chore(deps): bump boto3 from 1.42.51 to 1.42.56 in the python group (#14973)
Bumps the python group with 1 update: boto3.
Updates
boto3from 1.42.51 to 1.42.56
updated-dependencies:
- dependency-name: boto3 dependency-version: 1.42.56 dependency-type: direct:production update-type: version-update:semver-patch dependency-group: python …
Signed-off-by: dependabot[bot] support@github.com Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
版权所有:中国计算机学会技术支持:开源发展技术委员会
京ICP备13000930号-9
京公网安备 11010802032778号
Algo VPN
Algo VPN is a set of Ansible scripts that simplify the setup of a personal WireGuard and IPsec VPN. It uses the most secure defaults available and works with common cloud providers.
See our release announcement for more information.
Features
Anti-features
Deploy the Algo Server
The easiest way to get an Algo server running is to run it on your local system or from Google Cloud Shell and let it set up a new virtual machine in the cloud for you.
Setup an account on a cloud hosting provider. Algo supports DigitalOcean (most user friendly), Amazon Lightsail, Amazon EC2, Vultr, Microsoft Azure, Google Compute Engine, Scaleway, DreamCompute, Linode, other OpenStack-based cloud hosting, CloudStack-based cloud hosting, or Hetzner Cloud.
Get a copy of Algo. The Algo scripts will be run from your local system. There are two ways to get a copy:
Download the ZIP file. Unzip the file to create a directory named
algo-mastercontaining the Algo scripts.Use
git cloneto create a directory namedalgocontaining the Algo scripts:Set your configuration options. Open
config.cfgin your favorite text editor. Specify the users you want to create in theuserslist. Create a unique user for each device you plan to connect to your VPN. You should also review the other options before deployment, as changing your mind about them later may require you to deploy a brand new server.Start the deployment. Return to your terminal. In the Algo directory, run the appropriate script for your platform:
macOS/Linux:
Windows:
The first time you run the script, it will automatically install the required Python environment (Python 3.11+). On subsequent runs, it starts immediately and works on all platforms (macOS, Linux, Windows via WSL). The Windows PowerShell script automatically uses WSL when needed, since Ansible requires a Unix-like environment. There are several optional features available, none of which are required for a fully functional VPN server. These optional features are described in the deployment documentation.
That’s it! You can now set up clients to connect to your VPN. Proceed to Configure the VPN Clients below.
Configure the VPN Clients
Certificates and configuration files that users will need are placed in the
configsdirectory. Make sure to secure these files since many contain private keys. All files are saved under a subdirectory named with the IP address of your new Algo VPN server.Important for IPsec users: If you want to add or delete users later, you must select
yesat theDo you want to retain the keys (PKI)?prompt during the server deployment. This preserves the certificate authority needed for user management.Apple
WireGuard is used to provide VPN services on Apple devices. Algo generates a WireGuard configuration file,
wireguard/<username>.conf, and a QR code,wireguard/<username>.png, for each user defined inconfig.cfg.On iOS, install the WireGuard app from the iOS App Store. Then, use the WireGuard app to scan the QR code or AirDrop the configuration file to the device.
On macOS, install the WireGuard app from the Mac App Store. WireGuard will appear in the menu bar once you run the app. Click on the WireGuard icon, choose Import tunnel(s) from file…, then select the appropriate WireGuard configuration file.
On either iOS or macOS, you can enable “Connect on Demand” and/or exclude certain trusted Wi-Fi networks (such as your home or work) by editing the tunnel configuration in the WireGuard app. (Algo can’t do this automatically for you.)
If you prefer to use the built-in IPsec VPN on Apple devices, or need “Connect on Demand” or excluded Wi-Fi networks automatically configured, see the Apple IPsec client setup guide for detailed configuration instructions.
Android
WireGuard is used to provide VPN services on Android. Install the WireGuard VPN Client. Import the corresponding
wireguard/<name>.conffile to your device, then set up a new connection with it. See the Android setup guide for detailed installation and configuration instructions.Windows
WireGuard is used to provide VPN services on Windows. Algo generates a WireGuard configuration file,
wireguard/<username>.conf, for each user defined inconfig.cfg.Install the WireGuard VPN Client. Import the generated
wireguard/<username>.conffile to your device, then set up a new connection with it. See the Windows setup instructions for more detailed walkthrough and troubleshooting.Linux
Linux clients can use either WireGuard or IPsec:
WireGuard: WireGuard works great with Linux clients. See the Linux WireGuard setup guide for step-by-step instructions on configuring WireGuard on Ubuntu and other distributions.
IPsec: For strongSwan IPsec clients (including OpenWrt, Ubuntu Server, and other distributions), see the Linux IPsec setup guide for detailed configuration instructions.
OpenWrt
For OpenWrt routers using WireGuard, see the OpenWrt WireGuard setup guide for router-specific configuration instructions.
Other Devices
For devices not covered above or manual configuration, you’ll need specific certificate and configuration files. The files you need depend on your device platform and VPN protocol (WireGuard or IPsec).
Setup an SSH Tunnel
If you turned on the optional SSH tunneling role, local user accounts will be created for each user in
config.cfg, and SSH authorized_key files for them will be in theconfigsdirectory (user.pem). SSH user accounts do not have shell access, cannot authenticate with a password, and only have limited tunneling options (e.g.,ssh -Nis required). This ensures that SSH users have the least access required to set up a tunnel and can perform no other actions on the Algo server.Use the example command below to start an SSH tunnel by replacing
<user>and<ip>with your own. Once the tunnel is set up, you can configure a browser or other application to use 127.0.0.1:1080 as a SOCKS proxy to route traffic through the Algo server:SSH into Algo Server
Your Algo server is configured for key-only SSH access for administrative purposes. Open the Terminal app,
cdinto thealgo-masterdirectory where you originally downloaded Algo, and then use the command listed on the success message:where
<ip>is the IP address of your Algo server. If you find yourself regularly logging into the server, it will be useful to load your Algo SSH key automatically. Add the following snippet to the bottom of~/.bash_profileto add it to your shell environment permanently:Alternatively, you can choose to include the generated configuration for any Algo servers created into your SSH config. Edit the file
~/.ssh/configto include this directive at the top:where
<algodirectory>is the directory where you cloned Algo.Adding or Removing Users
Algo makes it easy to add or remove users from your VPN server after initial deployment.
For IPsec users: You must have selected
yesat theDo you want to retain the keys (PKI)?prompt during the initial server deployment. This preserves the certificate authority needed for user management. You should also save the p12 and CA key passwords shown during deployment, as they’re only displayed once.To add or remove users, first edit the
userslist in yourconfig.cfgfile. Add new usernames or remove existing ones as needed. Then navigate to the algo directory in your terminal and run:macOS/Linux:
Windows:
After the process completes, new configuration files will be generated in the
configsdirectory for any new users. The Algo VPN server will be updated to contain only the users listed in theconfig.cfgfile. Removed users will no longer be able to connect, and new users will have fresh certificates and configuration files ready for use.Privacy and Logging
Algo takes a pragmatic approach to privacy. By default, we minimize logging while maintaining enough information for security and troubleshooting.
What IS logged by default:
sudo wg- shows last endpoint and handshake time)Privacy is controlled by two main settings in
config.cfg:strongswan_log_level: -1- Controls StrongSwan connection logging (-1 = disabled, 2 = debug)privacy_enhancements_enabled: true- Master switch for log rotation, history clearing, log filtering, and cleanupTo enable full debugging when troubleshooting, set both
strongswan_log_level: 2andprivacy_enhancements_enabled: false. This will capture detailed connection logs and disable all privacy features. Remember to revert these changes after debugging.After deployment, verify your privacy settings:
Perfect privacy is impossible with any VPN solution. Your cloud provider sees and logs network traffic metadata regardless of your server configuration. And of course, your ISP knows you’re connecting to a VPN server, even if they can’t see what you’re doing through it.
For the highest level of privacy, treat your Algo servers as disposable. Spin up a new instance when you need it, use it for your specific purpose, then destroy it completely. The ephemeral nature of cloud infrastructure can be a privacy feature if you use it intentionally.
Additional Documentation
Setup Instructions for Specific Cloud Providers
Install and Deploy from Common Platforms
Setup VPN Clients to Connect to the Server
Advanced Deployment
If you’ve read all the documentation and have further questions, create a new discussion.
Endorsements
– Kenn White
– The Register
– the grugq
– Romain Dillet for TechCrunch
– Thorin Klosowski for Lifehacker
Contributing
See our Development Guide for information on:
Support Algo VPN
All donations support continued development. Thanks!
Algo is licensed and distributed under the AGPLv3. If you want to distribute a closed-source modification or service based on Algo, then please consider purchasing an exception . As with the methods above, this will help support continued development.