Package Details: private-internet-access-vpn 3.4-4

Git Clone URL: https://aur.archlinux.org/private-internet-access-vpn.git (read-only, click to copy)
Package Base: private-internet-access-vpn
Description: Installs VPN profiles for Private Internet Access Service
Upstream URL: https://www.privateinternetaccess.com/
Keywords: connman networkmanager openvpn python vpn
Licenses: GPL
Conflicts: xawtv
Submitter: flamusdiu
Maintainer: Auerhuhn
Last Packager: Auerhuhn
Votes: 87
Popularity: 0.41
First Submitted: 2014-08-14 01:22 (UTC)
Last Updated: 2024-12-22 18:56 (UTC)

Pinned Comments

Auerhuhn commented on 2023-10-27 08:23 (UTC) (edited on 2023-10-27 08:23 (UTC) by Auerhuhn)

Note that this package provides only VPN profiles but not the vendor’s software.

The package version refers to the python-pia tool by @flamusdiu, which may lag behind the vendor’s own VPN software version.

Please do not flag this package out-of-date unless @flamusdiu releases a new stable python-pia version.

Thank you!

Latest Comments

« First ‹ Previous 1 .. 28 29 30 31 32 33 34 35 36 37 38 .. 48 Next › Last »

Svante commented on 2016-07-14 07:26 (UTC)

Mine is still not working :-( I can now connect to the VPN's, but it blocks my internet connection? If I run 'sudo pia -a' I get a lot of output. Here is some of it: client dev tun proto udp remote nl.privateinternetaccess.com 1198 resolv-retry infinite nobind persist-key persist-tun cipher aes-128-cbc auth sha1 tls-client remote-cert-tls server auth-user-pass /etc/private-internet-access/login.conf comp-lzo verb 1 reneg-sec 0 crl-verify /etc/openvpn/crl.rsa.2048.pem ca /etc/openvpn/ca.rsa.2048.crt auth-nocache script-security 2 up /etc/openvpn/update-resolv-conf.sh down /etc/openvpn/update-resolv-conf.sh

cryzed commented on 2016-07-14 03:45 (UTC)

@flamusdiu, Thank you for fixing this so quickly!

flamusdiu commented on 2016-07-14 02:59 (UTC)

Should be fixed now. NOTE: Only the "normal" strength work atm. I'll add support for the strong ones in the next day or so.

nigeil commented on 2016-07-14 02:01 (UTC) (edited on 2016-07-14 02:07 (UTC) by nigeil)

CHILL CHILL, FELLOW FRIENDS, this problem now appears to be resolved. The UDP port that PIA uses has changed, but for whatever reason the downloaded zip scripts don't reference this. Use UDP port 1198 NOT 1194, and login should be successful. proto udp remote us-east.privateinternetaccess.com 1198 Use sudo sed -i 's/1194/1198/g' /etc/openvpn/*.conf to change all of the ports (only if this directory houses PIA scripts exclusively) Contacting tech support was helpful. Someone needs to update the PKGBUILD to download the newest openvpn.zip files, they have the changed ports. Also, commenters need to chill out, it was clear that the issue was being looked into by community members, I don't blame the package maintainer one bit for this, you keep doing you guy.

flamusdiu commented on 2016-07-14 01:22 (UTC)

I know -- I saw the article the same day they posted it. I just didn't realize at first they changed their default configurations as well as added the "strong" ones.

stevendupuis commented on 2016-07-14 00:44 (UTC)

PIA is making some changes after deciding to leave the Russian territories. However, the package is still broken. Please fix it. Thanks ...

twisted-space commented on 2016-07-13 15:44 (UTC)

This seems to be an issue with PIA themselves, see https://www.privateinternetaccess.com/forum/discussion/21796/vpn-connection-failed-message-with-new-configuration-files

stevendupuis commented on 2016-07-13 13:32 (UTC)

Yes, please fix the package - PIA has updated their security.

<deleted-account> commented on 2016-07-13 09:13 (UTC)

Thanks for the broken package. Again. Nothing personal, but would you be so kind to test the package before updating?

elbowz commented on 2016-07-13 08:14 (UTC)

I'm getting this errors: sudo openvpn --config /etc/openvpn/Brazil.conf Wed Jul 13 10:13:31 2016 OpenVPN 2.3.11 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 12 2016 Wed Jul 13 10:13:31 2016 library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 Wed Jul 13 10:13:31 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Jul 13 10:13:31 2016 UDPv4 link local: [undef] Wed Jul 13 10:13:31 2016 UDPv4 link remote: [AF_INET]177.154.145.104:1194 Wed Jul 13 10:13:31 2016 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com Wed Jul 13 10:13:31 2016 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed Wed Jul 13 10:13:31 2016 TLS_ERROR: BIO read tls_read_plaintext error Wed Jul 13 10:13:31 2016 TLS Error: TLS object -> incoming plaintext read error Wed Jul 13 10:13:31 2016 TLS Error: TLS handshake failed