The premise
Note; political rant with European bias follows. If you don’t want to be exposed to my political views but still want to read the technical content of this article, simply skip the “Premise” and scroll down to “My data under my control”.
Looking at the rapidly deteriorating situation in the United States of America with disgust and shock, my prediction is that the soft approach to opposing Donald Trump’s hostile take-over of the country is going to fail horribly, and will result in the next fascist dictatorship within two years (mark my words).
Therefore I am withdrawing my data from the US based companies as much and as fast as I can. If you live outside the United States, the possibility that US-based companies may just cut-off access to your Cloud data when the Orange Clown instructs them to, is all to real.
It’s not just me; there is a real and irreversible push in the European Union to put an end to the imbalance and invest in a European open-source based Cloud infrastructure to rival the US companies that have gladly received our money for years and still can’t make hard commitments that they won’t apply the kill-switch when the Fascist-in-Chief demands it.
My data under my control
The desire to have more control over your own data is not new of course. Discussions about what that means on a wider scale are simply accelerated by current events.
You can already access a lot of detailed information on how to become independent of the big tech companies via my own series of blog articles called “Slackware Cloud Server“. I am researching two additional installments to that series: one about how to setup Joplin Server as an alternative to OneNote (Joplin can actually import OneNote files easily), and another one about how to setup a cheap-ish remote storage to make safe backups of all your locally stored data. Data to be stored inside Europe of course. More on that in due time.
A necessary step to move away from Google and friends was purchasing a Proton family account. The realization hit me a long while ago of course, that free services like GMail are only free because Google harvests, uses and sells your data that you store on their platform.
Proton on the other hand is a Swiss-based company with a focus on privacy. It costs money to use their services, yes, but the data you store with Proton will be secure and safe from those prying eyes.
If you have not yet implemented my Slackware Cloud Server, then you are most likely subscribed to one or more Cloud-based streaming services like Netflix, HBO, AppleTV, Disney+ and so on – you pay when you determine you get your money’s worth. So I pay to get my data off Google, Microsoft and Dropbox servers.
VPN as a privacy tool
Looking at the services that come with a Proton account, I noticed that they offer a VPN service as part of the package. This reminded me of the importance to have a proper VPN installed. People who already live inside a dictatorship know that a VPN can be a lifeline to the free world, and my American friends: you will need that VPN too, soon!
I am not in favor of free VPN’s. Speeds are never great and you have no certainty or guarantee that the free VPN provider is not actually harvesting and selling your personal data.
Unless you yourself run the VPN server. At home I implemented an actual Virtual Private Network using Wireguard. WireGuard is a VPN protocol which is part of the Linux kernel and the user-space is a simple binary, controlled by simple configuration files. It connects my family’s laptops, phones and also the network infrastructure of our camper van to our home, combining all devices into a single network with one exit point towards the Internet which is here, at home.
This kind of VPN server is not meant to prevent other parties spying on you. Instead it is the type of VPN that securely connects devices (one server and many roaming clients) into a single ‘local’ network; the traditional interpretation of VPN. All devices inside the network can communicate with each other; this is how I can access my home automation even when I am out of the country in my camper van.
The VPN solution I want to discuss here, is of the other kind: the one that hides your activities from prying eyes. A privacy-enhancing tool.
This kind of VPN connection creates a tunnel between your local computer and one of many remote servers operated by a VPN provider. You can get a subscription from companies like NordVPN, PIA to name a few, or in my case: ProtonVPN. The VPN allows you to ‘go anonymous’ with the click of a button. Whatever information you access on the Internet through a VPN tunnel can never be traced back to you personally because your IP address is effectively hidden and replaced by the IP address of the VPN access point.
Installing the VPN client offered by any of these providers is trivial, applications offered for Linux, Windows, Android and iOS. The standard usage is also well-documented. It becomes more interesting when your use-case is more un-common.
This article shows how you can install a VPN (WireGuard in this case), place the VPN network interface inside a jail so that your Slackware computer does not even know it is there, and then add programs to that jail. The programs inside that network jail will be forced to access the internet through the VPN tunnel, they cannot circumvent the jail and therefore do not have access to your regular network connection. Your privacy-sensitive information will not be able leak out of your regular network connection. These jailed applications will still be able to communicate with local applications and services via the loopback interface.
Intrigued? Read on!
Put the VPN in a network jail
As a Slackware Linux user, text-based configuration files are always preferred over Graphical Users Interfaces, right 🙂
Obtain a WireGuard configuration
I downloaded the WireGuard configuration file that allows me to connect to the Proton VPN service from my own account’s dashboard. There’s documentation on how to do that.
The contents of this configuration file are really simple. All they describe are the characteristics of the two endpoints: yours (using a private key for encryption) and the remote server (identified by a public key and an IP address or hostname). The remote server in turn has a copy of your public key so that they can validate your identity:
PrivateKey = 2QLYsfx89Lpc24iBtZmygieXYwq1WZwPok8joqB/Fys= Address = 10.2.0.2/32 DNS = 10.2.0.1 [Peer] PublicKey = dOJQd38biobpWxq4wpF7mk2oUiJnjHZlDZ7s8X/z+xs= AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = XXX.XXX.XXX.XXX:51820
The two key values are of course bogus. The “XXX.XXX.XXX.XXX” will be the IP address of the VPN server at the other end of the connection.
Move the Wireguard configuration file to ‘/etc/wireguard/proton0.conf‘. You could now run the command “wg-quick up proton0” to activate the VPN interface but that has a potentially unwanted side effect if your computer is also a server. The ‘wg-quick‘ command installs a new default route forcing all your external traffic through the VPN tunnel.
If you run network services on that computer then your clients will be in for a world of hurt.
How to prevent that the ‘proton0‘ interface forces itself as the default route?
Tame the beast
To prevent ‘wg-quick‘ from overriding your default route and instead keep your physical network interface as your primary gateway always, you must modify the WireGuard configuration file that you just installed.
By default, wg-quick interprets the line “AllowedIPs = 0.0.0.0/0” as a trigger to automatically install a new default route through the VPN interface.
Modify the Configuration File
Open your configuration file /etc/wireguard/proton0.conf and add the following line into the [Interface] section. This instructs wg-quick to bring up the interface and set the IP, but not touch the system routing table:
Table = off # This prevents the default route override
Save the file and now bring up the interface (using the name of the configuration file “proton0“as argument, this will also determine the name of the VPN interface):
# wg-quick up proton0
Verify your default route is still going via your physical interface:
# ip route show | grep default
You should see a line like this: default via <your_gateway_ip> dev eth0
Verify the ‘proton0‘ interface is active:
# wg show
And finally, verify that all other services that are running on your computer are still accessible.
Routing traffic through the VPN
Since we have disabled automatic routing, no traffic will go through the VPN by default. The question remains of course… how should I access and use this new VPN network interface?
There are as many ways as there are use-cases, but for the sake of this article we focus on a single use-case.
We want to route specific traffic through the ‘proton0‘ network interface while keeping ‘eth0‘ (or whatever your default network interface is named) as the default for everything else. More specifically, I want to be able to determine which application(s) should access the Internet exclusively via the VPN interface. We can do this and at the same time leave the main system completely untouched; no ‘iptables‘ or ‘fwmark‘ rules are required to create this separation. How?
We are going to use Network Namespaces (netns).
A Network Namespace gives us the power to place the VPN interface into a “jail.” Basically it creates a separate network stack which is isolated from the computer’s regular network stack. Applications launched inside this jail use the VPN, while everything else on your system continues to use the default gateway. Here are the steps to do just that.
- Configure WireGuard to handle network isolation.
The only manual modification that we need to make to ‘/etc/wireguard/proton0.conf‘ in order to prevent it from updating the computer’s routing table has already been shown higher up in the article: Add the line
Table = off
to the[Interface]section of the configuration file. - Create a boot script (since this is Slackware we call it a “rc script”) to create the VPN jail every time the computer boots.
Save the following bash script as “/etc/rc.d/rc.protonvpn-jail” and make it executable via the command
“chmod +x /etc/rc.d/rc.protonvpn-jail“
# --- 8< ---
#!/bin/bash
# Configuration of a VPN "jail"
NS_NAME="vpn_jail"
WG_CONF_PATH="/etc/wireguard/proton0.conf"
WG_IF="proton0"
if [[ $EUID -ne 0 ]]; then
echo ">> This script must be run as root!"
exit 1
fi
case "$1" in
start)
# Automatically find the IP address assigned by Proton
echo "Extracting IP from $WG_CONF_PATH..."
VPN_IP=$(grep -Po '(?<=^Address = )[^, \n]+' "$WG_CONF_PATH")
echo "Extracting DNS resolver from $WG_CONF_PATH..."
DNS_IP=$(grep -Po '(?<=^DNS = )[^, \n]+' "$WG_CONF_PATH")
if [ -z "$VPN_IP" ]; then
echo ">> Error: Could not find Address in $WG_CONF_PATH"
exit 1
fi
echo "Starting VPN Jail for IP $VPN_IP..."
# Create the network namespace
ip netns add $NS_NAME
# Setup a Kill-Switch (using nftables)
ip netns exec $NS_NAME nft flush ruleset
ip netns exec $NS_NAME nft add table inet filter
ip netns exec $NS_NAME nft add chain inet filter output \
{ type filter hook output priority 0 \; policy drop \; }
ip netns exec $NS_NAME nft add rule inet filter output oifname "lo" accept
ip netns exec $NS_NAME nft add rule inet filter output oifname "$WG_IF" accept
# Bring up WireGuard in the default namespace
wg-quick up proton0
# Move the interface into the jail and re-assign the IP (which was lost during move)
ip link set $WG_IF netns $NS_NAME
ip netns exec $NS_NAME ip addr add $VPN_IP dev $WG_IF
# Bring the network link up (don't forget loopback!)
# and configure the default route inside the jail
ip netns exec $NS_NAME ip link set lo up
ip netns exec $NS_NAME ip link set $WG_IF up
ip netns exec $NS_NAME ip route add default dev $WG_IF
# Configure a working DNS for the jail namespace
mkdir -p /etc/netns/$NS_NAME
echo "nameserver $DNS_IP" > /etc/netns/$NS_NAME/resolv.conf
echo "VPN Jail is READY. IP: $VPN_IP"
;;
stop)
echo "Cleaning up VPN Jail..."
ip netns del $NS_NAME
# The interface moves back to default namespace on netns delete; shut it down
wg-quick down proton0 2>/dev/null
rm -rf /etc/netns/$NS_NAME
echo "VPN Jail removed."
;;
*)
echo "Usage: $0 {start|stop}"
exit 1
;;
esac
# --- 8< ---
Let’s quickly run through the script’s “start” section.
- The script greps for the “
Address =” line in our WireGuard configuration which makes it resistant against a future change in VPN provider or when Proton updates your local VPN endpoint IP address. - The IP address of the DNS resolver for the VPN connection is parsed in a similar fashion.
- A new network namespace is created to serve as our VPN jail.
- When you choose to run an application behind a VPN, you certainly need a “killswitch“.
The script uses nftables to ensure that you regular network interface is firewalled from the applications that will run inside the jail. All traffic from the application to Internet will be cut as soon as the VPN interface goes down, so that the application is not suddenly exposing your regular Internet IP address to the whole world.
How the Kill-Switch Works – A nftables rule sets a default “drop” policy for the output chain inside the jail. Then another nftables rule only allows network traffic to leave either via the loopback interface (lo: for local inter-application communication) or the WireGuard interface (proton0). If the proton0 interface goes down or is deleted, there is no “accept” rule for any other path. Since the jail doesn’t even “see” your physical interface, the application will simply lose connectivity rather than falling back to your real IP. - The WireGuard interface is created and then moved into the jail.
- After the move to the new namespace we re-associate the IP address of the interface that was stripped by the kernel. Moving an interface to a new namespace is like unplugging it from one stack and plugging it into another; the new namespace has no record of what the previous namespace had configured for the interface.
- Then the script ensures that the interface is up even if it was previously down.
- A DNS resolver is configured. We create the “
resolv.conf” file in a subdirectory called “/etc/netns/vpn_jail“, because the Linux kernel will automatically bind that directory to/etc/whenever commands are run inside the “vpn_jail” namespace. This ensures that your DNS queries inside the VPN jail are also routed through Proton VPN, preventing DNS leaks on your primary connection. It cannot get safer!
Add the boot script to Slackware
Add these lines to /etc/rc.d/rc.local :
if [ -x /etc/rc.d/rc.protonvpn-jail ]; then echo "Starting Proton VPN jail: /etc/rc.d/rc.protonvpn-jail start" /etc/rc.d/rc.protonvpn-jail start fi
And add these following lines to /etc/rc.d/rc.local_shutdown (if that file does not exist yet, just create it and make it executable):
if [ -x /etc/rc.d/rc.protonvpn-jail ]; then echo "Stopping Proton VPN jail: /etc/rc.d/rc.protonvpn-jail stop" /etc/rc.d/rc.protonvpn-jail stop fi
Configuring sudo
Our regular user account will be executing the “ip” command to run applications inside the VPN jail. Since usage of the Linux “ip” command is by default restricted to the root user, we need to create a “sudoers” rule to allow your regular user account to execute it.
And to be able to launch graphical applications from a desktop shortcut without a prompt popping up to ask for your password, we will arrange for passwordless execution.
The danger when doing this carelessly is that the user can gain access to a root shell by abusing the “sudo” privilege elevation. Therefore we implement a secure wrapper that prevents a user from gaining root access via /sbin/ip netns exec.
As root, create a script that explicitly forces the transition back to the original user once inside the namespace. Call the script “/usr/local/bin/netns-proton” and give it the following content:
#!/bin/bash # Usage: sudo netns-proton [args...] NAMESPACE="vpn_jail" COMMAND="$1" if [ -z "$COMMAND" ]; then echo "Usage: $0[args...]" exit 1 fi # Remove command from argument list, # leaving only the extra arguments shift 1 # Execute inside the namespace, # forcing a drop to the calling user. # "$SUDO_USER" is an environment variable set by sudo. /sbin/ip netns exec "$NAMESPACE" /usr/bin/sudo -u "$SUDO_USER" "$COMMAND" "$@"
Then make that script executable while ensuring that only root can edit it:
# chmod 755 /usr/local/bin/netns-proton
Next, configure sudo. Create a new file named “/etc/sudoers.d/vpn_jail” and add the following line (replace your_username with your actual username):
your_username ALL=(ALL) NOPASSWD: /usr/local/bin/netns-proton *
Using the wildcard * allows you to launch any command inside the namespace without a password. You should replace “your_username” with your own login name of course.
And it is safe: if you run “sudo /usr/local/bin/netns-proton bash“, the resulting shell will be restricted to your regular user permissions, even though it is inside the namespace. Your usage of sudo to enter a namespace is restricted to only the “vpn_jail”.
Quick Verification
You could reboot now, but you can also manually run
# /etc/rc.d/rc.protonvpn-jail start
as root, to create the VPN interface and the associated network jail. Then run the following command as your regular user to show the assigned IP inside the jail:
$ sudo /usr/local/bin/netns-proton ip addr show proton0
And finally, verify that the outside world sees a different IP address coming out of the VPN jail than your regular Internet IP address:
$ sudo /usr/local/bin/netns-proton curl http://myip.slackware.nl
Some trivial usage scenarios
You can now manually launch any application inside the VPN jail by prefixing it with the “sudo /usr/local/bin/netns-proton” command.
To run a web browser:
$ sudo /usr/local/bin/netns-proton firefox
To run a bash prompt inside the VPN jail:
$ sudo /usr/local/bin/netns-proton bash
A more complex usage scenario
A typical application you would want to put inside this VPN jail is a torrenting application. We’ll create a desktop shortcut for a VPN-jailed qBittorrent.
You can of course apply the below to any program but a torrent client can be used to demonstrate that the VPN connection actually works.
- Copy the regular desktop file into your $HOME:
$ cp -ia /usr/share/applications/org.qbittorrent.qBittorrent.desktop ~/.local/share/applications/
and create a shortcut to this on your desktop backdrop. Name it “qBittorrent via VPN”. We will edit the copy, not the original:- Open the copied desktop file in an ascii editor and change the “Exec =” line into:
Exec=sudo /usr/local/bin/netns-proton qbittorrent %U
- Open the copied desktop file in an ascii editor and change the “Exec =” line into:
- Alternatively create a new file on your desktop directly. Call it “qBittorrent via VPN”. This will create a file “~/.local/share/applications/qBittorrent via VPN.desktop” – then paste the following content into it:
[Desktop Entry] Categories=Network;FileTransfer;P2P;Qt; Comment=Launch qBittorrent inside the VPN Jail # This uses sudo (permitted by the NOPASSWD rule) to exec in the jail Exec=sudo /usr/local/bin/netns-proton qbittorrent %U GenericName=BitTorrent client Comment=Download and share files over BitTorrent Icon=qbittorrent MimeType=application/x-bittorrent;x-scheme-handler/magnet; Name=qBittorrent Terminal=false Type=Application StartupNotify=false StartupWMClass=qbittorrent Keywords=bittorrent;torrent;magnet;download;p2p; SingleMainWindow=true
Depending on the Desktop Environment , you make have to make this desktop file executable to allow for application-startup via a double-click.
Double-clicking the icon will launch the qBittorrent application inside the isolated network namespace. It’s usage is safe because it will communicate through the VPN and is secured by the built-in “kill-switch” against any accidental exposure.
You can verify that your Torrent client accesses the internet via your VPN:
Open https://ipleak.net/ in your browser (no VPN needed), scroll down to “Torrent Address Detection”, copy the Magnet link that appears there into your qBittorrent application and watch the ipleak page for connection confirmation.
Then bring the VPN down via:
# /etc/rc.d/rc.protonvpn-jail stop
and you should see an immediate loss of connectivity for the qBittorrent program.
Summarizing
I hope this helps keeping you safe 🙂

Great article and very helpful!
Thank you!
If, in addition to no longer being under the threat of Trump, I also want to no longer be under that of Von der Leyen, does your method work for that too?
Furthermore, aren’t the companies that provide VPNs controlled by the states where they operate? If so, could they reveal all your activities?
I remember that in the past, a long time ago, it was forbidden in France to send encrypted messages by mail (probably a holdover from the wars). Is it possible today to transmit encrypted data (by oneself, not through a company) over the internet?
When you and the receiver know each other’s encryption keys (in the case of GPG you only need the other one’s public key) you can send encrypted messages back and forth an no one will know. If you setup WireGuard on both sides behind your ISP router with port-forwarding enabled, you create a fully connected Wide Area Network where all IP addresses inside will be seen as local. You can ping the remote computers, login to them, share files etcetera. It does not stop with two sides – you can create this WAN with as many WireGuard peers as you want as long as each endpoint network uses a different IP range. And no one will ever know what you share because all traffic is encrypted. Using the knowledge you gained from reading my Slackware Cloud Server articles you can setup a full set of services to be used inside that WireGuard VPN network, for your family, friends or neighborhood. No one on the outside will ever know what’s going on inside.
A provider like Proton in Switserland is audited every year for proof that they do not keep logs of what their customers do, and they are also not able to break through your encryption because you have the keys and they do not.
I understand that you are Euro-sceptic but in a world that’s about to be divided between the American, Russian and Chinese dictators, we can not afford to be petty and nationalists. We need Europe as an independent power block. That means, the European Union will get a say in the laws of your country.
You could always emigrate to Greenland of course, to experience complete freedom and independence.
I don’t know if you’re aware of how Europe is evolving in the digital sphere. At the European Union level, there’s increasing talk of “digital identity,” which would obviously lead to a ban on VPNs in the long run. In France, a ban on social media for those under 15 has just been passed. I don’t see how this can exist without some kind of digital identity. And finally, the French government indicates that “it will deal with VPNs.”
https://www.lesnumeriques.com/societe-numerique/on-n-osait-pas-aller-a-la-confrontation-mais-le-gouvernement-francais-part-en-guerre-contre-les-vpn-n250778.html
“The Minister for Digital Affairs declared on Franceinfo this Friday that virtual private networks are “the next item on her list,” three days after the vote banning social media for those under 15. This announcement has raised concerns about a restriction of digital freedoms.”
For all this to work, tools like Tor must also be banned. In other words, in the internet domain, Europe must be completely isolated from the rest of the world. Like in China?
> The European Union’s legal system is still one where its inhabitants can stand up against bad proposals
Well that aged well eh Eric?
https://reclaimthenet.org/eu-targets-vpns-as-age-checks-expand
Another refugee from the funny farm? Using a fake name, no email address, so that no one recognizes you and that gives you the courage to piss on me from your anonymous stink hole?
I don’t see your point.
Yes the EU is looking at VPN usage and ways to deal with unwanted (in their view) usage. That’s their right, just as with any government that has to make decisions that affect all its residents. But that does not mean the EU has authoritative power. The web site you share, is only one of many ways to protest against these plans. We, European residents. still have the ability and power to object and through arguments convince our parliament to stop it from happening.
That’s the difference between EU on the one hand, and the US and other dictatorial regimes on the other hand.
Hi Eric,
Thank you for the, as usual, well-written and pleasant-to-read article.
I don’t have a use case for a VPN jail.
But I recently switched my VPN (ProtonVPN free servers) from Openvpn to WireGuard.
I used nmcli to install the WireGuard configuration file.
Your article showed me how to do it with WireGuard tools wg and wg-quick.
Admittedly, I should have searched harder on the internet but now your article is there 🙂
Thank you
Does it make sense to do a quick write-up on creating a WireGuard based VPN setup? One server (at home or on a rented VPS) and then laptops and phones connecting to that.
I have no doubt that such an article would make for a good read.
I’d probably test such a configuration but not sure that I’ll make it permanent.
Yes. Most guides online are for Ubuntu, Fedora, or GUI tools. A Slackware-centric guide would be a welcome contribution to the community.
So what about your data during let’s say the Obama administration? Snowden was not enough?
What do our Europeans leaders do now? What do they have to say about Chinese smartphones that do screen recordings all the time and send our data ta Malaisia ? Nothing?
Elon Musk and Trump is their only problem? Not the Chinese? Not their laws in the EU?
That means that they don’t really care about privacy but only for their agenda.
Maybe you should realise that too. Unless you too have an agenda.
It’s about mutual trust and respect.
With the current Trump administration I do not feel respected and I do not see anything Trump does that inspires trust about the availability of my data when stored by a US-based company, or the online services I purchased from a US-based company.
Of course the Chinese government is just another strongman administration. No better than the current US admin. But I already did away my Chinese smartphone and I refuse to drive a Chinese car.
If you care about privacy then do not use *any* online service. And if you use online services, make sure to encrypt your data and your communications.
The European Union’s legal system is still one where its inhabitants can stand up against bad proposals and move to prevent them being effectuated. Do not compare the EU to US or China.
I also spit in your face for your last sentence. Better to stay away from this blog in future.
A very democratic response of yours. Thank you.
It’s my blog and you are a guest. I’m fine with anyone having a different opinion, as long as you behave.