As a fun exercise, I am trying to run OpenVPN as a TOR hidden service on my Raspberry Pi 3B+
I am able to host and access a .onion website, access SSH over TOR and essentially every other service. I also successfully installed and configured OpenVPN to accept TCP clients. I am able to connect over the clearnet from my laptop through its internal LTE modem to the RPI on my home's broadband, confirm that my public IP on my laptop is my broadband provider's and not my wireless provider's.
The problem happens when I attempt to connect via SOCKS5/TOR. The connection sequence completes, but as soon as the routing tables are populated, no packets can reach the VPN. I suspect the SOCKS connection is getting sucked into VPN. I think there's a related problem/solution in this blog post:
https://kiljan.org/2017/11/15/routing-t ... cks-proxy/
However, his solution is not for VPN over TOR. If I were to use his script, it would populate $remote_1 with the onion address I am using. Can anyone point me to what I variable I should use instead? Or rather what I should modify? I am sorry if this is a NOOB question, still learning networking.
client
dev tun
proto tcp
remote <onionhashaddressredacted>.onion 1194 tcp-client
socks-proxy 127.0.0.1 9050
resolv-retry infinite
nobind
key-direction 1
remote-cert-tls server
tls-version-min 1.2
verify-x509-name <nameredacted> name
cipher AES-256-CBC
auth SHA256
auth-nocache
verb 3
script-security 2
up redirectgateway-def1-socks.sh # Redirect other traffic
down redirectgateway-def1-socks.sh # through the VPN