A suite of shell scripts that provide autonomous functionality for Port Forwarding from the Private Internet Access Linux VPN Client.
The shell script ipcheck.sh
checks for changes to your VPN IP and Port, and triggers an IFTTT event if changes are detected. This way you can be remotely notified how to connect to the PC without knowing the IP and Port the VPN assigns on auto connect.
The pia-port-detect.sh
script runs in the background, forwarding the current VPN port to the specified local port (default: 22). This allows you to easily use SSH, a Minecraft server, etc. with your PIA Port.
The pia-fwd.sh
script allows you to easily change the local port that the VPN port points to. For example, ./pia-fwd.sh 25565
would point the PIA VPN Port to Port 25565 (default for Minecraft server).
The scripts require the netcat
, curl
, and socat
utilities. You'll need git
to clone the repo and a text editor like nano
to edit the .env
file.
Additionally, the default local port that is accessible on startup is 22, so it would be most beneficial if you have SSH setup on your machine. You can change this default port in pia-port-detect.sh
.
You'll need cron
if you want to set up a cronjob to run on startup in the way these scripts are intended to function.
To install cron
on Arch Linux, use the cronie
package:
sudo pacman -S cronie
sudo systemctl enable cronie
Download the Linux installation script from the Private Internet Access VPN website.
If you're attempting to run the VPN on a Raspberry Pi, you must download the ARM version from here.
To download and install from the command line (with wget
installed), replace the URL with the most updated one from here (amd64) or here (arm64) and run:
# wget https://installers.privateinternetaccess.com/download/pia-linux-3.3.1-06924.run #amd64
wget https://installers.privateinternetaccess.com/download/pia-linux-arm64-3.3.1-06924.run #arm64
chmod +x pia-linux*
./pia-linux*
Ensure that the piactl
executable is at/usr/local/bin/piactl
and test it's working by running piactl get vpnip
.
To configure PIA VPN like me, run:
piactl set allowlan true
piactl set protocol openvpn
piactl set requestportforward true
Then, log in by running:
echo "YOUR_USERNAME" > login.txt
echo "YOUR_PASSWORD" >> login.txt
piactl login login.txt
rm login.txt
Install the PIA VPN Linux Client by running their official script from their website. Ensure that the piactl
executable is at/usr/local/bin/piactl
.
Use the GUI installer to login and configure the client. If you want a configuration like mine, use the following settings:
-
General
- Check "Launch on System Startup"
- Check "Connect on Launch"
-
Protocols
- Select OpenVPN
- Transport: TCP
- Remote Port: 80
- Data Encryption: AES-256
- Uncheck "Try Alternate Settings"
- Select OpenVPN
-
Network
- DNS: PIA DNS
- Check "Request Port Forwarding"
- Check "Allow LAN Traffic"
-
Privacy
- Uncheck "VPN Kill Switch"
-
Help
- Uncheck "Enable Debug Logging"
- Check "Disable Accelerated Graphics
Enable the PIA VPN Daemon.
piactl background enable
Add a cronjob to crontab -e
to connect to the VPN on startup.
@reboot /usr/local/bin/piactl connect
NOTE: The cronjob is necessary even when the PIA daemon is enabled and auto-connect is enabled to connect on startup.
Ensure git
is installed, then clone the git repo.
git clone https://github.com/ethmth/pia-ip.git
cd pia-ip/
Copy the sample .env.example
file to .env
.
cp .env.example .env
Additionally, once in the pia-ip
directory, run pwd
to print your current directory. Copy your current directory and add it to the third line in pia-fwd.sh
that says ABSOLUTE_PATH=
, replacing what's currently there.
For example,
#!/bin/sh
ABSOLUTE_PATH="/home/$USER/pia-ip"
...
Determine your device's wireless or wired network interface, whichever you want to determine the local IP of. ip a
gives a list of network interfaces on your device. A common wireless interface is wlan0
.
Edit the .env
file with your network interface.
INTERFACE_NAME=<your_network_interface>
Put your interface in place of <your_network_interface>
,
For example: INTERFACE_NAME=wlan0
NOTE: The
.env
file may be hidden, but if you cloned this repo from GitHub and entered its directory, it will be there. You can edit it by typingnano .env
.
Register an IFTTT account, then create an applet.
For the If This service, select "Webhooks" then "Receive a web request with a JSON payload". Call the event name something you'll remember, such as pi_awoken.
Add the event name to the .env
file.
IFTTT_EVENT=<your_event_name>
For the Then That service, you could theoretically select anything, but I selected "Send an email."
Once the Applet is created, go to ifttt.com/maker_webhooks and click Documentation. It should say "Your key is: <your_key>". Copy the key, then add it to the .env
file.
IFTTT_KEY=<your_key>
You can put whatever you'd like for the IFTTT_MESSAGE
.
Make the scripts executable.
chmod +x ipcheck.sh
chmod +x pia-fwd.sh
chmod +x pia-port-detect.sh
chmod +x pia-reconnect.sh
chmod +x pia-report.sh
Once you added the environment variables to the .env
file, test the first script by running it.
./ipcheck.sh
If you set it up correctly, your IFTTT event should get triggered with the local IP address, the VPN IP address, and the VPN Port.
If you would like this script to run on startup, I would recommend setting up a cronjob
.
crontab -e # Edit your crontab
Then, add the following lines, replacing the directory with the directory you cloned the git repo into.
@reboot /home/$USER/pia-ip/ipcheck.sh
@reboot /home/$USER/pia-ip/pia-port-detect.sh
5 5 * * * /home/$USER/pia-ip/pia-reconnect.sh 30
25 5 * * * /home/$USER/pia-ip/pia-report.sh
35 5 * * * /home/$USER/pia-ip/pia-fwd.sh 22
- The first line will cause the
ipcheck.sh
script to run on startup and detect VPN IP updates. - The second line will start the
pia-port-detect.sh
script which will also run on startup to ensure that any VPN Port changes are accounted for regarding port forwarding.
NOTE: Lines 3-5 are optional.
- The third line will automatically reconnect to the VPN at 5:05 AM every night.
- The fourth line will report the current VPN IP, Port, and Local IP every night at 5:25 AM, regardless of whether it has changed.
- The fifth line will reset the Local Port to 22 every day at 4:30 AM, so you are not locked out of your machine for more than a day if you mess up your forwarding.
To make it easier to change the Local Port the VPN Port points to, simply add pia-fwd.sh
to your bin.
To make it easier to reconnect to the VPN, add pia-reconnect.sh
to your bin.
sudo cp pia-fwd.sh /usr/bin/pia-fwd
sudo chmod +x /usr/bin/pia-fwd # Ensure it's executable
sudo cp pia-reconnect.sh /usr/bin/pia-reconnect
sudo chmod +x /usr/bin/pia-reconnect # Ensure it's executable
Now, you can simply type $ pia-fwd 25565
in your shell to start forwarding the VPN port to the default Minecraft Local Port. This is an example and you could use any valid port instead of 25565.
NOTE: Try to reset the port to 22 by using
$ pia-fwd 22
when you're done if you'll be leaving your machine and want to remotely access it using SSH later.
To reconnect to the VPN, you can just run pia-reconnect
.