<li><ahref="#the-vpn-connects-but-immediately-disconnects-with-encryption-failed">The VPN connects but immediately disconnects with “Encryption failed”</a></li>
<p>You should contact with your provider to double check if there is interest in being added to Passepartout. Beware that some may be concerned instead. Ultimately, you can submit your provider request for a viability review to <ahref="mailto:providers@passepartoutvpn.app">providers@passepartoutvpn.app</a>.</p>
<p><strong>UPDATE</strong>: due to user demands and broader compatibility, today Passepartout <em>does</em> support compression, but LZO only. Both <codeclass="highlighter-rouge">--comp-lzo [yes]</code> and <codeclass="highlighter-rouge">--compress lzo</code> are now legal options. Other algorithms (e.g. LZ4) are not supported and never will. All in all, the use of compression is still discouraged.</p>
<p>Some users may have noticed that Passepartout <del>is</del> was not compatible with any compression algorithm supported by OpenVPN. This <del>is</del> was intentional and <del>comes</del> came from a logical reasoning. Besides being a relevant overhead against marginal gains -most protocols in the application layer (e.g. HTTP) already use compression nowadays-, compression is vulnerable to an attack that may be able to reveal the secret session keys.</p>
<p>The attack is called VORACLE and is <ahref="https://community.openvpn.net/openvpn/wiki/VORACLE">extensively explained</a> by the very authors of OpenVPN. Most major providers have taken action and fixed the issue, but many are still refraining to disable compression for no acceptable reason. In case this happens, you are warmly encouraged to report the issue immediately and possibly link to either the official resource you find above, as it comes directly from the software makers, or this page.</p>
<p>BEWARE: it’s not about making the app work, this is about <em>your safety</em>. Do prompt your provider to disable compression ASAP. Most of the time it’s as easy as tweaking a single configuration line on their backends.</p>
<p>Keeping it broken is absolutely irresponsible.</p>
<h3id="im-on-wi-fi-but-my-device-shows-im-connected-via-lte">I’m on Wi-Fi but my device shows I’m connected via LTE</h3>
<p>The Wi-Fi/LTE icon (replace LTE with any cellular signal) while on VPN has been broken since iOS 10 or the like. It’s something that Apple is unable to fix or doesn’t bother fixing.</p>
<p>You should do a simple test. Verify your data consumption with your LTE provider website, normally phone providers have that. Now, when on VPN and the LTE icon appears in spite of Wi-Fi, download a relevant chunk of data. You may then learn that the plan is unaffected, implying that you’re actually connected via Wi-Fi.</p>
<p>I haven’t found a workaround for this and it’s been there for almost two years. Yeah, it’s a shame.</p>
<h3id="the-configuration-file-contains-an-unsupported-option-external-file">The configuration file contains an unsupported option (external file)</h3>
<p>Due to easier interoperability, the app does not support external files in the .ovpn main configuration. That’s because more often than not, it may not make sense referring to relative paths in a mobile device environment. Think of the Mail app for example. The fix is straightforward though, say you have an external <codeclass="highlighter-rouge">ca</code> file:</p>
<p>The same applies to other settings like <codeclass="highlighter-rouge">cert</code>, <codeclass="highlighter-rouge">key</code>, <codeclass="highlighter-rouge">tls-auth</code> and <codeclass="highlighter-rouge">tls-crypt</code>.</p>
<h3id="the-vpn-connects-but-immediately-disconnects-with-encryption-failed">The VPN connects but immediately disconnects with “Encryption failed”</h3>
<p>This happens when you rely on default OpenVPN encryption, which is normally Blowfish. The algorithm, besides being unsupported by Passepartout, is also weak and therefore discouraged. In order to fix this issue, you must switch to AES encryption. Passepartout only supports AES, be it in CBC or GCM mode.</p>
<p>Set encryption explicitly in the server configuration, e.g.:</p>
<h3id="why-dont-siri-shortcuts-execute-in-the-background">Why don’t Siri Shortcuts execute in the background?</h3>
<p>Unfortunately Apple is guilty of not fixing a related bug. I mean, it’s been there for years -since iOS 9 with my first bug report dating back to 2017- without them caring at all. No feedback and not even a proper response. And of course, no progress.</p>
<p>This is one of the several threads remarking the issue:</p>
<p>Now, due to this bug, App Extensions can’t control VPN using custom protocols -Siri Intents Extension in this case, in order to run shortcuts in the background. Only native VPN protocols work (IKEv2, IPsec etc.).</p>
<p>In short, there’s really <em>nothing</em> I can do about it.</p>
<p>Unless <codeclass="highlighter-rouge">redirect-gateway</code> is either:</p>
<ul>
<li>Explicitly added to the .ovpn configuration</li>
<li>Pushed from the server</li>
</ul>
<p>the default gateway is NOT changed. That is, your external IP won’t be the VPN’s IP. Double check the “Default gateway” entry in the “Configuration” page to see how your host profile looks like. On the other hand, the default gateway is always enforced for provider profiles.</p>
<p>This has been recently fixed in Passepartout 1.6.0 as it’s the standard OpenVPN behavior. Before 1.6.0, Passepartout erroneously assumed that all traffic should go through the VPN implicitly.</p>
<h3id="id-like-to-see-a-today-widget-in-the-notification-center">I’d like to see a Today Widget in the Notification Center</h3>
<p>The reason behind not providing a widget is exactly the same as Siri Shortcuts. A widget would still need to open the app, thus making it quite useless.</p>
<h3id="id-like-to-see-my-ip-address-in-the-app">I’d like to see my IP address in the app</h3>
<p>The reason why Passepartout does not present any personal information in app is <em>privacy</em>. Obtaining one’s IP address, regardless of being connected to a VPN or not, involves querying -and trusting- a third party service. Knowing such info is also of little use, given that most of the time you don’t want to share your VPN IP address and therefore link your identity to it. However, this feature might be introduced later as a diagnostic tool.</p>
<h3id="mullvad-ignores-my-custom-dns-settings">Mullvad ignores my custom DNS settings</h3>
<p>It looks like Mullvad “hijacks” DNS on default endpoints, making custom DNS settings irrelevant. In order to do custom DNS with Mullvad, make sure to explicitly pick the “Custom DNS” preset, which will let you connect to the UDP:1400 and TCP:1401 endpoints. These endpoints do support custom DNS servers instead.</p>
<p>Until version 1.7.0 for iOS, you will have to do a manual “Refresh infrastructure” in order to access the new preset.</p>
<p>Read the <ahref="https://github.com/passepartoutvpn/api-source-mullvad/issues/1">related report on GitHub</a>.</p>
Copyright (c) 2018 <ahref="https://davidederosa.com"title="The author website">Davide De Rosa</a><br/>
The logo is taken from the awesome <ahref="https://www.iconfinder.com/iconsets/circle-icons-1"title="Circle Icons">Circle Icons</a> set by <ahref="https://www.elegantthemes.com/"title="Elegant Themes">Nick Roach</a>