High level of protection
Cryptographic algorithm resistant to date is used for encryption AES-256-GCM
Bypass of the blockings
Full access to YouTube content, Unblocking of FaceBook, VKontakte and other social networks.
Large number of countries!
When connecting, you will be assigned an IP-address of the server you have chosen!

Telegram

Subscribe to our Telegram channel and get all important service news as quickly and conveniently as possible!

Read More...

Twitter

Fresh feed of news via Twitter!

Worldwide IT and security news via our Twitter by MultiVPN...

Read More...

Blog MultiVPN

Official MultiVPN Blog. Top news of MultiVPN service, updates, files and rest urgent important information!

Read More...

Instructions for Fedora Linux: connection to the MultiVPN Service

Open a terminal. First of all, you must obtain superuser rights:


  [[email protected] ~]$ su
  Password:
  [[email protected] user]# id
  uid=0(root) gid=0(root) groups=0(root)
  [[email protected] user]#

Update your system:


  [[email protected] user]# dnf -y update
  Dependencies resolved.
  Nothing to do.
  Complete!
  [[email protected] user]#

Check if you have OpenVPN installed:


  [[email protected] user]# openvpn --version
  OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 19 2020
  library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10
  Originally developed by James Yonan
  Copyright (C) 2002-2018 OpenVPN Inc <[email protected]>
  Compile time defines: enable_async_push=yes enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dependency_tracking=no enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=yes enable_fragment=yes enable_iproute2=yes enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=yes enable_plugin_down_root=yes enable_plugins=yes enable_port_share=yes enable_selinux=yes enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=no enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=yes enable_werror=no enable_win32_dll=yes enable_x509_alt_username=yes with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_sysroot=no
  [[email protected] user]#

If there is no OpenVPN package, install it:


  [[email protected] user]# dnf -y install openvpn
  Dependencies resolved.
  ==========================================================
  Package Architecture Version Repository Size
  ==========================================================
  Installing:
  openvpn x86_64 2.4.9-1.fc32 updates 536 k
  Installing dependencies:
  pkcs11-helper x86_64 1.22-10.fc32 updates 62 k
  Transaction Summary
  ==========================================================
  Install 2 Packages
  Total download size: 598 k
  Installed size: 1.4 M
  Downloading Packages:
  (1/2): pkcs11-helper-1.22-10.fc32.x86_64.rpm 46 kB/s | 62 kB 00:01
  (2/2): openvpn-2.4.9-1.fc32.x86_64.rpm 179 kB/s | 536 kB 00:02
  Total 127 kB/s | 598 kB 00:04
  Running transaction check
  Transaction check succeeded.
  Running transaction test
  Transaction test succeeded.
  Running transaction
  Preparing:
  Installing: pkcs11-helper-1.22-10.fc32.x86_64
  Running scriptlet: openvpn-2.4.9-1.fc32.x86_64
  Installing: openvpn-2.4.9-1.fc32.x86_64
  Running scriptlet: openvpn-2.4.9-1.fc32.x86_64
  Verifying: openvpn-2.4.9-1.fc32.x86_64
  Verifying; pkcs11-helper-1.22-10.fc32.x86_64
  Installed:
  openvpn-2.4.9-1.fc32.x86_64 pkcs11-helper-1.22-10.fc32.x86_64
  Complete!
  [[email protected] user]#

Download OpenVPN configuration files for your tariff plan on the page:
https://multivpn.su/tutorials.php

In this example, RSA configuration files for the "OpenVPN" tariff plan will be used
https://multivpn.su/files/ALL-OpenVPN.zip

Download the OpenVPN configuration files from the service site with a browser, because Anti-DDoS tools will not allow you to do this through wget, curl and other download managers. It is assumed that the archive with the configuration files is saved in /home/user/Downloads.
Directory listing:


  [[email protected] user]# cd Downloads/
  [[email protected] Downloads]# ls -la
  total 328
  drwxr-xr-x. 2 user user 4096 May 17 14:07 .
  drwx------. 15 user user 4096 May 17 13:27 ..
  -rw-rw-r--. 1 user user 326554 May 17 14:07 ALL-OpenVPN.zip
  [[email protected] Downloads]#

Unzip the downloaded archive with the unzip command. For convenience, the output of the command has been greatly reduced. In this example, we will use the RSA configuration file to connect to a server in Germany:


  [[email protected] Downloads]# unzip ALL-OpenVPN.zip
  Archive: ALL-OpenVPN.zip
  creating: ALL-OpenVPN/
  creating: ALL-OpenVPN/CCE/
  {abbreviated}
  creating: ALL-OpenVPN/ECC/
  {abbreviated}
  creating: ALL-OpenVPN/RSA/
  {abbreviated}
  inflating: ALL-OpenVPN/RSA/DE1-OpenVPN.ovpn
  {abbreviated}
  [[email protected] Downloads]#

Go to the directory with the RSA configuration files:


  [[email protected] Downloads]# cd ALL-OpenVPN/RSA/
  [[email protected] RSA]# ls -la
  total 260
  drwxr-xr-x. 2 root root 4096 May 8 02:26 .
  drwxr-xr-x. 5 root root 4096 May 8 02:24 ..
  {abbreviated}
  -rw-r--r--. 1 root root 9562 Apr 29 00:30 DE1-OpenVPN.ovpn
  {abbreviated}
  [[email protected] RSA]# pwd
  /home/user/Downloads/ALL-OpenVPN/RSA
  [[email protected] RSA]#

Connect to the VPN server you need with the command:
openvpn configuration_file_name.ovpn
In this example, this is Germany, configuration file DE1-OpenVPN.ovpn:


  [[email protected] RSA]# openvpn DE1-OpenVPN.ovpn
  Sun May 17 14:23:43 2020 OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 19 2020
  Sun May 17 14:23:43 2020 library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10
  Enter Auth Username: [email protected]
  Enter Auth Password: **********
  Sun May 17 14:23:49 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  Sun May 17 14:23:49 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  Sun May 17 14:23:49 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.9.170.232:2484
  Sun May 17 14:23:49 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
  Sun May 17 14:23:49 2020 Attempting to establish TCP connection with [AF_INET]5.9.170.232:2484 [nonblock]
  Sun May 17 14:23:50 2020 TCP connection established with [AF_INET]5.9.170.232:2484
  Sun May 17 14:23:50 2020 TCP_CLIENT link local: (not bound)
  Sun May 17 14:23:50 2020 TCP_CLIENT link remote: [AF_INET]5.9.170.232:2484
  Sun May 17 14:23:50 2020 TLS: Initial packet from [AF_INET]5.9.170.232:2484, sid=847403b4 1c7414b4
  Sun May 17 14:23:50 2020 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Fort-Funston CA, name=EasyRSA, [email protected]
  Sun May 17 14:23:50 2020 VERIFY KU OK
  Sun May 17 14:23:50 2020 Validating certificate extended key usage
  Sun May 17 14:23:50 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  Sun May 17 14:23:50 2020 VERIFY EKU OK
  Sun May 17 14:23:50 2020 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=server, name=EasyRSA, [email protected]
  Sun May 17 14:23:51 2020 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  Sun May 17 14:23:51 2020 [server] Peer Connection Initiated with [AF_INET]5.9.170.232:2484
  Sun May 17 14:23:52 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  Sun May 17 14:23:53 2020 PUSH: Received control message: 'PUSH_REPLY,route 192.168.9.0 255.255.255.0,redirect-gateway def1,dhcp-option DNS 192.71.244.22,dhcp-option DNS 54.39.94.211,block-outside-dns,route 192.168.9.1,topology net30,ping 10,ping-restart 120,ifconfig 192.168.9.10 192.168.9.9,peer-id 0,cipher AES-256-GCM'
  Sun May 17 14:23:53 2020 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: block-outside-dns (2.4.9)
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: timers and/or timeouts modified
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: --ifconfig/up options modified
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: route options modified
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: peer-id set
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: adjusting link_mtu to 1627
  Sun May 17 14:23:53 2020 OPTIONS IMPORT: data channel crypto options modified
  Sun May 17 14:23:53 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
  Sun May 17 14:23:53 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  Sun May 17 14:23:53 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  Sun May 17 14:23:53 2020 ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:ea:5d:49
  Sun May 17 14:23:53 2020 TUN/TAP device tun0 opened
  Sun May 17 14:23:53 2020 TUN/TAP TX queue length set to 100
  Sun May 17 14:23:53 2020 /sbin/ip link set dev tun0 up mtu 1500
  Sun May 17 14:23:53 2020 /sbin/ip addr add dev tun0 local 192.168.9.10 peer 192.168.9.9
  Sun May 17 14:23:55 2020 /sbin/ip route add 5.9.170.232/32 via 10.0.2.2
  Sun May 17 14:23:55 2020 /sbin/ip route add 0.0.0.0/1 via 192.168.9.9
  Sun May 17 14:23:55 2020 /sbin/ip route add 128.0.0.0/1 via 192.168.9.9
  Sun May 17 14:23:55 2020 /sbin/ip route add 192.168.9.0/24 via 192.168.9.9
  Sun May 17 14:23:55 2020 /sbin/ip route add 192.168.9.1/32 via 192.168.9.9
  Sun May 17 14:23:55 2020 Initialization Sequence Completed

OpenVPN will ask for a login and password to connect. They correspond to your username and password on the service website:


  Enter Auth Username: <<< Enter your E-Mail from your personal account here
  Enter Auth Password: <<< Enter your password here, the same as in your personal account

Do not close the console with the OpenVPN application until while you want to use OpenVPN connection.

Most likely, you will need to configure DNS servers for your connection: NS1 - 192.71.244.22 and NS2 - 54.39.94.211.

If you want to disconnect from the OpenVPN server, in the terminal with the OpenVPN application, press the key combination Ctrl + C


  Sun May 17 14:23:55 2020 Initialization Sequence Completed
  ^CSun May 17 14:32:19 2020 event_wait : Interrupted system call (code=4)
  Sun May 17 14:32:19 2020 /sbin/ip route del 192.168.9.0/24
  Sun May 17 14:32:19 2020 /sbin/ip route del 192.168.9.1/32
  Sun May 17 14:32:19 2020 /sbin/ip route del 5.9.170.232/32
  Sun May 17 14:32:19 2020 /sbin/ip route del 0.0.0.0/1
  Sun May 17 14:32:19 2020 /sbin/ip route del 128.0.0.0/1
  Sun May 17 14:32:19 2020 Closing TUN/TAP interface
  Sun May 17 14:32:19 2020 /sbin/ip addr del dev tun0 local 192.168.9.10 peer 192.168.9.9
  Sun May 17 14:32:19 2020 SIGINT[hard,] received, process exiting
  [[email protected] RSA]#


Linux instructions