Skip to content

Golliwog

My feedback

10 results found

  1. 69 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
  2. 1,046 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
  3. 74 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Golliwog commented  · 

    This can be done with a box like pfSense. See https://protonvpn.com/support/pfsense-wireguard/

    An issue arises when you have multiple VPNs using the same subnet. According to Proton support, multiple VPN connections from the same device are possible with this workaround:

    "Regarding the feature request, you should be able to use 10.3.0.1 for gateway/DNS, and 10.3.0.2 for your IP.
    It also works for 10.4.0.x, 10.5.0.x, etc. (the important thing is that the gateway should be .1)"

    I have tested and confirmed the solution up to 10.8.0.x.

    Also note, your Wireguard listening port (normally 51820) must be unique. I increment mine, eg. 51821, 51822, etc. for every additional connection. The peer port does not change.

  4. 6 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Golliwog commented  · 

    I spoke to Proton support, the solution has already been implemented!

    "Regarding the feature request, you should be able to use 10.3.0.1 for gateway/DNS, and 10.3.0.2 for your IP.
    It also works for 10.4.0.x, 10.5.0.x, etc. (the important thing is that the gateway should be .1)"

    I have tested and confirmed the solution up to 10.8.0.x.

    Also note, your Wireguard listening port (normally 51820) must be unique. I increment mine, eg. 51821, 51822, etc. for every additional connection. The peer port does not change.

    An error occurred while saving the comment
    Golliwog commented  · 

    The root of this issue is that all of ProtonVPNs Wireguard tunnels use the same network for clients on all servers - 10.2.0.2/32.

    I suggest setting the Wireguard network to a random IP. For example: 10.2.0.{random}/32

    Alternately, set the last octet to the server number in that country; eg. AU#66 would use 10.2.0.66/32

  5. 29 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
    An error occurred while saving the comment
    Golliwog commented  · 

    Tailscale is insecure if the coordination server is hosted by a third party. It effectively gives the coordination server access to someone's whole network.

    With ProtonVPN, I hate that at home, from my Android phone, I cannot access my local network securely as I have to chose between Always-On VPN and 'LAN Connections'.

    I think the above idea about using ProtonVPN with Tailscale exit nodes is based on a similar problem to me. I would suggest Proton looks at my root cause issue and cooks up a better custom solution.

    I would love a solution to allow access to my home network (at home and away) with all my traffic routing through a ProtonVPN gateway. (Tailscale tech could be used as a starting point.)

  6. 17 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
  7. 11 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Proton Mail  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Golliwog commented  · 

    This is critical. Proton should be conducting extra checks (eg. like the email missing attachments feature) to check for leaked email addresses.

    Golliwog supported this idea  · 
  8. 15 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
  9. 814 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 
  10. 173 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Golliwog supported this idea  · 

Feedback and Knowledge Base