$ ln -s /etc/openvpn/protonvpn/ch/ch.ovpn /etc/openvpn/protonvpn-ch.conf
+$ vim /etc/systemd/system/openvpn\@protonvpn-ch.service.d/override.conf
+[Unit]
+BindsTo = netns@protonvpn-ch.service
+JoinsNamespaceOf = netns@protonvpn-ch.service
+After = netns-ctl@protonvpn-ch.service
+
+[Service]
+PrivateNetwork = true
+BindPaths=/etc/netns/protonvpn-ch/resolv.conf:/etc/resolv.conf
+BindPaths=/etc/netns/protonvpn-ch/resolv.conf.vpn:/etc/resolv.conf.vpn
+
TODO: Upstream "foreign" mode for netns-ctl
$ systemctl enable --now netns@main netns-ctl@main
$ chmod +x /root/newpvpnch.sh
+$ systemctl enable --now dnsmasq-netns@vm-down.service
+$ systemctl enable --now dnsmasq-netns@protonvpn-ch.service
+
+TODO: persist firewall masquerade for outgoing traffic for the vpn connection
+
+$ iptables -t nat -I POSTROUTING -s 10.33.0.2 -o br0 -j MASQUERADE
+
+TODO: create firewall rules on all NS to limit traffic between main and protonvpn-ch/vm-down
+
+
$ /root/new/pvpnch.sh
+
+Wait until VPN is connected(if it does not connect, debug) and then this should work:
+
+ip netns exec vm-down ping google.de
+ip netns exec vm-down curl ipinfo.io