FrootVPN: encrypted anonymous VPN

anonymousUpdate: FrootVPN is no longer free.

FrootVPN is a (The Pirate Bay endorsed) free VPN service that routes all your network traffic anonymously through servers in Stockholm. The mechanism is different from Tor, where network bandwidth is randomly shared among the users. As per the claims on the FrootVPN website, the traffic is fully anonymous, censor free and no user information is saved in the servers.

Features

  • Completely anonymizes the system
  • Hides your original IP
  • All data is encrypted
  • High speed 10Gbit backbone (no limits)
  • No logs collected
  • Based in Stockholm, Sweden
  • Supported protocols:
    > PPTP protocol (128 bit key encryption)
    > L2TP protocol (168 bit key encryption)
    > OpenVPN protocol (2048 bit key certificate, 256 bit key encryption)
  • Free
  • Supports Linux, Windows, Mac, Android, Iphone, Ipad

NOTE: The service needs registration with an email ID. However, it does not verify it. Anything would work.

To use FrootVPN on Ubuntu:

As I can see in Reddit, many users are unable to connect or facing issues with FrootVPN. Here’s what I did with some hiccups. Now it works fine and connection speed is fast.

  1. Create an account with FrootVPN (link removed)
  2. Install openvpn:
    $ sudo apt-get install openvpn
  3. Download the configuration file for frootvpn:
    $ sudo wget https://www.frootvpn.com/files/frootvpn.ovpn -O /etc/openvpn/frootvpn.ovpn
  4. Create the openvpn connection:
    $ sudo openvpn /etc/openvpn/frootvpn.ovpn
  5. Check your IP address.
  6. Now cross-check the IP address here. This is a WebRTC test page to check if your VPN is leaking. The addresses in 5 and 6 should match.

NOTE: To strengthen your anonymity, try changing your MAC address with macchanger.

Troubleshooting

  • I faced some issues in Step 4 as I had IPv6 disabled in the kernel level. Enable IPv6 if disabled.
  • In case any domain/websites not responding for you, or you get the following error in TLS handshake:
    TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    TLS Error: TLS handshake failed
    SIGUSR1[soft,tls-error] received, process restarting

    try adding the following in your /etc/resolv.conf as the first nameserver entry:

    nameserver 80.67.0.2

    On Ubuntu, I use the following script:

    $ sudo sed -i '3i\nameserver 80.67.0.2' /etc/resolv.conf
    $ sudo openvpn /etc/openvpn/frootvpn.ovpn

Free alternatives (with OpenVPN support)

  • VPN Gate: Academic project at University of Tsukuba, Japan. Free. No registration.
  • FreeVPN.me: Free. No registration.

NOTE: Some of the alternatives have servers in the US.

24 thoughts on “FrootVPN: encrypted anonymous VPN”

      1. It says something about Inactivity Timeout and then if I reconnect it says “Cannot resolve host address: se-openvpn.frootvpn.com: Temporary failure in name resolution”

  1. How to set this VPN with my network-manager in KDE ? Debian Wheezy, btw. I’ve imported ovpn file as well as copied and created ca.crt with certificate but I cannot connect. I can connect only with the command in CLI: sudo openvpm ~/ etc. … Any tip, please ? Thans. Tack 😉

    1. On a second thought, why not contact the FrootVPN guys directly for support? I can see that you can mail them from the Contact page.
      In addition, plz take a note of Odin’s comment below. KDE Network Manager seems to have a OpenVPN plugin too (at lease for OpenSUSE… as I can see in Google results).

  2. Thanks for the how-to. I am also testing Frootvpn but am starting to have trouble setting it up via NetworkManager. I am running Arch-Linux and openbox. In NetworkManager there is an option to Automatically connect to a vpn and the vpn runs perfectly. Now, according to the NetworkManager wiki found here: https://wiki.archlinux.org/index.php/NetworkManager#VPN_support , I have to install the package networkmanager-openvpn when using openvpn. After the install the connection is no longer able to connect automatically. I have to manually enter the information pertaining to frootvpn such as gateway, user/ca certificates and private key information. My question is, where can I find this information? I am to create this using easy-rsa or is this providied elsewhere? Or is it safe to just connect to this vpn without this information?

    1. I figured it out. Click NetworkManager, Add, import from saved vpn configuration and find the frootvpn.ovpn you downloaded. Under Authentication change type to just password. You can either have your password saved or ask everytime you click. that is up to the user. Where it says Ca certificate you have to copy the crt from the frootvpn.ovpn and save it as ca.crt. In the frootvpn.ovpn the ca certificate will be between the tags. Copy everything between tags and save as ca.crt. From there frootvpn should work from network manager.

          1. Open the frootvpn.ovpn file that you download from the website in any editor. In the file you will find code between ca tags. Copy the code between the ca tags into a new file and name it ca.crt

    1. I am not seeing any issues even after I disconnect. My network configuration returns back to normal. It does not install any software on your system.
      If you are asking about OpenVPN, just run:
      $ sudo apt-get purge openvpn

        1. Press Ctrl-C in the terminal where you have run the following command:
          $ sudo openvpn /etc/openvpn/frootvpn.ovpn
          Notice that the VPN tunnel remains live as long as you don’t kill it.

Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s