Your location: Your IP: Your status:ProtectedUnprotected · To the tests »

OpenVPN with stunnel (Stealth VPN) on a Router running OpenWRT


First download and unpack the archive with the OpenVPN configuration files linked above. Open PuTTY or another terminal program, connect to the router and log in. Successively execute both commands: opkg update and opkg install openvpn-openssl luci-app-openvpn stunnel

Adjust configuration

Using WinSCP (of course alternatively the ssh terminal may be used) in the /etc/openvpn/ directory of your OpenWRT router create the file with the following lines as content

env | sed -n -e "
" | sort -u > /tmp/resolv.conf.vpn
uci set dhcp.@dnsmasq[0].resolvfile="/tmp/resolv.conf.vpn"
/etc/init.d/dnsmasq restart

and the file with the following content

uci set dhcp.@dnsmasq[0].resolvfile="/tmp/"
/etc/init.d/dnsmasq restart

Open the properties of the files and to set the permissions to 755.

In /var/log/openvpn.log you later may view the log, in case any issues with the OpenVPN connections should occur.

Stunnel configuration

Replace the SERVER_IP with the stunnel-specific IP address of the respective server. You can look it up in the overview of stunnel ports and IPs.

For the STUNNEL_PORT you can choose between the following ports: 22, 53, 443, 8085, 9009, 36315. To circumvent blocking, ports 53 and 443 are particularly recommended. The schema is:

config service 'OpenVPN-Instance-Name'
option enabled '1'
option client '1'
option accept_host ''
option accept_port '10000'

To use the VPN server in Basel, use WinSCP (or the terminal) to open the file stunnel in the /etc/config/ directory and in this example replace the content with the data for Basel1. Then save the file:

config globals 'globals'
#option alt_config_file '/etc/stunnel/stunnel.conf'
option setuid 'nobody'
option setgid 'nogroup'
config service 'PP_Basel1'
option enabled '1'
option client '1'
option accept_host ''
option accept_port '10000'
list connect ''

Should you later decide to disable OpenVPN, then do not forget to also disable Stunnel. To do so open the file stunnel in the /etc/config/ directory and change the line:

option enabled '1'


option enabled '0'

DNS server configuration

Log in on your OpenWRT router using a web browser ( Change to the Network=>Interfaces=>WAN=>Edit=>Advanced Settings tab and deactivate Use DNS servers advertised by peer. At Use custom DNS servers enter at least two publicly usable IPv4 DNS servers (e.g. and and click on the Save button.

Do the same in the WAN6 tab and enter at least two IPv6 DNS servers. Then click the Save and the Save & Apply button. You can either use the DNS servers from Google (IPv4: and IPv6: 2001:4860:4860::8888 and 2001:4860:4860::8844) or use some of the OpenNIC project.

Note: If you want, you can also use Perfect Privacy DNS servers (you can find the IPs on the DNS server page in the customer area). These DNS servers will only resolve * domains when VPN is not connected which means that Internet access will not work without the VPN being connected. However, there will be no IP leak when using public name servers instead, since all DNS requests will be sent anonymized over the VPN tunnel while a VPN connection is established.

OpenVPN configuration

In the menu go to VPN=>OpenVPN and at OVPN configuration file upload enter PP_Basel1. Then click on Search and choose the previously downloaded Basel1.ovpn file from Perfect Privacy. Click on the Upload button afterwards.

Open the newly created instance PP_Basel1 by clicking Edit and in the first line replace the text "userpass.txt“ with “PP_Basel1.auth“.

Ensure the formatting has been taken on correctly by the browser and that all the remote commands are underneath each other in separate lines.

In the second field fill in your Perfect Privacy username and the corresponding password and then save them by clicking the Save button.

Firewall configuration

Navigate to the menu Network=>Interfaces and click on Add new interface….

  • Name: PP_VPN
  • Protocol: Unmanaged
  • Interface: In the last line enter tun0

Accept the settings with the Create interface button.

In the newly created interface change to the Firewall Settings tab. Open the choice field next to Create / Assign firewall-zone, and in the last line enter PP_FW. Click the Save button.

Afterwards navigate to Network=>Firewall and to the right of PP_FW click on Edit. Adjust the following settings:

  • Name: PP_FW
  • Input: reject
  • Output: accept
  • Forward: reject
  • Masquerading: activate
  • MSS clamping: activate
  • Covered networks: PP_VPN

In the lower field select the following:

  • Allow forward from source zones: activate lan

Use the Save button to accept the settings and then click on Save & Apply.

Activate OpenVPN

Go to the menu Services=>OpenVPN and set the checkmark at Enabled. Then first click on the button Save & Apply and then start PP_Basel1 by clicking the start button.

Optional: Activate the kill-switch

Attention: This step activates the firewall protection ("kill switch"), which ensures in case off an interruption of the internet service no data can bypass the VPN tunnel. If you want to access the internet via your router without VPN too, you have to skip this step.

Navigate to Network=>Firewall and underneath Zones open lan using the Edit button.

Scroll down to Inter-Zone Forwarding and next to Allow forward to destination zones activate only PP_FW. Then click on the button Save & Apply.

If you want to disable the firewall protection ("kill switch") again, next to Allow forward to destination zones: PP-FW additionally activate WAN and WAN6.

You can verify that the VPN connection is working correctly by visiting our Check-IP website from any device connected to the router.

This website uses cookies to analyze the traffic and to control our advertising. By using this site, you agree to the use of cookies. More information can be found in our privacy policy.