Managed to get this setup in a VM very easily. I think its really neat that it sets up so many different VPN protocols in one fell swoop. Also like the added touch of fetching clients in the event you can’t trust the publicly available clients in your country.
Managed to connect to L2TP/IPsec via Android.. once. Not sure what the deal is but for some reason I wasn’t able to connect again. Haven’t attempted to do much troubleshooting, but likely will later. Did establish a connection from Kubuntu 16.10 via WireGuard. Stupid easy that. Kind of amazed how simple the WireGuard connection is. Also having difficulty fully establishing a connection via OpenVPN. It gets super close to connecting then fails. Again, haven’t done much troubleshooting, but will do more later. UPDATE: OpenVPN works if you’re not an idiot.
I get that they want to make this an easy community thing that is meant to be shared but.. Would be nice (I realize this might be a tall order) if there were user management. From what i can see it only makes one user per VPN protocol. Considering how much it sets up, I could see how it would potentially be difficult to maintain users across that many different protocols/services, but again, would be nice to share a hand-rolled VPN VPS among a group of friends.
Pondering setting up a pfSense box for the apartment. Would be interesting to get OpenVPN running on pfSense.. and use the OpenVPN client functionality in pfSense to connect to the VPN server. VPN daisy chain of sorts.
This was my first experience with Ansible. Curious to read through the Ansible code to try to re-create even one of the services by hand how Streisand sets it up (like on a Pi, maybe?).
Will update further as I test, but so far, super intriguing project.
Initially discovered via The impossible task of creating a “Best VPNs” list today
Source: GitHub – jlund/streisand
Leave a Reply