• Stars
    star
    167
  • Rank 219,743 (Top 5 %)
  • Language
    Shell
  • License
    GNU General Publi...
  • Created about 3 years ago
  • Updated 13 days ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A collection of configs for various VPN providers

OpenVPN providers config collection

This repository is a support-repo for: https://github.com/haugene/docker-transmission-openvpn It is an effort to separate the development and maintenance of that project and the VPN configs it relies on.

The split is thought to have multiple benefits. It will reduce noice in the main project and hopefully create a meaningful separation that can make it easier to test changes in configs and contribute to keep the providers up to date.

Use your own config

If you have a .ovpn file from your VPN provider and you want to use it with this project then CONTRIBUTING.md is the guide you're looking for.

Structure

The main project currently only support OpenVPN but we're hoping to support Wireguard as well. To plan for that we are separating configs here based on technology and then provider.

So the structure becomes:

<vpn-technology>/<provider>/<bundle-name>/configs.ovpn

For example:

openvpn/mullvad/tcp80/mullvad_ch_tcp80.ovpn

Providers and status of configs

Provider Folder Provider Status Configs tested Successful
anonine πŸ†˜ (0%) 10 0
anonvpn πŸ†˜ (0%) 8 0
blackvpn πŸ†˜ (0%) 10 0
btguard πŸ’― 2 2
bulletvpn πŸ†— (70%) 10 7
cryptostorm πŸ’― 10 10
expressvpn βœ… (90%) 10 9
fastestvpn πŸ†— (80%) 10 8
freevpn πŸ†˜ (0%) 10 0
froot πŸ’― 7 7
frostvpn πŸ†˜ (0%) 10 0
getflix πŸ†— (80%) 10 8
ghostpath πŸ†— (70%) 10 7
giganews πŸ’― 10 10
goosevpn ⚠️ (60%) 10 6
hideme πŸ†— (80%) 10 8
hotspotshield πŸ’― 10 10
integrityvpn πŸ’― 1 1
ironsocket πŸ†— (80%) 10 8
ivacy βœ… (90%) 10 9
ivpn πŸ’― 10 10
mullvad πŸ†— (70%) 10 7
octanevpn πŸ†— (70%) 10 7
ovpn πŸ†— (80%) 10 8
privado πŸ†— (70%) 10 7
privatevpn πŸ†— (80%) 10 8
protonvpn πŸ’― 10 10
proxpn πŸ†˜ (0%) 10 0
purevpn πŸ’― 10 10
ra4w πŸ†˜ (0%) 10 0
safervpn ⚠️ (50%) 10 5
slickvpn πŸ†— (70%) 10 7
slickvpncore βœ… (90%) 10 9
smartdnsproxy πŸ†— (80%) 10 8
smartvpn ⚠️ (33%) 3 1
surfshark πŸ’― 10 10
tiger πŸ†˜ (0%) 10 0
torguard πŸ†— (70%) 10 7
trustzone πŸ†˜ (0%) 10 0
tunnelbear πŸ†— (80%) 10 8
vpnac πŸ’― 10 10
vpnarea ⚠️ (60%) 10 6
vpnbook πŸ’― 9 9
vpnfacile πŸ†˜ (0%) 10 0
vpnht πŸ†˜ (0%) 10 0
vpntunnel πŸ†— (80%) 10 8
vpnunlimited πŸ’― 10 10
wevpn πŸ’― 10 10
windscribe ⚠️ (60%) 10 6
zoogvpn πŸ†˜ (0%) 10 0

Config testing

There is a work in progress to automate periodic checks of all our configs. The table above is the current output of that work. As we can't automate this completely without having an active subscription to every supported provider we do basic connectivity tests to assert the overall health of the providers and config bundles.

Some testing is better than none, and we believe that this will help maintain and manage providers going forward.

If you have Python experience and want to contribute - you're more than welcome! Create an issue and we can start a discussion on what the next steps are. They're just runnung locally for now, but we plan to move them into a CI. Probably GitHub workflows.

Running the tests

For now the tests are run in a simple setup with docker-compose. We throw the configs from this repo into the main project container, mount the test script and override the container command. The results are written to a data folder mounted in the current location. Results will be owned by root for now, we'll address that later. For now sudo chown is your friend.

Start it locally by running:

docker-compose -f configtest-compose.yml up

Then you can generate the markdown table by running:

python3 generate_results_md_table.py data/result1234.json >> README.md

Or something similar depending on the data file you want to use.