Not one more repository to add, sign, reload at each update. And can get compromised.
Not one more piece of software to run that may, or may not, run properly (looking at you ProtonVPN)
Just download the wireguard or openvpn configs to some desired exit points, load them into NetworkManager as described, and BINGO you have an integrated way of switching desired location, a visual icon in the taskbar confirming your status, and no extra hassle.
Did you know that qbittorrent can be told to only work if the VPN is on? There are places where it matters.
And to answer your question, no, that is not normal. If a piece of software isn’t available for your distribution, then consider finding another. Like, here, using NetworkManager to do the job!
Change your distribution to MX Linux and use MX Package Installer there. Select Mullvad VPN from "Popular Apps" tab there and MXPI will do all these steps for you.
So usually people do install Linux software from trusted software repositories. Linux practically invented the idea of the app store a full ten years before the first iPhone came out and popularized the term “app.”
The problem with the Mullvad VPN is that their app is not in the trusted software repositories of most Linux distributions. So you are required to go through a few extra steps to first trust the Mullvad software repositories, and then install their VPN app the usual way using apt install or from the software center.
You could just download the “.deb” file and double click on it, but you will have to download and install all software security updates by hand. By going through the extra steps to add Mullvad to your trusted software repository list, you will get software security updates automatically whenever you install all other software updates on your computer.
Most Linux distros don’t bother to make it easy for you to add other trusted software repositories because it can be a major security risk if you trust the wrong people. So I suppose it is for the best that the easiest way to install third-party software is to follow the steps you saw on the website.
Also note that Mullvad has a pretty technical user base and target audience, and thus their documentation is likely geared towards them. You could also consider using Mozilla VPN, which offers pretty much the same advantages (they use Mullvad’s servers), at the same price if you pay annually, and is easier to use.
Oh actually, looking at the Ubuntu installation docs, that doesn’t really seem to be much easier - that’s a disappointment :/
Although if you don’t mind running one terminal command (specifically, sudo add-apt-repository ppa:mozillacorp/mozillavpn), I think after that you should just be able to use the Ubuntu App Center to install software - which usually is the way to install software in Ubuntu, and works similar to app stores on phones.
it’s just a fuckin step by step guide on how to add their repo to the sources.list
What’s so technical about it? It’s how you install everything on Ubuntu.
No knowing how apt works, is equivalent to not understanding why grandma_pics.zip.exe is probably a virus. If you’re that uninformed, we can’t help you.
I have the exact same issue atm. After a new Windows update, I have to disable Wifi on Windows for it to work on Linux. It sounds bizarre, but try disabling Wifi on Windows.
Do you have any evidence that writing that line actually works to keep AI from using your comment? If some of the biggest authors alive can’t keep their words out of the algorithm, I’m not convinced that a Lemmy comment stands a chance.
It’s copy and pasting 5 lines into the terminal and hitting enter. It’s not that hard. If it’s not worth the 15 seconds of ‘work’ you probably don’t need the software that badly.
And it’s not the default. Usually you shouldn’t add random software sources and download software from some websites. Your Linux package manager should be the source for software. (Software Manager / Store / Synaptics, … whatever Ubuntu calls it) It installs software with one or two clicks with the mouse, the software there is tested and tied into the rest of the systems and tens of thousands of packages are available. No malware guaranteed, and updates are handled automatically.
And with other Operating systems it’s also ridiculous: You need to find the website of some software, avoid malware and copycats that advertise similar software with ads, click download, click ‘yes’ I accept a download with a harmful extension. Then you need to open the file manager and double click on it. Then a window opens and you need to click ‘next’. Accept the terms. Give permission to install and maybe remove a few ticks and choose a location. I’d say it’s about the same amount of work and the downside is it doesn’t necessarily handle updates and security fixes.
I think Ubuntu doesn’t have Mullvad available in their own repository. I took another approach and imported their settings/profile into the VPN/network manager that is available per default on many Linux distributions. No install required at all. But importing the settings isn’t easier, so YMMV here. And I think you have to create a profile for each and every country/endpoint which is a bit cumbersome, depending on what you’re trying to do with the VPN.
It’s copy and pasting 5 lines into the terminal and hitting enter. It’s not that hard. If it’s not worth the 15 seconds of ‘work’ you probably don’t need the software that badly.
Telling people to just run random code they found on the internet and don’t understand is really bad advice.
But how do you think you install software on Windows? You download a random installer from the internet and double-click it. The installer is an executable file and runs some code on your computer to set up the software. I’d argue it’s exactly the same.
In the one instance you copy and paste code and run it. In the other instance you execute an installer that also contains the random code. And you can’t even have a look what happens.
The real issue is: You have to trust the vendor. If you don’t trust Mullvad, don’t run their 5 lines of code. But you then also shouldn’t install their software and not run their windows installer. I don’t see a way around this ‘trust’ issue.
The proper way of course would be a standardised process that also confines the software into containers with minimal permissions. Something like Android Apps. In theory you could add a default update process so the vendor just needs to define an update server in the (apk) installer file. Google didn’t do this, but they want people to use their Play Store. And I don’t think we have a permission system that is actively used on any of the major desktop operating systems, anyways.
As others have already pointed out, a lot of Linux software is installed from repositories in a standard way, and once you do that, it updates automatically.
However, as you’ve already discovered, there’s more than one way to install Linux software. Repositories are still the most common way, but installing single .deb’s (Debian based distributions) or .rpms (RedHat packaging format) is still there and there are more like Snap, Flatpak and Appimage. You can also often just download the source and compile it yourself. It’s a very diverse ecosystem, not like the controlled worlds of WIndows and Mac.
In this case you can download the .deb file, and pretty sure you can even install it through the file manager, just like in Windows (I don’t use Ubuntu, but I think it will just start GUI installation if you double-click on a .deb file).
But lot of things in Linux are still done through the terminal, like changing configurations and, yes, installing things.
Getting used to it takes a while, especially if you’re not used to modern Windows administration through PowerShell.
The important part is trying to figure out what each of the commands do and that the output actually means. Software that supports Linux normally has very clear instructions (like in this case), but it does require willingness to change habits, technical curiosity and some trial and error (patience). It’s not quite as polished experience as the commercial OS’s. There’s still a lot of rough edges for the user.
And click the “download .deb” button (It says underneath “Works on Ubuntu 20.04+, Debian 11+ (64bit only)”. As long as your Ubuntu is up-to-date, this will work fine)
you get a file (“MullvadVPN-2023.6_amd64.deb”) you can run just like on Windows (similar to MullvadVPN-2023.6.exe)
opening the file should open a GUI for installing the file
Keep in mind, to update Mullvad VPN, you would need to download a newer .deb file (after an update is released). It shows the latest version above the download buttons, below the “Mullvad VPN for Linux text” This is the same as how it is on Windows
Edit: This is not intended as good advice, just a simple way to install Mullvad VPN. The smartest solution would be to add the repo.
2nd Edit: While this is how Mullvad provides their software, it is never ideal to install random .deb packages or add third party repos without being sure that the ones who provided the package/repo is trustworthy.
It might not be good advice, but that was not what OP asked for.
My comment was meant as a beginner-friendly way to install Mullvad VPN on Ubuntu, and not unsolicited advice telling them to learn something that should not be needed for daily computer usage. And while adding the repo might be the better solution, that would require the use of the terminal, and as multiple people have proven to me, that wouldn’t be a friendly way to introduce Linux to someone just starting out.
You don’t teach someone to swim, by dropping them in the middle of the pacific.
Many, perhaps even most, installation guides for software use commands because the graphical alternatives can vary wildly between desktops and distributions. So using commands in guides is usually the more likely to work.
That said, what Mullvad does is stupid. The downloadable deb and rpm files should just initialize the update repository. That is what Google does with their Chrome download. Basically download the file, double click on it, confirm installation. That’s it. Users don’t need to do that manually for Chrome.
Luckily, there are only a few cases remain for this type of installation. Most regular things should be either in your distribution’s regular repository or on Flathub.
linux
Newest
This magazine is from a federated server and may be incomplete. Browse more on the original instance.