jonny5alive wrote:
Thank you David, I will try it out.
I've read about SSH tunneling... is this a viable alternative or not?
Depending on your needs, certainly - I wouldn't categorize it as a VPN though, so didn't think about it based on your initial question. But it's likely to be simpler to operate if it serves your needs.
If you're trying to reach a single target host/port, a plain ssh forwarding tunnel (e.g., the client "-L" option) will work fine, though you then have to tell your client to connect to the local end of the tunnel, and have to set up different local endpoints for multiple targets (you can use multiple "-L" options on a single connection).
If you just want browser support, then it's easier to use the SSH SOCKS support (the client "-D" option) instead, and reconfigure your browser to use the local SOCKS interface. The advantage to this is that it can dynamically switch endpoints, so can cover most browsing requirements in terms of visiting any hosts, but still needs you to switch browser configuration when you're back in a non-tunneled configuration.
I use CopSSH as a simple self-contained (with installer) SSH implementation for Windows, which you could use as a command line client. I'm sure there are a bunch of other implementations, and probably GUI wrappers, but am not familiar with any others personally.
But if you want general IP access to the net, the VPN link is the most general, and requires no changes to any client applications. Essentially, once set up, you right click the tray icon (on the Windows client), pick the server to connect to, and after you're connected that becomes your default route out (if you so configure it) and all applications will just work normally. It does require more initial setup but that's pretty much a one time thing.
But for basic browser support, you could use the SOCKS setup initially (it just needs sshd running on your server) as then decide if you want to try setting up OpenVPN. Note that in either case any firewall filters your server has will need to let the appropriate inbound traffic in, and for the OpenVPN case, back out again since the traffic will be arriving on your server via a separate VPN interface.
Oh, and one other OpenVPN complexity I forgot in my first post - you'll probably need to set up iptables for NATing the OpenVPN traffic. That's because the addresses OpenVPN is assigning to clients will not be globally reachable, so won't work for traffic going back out to the general Internet, and will need to be NATed so they look like they're coming from your Linode address. Not terribly hard, but another setup step. (I'd probably work on that after you had the basic OpenVPN link working and could access your Linode itself)
-- David