 2017 WARNING: file 'pass.txt' is group or others accessible
Thu Oct 26 23:20:58 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Thu Oct 26 23:20:58 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Thu Oct 26 23:20:58 2017 Error reading username from Auth authfile: pass.txt
Thu Oct 26 23:20:58 2017 Exiting due to fatal error
Fri Oct 27 14:20:18 2017 WARNING: file 'pass.txt' is group or others accessible
Fri Oct 27 14:20:18 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Fri Oct 27 14:20:18 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Fri Oct 27 14:20:18 2017 Error reading username from Auth authfile: pass.txt
Fri Oct 27 14:20:18 2017 Exiting due to fatal error
Fri Oct 27 14:26:14 2017 WARNING: file 'pass.txt' is group or others accessible
Fri Oct 27 14:26:14 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Fri Oct 27 14:26:14 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Fri Oct 27 14:26:14 2017 Error reading username from Auth authfile: pass.txt
Fri Oct 27 14:26:14 2017 Exiting due to fatal error
Fri Oct 27 14:41:27 2017 WARNING: file 'pass.txt' is group or others accessible
Fri Oct 27 14:41:27 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Fri Oct 27 14:41:27 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Fri Oct 27 14:41:27 2017 Error reading username from Auth authfile: pass.txt
Fri Oct 27 14:41:27 2017 Exiting due to fatal error
Fri Oct 27 14:57:37 2017 WARNING: file 'pass.txt' is group or others accessible
Fri Oct 27 14:57:37 2017 OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jun 30 2017
Fri Oct 27 14:57:37 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Fri Oct 27 14:57:37 2017 Error reading username from Auth authfile: pass.txt
Fri Oct 27 14:57:37 2017 Exiting due to fatal error

Unable to connect

Everytime I start 4nonimizer it says There is a problem starting openvpn . When I first installed it , it was working fine but now it's giving problem even my anonsurf surf is not working now . I'm using ParrotSec OS . Please Help

plz help

cp: cannot stat '../4nonimizer': No such file or directory
'/usr/bin/4nonimizer' -> '/opt/4nonimizer/4nonimizer'
chmod: cannot access '/opt/4nonimizer/vpn//.sh': No such file or directory
cp: cannot stat '/opt/4nonimizer/4non.service': No such file or directory
chmod: cannot access '/etc/systemd/system/4non.service': No such file or directory
Synchronizing state of tor.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable tor
Failed to enable unit: Unit file /etc/systemd/system/tor.service is masked.
Failed to start tor.service: Unit tor.service is masked.
Failed to enable unit: Unit file 4non.service does not exist.

[+] Enter "A" if you want to update all vpn profiles, or wait 1 secs to update only the default one (VPNbook)...
[+] Obtaining Credentials and config files of default vpn (VpnBook)

./4nonimizer: line 231: cd: /opt/4nonimizer/vpn/vpnbook: No such file or directory
sed: can't read /opt/4nonimizer/vpn//.ovpn: No such file or directory
sed: can't read /opt/4nonimizer/vpn//.ovpn: No such file or directory

There is a problem starting openvpn. Please, check nohup.out for details

hello guyz can you please help me with 4nonimizer it installed fine but it wont change the ip it gives me this message :

[+] There is a problem starting openvpn. Please, check nohup.out for details

Mon Nov 5 14:00:49 2018 UDP link remote: [AF_INET]51.68.180.4:25000
Mon Nov 5 14:00:52 2018 TLS: Initial packet from [AF_INET]51.68.180.4:25000, sid=166c2d38 c66d2384
Mon Nov 5 14:00:52 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Nov 5 14:00:52 2018 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Mon Nov 5 14:00:52 2018 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Mon Nov 5 14:00:52 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Nov 5 14:00:52 2018 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.180.4:25000
Mon Nov 5 14:00:53 2018 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Mon Nov 5 14:00:53 2018 AUTH: Received control message: AUTH_FAILED
Mon Nov 5 14:00:53 2018 SIGTERM[soft,auth-failure] received, process exiting
Mon Nov 5 14:06:38 2018 WARNING: file 'pass.txt' is group or others accessible
Mon Nov 5 14:06:38 2018 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 30 2018
Mon Nov 5 14:06:38 2018 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
Mon Nov 5 14:06:38 2018 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Nov 5 14:06:38 2018 NOTE: --fast-io is disabled since we are not using UDP
Mon Nov 5 14:06:38 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.180.4:443
Mon Nov 5 14:06:38 2018 Socket Buffers: R=[1048576->1048576] S=[524288->524288]
Mon Nov 5 14:06:38 2018 Attempting to establish TCP connection with [AF_INET]51.68.180.4:443 [nonblock]
Mon Nov 5 14:06:39 2018 TCP connection established with [AF_INET]51.68.180.4:443
Mon Nov 5 14:06:39 2018 TCP_CLIENT link local: (not bound)
Mon Nov 5 14:06:39 2018 TCP_CLIENT link remote: [AF_INET]51.68.180.4:443
Mon Nov 5 14:06:40 2018 TLS: Initial packet from [AF_INET]51.68.180.4:443, sid=4afffbb2 2bc28598
Mon Nov 5 14:06:40 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Nov 5 14:06:40 2018 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Mon Nov 5 14:06:40 2018 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
Mon Nov 5 14:06:40 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Nov 5 14:06:40 2018 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.180.4:443
Mon Nov 5 14:06:41 2018 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Mon Nov 5 14:06:42 2018 AUTH: Received control message: AUTH_FAILED
Mon Nov 5 14:06:42 2018 SIGTERM[soft,auth-failure] received, process exiting

VPNBook

VPNBook authentication isn't working cause they changed the password section at their website and now the password is in image

No IP after start command

screenshot 2018-12-20 at 11 08 02

It looks like openvpn connection is successful but I am not getting a new IP address and I can not access the internet anymore until I stop the 4nonimizer. Any clues?
I am using Kali-Linux inside a VirtualBox with an Alfa Network dongle.

automated install

si en el comando apt-get install .... pudierais poner detrás -y haría que no estuvieses pendiente de ir dando a S y a Y para aceptar todo el tiempo.

No existe el archivo o el directorio

cp: no se puede efectuar stat' sobre '../4nonimizer': No existe el archivo o el directorio '/usr/bin/4nonimizer' -> '/opt/4nonimizer/4nonimizer' cp: no se puede efectuarstat' sobre '/opt/4nonimizer/4non.service': No existe el archivo o el directorio
chmod: no se puede acceder a '/opt/4nonimizer/vpn//.sh': No existe el archivo o el directorio
Synchronizing state of tor.service with SysV init with /lib/systemd/systemd-sysv-install...
Executing /lib/systemd/systemd-sysv-install enable tor
insserv: warning: current start runlevel(s) (empty) of script tor' overrides LSB defaults (2 3 4 5). insserv: warning: current stop runlevel(s) (0 1 2 3 4 5 6) of scripttor' overrides LSB defaults (0 1 6).

4nonimizer/4nonimizer: línea 206: cd: /opt/4nonimizer/vpn/vpnbook: No existe el archivo o el directorio
sed: no se puede leer /opt/4nonimizer/vpn//.ovpn: No existe el archivo o el directorio
sed: no se puede leer /opt/4nonimizer/vpn//.ovpn: No existe el archivo o el directorio

Ubuntu 16.04.2 xenial x64

Instalacion:
git clone https://github.com/Hackplayers/4nonimizer.git
sudo 4nonimizer/4nonimizer install

Update:
sudo 4nonimizer/4nonimizer start

[+] Starting 4nonimizer to hide your real IP...

sed: no se puede leer /opt/4nonimizer/vpn//.ovpn: No existe el archivo o el directorio
sed: no se puede leer /opt/4nonimizer/vpn//.ovpn: No existe el archivo o el directorio
./4nonimizer/4nonimizer: línea 73: cd: /opt/4nonimizer/vpn/vpnbook/: No existe el archivo o el directorio
ls: no se puede acceder a '*.ovpn': No existe el archivo o el directorio
..............................�[3;J

[+] There is a problem starting openvpn. Please, check nohup.out for details

cat: /opt/4nonimizer/4nonimizer: No existe el archivo o el directorio
tail: no se puede abrir '/opt/4nonimizer/vpn//nohup.out' para lectura: No existe el archivo o el directorio

there is a problem starting ovpn check nogup.out for details

i installed 4nonimizer and i started it, i ried change different providers, i updated it, but i still get this type of error when i tri to start...it was the best vpn i could find, pleas let's fix this
Starting 4nonimizer to hide your real IP...

..............................

[+] There is a problem starting openvpn. Please, check nohup.out for details

Sat May 27 14:45:42 2017 Exiting due to fatal error
Sat May 27 14:47:59 2017 WARNING: file 'pass.txt' is group or others accessible
Sat May 27 14:47:59 2017 OpenVPN 2.4.0 [git:master/de39933a5c67a449+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 11 2017
Sat May 27 14:47:59 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
Sat May 27 14:49:29 2017 ERROR: Failed retrieving username or password
Sat May 27 14:49:29 2017 Exiting due to fatal error
Sat May 27 17:20:45 2017 WARNING: file 'pass.txt' is group or others accessible
Sat May 27 17:20:45 2017 OpenVPN 2.4.0 [git:master/de39933a5c67a449+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 11 2017
Sat May 27 17:20:45 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
Sat May 27 17:21:12 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]154.70.152.210:553
Sat May 27 17:21:12 2017 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sat May 27 17:21:12 2017 UDP link local: (not bound)
Sat May 27 17:21:12 2017 UDP link remote: [AF_INET]154.70.152.210:553
Sat May 27 17:21:13 2017 TLS: Initial packet from [AF_INET]154.70.152.210:553, sid=69e777bd bd3029fc
Sat May 27 17:21:13 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat May 27 17:21:15 2017 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=[email protected]
Sat May 27 17:21:15 2017 VERIFY OK: nsCertType=SERVER
Sat May 27 17:21:15 2017 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=[email protected]
Sat May 27 17:21:28 2017 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1558'
Sat May 27 17:21:28 2017 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Sat May 27 17:21:28 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat May 27 17:21:28 2017 [server] Peer Connection Initiated with [AF_INET]154.70.152.210:553
Sat May 27 17:21:29 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sat May 27 17:21:30 2017 AUTH: Received control message: AUTH_FAILED
Sat May 27 17:21:30 2017 SIGTERM[soft,auth-failure] received, process exiting
Options error: I'm trying to parse "/opt/4nonimizer/vpn/tunnelbear/TunnelBear" as an --option parameter but I don't see a leading '--'
Use --help for more information.
Sun May 28 11:47:29 2017 WARNING: file 'pass.txt' is group or others accessible
Sun May 28 11:47:29 2017 OpenVPN 2.4.0 [git:master/de39933a5c67a449+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 11 2017
Sun May 28 11:47:29 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08

How to install it on antergos or arch linux?

./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 178: lsb_release: command not found
./4nonimizer: line 178: [: =: unary operator expected
./4nonimizer: line 183: lsb_release: command not found
./4nonimizer: line 183: [: =: unary operator expected
./4nonimizer: line 183: lsb_release: command not found
./4nonimizer: line 183: [: =: unary operator expected

[*] Your distro is not supported

:D i hope i can install it on my antergos.

Ubuntu 14.04 systemctl error

cp: ‘../4nonimizer’ and ‘/opt/4nonimizer’ are the same file
‘/usr/bin/4nonimizer’ -> ‘/opt/4nonimizer/4nonimizer’
./4nonimizer: line 206: systemctl: command not found
./4nonimizer: line 207: systemctl: command not found
./4nonimizer: line 208: systemctl: command not found

Ubuntu 14.04 uses Upstart instead of Systemd. It didn't seem to cause install problems. FYI

No added vpn Shown

I added a new vpn folder in VPN folder of 4nonmizer directory, however Its not shown once Change_vpn is used

Problem starting 4nonimizer

Hi , I have this problem starting 4nonimizer , I am using Kali linux 2017

+] Your current IP is ...

[+] Starting 4nonimizer to hide your real IP...

sed: can't read /opt/4nonimizer/vpn/vpnbook/.ovpn: No such file or directory
ls: cannot access '/opt/4nonimizer/vpn/vpnbook/
.ovpn': No such file or directory
..............................

[+] There is a problem starting openvpn. Please, check nohup.out for details

--pkcs11-pin-cache seconds : Number of seconds to cache PIN. The default is -1
cache until token is removed.
--pkcs11-id-management : Acquire identity from management interface.
--pkcs11-id serialized-id 'id' : Identity to use, get using standalone --show-pkcs11-ids

SSL Library information:
--show-ciphers : Show cipher algorithms to use with --cipher option.
--show-digests : Show message digest algorithms to use with --auth option.
--show-engines : Show hardware crypto accelerator engines (if available).
--show-tls : Show all TLS ciphers (TLS used only as a control channel).

Generate a random key (only for non-TLS static key encryption mode):
--genkey : Generate a random key to be used as a shared secret,
for use with the --secret option.
--secret file : Write key to file.

Tun/tap config mode (available with linux 2.4+):
--mktun : Create a persistent tunnel.
--rmtun : Remove a persistent tunnel.
--dev tunX|tapX : tun/tap device
--dev-type dt : Device type. See tunnel options above for details.
--user user : User to set privilege to.
--group group : Group to set privilege to.

PKCS#11 standalone options:
--show-pkcs11-ids provider [cert_private] : Show PKCS#11 available ids.
--verb option can be added BEFORE this.

General Standalone Options:
--show-gateway : Show info about default gateway.

What is the problem pls ???

Thnx in advance ;

There is a problem starting openvpn. Please, check nohup.out for details

[+] Starting 4nonimizer to hide your real IP...

..............................

[+] There is a problem starting openvpn. Please, check nohup.out for details

Sun Mar 25 07:57:32 2018 Attempting to establish TCP connection with [AF_INET]142.4.206.228:80 [nonblock]
Sun Mar 25 07:57:33 2018 TCP connection established with [AF_INET]142.4.206.228:80
Sun Mar 25 07:57:33 2018 TCP_CLIENT link local: (not bound)
Sun Mar 25 07:57:33 2018 TCP_CLIENT link remote: [AF_INET]142.4.206.228:80
Sun Mar 25 07:57:33 2018 TLS: Initial packet from [AF_INET]142.4.206.228:80, sid=46efdb87 c84eedb1
Sun Mar 25 07:57:33 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Mar 25 07:57:49 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Mar 25 07:57:49 2018 TLS Error: TLS handshake failed
Sun Mar 25 07:57:49 2018 Fatal TLS error (check_tls_errors_co), restarting
Sun Mar 25 07:57:49 2018 SIGUSR1[soft,tls-error] received, process restarting
Sun Mar 25 07:57:49 2018 Restart pause, 5 second(s)
Sun Mar 25 07:57:51 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Mar 25 07:57:51 2018 TLS Error: TLS handshake failed
Sun Mar 25 07:57:51 2018 SIGUSR1[soft,tls-error] received, process restarting
Sun Mar 25 07:57:51 2018 Restart pause, 5 second(s)
Sun Mar 25 07:57:54 2018 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Mar 25 07:57:54 2018 NOTE: --fast-io is disabled since we are not using UDP
Sun Mar 25 07:57:54 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]198.7.58.147:80
Sun Mar 25 07:57:54 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
Sun Mar 25 07:57:54 2018 Attempting to establish TCP connection with [AF_INET]198.7.58.147:80 [nonblock]
Sun Mar 25 07:57:55 2018 TCP connection established with [AF_INET]198.7.58.147:80
Sun Mar 25 07:57:55 2018 TCP_CLIENT link local: (not bound)
Sun Mar 25 07:57:55 2018 TCP_CLIENT link remote: [AF_INET]198.7.58.147:80
Sun Mar 25 07:57:55 2018 TLS: Initial packet from [AF_INET]198.7.58.147:80, sid=4e7b20b9 dbf3db00
Sun Mar 25 07:57:56 2018 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Mar 25 07:57:56 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.193.233:25000
Sun Mar 25 07:57:56 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Mar 25 07:57:56 2018 UDP link local: (not bound)
Sun Mar 25 07:57:56 2018 UDP link remote: [AF_INET]178.162.193.233:25000
Sun Mar 25 07:57:56 2018 TLS: Initial packet from [AF_INET]178.162.193.233:25000, sid=d6e06578 cfa9e6db

Problem installing 4nonimizer

I already clone it and have the directory in my root but when I hit the command:

4nonimizer install

this message shows up:

bash: /usr/bin/4nonimizer: No such file or directory

Help!

There is a problem starting openvpn. Please, check nohup.out for details

Buenas,

Me aparece ese error cuando hago un start. Al ver el fichero nohup esto es lo que aparece:

OpenVPN 2.4.0 [git:master/f5bf296bacce76a8+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 29 2016

General Options:
--config file   : Read configuration options from file.
--help          : Show options.
--version       : Show copyright and version information.

Tunnel Options:
--local host    : Local host name or ip address. Implies --bind.
--remote host [port] : Remote host name or ip address.
--remote-random : If multiple --remote options specified, choose one randomly.
--remote-random-hostname : Add a random string to remote DNS name.
--mode m        : Major mode, m = 'p2p' (default, point-to-point) or 'server'.
--proto p       : Use protocol p for communicating with peer.
                  p = udp (default), tcp-server, or tcp-client
--proto-force p : only consider protocol p in list of connection profiles.
                  p = udp6, tcp6-server, or tcp6-client (ipv6)
--connect-retry n [m] : For client, number of seconds to wait between
                  connection retries (default=5). On repeated retries
                  the wait time is exponentially increased to a maximum of m
                  (default=300).
--connect-retry-max n : Maximum connection attempt retries, default infinite.
--http-proxy s p [up] [auth] : Connect to remote host
                  through an HTTP proxy at address s and port p.
                  If proxy authentication is required,
                  up is a file containing username/password on 2 lines, or
                  'stdin' to prompt from console.  Add auth='ntlm' if
                  the proxy requires NTLM authentication.
--http-proxy s p 'auto[-nct]' : Like the above directive, but automatically
                  determine auth method and query for username/password
                  if needed.  auto-nct disables weak proxy auth methods.
--http-proxy-option type [parm] : Set extended HTTP proxy options.
                                  Repeat to set multiple options.
                  VERSION version (default=1.0)
                  AGENT user-agent
--socks-proxy s [p] [up] : Connect to remote host through a Socks5 proxy at
                  address s and port p (default port = 1080).
                  If proxy authentication is required,
                  up is a file containing username/password on 2 lines, or
                  'stdin' to prompt for console.
--socks-proxy-retry : Retry indefinitely on Socks proxy errors.
--resolv-retry n: If hostname resolve fails for --remote, retry
                  resolve for n seconds before failing (disabled by default).
                  Set n="infinite" to retry indefinitely.
--float         : Allow remote to change its IP address/port, such as through
                  DHCP (this is the default if --remote is not used).
--ipchange cmd  : Run command cmd on remote ip address initial
                  setting or change -- execute as: cmd ip-address port#
--port port     : TCP/UDP port # for both local and remote.
--lport port    : TCP/UDP port # for local (default=1194). Implies --bind.
--rport port    : TCP/UDP port # for remote (default=1194).
--bind          : Bind to local address and port. (This is the default unless
                  --proto tcp-client or --http-proxy or --socks-proxy is used).
--nobind        : Do not bind to local address and port.
--dev tunX|tapX : tun/tap device (X can be omitted for dynamic device.
--dev-type dt   : Which device type are we using? (dt = tun or tap) Use
                  this option only if the tun/tap device used with --dev
                  does not begin with "tun" or "tap".
--dev-node node : Explicitly set the device node rather than using
                  /dev/net/tun, /dev/tun, /dev/tap, etc.
--lladdr hw     : Set the link layer address of the tap device.
--topology t    : Set --dev tun topology: 'net30', 'p2p', or 'subnet'.
--iproute cmd   : Use this command instead of default /sbin/ip.
--ifconfig l rn : TUN: configure device to use IP address l as a local
                  endpoint and rn as a remote endpoint.  l & rn should be
                  swapped on the other peer.  l & rn must be private
                  addresses outside of the subnets used by either peer.
                  TAP: configure device to use IP address l as a local
                  endpoint and rn as a subnet mask.
--ifconfig-ipv6 l r : configure device to use IPv6 address l as local
                      endpoint (as a /64) and r as remote endpoint
--ifconfig-noexec : Don't actually execute ifconfig/netsh command, instead
                    pass --ifconfig parms by environment to scripts.
--ifconfig-nowarn : Don't warn if the --ifconfig option on this side of the
                    connection doesn't match the remote side.
--route network [netmask] [gateway] [metric] :
                  Add route to routing table after connection
                  is established.  Multiple routes can be specified.
                  netmask default: 255.255.255.255
                  gateway default: taken from --route-gateway or --ifconfig
                  Specify default by leaving blank or setting to "nil".
--route-ipv6 network/bits [gateway] [metric] :
                  Add IPv6 route to routing table after connection
                  is established.  Multiple routes can be specified.
                  gateway default: taken from 'remote' in --ifconfig-ipv6
--route-gateway gw|'dhcp' : Specify a default gateway for use with --route.
--route-metric m : Specify a default metric for use with --route.
--route-delay n [w] : Delay n seconds after connection initiation before
                  adding routes (may be 0).  If not specified, routes will
                  be added immediately after tun/tap open.  On Windows, wait
                  up to w seconds for TUN/TAP adapter to come up.
--route-up cmd  : Run command cmd after routes are added.
--route-pre-down cmd : Run command cmd before routes are removed.
--route-noexec  : Don't add routes automatically.  Instead pass routes to
                  --route-up script using environmental variables.
--route-nopull  : When used with --client or --pull, accept options pushed
                  by server EXCEPT for routes and dhcp options.
--allow-pull-fqdn : Allow client to pull DNS names from server for
                    --ifconfig, --route, and --route-gateway.
--redirect-gateway [flags]: Automatically execute routing
                  commands to redirect all outgoing IP traffic through the
                  VPN.  Add 'local' flag if both OpenVPN servers are directly
                  connected via a common subnet, such as with WiFi.
                  Add 'def1' flag to set default route using using 0.0.0.0/1
                  and 128.0.0.0/1 rather than 0.0.0.0/0.  Add 'bypass-dhcp'
                  flag to add a direct route to DHCP server, bypassing tunnel.
                  Add 'bypass-dns' flag to similarly bypass tunnel for DNS.
--redirect-private [flags]: Like --redirect-gateway, but omit actually changing
                  the default gateway.  Useful when pushing private subnets.
--client-nat snat|dnat network netmask alias : on client add 1-to-1 NAT rule.
--push-peer-info : (client only) push client info to server.
--setenv name value : Set a custom environmental variable to pass to script.
--setenv FORWARD_COMPATIBLE 1 : Relax config file syntax checking to allow
                  directives for future OpenVPN versions to be ignored.
--ignore-unkown-option opt1 opt2 ...: Relax config file syntax. Allow
                  these options to be ignored when unknown
--script-security level: Where level can be:
                  0 -- strictly no calling of external programs
                  1 -- (default) only call built-ins such as ifconfig
                  2 -- allow calling of built-ins and scripts
                  3 -- allow password to be passed to scripts via env
--shaper n      : Restrict output to peer to n bytes per second.
--keepalive n m : Helper option for setting timeouts in server mode.  Send
                  ping once every n seconds, restart if ping not received
                  for m seconds.
--inactive n [bytes] : Exit after n seconds of activity on tun/tap device
                  produces a combined in/out byte count < bytes.
--ping-exit n   : Exit if n seconds pass without reception of remote ping.
--ping-restart n: Restart if n seconds pass without reception of remote ping.
--ping-timer-rem: Run the --ping-exit/--ping-restart timer only if we have a
                  remote address.
--ping n        : Ping remote once every n seconds over TCP/UDP port.
--multihome     : Configure a multi-homed UDP server.
--fast-io       : (experimental) Optimize TUN/TAP/UDP writes.
--remap-usr1 s  : On SIGUSR1 signals, remap signal (s='SIGHUP' or 'SIGTERM').
--persist-tun   : Keep tun/tap device open across SIGUSR1 or --ping-restart.
--persist-remote-ip : Keep remote IP address across SIGUSR1 or --ping-restart.
--persist-local-ip  : Keep local IP address across SIGUSR1 or --ping-restart.
--persist-key   : Don't re-read key files across SIGUSR1 or --ping-restart.
--passtos       : TOS passthrough (applies to IPv4 only).
--tun-mtu n     : Take the tun/tap device MTU to be n and derive the
                  TCP/UDP MTU from it (default=1500).
--tun-mtu-extra n : Assume that tun/tap device might return as many
                  as n bytes more than the tun-mtu size on read
                  (default TUN=0 TAP=32).
--link-mtu n    : Take the TCP/UDP device MTU to be n and derive the tun MTU
                  from it.
--mtu-disc type : Should we do Path MTU discovery on TCP/UDP channel?
                  'no'    -- Never send DF (Don't Fragment) frames
                  'maybe' -- Use per-route hints
                  'yes'   -- Always DF (Don't Fragment)
--mtu-test      : Empirically measure and report MTU.
--fragment max  : Enable internal datagram fragmentation so that no UDP
                  datagrams are sent which are larger than max bytes.
                  Adds 4 bytes of overhead per datagram.
--mssfix [n]    : Set upper bound on TCP MSS, default = tun-mtu size
                  or --fragment max value, whichever is lower.
--sndbuf size   : Set the TCP/UDP send buffer size.
--rcvbuf size   : Set the TCP/UDP receive buffer size.
--mark value    : Mark encrypted packets being sent with value. The mark value
                  can be matched in policy routing and packetfilter rules.
--txqueuelen n  : Set the tun/tap TX queue length to n (Linux only).
--memstats file : Write live usage stats to memory mapped binary file.
--mlock         : Disable Paging -- ensures key material and tunnel
                  data will never be written to disk.
--up cmd        : Run command cmd after successful tun device open.
                  Execute as: cmd tun/tap-dev tun-mtu link-mtu \
                              ifconfig-local-ip ifconfig-remote-ip
                  (pre --user or --group UID/GID change)
--up-delay      : Delay tun/tap open and possible --up script execution
                  until after TCP/UDP connection establishment with peer.
--down cmd      : Run command cmd after tun device close.
                  (post --user/--group UID/GID change and/or --chroot)
                  (command parameters are same as --up option)
--down-pre      : Run --down command before TUN/TAP close.
--up-restart    : Run up/down commands for all restarts including those
                  caused by --ping-restart or SIGUSR1
--user user     : Set UID to user after initialization.
--group group   : Set GID to group after initialization.
--chroot dir    : Chroot to this directory after initialization.
--cd dir        : Change to this directory before initialization.
--daemon [name] : Become a daemon after initialization.
                  The optional 'name' parameter will be passed
                  as the program name to the system logger.
--syslog [name] : Output to syslog, but do not become a daemon.
                  See --daemon above for a description of the 'name' parm.
--inetd [name] ['wait'|'nowait'] : Run as an inetd or xinetd server.
                  See --daemon above for a description of the 'name' parm.
--log file      : Output log to file which is created/truncated on open.
--log-append file : Append log to file, or create file if nonexistent.
--suppress-timestamps : Don't log timestamps to stdout/stderr.
--machine-readable-output : Always log timestamp, message flags to stdout/stderr.
--writepid file : Write main process ID to file.
--nice n        : Change process priority (>0 = lower, <0 = higher).
--echo [parms ...] : Echo parameters to log output.
--verb n        : Set output verbosity to n (default=1):
                  (Level 3 is recommended if you want a good summary
                  of what's happening without being swamped by output).
                : 0 -- no output except fatal errors
                : 1 -- startup info + connection initiated messages +
                       non-fatal encryption & net errors
                : 2,3 -- show TLS negotiations & route info
                : 4 -- show parameters
                : 5 -- show 'RrWw' chars on console for each packet sent
                       and received from TCP/UDP (caps) or tun/tap (lc)
                : 6 to 11 -- debug messages of increasing verbosity
--mute n        : Log at most n consecutive messages in the same category.
--status file n : Write operational status to file every n seconds.
--status-version [n] : Choose the status file format version number.
                  Currently, n can be 1, 2, or 3 (default=1).
--disable-occ   : Disable options consistency check between peers.
--gremlin mask  : Special stress testing mode (for debugging only).
--compress alg  : Use compression algorithm alg
--comp-lzo      : Use LZO compression -- may add up to 1 byte per
                  packet for uncompressible data.
--comp-noadapt  : Don't use adaptive compression when --comp-lzo
                  is specified.
--management ip port [pass] : Enable a TCP server on ip:port to handle
                  management functions.  pass is a password file
                  or 'stdin' to prompt from console.
                  To listen on a unix domain socket, specific the pathname
                  in place of ip and use 'unix' as the port number.
--management-client : Management interface will connect as a TCP client to
                      ip/port rather than listen as a TCP server.
--management-query-passwords : Query management channel for private key
                  and auth-user-pass passwords.
--management-query-proxy : Query management channel for proxy information.
--management-query-remote : Query management channel for --remote directive.
--management-hold : Start OpenVPN in a hibernating state, until a client
                    of the management interface explicitly starts it.
--management-signal : Issue SIGUSR1 when management disconnect event occurs.
--management-forget-disconnect : Forget passwords when management disconnect
                                 event occurs.
--management-up-down : Report tunnel up/down events to management interface.
--management-log-cache n : Cache n lines of log file history for usage
                  by the management channel.
--management-client-user u  : When management interface is a unix socket, only
                              allow connections from user u.
--management-client-group g : When management interface is a unix socket, only
                              allow connections from group g.
--management-client-auth : gives management interface client the responsibility
                           to authenticate clients after their client certificate
			      has been verified.
--management-client-pf : management interface clients must specify a packet
                         filter file for each connecting client.
--plugin m [str]: Load plug-in module m passing str as an argument
                  to its initialization function.

Multi-Client Server options (when --mode server is used):
--server network netmask : Helper option to easily configure server mode.
--server-ipv6 network/bits : Configure IPv6 server mode.
--server-bridge [IP netmask pool-start-IP pool-end-IP] : Helper option to
                    easily configure ethernet bridging server mode.
--push "option" : Push a config file option back to the peer for remote
                  execution.  Peer must specify --pull in its config file.
--push-reset    : Don't inherit global push list for specific
                  client instance.
--ifconfig-pool start-IP end-IP [netmask] : Set aside a pool of subnets
                  to be dynamically allocated to connecting clients.
--ifconfig-pool-linear : Use individual addresses rather than /30 subnets
                  in tun mode.  Not compatible with Windows clients.
--ifconfig-pool-persist file [seconds] : Persist/unpersist ifconfig-pool
                  data to file, at seconds intervals (default=600).
                  If seconds=0, file will be treated as read-only.
--ifconfig-ipv6-pool base-IP/bits : set aside an IPv6 network block
                  to be dynamically allocated to connecting clients.
--ifconfig-push local remote-netmask : Push an ifconfig option to remote,
                  overrides --ifconfig-pool dynamic allocation.
                  Only valid in a client-specific config file.
--ifconfig-ipv6-push local/bits remote : Push an ifconfig-ipv6 option to
                  remote, overrides --ifconfig-ipv6-pool allocation.
                  Only valid in a client-specific config file.
--iroute network [netmask] : Route subnet to client.
--iroute-ipv6 network/bits : Route IPv6 subnet to client.
                  Sets up internal routes only.
                  Only valid in a client-specific config file.
--disable       : Client is disabled.
                  Only valid in a client-specific config file.
--client-cert-not-required : Don't require client certificate, client
                  will authenticate using username/password.
--verify-client-cert [none|optional|require] : perform no, optional or
                  mandatory client certificate verification.
                  Default is to require the client to supply a certificate.
--username-as-common-name  : For auth-user-pass authentication, use
                  the authenticated username as the common name,
                  rather than the common name from the client cert.
--auth-user-pass-verify cmd method: Query client for username/password and
                  run command cmd to verify.  If method='via-env', pass
                  user/pass via environment, if method='via-file', pass
                  user/pass via temporary file.
--auth-gen-token  [lifetime] Generate a random authentication token which is pushed
                  to each client, replacing the password.  Usefull when
                  OTP based two-factor auth mechanisms are in use and
                  --reneg-* options are enabled. Optionally a lifetime in seconds
                  for generated tokens can be set.
--opt-verify    : Clients that connect with options that are incompatible
                  with those of the server will be disconnected.
--auth-user-pass-optional : Allow connections by clients that don't
                  specify a username/password.
--no-name-remapping : Allow Common Name and X509 Subject to include
                      any printable character.
--client-to-client : Internally route client-to-client traffic.
--duplicate-cn  : Allow multiple clients with the same common name to
                  concurrently connect.
--client-connect cmd : Run command cmd on client connection.
--client-disconnect cmd : Run command cmd on client disconnection.
--client-config-dir dir : Directory for custom client config files.
--ccd-exclusive : Refuse connection unless custom client config is found.
--tmp-dir dir   : Temporary directory, used for --client-connect return file and plugin communication.
--hash-size r v : Set the size of the real address hash table to r and the
                  virtual address table to v.
--bcast-buffers n : Allocate n broadcast buffers.
--tcp-queue-limit n : Maximum number of queued TCP output packets.
--tcp-nodelay   : Macro that sets TCP_NODELAY socket flag on the server
                  as well as pushes it to connecting clients.
--learn-address cmd : Run command cmd to validate client virtual addresses.
--connect-freq n s : Allow a maximum of n new connections per s seconds.
--max-clients n : Allow a maximum of n simultaneously connected clients.
--max-routes-per-client n : Allow a maximum of n internal routes per client.
--stale-routes-check n [t] : Remove routes with a last activity timestamp
                             older than n seconds. Run this check every t
                             seconds (defaults to n).
--explicit-exit-notify [n] : In UDP server mode send [RESTART] command on exit/restart to connected
                             clients. n = 1 - reconnect to same server,
                             2 - advance to next server, default=1.
--port-share host port [dir] : When run in TCP mode, proxy incoming HTTPS
                  sessions to a web server at host:port.  dir specifies an
                  optional directory to write origin IP:port data.

Client options (when connecting to a multi-client server):
--client         : Helper option to easily configure client mode.
--auth-user-pass [up] : Authenticate with server using username/password.
                  up is a file containing the username on the first line,
                  and a password on the second. If either the password or both
                  the username and the password are omitted OpenVPN will prompt
                  for them from console.
--pull           : Accept certain config file options from the peer as if they
                  were part of the local config file.  Must be specified
                  when connecting to a '--mode server' remote host.
--pull-filter accept|ignore|reject t : Filter each option received from the
                  server if it starts with the text t. The action flag accept,
                  ignore or reject causes the option to be allowed, removed or
                  rejected with error. May be specified multiple times, and
                  each filter is applied in the order of appearance.
--auth-retry t  : How to handle auth failures.  Set t to
                  none (default), interact, or nointeract.
--static-challenge t e : Enable static challenge/response protocol using
                  challenge text t, with e indicating echo flag (0|1)
--connect-timeout n : when polling possible remote servers to connect to
                  in a round-robin fashion, spend no more than n seconds
                  waiting for a response before trying the next server.
--allow-recursive-routing : When this option is set, OpenVPN will not drop
                  incoming tun packets with same destination as host.
--explicit-exit-notify [n] : On exit/restart, send exit signal to
                  server/remote. n = # of retries, default=1.

Data Channel Encryption Options (must be compatible between peers):
(These options are meaningful for both Static Key & TLS-mode)
--secret f [d]  : Enable Static Key encryption mode (non-TLS).
                  Use shared secret file f, generate with --genkey.
                  The optional d parameter controls key directionality.
                  If d is specified, use separate keys for each
                  direction, set d=0 on one side of the connection,
                  and d=1 on the other side.
--auth alg      : Authenticate packets with HMAC using message
                  digest algorithm alg (default=SHA1).
                  (usually adds 16 or 20 bytes per packet)
                  Set alg=none to disable authentication.
--cipher alg    : Encrypt packets with cipher algorithm alg
                  (default=BF-CBC).
                  Set alg=none to disable encryption.
--ncp-ciphers list : List of ciphers that are allowed to be negotiated.
--ncp-disable   : Disable cipher negotiation.
--prng alg [nsl] : For PRNG, use digest algorithm alg, and
                   nonce_secret_len=nsl.  Set alg=none to disable PRNG.
--keysize n     : Size of cipher key in bits (optional).
                  If unspecified, defaults to cipher-specific default.
--engine [name] : Enable OpenSSL hardware crypto engine functionality.
--no-replay     : Disable replay protection.
--mute-replay-warnings : Silence the output of replay warnings to log file.
--replay-window n [t]  : Use a replay protection sliding window of size n
                         and a time window of t seconds.
                         Default n=64 t=15
--no-iv         : Disable cipher IV -- only allowed with CBC mode ciphers.
--replay-persist file : Persist replay-protection state across sessions
                  using file.
--test-crypto   : Run a self-test of crypto features enabled.
                  For debugging only.

TLS Key Negotiation Options:
(These options are meaningful only for TLS-mode)
--tls-server    : Enable TLS and assume server role during TLS handshake.
--tls-client    : Enable TLS and assume client role during TLS handshake.
--key-method m  : Data channel key exchange method.  m should be a method
                  number, such as 1 (default), 2, etc.
--ca file       : Certificate authority file in .pem format containing
                  root certificate.
--capath dir    : A directory of trusted certificates (CAs and CRLs).
--dh file       : File containing Diffie Hellman parameters
                  in .pem format (for --tls-server only).
                  Use "openssl dhparam -out dh1024.pem 1024" to generate.
--cert file     : Local certificate in .pem format -- must be signed
                  by a Certificate Authority in --ca file.
--extra-certs file : one or more PEM certs that complete the cert chain.
--key file      : Local private key in .pem format.
--tls-version-min <version> ['or-highest'] : sets the minimum TLS version we
    will accept from the peer.  If version is unrecognized and 'or-highest'
    is specified, require max TLS version supported by SSL implementation.
--tls-version-max <version> : sets the maximum TLS version we will use.
--pkcs12 file   : PKCS#12 file containing local private key, local certificate
                  and optionally the root CA certificate.
--x509-username-field : Field in x509 certificate containing the username.
                        Default is CN in the Subject field.
--verify-hash   : Specify SHA1 fingerprint for level-1 cert.
--tls-cipher l  : A list l of allowable TLS ciphers separated by : (optional).
                : Use --show-tls to see a list of supported TLS ciphers.
--tls-timeout n : Packet retransmit timeout on TLS control channel
                  if no ACK from remote within n seconds (default=2).
--reneg-bytes n : Renegotiate data chan. key after n bytes sent and recvd.
--reneg-pkts n  : Renegotiate data chan. key after n packets sent and recvd.
--reneg-sec n   : Renegotiate data chan. key after n seconds (default=3600).
--hand-window n : Data channel key exchange must finalize within n seconds
                  of handshake initiation by any peer (default=60).
--tran-window n : Transition window -- old key can live this many seconds
                  after new key renegotiation begins (default=3600).
--single-session: Allow only one session (reset state on restart).
--tls-exit      : Exit on TLS negotiation failure.
--tls-auth f [d]: Add an additional layer of authentication on top of the TLS
                  control channel to protect against attacks on the TLS stack
                  and DoS attacks.
                  f (required) is a shared-secret key file.
                  The optional d parameter controls key directionality,
                  see --secret option for more info.
--tls-crypt key : Add an additional layer of authenticated encryption on top
                  of the TLS control channel to hide the TLS certificate,
                  provide basic post-quantum security and protect against
                  attacks on the TLS stack and DoS attacks.
                  key (required) provides the pre-shared key file.
                  see --secret option for more info.
--askpass [file]: Get PEM password from controlling tty before we daemonize.
--auth-nocache  : Don't cache --askpass or --auth-user-pass passwords.
--crl-verify crl ['dir']: Check peer certificate against a CRL.
--tls-verify cmd: Run command cmd to verify the X509 name of a
                  pending TLS connection that has otherwise passed all other
                  tests of certification.  cmd should return 0 to allow
                  TLS handshake to proceed, or 1 to fail.  (cmd is
                  executed as 'cmd certificate_depth subject')
--tls-export-cert [directory] : Get peer cert in PEM format and store it 
                  in an openvpn temporary file in [directory]. Peer cert is 
                  stored before tls-verify script execution and deleted after.
--verify-x509-name name: Accept connections only from a host with X509 subject
                  DN name. The remote host must also pass all other tests
                  of verification.
--ns-cert-type t: Require that peer certificate was signed with an explicit
                  nsCertType designation t = 'client' | 'server'.
--x509-track x  : Save peer X509 attribute x in environment for use by
                  plugins and management interface.
--keying-material-exporter label len : Save Exported Keying Material (RFC5705)
                  of len bytes (min. 16 bytes) using label in environment for use by plugins.
--remote-cert-ku v ... : Require that the peer certificate was signed with
                  explicit key usage, you can specify more than one value.
                  value should be given in hex format.
--remote-cert-eku oid : Require that the peer certificate was signed with
                  explicit extended key usage. Extended key usage can be encoded
                  as an object identifier or OpenSSL string representation.
--remote-cert-tls t: Require that peer certificate was signed with explicit
                  key usage and extended key usage based on RFC3280 TLS rules.
                  t = 'client' | 'server'.

PKCS#11 Options:
--pkcs11-providers provider ... : PKCS#11 provider to load.
--pkcs11-protected-authentication [0|1] ... : Use PKCS#11 protected authentication
                              path. Set for each provider.
--pkcs11-private-mode hex ...   : PKCS#11 private key mode mask.
                              0       : Try  to determind automatically (default).
                              1       : Use Sign.
                              2       : Use SignRecover.
                              4       : Use Decrypt.
                              8       : Use Unwrap.
--pkcs11-cert-private [0|1] ... : Set if login should be performed before
                                  certificate can be accessed. Set for each provider.
--pkcs11-pin-cache seconds      : Number of seconds to cache PIN. The default is -1
                                  cache until token is removed.
--pkcs11-id-management          : Acquire identity from management interface.
--pkcs11-id serialized-id 'id'  : Identity to use, get using standalone --show-pkcs11-ids

SSL Library information:
--show-ciphers  : Show cipher algorithms to use with --cipher option.
--show-digests  : Show message digest algorithms to use with --auth option.
--show-engines  : Show hardware crypto accelerator engines (if available).
--show-tls      : Show all TLS ciphers (TLS used only as a control channel).

Generate a random key (only for non-TLS static key encryption mode):
--genkey        : Generate a random key to be used as a shared secret,
                  for use with the --secret option.
--secret file   : Write key to file.

Tun/tap config mode (available with linux 2.4+):
--mktun         : Create a persistent tunnel.
--rmtun         : Remove a persistent tunnel.
--dev tunX|tapX : tun/tap device
--dev-type dt   : Device type.  See tunnel options above for details.
--user user     : User to set privilege to.
--group group   : Group to set privilege to.

PKCS#11 standalone options:
--show-pkcs11-ids provider [cert_private] : Show PKCS#11 available ids.
                                            --verb option can be added *BEFORE* this.

General Standalone Options:
--show-gateway : Show info about default gateway.
Options error: Unrecognized option or missing or extra parameter(s) in /opt/4nonimizer/vpn/nordvpn/7Proxies.com-vpndetectbypass-Germany-renamed.ovpn:7: <!DOCTYPE (2.4.0)
Use --help for more information.

¿Qué puede estar pasando?

Gracias!

geckodriver executable needs to be in PATH(while using brut3k1t)

Traceback (most recent call last):
File "brut3k1t.py", line 77, in
main()
File "brut3k1t.py", line 70, in main
w.execute()
File "/root/brut3k1t/core/web.py", line 42, in execute
if self.usercheck(self.username, self.service) == 1:
File "/root/brut3k1t/core/web.py", line 51, in usercheck
driver = webdriver.Firefox()
File "/usr/local/lib/python2.7/dist-packages/selenium/webdriver/firefox/webdriver.py", line 144, in init
self.service.start()
File "/usr/local/lib/python2.7/dist-packages/selenium/webdriver/common/service.py", line 81, in start
os.path.basename(self.path), self.start_error_message)
selenium.common.exceptions.WebDriverException: Message: 'geckodriver' executable needs to be in PATH.

Add bash & zsh auto completion

For a perfect cli tool. We need bash & zsh auto-completion.so i think it shouldn't be super hard to do the same for 4nonimizer.try to do that as soon as possible

Can't connect no any VPN services after command "4nonimizer update_vpns"

hello guys!
After command 4nonimizer update_vpns does not work any VPN service.
for example, this is a log of the issue:

`[+] There is a problem starting openvpn. Please, check nohup.out for details

Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: route options modified
Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: peer-id set
Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: adjusting link_mtu to 1627
Sun Jan 28 16:48:55 2018 OPTIONS IMPORT: data channel crypto options modified
Sun Jan 28 16:48:55 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Jan 28 16:48:55 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 28 16:48:55 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 28 16:48:55 2018 ROUTE_GATEWAY 192.168.88.1/255.255.255.0 IFACE=wlan0 HWADDR=e0:00:a5:00:1c:f7
Sun Jan 28 16:48:55 2018 TUN/TAP device tun3 opened
Sun Jan 28 16:48:55 2018 TUN/TAP TX queue length set to 100
Sun Jan 28 16:48:55 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Jan 28 16:48:55 2018 /sbin/ip link set dev tun3 up mtu 1500
Sun Jan 28 16:48:55 2018 /sbin/ip addr add dev tun3 local 10.12.0.214 peer 10.12.0.213
Sun Jan 28 16:48:57 2018 /sbin/ip route add 178.65.193.233/32 via 192.168.88.1
Sun Jan 28 16:48:57 2018 /sbin/ip route add 0.0.0.0/1 via 10.12.0.213
Sun Jan 28 16:48:57 2018 /sbin/ip route add 128.0.0.0/1 via 10.12.0.213
Sun Jan 28 16:48:57 2018 /sbin/ip route add 10.12.0.1/32 via 10.12.0.213
Sun Jan 28 16:48:57 2018 Initialization Sequence Completed
Thu Feb 1 22:03:09 2018 WARNING: file 'pass.txt' is group or others accessible
Thu Feb 1 22:03:09 2018 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 10 2017
Thu Feb 1 22:03:09 2018 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
Thu Feb 1 22:03:10 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]198.186.193.94:443
Thu Feb 1 22:03:10 2018 UDP link local: (not bound)
Thu Feb 1 22:03:10 2018 UDP link remote: [AF_INET]198.186.193.94:443
Thu Feb 1 22:03:10 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Feb 1 22:03:13 2018 [VPN] Peer Connection Initiated with [AF_INET]198.186.193.94:443
Thu Feb 1 22:03:14 2018 AUTH: Received control message: AUTH_FAILED
Thu Feb 1 22:03:14 2018 SIGTERM[soft,auth-failure] received, process exiting
`

Can't starrt 4nonimizer

I installed 4nonimizer, but when i try to start it, it showing the following error

       ___                   _           _
      /   |                 (_)         (_)
     / /| |_ __   ___  _ __  _ _ __ ___  _ _______ _ __
    / /_| | '_ \ / _ \| '_ \| | '_  ` _ | |_  / _ \ '__|
    \___  | | | | (_) | | | | | | | | | | |/ /  __/ |
        |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_|
                                       By Carlos Antonini & Vicente Motos
                                       Version: 1.10

[*] You must install 4nonimizer first!

And when I try to reinstall it

[+] Installing dependences...

Reading package lists... Done
Building dependency tree
Reading state information... Done
curl is already the newest version (7.52.1-5+deb9u5).
libcurl4-gnutls-dev is already the newest version (7.52.1-5+deb9u5).
tor is already the newest version (0.2.9.14-1).
bzip2 is already the newest version (1.0.6-8.1).
dnscrypt-proxy is already the newest version (1.9.4-1).
dos2unix is already the newest version (7.3.4-3).
easy-rsa is already the newest version (2.2.2-2).
geoip-bin is already the newest version (1.6.9-4).
geoip-database is already the newest version (20170512-1).
nmap is already the newest version (7.40-1).
openvpn is already the newest version (2.4.0-6+deb9u2).
proxychains is already the newest version (3.1-7).
librtmp-dev is already the newest version (2.4+20151223.gitfa8646d.1-1+b1).
unzip is already the newest version (6.0-21).
whois is already the newest version (5.2.17~deb9u1).
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

[+] Installing and linking the init service...

cp: cannot stat '../4nonimizer': No such file or directory
'/usr/bin/4nonimizer' -> '/opt/4nonimizer/4nonimizer'
chmod: cannot access '/opt/4nonimizer/vpn//.sh': No such file or directory
cp: cannot stat '/opt/4nonimizer/4non.service': No such file or directory
chmod: cannot access '/etc/systemd/system/4non.service': No such file or directory
Synchronizing state of tor.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable tor
Failed to enable unit: File 4non.service: No such file or directory

Kindly help me to resolve this issue.

Raspbian compatible

I tried it on raspbian 8 and apparently works well. I made some minor modifications because I can not down the interface where I am connected. "icanhazip.com" have problems viewing the ip spoofed. for that I suggest change for "ipecho.net/plain". isnt perfect, but it works.

How to install in Raspbian

git clone https://github.com/Hackplayers/4nonimizer
cd 4nonimizer
curl -s https://gist.githubusercontent.com/vay3t/b02f77699538aafcbd73e31af9301fc4/raw/9ebb3fa198b6202a76ebf0c6d5fae27306aa6b0e/4nonimizer > 4nonimizer
sudo ./4nonimizer install
sudo 4nonimizer start

Sometimes I have problems with openvpn

[+] There is a problem starting openvpn. Please, check nohup.out for details

tail: no se puede abrir «/opt/4nonimizer/vpn/4nonimizer/nohup.out» para lectura: No existe el fichero o el directorio

This isn't an issue, more a request but I am not sure where to put recommendations

I know issues isn't the place for this, I am just not sure how to go about recommending this incorporation.

I made /opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh more automated. It simply requires sudo apt-get install -y tesseract-ocr; sudo apt-get install -y imagemagick.

This is the output of my changes:

┌─[root@parrot]─[~]
└──╼ #/opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh 
Would you like to attempt to extract username & password Automatically? [y/N] y
Username: vpnbook

Please reference this password: e?bhr63 

With the image I am opening
Please enter the missing character: 2
Username: vpnbook
Password: e2bhr63 

Is this correct? [y/N]y
┌─[root@parrot]─[~]
└──╼ #

Please let me know if you'd like the source code.

Again, I am sorry for filling up issues when this isn't one.

sed: can't read /opt/4nonimizer/vpn/proxysh/*.ovpn: No such file or directory

Hi!
First, thank you for '4nonimizer' development !
But I got a problem...
After installation and typing '4nonimizer start'
I got these logs-

==========================

sed: can't read /opt/4nonimizer/vpn/proxysh/ *.ovpn: No such file or directory
ls: cannot access '/opt/4nonimizer/vpn/proxysh/ *.ovpn': No such file or directory
..............................
[+] There is a problem starting openvpn. Please, check nohup.out for details

--pkcs11-pin-cache seconds : Number of seconds to cache PIN. The default is -1
cache until token is removed.
--pkcs11-id-management : Acquire identity from management interface.
--pkcs11-id serialized-id 'id' : Identity to use, get using standalone --show-pkcs11-ids

SSL Library information:
--show-ciphers : Show cipher algorithms to use with --cipher option.
--show-digests : Show message digest algorithms to use with --auth option.
--show-engines : Show hardware crypto accelerator engines (if available).
--show-tls : Show all TLS ciphers (TLS used only as a control channel).

Generate a random key (only for non-TLS static key encryption mode):
--genkey : Generate a random key to be used as a shared secret,
for use with the --secret option.
--secret file : Write key to file.

Tun/tap config mode (available with linux 2.4+):
--mktun : Create a persistent tunnel.
--rmtun : Remove a persistent tunnel.
--dev tunX|tapX : tun/tap device
--dev-type dt : Device type. See tunnel options above for details.
--user user : User to set privilege to.
--group group : Group to set privilege to.

PKCS#11 standalone options:
--show-pkcs11-ids provider [cert_private] : Show PKCS#11 available ids.
--verb option can be added BEFORE this.

General Standalone Options:
--show-gateway : Show info about default gateway.

====================================

I think that the below logs are seen when I run '# openvpn' in terminal...
I don't know what is the problem...
Thx!!
I'm using kali 2.0

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.