Configuration of Applications (Only for proxied configurations)

If you are using  any ‘Proxied’ server, you would need to configure your programs to go through the VPN (unless you don’t want them to).

Fully Routed and Surfing/Streaming configurations do not require these additional steps as all your data will be redirected through the VPN automatically once you are connected.

Click on a button below to view the program’s configuration.

Torrent Clients

We highly recommend qBittorrent for Windows users and Vuze for Macs. Vuze is the only Mac torrent client with full Socks proxy support which is required for our proxied configurations (PublicTracker/PrivateTracker).

      

If your program is not listed here, do not fret! As long as your program supports Socks Proxies, you only need to enter the following details in the relevant fields:

  • Hostname: 10.10.10.1
  • Port: 1080
  • Type of Proxy: Socks 5
  • No authentication

Browsers

         

For other browsers and download managers, you will need to configure the HTTP proxy. You can also opt for SOCKS proxy if needed.

  • Hostname: 10.10.10.1
  • Port: 808
  • Type of Proxy: HTTP
  • No authentication

You can also always drop by our Support Forums to ask for help in configuring a particular program.

To have additional privacy at the cost of speed, you can combine BolehVPN with TOR.

Please note that it is not recommended to P2P over TOR.

There are two ways each with their respective pros/cons:

Using BolehVPN over TOR

Download and launch TOR browser bundle. Open BolehVPN client and go to Proxy Settings and enter in the following parameters:

  • Proxy type: Socks
  • Server: 127.0.0.1
  • Port: 9150

Connect to BolehVPN with one of the FullyRouted-TCP/xCloakRouted-TCP connection options. We are currently looking at expanding our server options that support TCP. Please note that TCP is slower than UDP. TOR does NOT support UDP at the moment.

Advantages

  • Additional privacy layer (our VPN server will not see your real IP address but the IP of the TOR exit node)
  • Option to connect to web sites under TOR protection, even to those sites which refuse TOR connections
  • Usage of TOR even by the programs which don’t support it
  • Access to TOR from all the applications transparently: no need to configure each application, one by one
  • Avoidance of any traffic discrimination from TOR exit nodes (packets are still encrypted when they pass through TOR exit node)
  • Major security layer in the event you pass through a compromised/malicious TOR exit node (packets are still encrypted when they pass through the TOR exit node)

Disadvantages:

  • Poor performance

Using TOR over BolehVPN

This setup is not as beneficial as the above but it is useful if you wish to hide TOR traffic from your ISP provider. If you wish to connect over TOR over BolehVPN:

  • Connect to a Fully-Routed BolehVPN server
  • Launch Tor

All the applications configured to connect over TOR will connect over TOR over BolehVPN. All the applications not configured for TOR will simply connect over the VPN. 

Implications

  • Our servers can see your real IP address.
  • Our servers can not see your traffic content, real origin and real destinations.
  • The TOR entry-node will not see your real IP address, it will see the exit-IP address of the VPN server you’re connected to.
  • Your are not protected against malicious TOR exit nodes if you send/receive unencrypted traffic to/from the final host you connect to.