securefishnet-1.5-3.armv7hl.rpm | 78.1 KB | 26/08/2015 - 13:12 |
securefishnet-1.5-4.armv7hl.rpm | 77.79 KB | 26/08/2015 - 20:14 |
securefishnet-1.6-2.armv7hl.rpm | 111.93 KB | 22/10/2015 - 16:57 |
securefishnet-1.6-2.i486.rpm | 120.59 KB | 22/10/2015 - 17:35 |
securefishnet-1.6-3.armv7hl.rpm | 112.33 KB | 28/10/2015 - 17:26 |
securefishnet-1.6-3.i486.rpm | 120.95 KB | 28/10/2015 - 18:21 |
securefishnet-1.6-4.armv7hl.rpm | 112.34 KB | 11/11/2015 - 13:10 |
securefishnet-1.6-4.i486.rpm | 120.94 KB | 11/11/2015 - 13:10 |
securefishnet-1.6-5.armv7hl.rpm | 112.38 KB | 16/11/2015 - 09:42 |
securefishnet-1.6-5.i486.rpm | 120.93 KB | 16/11/2015 - 09:42 |
securefishnet-1.9-2.armv7hl.rpm | 139.88 KB | 10/04/2016 - 20:56 |
securefishnet-1.9-2.i486.rpm | 151.24 KB | 10/04/2016 - 20:56 |
securefishnet-1.9-5.armv7hl.rpm | 140.77 KB | 12/05/2016 - 15:02 |
securefishnet-1.9-5.i486.rpm | 151.47 KB | 12/05/2016 - 15:02 |
securefishnet-2.0-5.i486.rpm | 150.52 KB | 20/09/2016 - 16:11 |
securefishnet-2.0-5.armv7hl.rpm | 138.31 KB | 20/09/2016 - 16:11 |
securefishnet-2.0-7.armv7hl.rpm | 139.05 KB | 20/10/2016 - 14:01 |
securefishnet-2.0-7.i486.rpm | 151.95 KB | 20/10/2016 - 14:01 |
securefishnet-2.1-2.armv7hl.rpm | 139.59 KB | 30/08/2017 - 17:03 |
securefishnet-2.1-2.i486.rpm | 151.33 KB | 30/08/2017 - 17:03 |
securefishnet-2.1-4.armv7hl.rpm | 144.66 KB | 17/06/2018 - 12:35 |
securefishnet-2.1-4.i486.rpm | 156.96 KB | 17/06/2018 - 12:35 |
securefishnet-2.1-5.armv7hl.rpm | 144.81 KB | 12/09/2018 - 20:32 |
securefishnet-2.1-5.i486.rpm | 157.23 KB | 12/09/2018 - 20:32 |
securefishnet-2.1-7.armv7hl.rpm | 146.15 KB | 22/01/2019 - 12:28 |
securefishnet-2.1-7.i486.rpm | 157.54 KB | 22/01/2019 - 12:28 |
securefishnet-2.1-8.armv7hl.rpm | 146.13 KB | 28/01/2019 - 18:57 |
securefishnet-2.1-8.i486.rpm | 157.3 KB | 28/01/2019 - 18:57 |
securefishnet-2.1-9.armv7hl.rpm | 145.94 KB | 08/03/2019 - 11:38 |
securefishnet-2.1-9.i486.rpm | 157.26 KB | 08/03/2019 - 11:38 |
securefishnet-2.1-11.armv7hl.rpm | 147.17 KB | 08/08/2019 - 14:12 |
securefishnet-2.1-11.i486.rpm | 159.11 KB | 08/08/2019 - 14:12 |
securefishnet-2.1-12.armv7hl.rpm | 149.99 KB | 06/10/2020 - 19:54 |
securefishnet-2.1-12.i486.rpm | 162.12 KB | 06/10/2020 - 19:54 |
securefishnet-2.1-14.armv7hl.rpm | 149.14 KB | 07/03/2021 - 18:28 |
securefishnet-2.1-14.i486.rpm | 161.99 KB | 07/03/2021 - 18:28 |
securefishnet-2.1-15.i486.rpm | 161.94 KB | 08/03/2021 - 18:49 |
securefishnet-2.1-15.armv7hl.rpm | 149.25 KB | 08/03/2021 - 18:49 |
securefishnet-2.1-17.armv7hl.rpm | 145.77 KB | 16/06/2021 - 20:44 |
securefishnet-2.1-17.i486.rpm | 157.03 KB | 16/06/2021 - 20:44 |
securefishnet-2.1-17.aarch64.rpm | 148.13 KB | 16/06/2021 - 20:44 |
securefishnet-2.2-1.aarch64.rpm | 148.91 KB | 20/08/2021 - 12:37 |
securefishnet-2.2-1.i486.rpm | 157.31 KB | 20/08/2021 - 12:37 |
securefishnet-2.2-1.armv7hl.rpm | 146.54 KB | 20/08/2021 - 12:37 |
Comments
korppi
Thu, 2015/08/13 - 12:40
Permalink
No ports of this app to N9. N9 is too locked up for that. But you can use openvpn in it.
Matty69
Sun, 2015/05/31 - 08:17
Permalink
Hi! Same problem with client for me: it disconnects immediately after start - seems it even doesnt try ty to connect to the network. Got the same error messages as wico after starting securefishnet-gui from cli. "Static key" option in UI doesnt make a difference. openvpn from CLI with same .ovpn works.
korppi
Sun, 2015/05/31 - 08:57
Permalink
Execute as root "/usr/sbin/openvpn --user nobody --group nobody --config your_config_file_name --verb 4" and send me the output. Remove all IP:s and personal info from log.
abbaspower
Wed, 2015/05/13 - 17:45
Permalink
When I install this package in sailfish os 1.1.4.29 I have the following error:
Transaction/7686_ecdadbcc
Status:repo-not-availabel
Extra details:
Authentication failed(is SSU set up correctly?)
Dismiss
I think openvpn upgraded from 2.3.4-2 to 2.3.6-1 by NileDK
korppi
Wed, 2015/05/13 - 18:00
Permalink
So this has nothing to do with securefishnet...
You have NielDK's repo active and there are no package named(or version) like that anymore...
Refresh package list.
And why not use openvpn from Jolla?
wico
Tue, 2015/05/12 - 15:41
Permalink
Since a day I try to get securefishnet started on my jolla - with no success.
Here is the whole story:
1) I have a openvpn-config with static key. Works perfectly on commandline!
2) With securefishnet after pressing "start", it immediately goes into "disconnect" state. Via the terminal I can see:
[nemo@singularity ~]$ securefishnet-gui
[D] QWaylandEglClientBufferIntegration::QWaylandEglClientBufferIntegration:62 - Using Wayland-EGL
[D] onOutputChanged:158 - ,ONLINESonlineONLINES,MANAGEMENT:,VPNGW,,MANAGEMENT:,OLDGW,,MANAGEMENT:,VSIP,,MANAGEMENT:,DNS,
[D] onOutputChanged:158 - ,ONLINESonlineONLINES
[D] onOutputChanged:158 - STATE,DISCONNECTED,
3) I started the OVPNdaemon via strace and can see:
strace -s 1024 -f /usr/bin/OVPNdaemon
[...]
[pid 16898] execve("/usr/sbin/openvpn", ["/usr/sbin/openvpn", "--user", "nobody", "--group", "nobody", "--config", "/home/nemo/fireland-singularity.conf", "--dev", "p2p5", "--dev-type", "tun", "--verb", "4", "--management-query-passwords", "--auth-retry", "interact", "--management-hold", "on", "--persist-tun", "--auth-user-pass", "--persist-key", "--management", "127.0.0.1", "4445"], [/* 20 vars */] <unfinished ...>
[...]
[pid 16895] read(12, "Options error: --auth-user-pass requires --pull\n", 48) = 48
[...]
[pid 16898] +++ exited with 1 +++
[...]
4) Same happens if I run openvpn with the above arguments directly:
[root@singularity openvpn]# /usr/sbin/openvpn --user nobody --group nobody --config /home/nemo/fireland-singularity.conf --dev p2p5 --dev-type tun --verb 4 --management-query-passwords --auth-retry interact --management-hold on --persist-tun --auth-user-pass --persist-key --management 127.0.0.1 4445
Options error: --auth-user-pass requires --pull
Use --help for more information.
EXIT 1
Thus - is securefisnet unable to handle static-key situations? When I remove "--auth-user-pass" from the arguments, it looks way better. But unfortunately I cant tweak OVPNdaemon to do so. :(
Thanks for help!
Martin
korppi
Tue, 2015/05/12 - 16:08
Permalink
Thanks for all your effort to help.
You can try to add "pull" to your configfile. If that doesn't help then it needs little more coding...
wico
Tue, 2015/05/12 - 16:44
Permalink
I tried that - problem with pull is:
Options error: Parameter --pull can only be specified in TLS-mode, i.e. where --tls-server or --tls-client is also specified.
But I use a static key (which is mandatory, I cant switch to TLS due to other reasons).
Big thanks for your awesome support!
Martin
korppi
Tue, 2015/05/12 - 17:09
Permalink
Ok
Little more coding for me then ;-)
wico
Tue, 2015/05/12 - 18:06
Permalink
Tell me if you need a sample-config. :)
Are you github'ing?
korppi
Wed, 2015/05/13 - 09:55
Permalink
There is new option in config dialog try it if it helps. If the busy indicator doesn't stop, openvpn still might be connected... I need openvpns log in that case.
wico
Wed, 2015/05/13 - 12:06
Permalink
Works now! God job! :)
abbaspower
Tue, 2015/05/12 - 12:02
Permalink
Hi,
Thank you for this package but dont work in sailfishos 1.1.4.29
please upgrade to new version
korppi
Tue, 2015/05/12 - 16:20
Permalink
Works for me...
Little more info please. Can't help if all I get is " don't work " ...
known issues:
- Ipv6 will not work
- If certs and keys are not with absolute paths in config...
jaekkay
Tue, 2015/04/07 - 23:44
Permalink
Thank you for the regular updates and the recent improvements!
carepack
Tue, 2015/03/31 - 23:37
Permalink
thx for the update!!!!
carepack
Thu, 2015/03/26 - 13:49
Permalink
hi korppi,
thx for you're gui for openvpn. One question:
The connection is establised perfectly. But to reach my home server etc. I have to manually add a new route. Is it possible in any kind of way that this don't have to be manually done? It's all about comfort :-)
But big thx!
korppi
Sun, 2015/03/29 - 18:57
Permalink
There is bug with routing if you are using tun device. Already fixed it but have to run more tests. Tap device is working.
Routing table is not the default one, so don't try to check with "route" command as it shows the default table.
Moth
Sat, 2015/02/21 - 12:03
Permalink
Just a small recommendation... ;-)
korppi
Mon, 2015/02/23 - 00:04
Permalink
I know my icon is bad...
And thanks for this, but someone was faster. I just forgot to change it.
virgi
Mon, 2015/02/16 - 03:10
Permalink
Hello there! thanks for great app, but i cannot establish vpn connection with it=(
if i openvpn from shell under nemo i get "Cannot open TUN/TAP dev /dev/net/tun: Permission denied"
and it works just fine under devel-su
Any ideas?
Thanks.
Alex.
korppi
Mon, 2015/02/16 - 13:46
Permalink
Did you put absolute paths for keys in config file when trying my app?
And just as openvpn says it, "Permission denied".
Nemo can't make tun/tap device and update routing and ...
virgi
Mon, 2015/02/16 - 16:47
Permalink
yes, paths are absolute.
I tried to give vpn and openvpn permissions to nemo user, but that didn't help.
The thing is why i'm the only one having this issue. Can you post output of "id" command in shell for nemo user? Maybe some groups are missing.
korppi
Mon, 2015/02/16 - 18:07
Permalink
You should not need to change any settings on device. If you use Jolla anyway... don't know about other devices. There's daemon with my app which has necessary rights to execute openvpn. But you can try with devel-su and if its working send me the logs. I don't need IPs and such only need to see failure point and what led to it. "--verb 4" at the end on commandline.
And one more thing you can't hardcode the TUN/TAP device in config...
virgi
Tue, 2015/02/17 - 01:43
Permalink
great! it's just a wrong password! that's the problem with 512bit passwords=\ sorry for taking your time
PS that error i've got, when password was wrong, was in infinite loop (until you hit stop button). May be you could create some kind of workaround or just insert password check for key with openssl before running openvpn
anyway thanks again for so much needed app
korppi
Tue, 2015/02/17 - 08:48
Permalink
No problem
My app should inform the user about that. It reads openvpns output and when it doesn't understand stays in that loop. I have to check why thats not working.
casanunda
Tue, 2015/01/06 - 21:29
Permalink
Thanks, works great!
It did not work at first, but after reading another comment and changing the path to the key file to absolute path in the config file (which is not an obvious step), everything works fine.
timetourist
Sat, 2014/12/20 - 21:35
Permalink
This is really great! Works perfect with VyprVPN. Anyone who wants to use VyprVPN on his Jolla can get the OpenVPN configuration files from this page: https://www.goldenfrog.com/UK/support/vyprvpn/vpn-setup/ipad/openvpn-con... . These config files already contain the certificate, so no need to fiddle around. Just add a profile in SecureFishNet and point to the OVPN-file. For each VPN-gateway you will need one config file. NOTE: you have to rename the config files so they do not contain any blanks.
jaekkay
Tue, 2014/09/09 - 13:08
Permalink
Hi, After successful connection, dns seem to be fine on Sailfish browser but Android firefox/opera browser still shows ISP dns (Dns queries does not seem to be forwarded through VPN). Is this expected behaviour? Thanks.
korppi
Fri, 2014/09/12 - 22:24
Permalink
Thanks for reporting. Fixed
Pages