diff --git a/README.md b/README.md index 5356c2c..2a93999 100644 --- a/README.md +++ b/README.md @@ -61,7 +61,7 @@ Some users have created their own repositories for manual connections, based on | Linux | No | Python | WireGuard, PF | [milahu/python-piavpn](https://github.com/milahu/python-piavpn) | | Linux | No | Bash | WireGuard, PF,
router and android config | [triffid/pia-wg](https://github.com/triffid/pia-wg) | | Linux/FreeBSD/Win | No | Go | WireGuard,
config generation | [ddb_db/piawgcli](https://gitlab.com/ddb_db/piawgcli) | -| OPNsense | No | Python | WireGuard, PF | [FingerlessGlov3s/OPNsensePIAWireguard](https://github.com/FingerlessGlov3s/OPNsensePIAWireguard) | +| OPNsense | No | Python | WireGuard, PF, DIP | [FingerlessGlov3s/OPNsensePIAWireguard](https://github.com/FingerlessGlov3s/OPNsensePIAWireguard) | | pfSense | No | Sh | OpenVPN, PF | [fm407/PIA-NextGen-PortForwarding](https://github.com/fm407/PIA-NextGen-PortForwarding) | | pfSense | No | Java/PHP | WireGuard, PF | [ddb_db/pfpiamgr](https://gitlab.com/ddb_db/pfpiamgr) | | Synology | Yes | Bash | Compatibility | [steff2632/manual-connections](https://github.com/steff2632/manual-connections) | @@ -69,6 +69,7 @@ Some users have created their own repositories for manual connections, based on | TrueNAS | No | Bash | PF | [dak180/TrueNAS-Scripts](https://github.com/dak180/TrueNAS-Scripts/blob/master/pia-port-forward.sh) | | UFW | Yes | Bash | Firewall Rules | [iPherian/manual-connections](https://github.com/iPherian/manual-connections) | | Windows | No | PowerShell | Windows comptaibility | [ImjuzCY/pia-posh](https://github.com/ImjuzCY/pia-posh) | +| Windows | No | Powershell | OpenVPN, PF | [dougbenham/PIA-OpenVPN-Script](https://github.com/dougbenham/PIA-OpenVPN-Script) | ## PIA Port Forwarding diff --git a/connect_to_wireguard_with_token.sh b/connect_to_wireguard_with_token.sh index 30aa3a2..6d0c89e 100755 --- a/connect_to_wireguard_with_token.sh +++ b/connect_to_wireguard_with_token.sh @@ -139,7 +139,7 @@ $dnsSettingForVPN [Peer] PersistentKeepalive = 25 PublicKey = $(echo "$wireguard_json" | jq -r '.server_key') -AllowedIPs = 0.0.0.0/0 +AllowedIPs = 0.0.0.0/1, 128.0.0.0/1 Endpoint = ${WG_SERVER_IP}:$(echo "$wireguard_json" | jq -r '.server_port') " > /etc/wireguard/pia.conf || exit 1 echo -e "${green}OK!${nc}" diff --git a/get_token.sh b/get_token.sh index 38ab5c0..6285a26 100755 --- a/get_token.sh +++ b/get_token.sh @@ -69,7 +69,7 @@ fi echo -n "Checking login credentials..." generateTokenResponse=$(curl -s -u "$PIA_USER:$PIA_PASS" \ - "https://privateinternetaccess.com/gtoken/generateToken") + "https://www.privateinternetaccess.com/gtoken/generateToken") if [[ $(echo "$generateTokenResponse" | jq -r '.status') != "OK" ]]; then echo