If they match, your VPN is not working correctly. It will show you your current public IP address and you'll compare that to the one from before. Type the following command, this will give you information about your connection. This should give you a some nice lines signaling that you are connected to the VPN. sudo systemctl start openvpn- based on the above example, is us-californa. Try the connection, this is where the new systemctl magic comes in.
#Pia openvpn password#
If you do not do this, OpenVPN will ask for a username and password each time you want to connect, and that's not a good headless setup. Modify the file you just created (I suggest nano) at the following line: auth-user-pass -> auth-user-pass /etc/openvpn/login. Name it something simple, for example nf as this filename will become the name of the OpenVPN service later. Save your configuration with nano /etc/openvpn/client/.conf. I don't know why this happened, but switching to the TCP/:502 setup solved the problem instantly. I had a connection on paper, but there was no data flow. When I tried with the recommended UDP configuration files, there was a successful connection and ping went through as well, but nothing else. Use the Recommended TCP configuration.Your speed should not be affected that much anyways as long as it's decently close. For me for example, the closest server is always very busy with high latency throughout the evening, so I chose one that's a bit further but never as congested. Make sure to choose one that is reliable 24/7. There is no automatic failover or connection to another region. You can only have a single location at a time.Try another server if you face this issue as well. I got access denied - authentication failure on some of the servers, the others worked perfectly.Go to PIA OpenVPN Configurator and create a configuration file for your favorite location. Sudo bash - c 'echo "PASSWORD" > /etc/openvpn/login'ĭownload PIA OpenVPN config file. sudo bash - c 'echo "USERNAME" > /etc/openvpn/login' As long as your Pi is well secured, it should not be a problem. While this is not technically "best practice", I could not come up with a safer way. Since PIA VPN uses auth-pass in its configuration, we need to save the PIA username + password in a file on the server - the same you use to log into the desktop app or website.
#Pia openvpn install#
Install OpenVPN on your Raspberry sudo apt install openvpn -yĬreate a login file for OpenVPN. Take note of the IP address displayed there, that's your current public IP without the VPN.
#Pia openvpn update#
sudo apt update & sudo apt upgrade -yĬheck if you have an internet connection to begin with.