Let’s assume that there is some insecure link between your computer and WiFi-reachable gateway.
wlan0 NIC with 192.168.0/24 network on it.
Install. At first you must install this software: download, check the signature, compile.
Prepare the client. Generate client’s verifier for Alice as an example:
client% ./utils/newclient.sh Alice
Passphrase:
Your client verifier is: $balloon$s=32768,t=16,p=2$bwR5VjeCYIQaa8SeaI3rqg
Place the following YAML configuration entry on the server's side:
Alice:
up: /path/to/up.sh
iface: or TUN/TAP interface name
verifier: $balloon$s=32768,t=16,p=2$bwR5VjeCYIQaa8SeaI3rqg$KCNIqfS4DGsBTtVytamAzcISgrlEWvNxan1UfBrFu10
Prepare the server. Add this entry to peers.yaml configuration file:
Alice:
iface: tap10
verifier: $balloon$s=32768,t=16,p=2$bwR5VjeCYIQaa8SeaI3rqg$KCNIqfS4DGsBTtVytamAzcISgrlEWvNxan1UfBrFu10
Prepare network on GNU/Linux IPv4 server:
server% ip addr add 192.168.0.1/24 dev wlan0 server% ip tuntap add dev tap10 mode tap server% ip addr add 172.16.0.1/24 dev tap10 server% ip link set up dev tap10
Run server daemon itself:
server% govpn-server -bind 192.168.0.1:1194
Prepare network on GNU/Linux IPv4 client:
client% ip addr add 192.168.0.2/24 dev wlan0 client% ip tuntap add dev tap10 mode tap client% ip addr add 172.16.0.2/24 dev tap10 client% ip link set up dev tap10 client% ip route add 0/1 via 172.16.0.1 client% ip route add 128/1 via 172.16.0.1
Run client daemon itself:
client% govpn-client \
-verifier '$balloon$s=32768,t=16,p=2$bwR5VjeCYIQaa8SeaI3rqg' \
-iface tap10 \
-remote 192.168.0.1:1194
FreeBSD IPv6 similar client-server example:
server% ifconfig em0 inet6 fe80::1/64 server% govpn-server -bind "fe80::1%em0"
client% ifconfig me0 inet6 -ifdisabled auto_linklocal
client% ifconfig tap10
client% ifconfig tap10 inet6 fc00::2/96 up
client% route -6 add default fc00::1
client% govpn-client \
-verifier '$balloon$s=32768,t=16,p=2$bwR5VjeCYIQaa8SeaI3rqg' \
-iface tap10 \
-remote "[fe80::1%me0]":1194