GorzVPN Setup Guide

Table of Contents

Once you purchase an account, you will be given a text file containing your sublink. If you are not familiar with this type of VPN, in short, sublinks are links to automatically updated, dynamically generated configuration files. In the world of censhorship circumvention, being up-to-date and using latest technology are of paramount importance.

You can run this in two modes: proxy mode and full tunnel (VPN mode).

Proxy mode:

To use the proxy mode, many apps such as v2rayN allow setting system proxy. But for better control, we advise you to install ZeroOmega extension for your browser. Create a new profile like the following image:

For other applications that support a socks proxy, set them to socks5 address 127.0.0.1 and port 10808.

VPN mode:

Some software and mainly mobile apps allow different routing in VPN mode, however, it causes DNS leak which affects your privacy. Our own Windows software package doesn't produce any leak in VPN mode.

Android

Download V2rayNG app from Google Play store , or directly from their project github.

Copy your sublink from inside the text file, tap on "+" and select "Import config from Clipboard".

iOS

Download FoxRay or Streisand and import the sublink.

Windows

While you can use software like V2rayN, we strongly recommend using our own solution. It is based on open-source software and has great advantages such as:

Download GorzVPN for Windows

Depending on whether you want a proxy endpoint or a full tunnel, run GorzProxy.bat or GorzVPN.bat

Linux

You may use V2rayN which is popular but we recommend GorzRay as it aligns with our goals much better and provides a truly zero DNS-leak VPN experience.

Mac

Also our own client software is being developed. For now, please use FoxRay or V2rayN.

Testing Your Setup

All of our accounts are configured to resolve DNS on our servers, and DNS queries are always handled via DNS over HTTPS. This means that all your requests to our servers and out of them are encrypted.

Once you are connected via GorzVPN, you can test the security of your connection. On all of the platfroms your traffic will be 100% encrypted and disguised. Also your name lookups will be protected by DNSSEC. To test the name protection visit a resolver test.

To check if you have any DNS leak, visit an online test tool like dnsleaktest.org or browserleaks.com. The result should show only 1 place (one IPv4 and/or one IPv6) like the image below:

DNS Leak on Android and iOS Devices

Unfortunately, current mobile apps in VPN mode might not completely prevent from DNS leak unless you explicitly set a DNS over HTTPS in your browser or system settings. This means that your connection queries might be handled by public servers such as Google and even your local ISP. Our own Windows software package (and hopefully Linux/Mac, and our own mobile app soon) does not have this problem.

In the following sections, you will see the instructions on how to use your purchased DNS instance in different platforms.

Windows and Linux

Use a browser that can strictly set a custom DoH, like Firefox. In Firefox settings, in section "Privacy & Security" set "Enable DNS over HTTPS using:" to "Max Protection". Set the provider to custom and put the link of your purchased DNS instance in the field, like the image below.

Android

Unfortunately Android does not allow setting a DNS over HTTPS instance globally with a custom path. To use our DoH on Android, install Firefox Nightly since the main Firefox app doesn't allow editing extra configuration settings either. Open "about:config" via the address bar, and then search and set these parameters:

🔍"network.trr.mode" to 3 🔍"network.trr.default_provider_uri" to your purchased link from GorzVPN 🔍"media.peerconnection.enabled" to false

MacOS/iOS

You can enable DNS over HTTPS globally through installing a .mobileconfig file. Open a text editor and paste the following, changing the server URL to the one you purchased. Save it as GorzVPN.mobileconfig and install it by opening/tapping on it.

<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>PayloadContent</key> <array> <dict> <key>DNSSettings</key> <dict> <key>DNSProtocol</key> <string>HTTPS</string> <key>ServerURL</key> <string>**********************************</string> </dict> <key>PayloadDisplayName</key> <string>GorzVPN DoH</string> <key>PayloadIdentifier</key> <string>com.gorzvpn.doh.9a7d7bc0-2d33-4262-b9e2-0c1440b1859d</string> <key>PayloadType</key> <string>com.apple.dnsSettings.managed</string> <key>PayloadUUID</key> <string>9a7d7bc0-2d33-4262-b9e2-0c1440b1859d</string> <key>PayloadVersion</key> <integer>1</integer> <key>ProhibitDisablement</key> <false/> </dict> </array> <key>PayloadDisplayName</key> <string>GorzVPN DoH</string> <key>PayloadIdentifier</key> <string>com.gorzvpn.profile.6f3cf6e4-04ad-44de-885a-d2c553b659dc</string> <key>PayloadRemovalDisallowed</key> <false/> <key>PayloadType</key> <string>Configuration</string> <key>PayloadUUID</key> <string>6f3cf6e4-04ad-44de-885a-d2c553b659dc</string> <key>PayloadVersion</key> <integer>1</integer> </dict> </plist>