NymVPN alpha CLI Guide
NymVPN is an experimental software and it's for testing purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results.
Installation
Any syntax in
<>
brackets is a user's/version unique variable. Exchange with a corresponding name without the<>
brackets.
-
Open Github releases page (opens in a new tab) and download the CLI latest binary for your system
-
Verify sha hash of your downloaded binary with the one listed on the releases page (opens in a new tab). You can use a simple
shasum
command and compare strings (ie with Python) or run in the same directory the following command, exchanging<SHA_STRING>
with the one of your binary, like in the example:
echo "<SHA_STRING>" | shasum -a 256 -c
# choose a correct one according to your binary, this is just an example
# echo "0e4abb461e86b2c168577e0294112a3bacd3a24bf8565b49783bfebd9b530e23 nym-vpn-cli_<!-- cmdrun scripts/nym_vpn_cli_version.sh -->_ubuntu-22.04_amd64.tar.gz" | shasum -a 256 -c
- Extract files:
tar -xvf <BINARY>.tar.gz
# for example
# tar -xvf nym-vpn-cli_<!-- cmdrun scripts/nym_vpn_cli_version.sh -->_ubuntu-22.04_x86_64.tar.gz
- Make executable:
# make sure you are in the right sub-directory
chmod u+x ./nym-vpn-cli
Run NymVPN
For NymVPN to work, all other VPNs must be switched off! At this alpha stage of NymVPN, the network connection (wifi) must be reconnected after or in between the testing rounds.
Make sure your terminal is open in the same directory as your nym-vpn-cli
binary.
- Go to nymvpn.com/en/alpha (opens in a new tab) to get the entire command with all the needed arguments' values and your wireguard private key for testing purposes
- Run it as root with
sudo
- the command will look like this with specified arguments:
sudo ./nym-vpn-cli -c ./sandbox.env --entry-gateway-id <ENTRY_GATEWAY_ID> --exit-router-address <EXIT_ROUTER_ADDRESS> --enable-wireguard --private-key <PRIVATE_KEY> --wg-ip <WIREGUARD_IP>
- To choose different Gateways, visit explorer.nymtech.net/network-components/gateways (opens in a new tab) and copy-paste an identity key of your choice
- See all possibilities in command explanation section below
In case of errors, see troubleshooting section.
CLI Commands and Options
The basic syntax of nym-vpn-cli
is:
sudo ./nym-vpn-cli <--exit-router-address <EXIT_ROUTER_ADDRESS>|--exit-gateway-id <EXIT_GATEWAY_ID>|--exit-gateway-country <EXIT_GATEWAY_COUNTRY>>
- To choose different Gateways, visit nymvpn.com/en/alpha/api/gateways (opens in a new tab)
- To see all possibilities run with
--help
flag:
./nym-vpn-cli --help
```sh
Usage: nym-vpn-cli [OPTIONS] <--exit-router-address <EXIT_ROUTER_ADDRESS>|--exit-gateway-id <EXIT_GATEWAY_ID>|--exit-gateway-country <EXIT_GATEWAY_COUNTRY>>
Options:
-c, --config-env-file <CONFIG_ENV_FILE>
Path pointing to an env file describing the network
--mixnet-client-path <MIXNET_CLIENT_PATH>
Path to the data directory of a previously initialised mixnet client, where the keys reside
--entry-gateway-id <ENTRY_GATEWAY_ID>
Mixnet public ID of the entry gateway
--entry-gateway-country <ENTRY_GATEWAY_COUNTRY>
Auto-select entry gateway by country ISO
--entry-gateway-low-latency
Auto-select entry gateway by latency
--exit-router-address <EXIT_ROUTER_ADDRESS>
Mixnet recipient address
--exit-gateway-id <EXIT_GATEWAY_ID>
--exit-gateway-country <EXIT_GATEWAY_COUNTRY>
Mixnet recipient address
--enable-wireguard
Enable the wireguard traffic between the client and the entry gateway
--private-key <PRIVATE_KEY>
Associated private key
--wg-ip <WG_IP>
The IP address of the wireguard interface used for the first hop to the entry gateway
--nym-ipv4 <NYM_IPV4>
The IPv4 address of the nym TUN device that wraps IP packets in sphinx packets
--nym-ipv6 <NYM_IPV6>
The IPv6 address of the nym TUN device that wraps IP packets in sphinx packets
--nym-mtu <NYM_MTU>
The MTU of the nym TUN device that wraps IP packets in sphinx packets
--disable-routing
Disable routing all traffic through the nym TUN device. When the flag is set, the nym TUN device will be created, but to route traffic through it you will need to do it manually, e.g. ping -Itun0
--enable-two-hop
Enable two-hop mixnet traffic. This means that traffic jumps directly from entry gateway to exit gateway
--enable-poisson-rate
Enable Poisson process rate limiting of outbound traffic
--disable-background-cover-traffic
Disable constant rate background loop cover traffic
-h, --help
Print help
-V, --version
Print version
```
Here is a list of the options and their descriptions. Some are essential, some are more technical and not needed to be adjusted by users.
Fundamental commands and arguments
-c
is a path to the Sandbox config (opens in a new tab) file saved assandbox.env
--entry-gateway-id
: paste one of the values labeled with a key"identityKey"
(without" "
) from here (opens in a new tab)--exit-router-address
: paste one of the values labeled with a key"address"
(without" "
) from here here (opens in a new tab)--enable-wireguard
: Enable the wireguard traffic between the client and the entry gateway. NymVPN uses Mullvad libraries for wrappingwireguard-go
and to setup local routing rules to route all traffic to the TUN virtual network device--wg-ip
: The address of the wireguard interface, you can get it here (opens in a new tab)--private-key
: get your private key for testing purposes here (opens in a new tab)--enable-two-hop
is a faster setup where the traffic is routed from the client to Entry Gateway and directly to Exit Gateway (default is 5-hops)
Advanced options
--enable-poisson
: Enables process rate limiting of outbound traffic (disabled by default). It means that NymVPN client will send packets at a steady stream to the Entry Gateway. By default it's on average one sphinx packet per 20ms, but there is some randomness (poisson distribution). When there are no real data to fill the sphinx packets with, cover packets are generated instead.--ip
is the IP address of the TUN device. That is the IP address of the local private network that is set up between local client and the Exit Gateway.--mtu
: The MTU of the TUN device. That is the max IP packet size of the local private network that is set up between local client and the Exit Gateway.--disable-routing
: Disable routing all traffic through the VPN TUN device.
Testnet environment
If you want to run NymVPN CLI in Nym Sandbox environment, there are a few adjustments to be done:
- Create Sandbox environment config file by saving this (opens in a new tab) as
sandbox.env
in the same directory as your NymVPN binaries by running:
curl -o sandbox.env -L https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env
-
Check available Gateways at nymvpn.com/en/alpha/api/gateways (opens in a new tab)
-
Run with a flag
-c
sudo ./nym-vpn-cli -c <PATH_TO>/sandbox.env <--exit-router-address <EXIT_ROUTER_ADDRESS>|--exit-gateway-id <EXIT_GATEWAY_ID>|--exit-gateway-country <EXIT_GATEWAY_COUNTRY>>