|
@@ -9,11 +9,14 @@
|
9
|
9
|
# Freedom in the Cloud
|
10
|
10
|
#
|
11
|
11
|
# VPN functions
|
|
12
|
+# https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-debian-8
|
|
13
|
+# https://jamielinux.com/blog/force-all-network-traffic-through-openvpn-using-iptables/
|
|
14
|
+# http://www.farrellf.com/projects/software/2016-05-04_Running_a_VPN_Server_with_OpenVPN_and_Stunnel/index_.php
|
12
|
15
|
#
|
13
|
16
|
# License
|
14
|
17
|
# =======
|
15
|
18
|
#
|
16
|
|
-# Copyright (C) 2014-2016 Bob Mottram <bob@freedombone.net>
|
|
19
|
+# Copyright (C) 2014-2017 Bob Mottram <bob@freedombone.net>
|
17
|
20
|
#
|
18
|
21
|
# This program is free software: you can redistribute it and/or modify
|
19
|
22
|
# it under the terms of the GNU Affero General Public License as published by
|
|
@@ -28,12 +31,31 @@
|
28
|
31
|
# You should have received a copy of the GNU Affero General Public License
|
29
|
32
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
30
|
33
|
|
31
|
|
-VARIANTS=''
|
|
34
|
+VARIANTS='full full-vim'
|
32
|
35
|
|
33
|
36
|
IN_DEFAULT_INSTALL=0
|
34
|
37
|
SHOW_ON_ABOUT=0
|
35
|
38
|
|
36
|
|
-vpn_variables=()
|
|
39
|
+OPENVPN_SERVER_NAME="server"
|
|
40
|
+OPENVPN_KEY_FILENAME='client.ovpn'
|
|
41
|
+
|
|
42
|
+VPN_COUNTRY_CODE="US"
|
|
43
|
+VPN_AREA="Apparent Free Speech Zone"
|
|
44
|
+VPN_LOCATION="Freedomville"
|
|
45
|
+VPN_ORGANISATION="Freedombone"
|
|
46
|
+VPN_UNIT="Freedombone Unit"
|
|
47
|
+STUNNEL_PORT=3439
|
|
48
|
+VPN_TLS_PORT=553
|
|
49
|
+
|
|
50
|
+vpn_variables=(MY_EMAIL_ADDRESS
|
|
51
|
+ DEFAULT_DOMAIN_NAME
|
|
52
|
+ MY_USERNAME
|
|
53
|
+ VPN_COUNTRY_CODE
|
|
54
|
+ VPN_AREA
|
|
55
|
+ VPN_LOCATION
|
|
56
|
+ VPN_ORGANISATION
|
|
57
|
+ VPN_UNIT
|
|
58
|
+ VPN_TLS_PORT)
|
37
|
59
|
|
38
|
60
|
function logging_on_vpn {
|
39
|
61
|
echo -n ''
|
|
@@ -44,10 +66,135 @@ function logging_off_vpn {
|
44
|
66
|
}
|
45
|
67
|
|
46
|
68
|
function install_interactive_vpn {
|
47
|
|
- echo -n ''
|
|
69
|
+ read_config_param VPN_TLS_PORT
|
|
70
|
+ if [ ! $VPN_TLS_PORT ]; then
|
|
71
|
+ VPN_TLS_PORT=553
|
|
72
|
+ fi
|
|
73
|
+ VPN_DETAILS_COMPLETE=
|
|
74
|
+ while [ ! $VPN_DETAILS_COMPLETE ]
|
|
75
|
+ do
|
|
76
|
+ data=$(tempfile 2>/dev/null)
|
|
77
|
+ trap "rm -f $data" 0 1 2 5 15
|
|
78
|
+ currtlsport=$(grep 'VPN_TLS_PORT' temp.cfg | awk -F '=' '{print $2}')
|
|
79
|
+ if [ $currtlsport ]; then
|
|
80
|
+ VPN_TLS_PORT=$currtlsport
|
|
81
|
+ fi
|
|
82
|
+ dialog --backtitle $"Freedombone Configuration" \
|
|
83
|
+ --title $"VPN Configuration" \
|
|
84
|
+ --form $"\nPlease enter your VPN details. Changing the port to 443 will help defend against censorship but will prevent other web apps from running." 12 65 1 \
|
|
85
|
+ $"TLS port:" 1 1 "$VPN_TLS_PORT" 1 12 5 5 \
|
|
86
|
+ 2> $data
|
|
87
|
+ sel=$?
|
|
88
|
+ case $sel in
|
|
89
|
+ 1) exit 1;;
|
|
90
|
+ 255) exit 1;;
|
|
91
|
+ esac
|
|
92
|
+ tlsport=$(cat $data | sed -n 1p)
|
|
93
|
+ if [ ${#tlsport} -gt 1 ]; then
|
|
94
|
+ if [[ "$tlsport" != *' '* && "$tlsport" != *'.'* ]]; then
|
|
95
|
+ VPN_TLS_PORT="$tlsport"
|
|
96
|
+ VPN_DETAILS_COMPLETE="yes"
|
|
97
|
+ write_config_param "VPN_TLS_PORT" "$VPN_TLS_PORT"
|
|
98
|
+ fi
|
|
99
|
+ fi
|
|
100
|
+ done
|
|
101
|
+ clear
|
48
|
102
|
APP_INSTALLED=1
|
49
|
103
|
}
|
50
|
104
|
|
|
105
|
+function vpn_change_tls_port {
|
|
106
|
+ EXISTING_VPN_TLS_PORT=$VPN_TLS_PORT
|
|
107
|
+
|
|
108
|
+ data=$(tempfile 2>/dev/null)
|
|
109
|
+ trap "rm -f $data" 0 1 2 5 15
|
|
110
|
+ dialog --title $"VPN Configuration" \
|
|
111
|
+ --backtitle $"Freedombone Control Panel" \
|
|
112
|
+ --inputbox $'Change TLS port' 10 50 $VPN_TLS_PORT 2>$data
|
|
113
|
+ sel=$?
|
|
114
|
+ case $sel in
|
|
115
|
+ 0)
|
|
116
|
+ tlsport=$(<$data)
|
|
117
|
+ if [ ${#tlsport} -gt 0 ]; then
|
|
118
|
+ if [[ "$tlsport" != "$EXISTING_VPN_TLS_PORT" ]]; then
|
|
119
|
+ clear
|
|
120
|
+ VPN_TLS_PORT=$tlsport
|
|
121
|
+ write_config_param "VPN_TLS_PORT" "$VPN_TLS_PORT"
|
|
122
|
+ sed -i "s|accept =.*|accept = $VPN_TLS_PORT|g" /etc/stunnel/stunnel.conf
|
|
123
|
+ sed -i "s|accept =.*|accept = $VPN_TLS_PORT|g" /etc/stunnel/stunnel-client.conf
|
|
124
|
+
|
|
125
|
+ for d in /home/*/ ; do
|
|
126
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
127
|
+ if [ -f /home/$USERNAME/stunnel-client.conf ]; then
|
|
128
|
+ cp /etc/stunnel/stunnel-client.conf /home/$USERNAME/stunnel-client.conf
|
|
129
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/stunnel-client.conf
|
|
130
|
+ fi
|
|
131
|
+ done
|
|
132
|
+
|
|
133
|
+ if [ $VPN_TLS_PORT -eq 443 ]; then
|
|
134
|
+ systemctl stop nginx
|
|
135
|
+ systemctl disable nginx
|
|
136
|
+ else
|
|
137
|
+ systemctl enable nginx
|
|
138
|
+ systemctl restart nginx
|
|
139
|
+ fi
|
|
140
|
+
|
|
141
|
+ systemctl restart stunnel
|
|
142
|
+
|
|
143
|
+ dialog --title $"VPN Configuration" \
|
|
144
|
+ --msgbox $"TLS port changed to $VPN_TLS_PORT" 6 60
|
|
145
|
+ fi
|
|
146
|
+ fi
|
|
147
|
+ ;;
|
|
148
|
+ esac
|
|
149
|
+}
|
|
150
|
+
|
|
151
|
+function vpn_regenerate_client_keys {
|
|
152
|
+ data=$(tempfile 2>/dev/null)
|
|
153
|
+ trap "rm -f $data" 0 1 2 5 15
|
|
154
|
+ dialog --title $"Regenerate VPN keys for a user" \
|
|
155
|
+ --backtitle $"Freedombone Control Panel" \
|
|
156
|
+ --inputbox $'username' 10 50 2>$data
|
|
157
|
+ sel=$?
|
|
158
|
+ case $sel in
|
|
159
|
+ 0)
|
|
160
|
+ USERNAME=$(<$data)
|
|
161
|
+ if [ ${#USERNAME} -gt 0 ]; then
|
|
162
|
+ if [ -d /home/$USERNAME ]; then
|
|
163
|
+ clear
|
|
164
|
+ create_user_vpn_key $USERNAME
|
|
165
|
+ dialog --title $"Regenerate VPN keys for a user" \
|
|
166
|
+ --msgbox $"VPN keys were regenerated for $USERNAME" 6 60
|
|
167
|
+ fi
|
|
168
|
+ fi
|
|
169
|
+ ;;
|
|
170
|
+ esac
|
|
171
|
+}
|
|
172
|
+
|
|
173
|
+function configure_interactive_vpn {
|
|
174
|
+ read_config_param VPN_TLS_PORT
|
|
175
|
+ while true
|
|
176
|
+ do
|
|
177
|
+ data=$(tempfile 2>/dev/null)
|
|
178
|
+ trap "rm -f $data" 0 1 2 5 15
|
|
179
|
+ dialog --backtitle $"Freedombone Control Panel" \
|
|
180
|
+ --title $"VPN Configuration" \
|
|
181
|
+ --radiolist $"Choose an operation:" 13 70 3 \
|
|
182
|
+ 1 $"Change TLS port (currently $VPN_TLS_PORT)" off \
|
|
183
|
+ 2 $"Regenerate keys for a user" off \
|
|
184
|
+ 3 $"Exit" on 2> $data
|
|
185
|
+ sel=$?
|
|
186
|
+ case $sel in
|
|
187
|
+ 1) return;;
|
|
188
|
+ 255) return;;
|
|
189
|
+ esac
|
|
190
|
+ case $(cat $data) in
|
|
191
|
+ 1) vpn_change_tls_port;;
|
|
192
|
+ 2) vpn_regenerate_client_keys;;
|
|
193
|
+ 3) break;;
|
|
194
|
+ esac
|
|
195
|
+ done
|
|
196
|
+}
|
|
197
|
+
|
51
|
198
|
function reconfigure_vpn {
|
52
|
199
|
echo -n ''
|
53
|
200
|
}
|
|
@@ -57,40 +204,457 @@ function upgrade_vpn {
|
57
|
204
|
}
|
58
|
205
|
|
59
|
206
|
function backup_local_vpn {
|
60
|
|
- echo -n ''
|
|
207
|
+ for d in /home/*/ ; do
|
|
208
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
209
|
+ if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
|
|
210
|
+ cp /home/$USERNAME/$OPENVPN_KEY_FILENAME /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME}
|
|
211
|
+ fi
|
|
212
|
+ done
|
|
213
|
+
|
|
214
|
+ function_check backup_directory_to_usb
|
|
215
|
+ backup_directory_to_usb /etc/openvpn/easy-rsa/keys vpn
|
|
216
|
+ backup_directory_to_usb /etc/stunnel vpnstunnel
|
61
|
217
|
}
|
62
|
218
|
|
63
|
219
|
function restore_local_vpn {
|
64
|
|
- echo -n ''
|
|
220
|
+ temp_restore_dir=/root/tempvpn
|
|
221
|
+ restore_directory_from_usb $temp_restore_dir vpn
|
|
222
|
+ if [ -d ${temp_restore_dir} ]; then
|
|
223
|
+ cp -r ${temp_restore_dir}/* /etc/openvpn/easy-rsa/keys
|
|
224
|
+ cp -r ${temp_restore_dir}/${OPENVPN_SERVER_NAME}* /etc/openvpn/
|
|
225
|
+ cp -r ${temp_restore_dir}/dh* /etc/openvpn/
|
|
226
|
+ rm -rf ${temp_restore_dir}
|
|
227
|
+
|
|
228
|
+ for d in /home/*/ ; do
|
|
229
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
230
|
+ if [ -f /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} ]; then
|
|
231
|
+ cp /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} /home/$USERNAME/$OPENVPN_KEY_FILENAME
|
|
232
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/$OPENVPN_KEY_FILENAME
|
|
233
|
+ fi
|
|
234
|
+ done
|
|
235
|
+ fi
|
|
236
|
+ temp_restore_dir=/root/tempvpnstunnel
|
|
237
|
+ restore_directory_from_usb $temp_restore_dir vpnstunnel
|
|
238
|
+ if [ -d ${temp_restore_dir} ]; then
|
|
239
|
+ cp -r ${temp_restore_dir}/* /etc/stunnel
|
|
240
|
+ rm -rf ${temp_restore_dir}
|
|
241
|
+ for d in /home/*/ ; do
|
|
242
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
243
|
+ if [ -f /home/$USERNAME/stunnel.pem ]; then
|
|
244
|
+ cp /etc/stunnel/stunnel.pem /home/$USERNAME/stunnel.pem
|
|
245
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.pem
|
|
246
|
+ fi
|
|
247
|
+ if [ -f /home/$USERNAME/stunnel.p12 ]; then
|
|
248
|
+ cp /etc/stunnel/stunnel.p12 /home/$USERNAME/stunnel.p12
|
|
249
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.p12
|
|
250
|
+ fi
|
|
251
|
+ done
|
|
252
|
+ fi
|
65
|
253
|
}
|
66
|
254
|
|
67
|
255
|
function backup_remote_vpn {
|
68
|
|
- echo -n ''
|
|
256
|
+ for d in /home/*/ ; do
|
|
257
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
258
|
+ if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
|
|
259
|
+ cp /home/$USERNAME/$OPENVPN_KEY_FILENAME /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME}
|
|
260
|
+ fi
|
|
261
|
+ done
|
|
262
|
+
|
|
263
|
+ function_check backup_directory_to_friend
|
|
264
|
+ backup_directory_to_friend /etc/openvpn/easy-rsa/keys vpn
|
|
265
|
+ backup_directory_to_friend /etc/stunnel vpnstunnel
|
69
|
266
|
}
|
70
|
267
|
|
71
|
268
|
function restore_remote_vpn {
|
72
|
|
- echo -n ''
|
|
269
|
+ temp_restore_dir=/root/tempvpn
|
|
270
|
+ restore_directory_from_friend $temp_restore_dir vpn
|
|
271
|
+ if [ -d ${temp_restore_dir} ]; then
|
|
272
|
+ cp -r ${temp_restore_dir}/* /etc/openvpn/easy-rsa/keys
|
|
273
|
+ cp -r ${temp_restore_dir}/${OPENVPN_SERVER_NAME}* /etc/openvpn/
|
|
274
|
+ cp -r ${temp_restore_dir}/dh* /etc/openvpn/
|
|
275
|
+ rm -rf ${temp_restore_dir}
|
|
276
|
+
|
|
277
|
+ for d in /home/*/ ; do
|
|
278
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
279
|
+ if [ -f /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} ]; then
|
|
280
|
+ cp /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} /home/$USERNAME/$OPENVPN_KEY_FILENAME
|
|
281
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/$OPENVPN_KEY_FILENAME
|
|
282
|
+ fi
|
|
283
|
+ done
|
|
284
|
+ fi
|
|
285
|
+ temp_restore_dir=/root/tempvpnstunnel
|
|
286
|
+ restore_directory_from_friend $temp_restore_dir vpnstunnel
|
|
287
|
+ if [ -d ${temp_restore_dir} ]; then
|
|
288
|
+ cp -r ${temp_restore_dir}/* /etc/stunnel
|
|
289
|
+ rm -rf ${temp_restore_dir}
|
|
290
|
+ for d in /home/*/ ; do
|
|
291
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
292
|
+ if [ -f /home/$USERNAME/stunnel.pem ]; then
|
|
293
|
+ cp /etc/stunnel/stunnel.pem /home/$USERNAME/stunnel.pem
|
|
294
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.pem
|
|
295
|
+ fi
|
|
296
|
+ if [ -f /home/$USERNAME/stunnel.p12 ]; then
|
|
297
|
+ cp /etc/stunnel/stunnel.p12 /home/$USERNAME/stunnel.p12
|
|
298
|
+ chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.p12
|
|
299
|
+ fi
|
|
300
|
+ done
|
|
301
|
+ fi
|
73
|
302
|
}
|
74
|
303
|
|
75
|
304
|
function remove_vpn {
|
76
|
|
- apt-get -yq remove --purge fastd
|
|
305
|
+ systemctl stop stunnel
|
|
306
|
+ systemctl disable stunnel
|
|
307
|
+ rm /etc/systemd/system/stunnel.service
|
|
308
|
+
|
|
309
|
+ systemctl stop openvpn
|
|
310
|
+ if [ $VPN_TLS_PORT -ne 443 ]; then
|
|
311
|
+ firewall_remove VPN-TLS $VPN_TLS_PORT
|
|
312
|
+ else
|
|
313
|
+ systemctl enable nginx
|
|
314
|
+ systemctl restart nginx
|
|
315
|
+ fi
|
|
316
|
+
|
|
317
|
+ apt-get -yq remove --purge fastd openvpn easy-rsa
|
|
318
|
+ apt-get -yq remove stunnel4
|
|
319
|
+ if [ -d /etc/openvpn ]; then
|
|
320
|
+ rm -rf /etc/openvpn
|
|
321
|
+ fi
|
|
322
|
+ firewall_disable_vpn
|
|
323
|
+
|
|
324
|
+ echo 0 > /proc/sys/net/ipv4/ip_forward
|
|
325
|
+ sed -i 's|net.ipv4.ip_forward=.*|net.ipv4.ip_forward=0|g' /etc/sysctl.conf
|
|
326
|
+
|
77
|
327
|
remove_completion_param install_vpn
|
|
328
|
+
|
|
329
|
+ # remove any client keys
|
|
330
|
+ for d in /home/*/ ; do
|
|
331
|
+ USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
|
|
332
|
+ if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
|
|
333
|
+ shred -zu /home/$USERNAME/$OPENVPN_KEY_FILENAME
|
|
334
|
+ fi
|
|
335
|
+ rm /home/$USERNAME/stunnel*
|
|
336
|
+ done
|
|
337
|
+ userdel -f vpn
|
|
338
|
+ groupdel -f vpn
|
|
339
|
+
|
|
340
|
+ if [ -d /etc/stunnel ]; then
|
|
341
|
+ rm -rf /etc/stunnel
|
|
342
|
+ fi
|
|
343
|
+}
|
|
344
|
+
|
|
345
|
+function create_user_vpn_key {
|
|
346
|
+ username=$1
|
|
347
|
+
|
|
348
|
+ if [ ! -d /home/$username ]; then
|
|
349
|
+ return
|
|
350
|
+ fi
|
|
351
|
+
|
|
352
|
+ echo $"Creating VPN key for $username"
|
|
353
|
+
|
|
354
|
+ cd /etc/openvpn/easy-rsa
|
|
355
|
+
|
|
356
|
+ if [ -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
|
|
357
|
+ rm /etc/openvpn/easy-rsa/keys/$username.crt
|
|
358
|
+ fi
|
|
359
|
+ if [ -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
|
|
360
|
+ rm /etc/openvpn/easy-rsa/keys/$username.key
|
|
361
|
+ fi
|
|
362
|
+ if [ -f /etc/openvpn/easy-rsa/keys/$username.csr ]; then
|
|
363
|
+ rm /etc/openvpn/easy-rsa/keys/$username.csr
|
|
364
|
+ fi
|
|
365
|
+
|
|
366
|
+ sed -i 's| --interact||g' build-key
|
|
367
|
+ ./build-key "$username"
|
|
368
|
+
|
|
369
|
+ if [ ! -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
|
|
370
|
+ echo $'VPN user cert not generated'
|
|
371
|
+ exit 783528
|
|
372
|
+ fi
|
|
373
|
+ user_cert=$(cat /etc/openvpn/easy-rsa/keys/$username.crt)
|
|
374
|
+ if [ ${#user_cert} -lt 10 ]; then
|
|
375
|
+ cat /etc/openvpn/easy-rsa/keys/$username.crt
|
|
376
|
+ echo $'User cert generation failed'
|
|
377
|
+ exit 634659
|
|
378
|
+ fi
|
|
379
|
+ if [ ! -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
|
|
380
|
+ echo $'VPN user key not generated'
|
|
381
|
+ exit 682523
|
|
382
|
+ fi
|
|
383
|
+ user_key=$(cat /etc/openvpn/easy-rsa/keys/$username.key)
|
|
384
|
+ if [ ${#user_key} -lt 10 ]; then
|
|
385
|
+ cat /etc/openvpn/easy-rsa/keys/$username.key
|
|
386
|
+ echo $'User key generation failed'
|
|
387
|
+ exit 285838
|
|
388
|
+ fi
|
|
389
|
+
|
|
390
|
+ user_vpn_cert_file=/home/$username/$OPENVPN_KEY_FILENAME
|
|
391
|
+
|
|
392
|
+ echo 'client' > $user_vpn_cert_file
|
|
393
|
+ echo 'dev tun' >> $user_vpn_cert_file
|
|
394
|
+ echo 'proto tcp' >> $user_vpn_cert_file
|
|
395
|
+ echo "remote localhost $STUNNEL_PORT" >> $user_vpn_cert_file
|
|
396
|
+ echo "route $DEFAULT_DOMAIN_NAME 255.255.255.255 net_gateway" >> $user_vpn_cert_file
|
|
397
|
+ echo 'resolv-retry infinite' >> $user_vpn_cert_file
|
|
398
|
+ echo 'nobind' >> $user_vpn_cert_file
|
|
399
|
+ echo 'tun-mtu 1500' >> $user_vpn_cert_file
|
|
400
|
+ echo 'tun-mtu-extra 32' >> $user_vpn_cert_file
|
|
401
|
+ echo 'mssfix 1450' >> $user_vpn_cert_file
|
|
402
|
+ echo 'persist-key' >> $user_vpn_cert_file
|
|
403
|
+ echo 'persist-tun' >> $user_vpn_cert_file
|
|
404
|
+ echo 'auth-nocache' >> $user_vpn_cert_file
|
|
405
|
+ echo 'remote-cert-tls server' >> $user_vpn_cert_file
|
|
406
|
+ echo 'comp-lzo' >> $user_vpn_cert_file
|
|
407
|
+ echo 'verb 3' >> $user_vpn_cert_file
|
|
408
|
+ echo '' >> $user_vpn_cert_file
|
|
409
|
+
|
|
410
|
+ echo '<ca>' >> $user_vpn_cert_file
|
|
411
|
+ cat /etc/openvpn/ca.crt >> $user_vpn_cert_file
|
|
412
|
+ echo '</ca>' >> $user_vpn_cert_file
|
|
413
|
+
|
|
414
|
+ echo '<cert>' >> $user_vpn_cert_file
|
|
415
|
+ cat /etc/openvpn/easy-rsa/keys/$username.crt >> $user_vpn_cert_file
|
|
416
|
+ echo '</cert>' >> $user_vpn_cert_file
|
|
417
|
+
|
|
418
|
+ echo '<key>' >> $user_vpn_cert_file
|
|
419
|
+ cat /etc/openvpn/easy-rsa/keys/$username.key >> $user_vpn_cert_file
|
|
420
|
+ echo '</key>' >> $user_vpn_cert_file
|
|
421
|
+
|
|
422
|
+ chown $username:$username $user_vpn_cert_file
|
|
423
|
+
|
|
424
|
+ # keep a backup
|
|
425
|
+ cp $user_vpn_cert_file /etc/openvpn/easy-rsa/keys/$username.ovpn
|
|
426
|
+
|
|
427
|
+ #rm /etc/openvpn/easy-rsa/keys/$username.crt
|
|
428
|
+ #rm /etc/openvpn/easy-rsa/keys/$username.csr
|
|
429
|
+ shred -zu /etc/openvpn/easy-rsa/keys/$username.key
|
|
430
|
+
|
|
431
|
+ echo $"VPN key created at $user_vpn_cert_file"
|
|
432
|
+}
|
|
433
|
+
|
|
434
|
+function add_user_vpn {
|
|
435
|
+ new_username="$1"
|
|
436
|
+ new_user_password="$2"
|
|
437
|
+
|
|
438
|
+ create_user_vpn_key $new_username
|
|
439
|
+ if [ -f /etc/stunnel/stunnel.pem ]; then
|
|
440
|
+ cp /etc/stunnel/stunnel.pem /home/$new_username/stunnel.pem
|
|
441
|
+ chown $new_username:$new_username /home/$new_username/stunnel.pem
|
|
442
|
+ fi
|
|
443
|
+ if [ -f /etc/stunnel/stunnel.p12 ]; then
|
|
444
|
+ cp /etc/stunnel/stunnel.p12 /home/$new_username/stunnel.p12
|
|
445
|
+ chown $new_username:$new_username /home/$new_username/stunnel.p12
|
|
446
|
+ fi
|
|
447
|
+ cp /etc/stunnel/stunnel-client.conf /home/$new_username/stunnel-client.conf
|
|
448
|
+ chown $new_username:$new_username /home/$new_username/stunnel-client.conf
|
|
449
|
+}
|
|
450
|
+
|
|
451
|
+function remove_user_vpn {
|
|
452
|
+ new_username="$1"
|
|
453
|
+}
|
|
454
|
+
|
|
455
|
+function install_stunnel {
|
|
456
|
+ apt-get -yq install stunnel4
|
|
457
|
+
|
|
458
|
+ cd /etc/stunnel
|
|
459
|
+
|
|
460
|
+ openssl req -x509 -nodes -days 3650 -sha256 \
|
|
461
|
+ -subj "/O=$VPN_ORGANISATION/OU=$VPN_UNIT/C=$VPN_COUNTRY_CODE/ST=$VPN_AREA/L=$VPN_LOCATION/CN=$HOSTNAME" \
|
|
462
|
+ -newkey rsa:2048 -keyout key.pem \
|
|
463
|
+ -out cert.pem
|
|
464
|
+ if [ ! -f key.pem ]; then
|
|
465
|
+ echo $'stunnel key not created'
|
|
466
|
+ exit 793530
|
|
467
|
+ fi
|
|
468
|
+ if [ ! -f cert.pem ]; then
|
|
469
|
+ echo $'stunnel cert not created'
|
|
470
|
+ exit 204587
|
|
471
|
+ fi
|
|
472
|
+ chmod 400 key.pem
|
|
473
|
+ chmod 640 cert.pem
|
|
474
|
+
|
|
475
|
+ cat key.pem cert.pem >> stunnel.pem
|
|
476
|
+ chmod 640 stunnel.pem
|
|
477
|
+
|
|
478
|
+ openssl pkcs12 -export -out stunnel.p12 -inkey key.pem -in cert.pem -passout pass:
|
|
479
|
+ if [ ! -f stunnel.p12 ]; then
|
|
480
|
+ echo $'stunnel pkcs12 not created'
|
|
481
|
+ exit 639353
|
|
482
|
+ fi
|
|
483
|
+ chmod 640 stunnel.p12
|
|
484
|
+
|
|
485
|
+ echo 'chroot = /var/lib/stunnel4' > stunnel.conf
|
|
486
|
+ echo 'pid = /stunnel4.pid' >> stunnel.conf
|
|
487
|
+ echo 'setuid = stunnel4' >> stunnel.conf
|
|
488
|
+ echo 'setgid = stunnel4' >> stunnel.conf
|
|
489
|
+ echo 'socket = l:TCP_NODELAY=1' >> stunnel.conf
|
|
490
|
+ echo 'socket = r:TCP_NODELAY=1' >> stunnel.conf
|
|
491
|
+ echo 'cert = /etc/stunnel/stunnel.pem' >> stunnel.conf
|
|
492
|
+ echo '[openvpn]' >> stunnel.conf
|
|
493
|
+ echo "accept = $VPN_TLS_PORT" >> stunnel.conf
|
|
494
|
+ echo 'connect = localhost:1194' >> stunnel.conf
|
|
495
|
+ echo 'cert = /etc/stunnel/stunnel.pem' >> stunnel.conf
|
|
496
|
+
|
|
497
|
+ sed -i 's|ENABLED=.*|ENABLED=1|g' /etc/default/stunnel4
|
|
498
|
+
|
|
499
|
+ echo '[openvpn]' > stunnel-client.conf
|
|
500
|
+ echo 'client = yes' >> stunnel-client.conf
|
|
501
|
+ echo "accept = $STUNNEL_PORT" >> stunnel-client.conf
|
|
502
|
+ echo "connect = $DEFAULT_DOMAIN_NAME:$VPN_TLS_PORT" >> stunnel-client.conf
|
|
503
|
+ echo 'cert = stunnel.pem' >> stunnel-client.conf
|
|
504
|
+
|
|
505
|
+ echo '[Unit]' > /etc/systemd/system/stunnel.service
|
|
506
|
+ echo 'Description=SSL tunnel for network daemons' >> /etc/systemd/system/stunnel.service
|
|
507
|
+ echo 'Documentation=man:stunnel https://www.stunnel.org/docs.html' >> /etc/systemd/system/stunnel.service
|
|
508
|
+ echo 'DefaultDependencies=no' >> /etc/systemd/system/stunnel.service
|
|
509
|
+ echo 'After=network.target' >> /etc/systemd/system/stunnel.service
|
|
510
|
+ echo 'After=syslog.target' >> /etc/systemd/system/stunnel.service
|
|
511
|
+ echo '' >> /etc/systemd/system/stunnel.service
|
|
512
|
+ echo '[Install]' >> /etc/systemd/system/stunnel.service
|
|
513
|
+ echo 'WantedBy=multi-user.target' >> /etc/systemd/system/stunnel.service
|
|
514
|
+ echo 'Alias=stunnel.target' >> /etc/systemd/system/stunnel.service
|
|
515
|
+ echo '' >> /etc/systemd/system/stunnel.service
|
|
516
|
+ echo '[Service]' >> /etc/systemd/system/stunnel.service
|
|
517
|
+ echo 'Type=forking' >> /etc/systemd/system/stunnel.service
|
|
518
|
+ echo 'RuntimeDirectory=stunnel' >> /etc/systemd/system/stunnel.service
|
|
519
|
+ echo 'EnvironmentFile=-/etc/stunnel/stunnel.conf' >> /etc/systemd/system/stunnel.service
|
|
520
|
+ echo 'ExecStart=/usr/bin/stunnel /etc/stunnel/stunnel.conf' >> /etc/systemd/system/stunnel.service
|
|
521
|
+ echo 'ExecStop=/usr/bin/killall -9 stunnel' >> /etc/systemd/system/stunnel.service
|
|
522
|
+ echo 'RemainAfterExit=yes' >> /etc/systemd/system/stunnel.service
|
|
523
|
+
|
|
524
|
+ if [ $VPN_TLS_PORT -eq 443 ]; then
|
|
525
|
+ systemctl stop nginx
|
|
526
|
+ systemctl disable nginx
|
|
527
|
+ else
|
|
528
|
+ systemctl enable nginx
|
|
529
|
+ systemctl restart nginx
|
|
530
|
+ fi
|
|
531
|
+
|
|
532
|
+ systemctl enable stunnel
|
|
533
|
+ systemctl daemon-reload
|
|
534
|
+ systemctl start stunnel
|
|
535
|
+
|
|
536
|
+ cp /etc/stunnel/stunnel.pem /home/$MY_USERNAME/stunnel.pem
|
|
537
|
+ cp /etc/stunnel/stunnel.p12 /home/$MY_USERNAME/stunnel.p12
|
|
538
|
+ cp /etc/stunnel/stunnel-client.conf /home/$MY_USERNAME/stunnel-client.conf
|
|
539
|
+ chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/stunnel*
|
78
|
540
|
}
|
79
|
541
|
|
80
|
542
|
function install_vpn {
|
81
|
|
- if ! grep -q "repo.universe-factory.net" /etc/apt/sources.list; then
|
82
|
|
- echo 'deb http://repo.universe-factory.net/debian/ sid main' >> /etc/apt/sources.list
|
83
|
|
- gpg --keyserver pgpkeys.mit.edu --recv-key 16EF3F64CB201D9C
|
84
|
|
- if [ ! "$?" = "0" ]; then
|
85
|
|
- exit 76272
|
86
|
|
- fi
|
87
|
|
- gpg -a --export 16EF3F64CB201D9C | sudo apt-key add -
|
88
|
|
- apt-get update
|
89
|
|
- apt-get -yq install fastd
|
90
|
|
- if [ ! "$?" = "0" ]; then
|
91
|
|
- exit 52026
|
92
|
|
- fi
|
|
543
|
+ apt-get -yq install fastd openvpn easy-rsa
|
|
544
|
+
|
|
545
|
+ groupadd vpn
|
|
546
|
+ useradd -r -s /bin/false -g vpn vpn
|
|
547
|
+
|
|
548
|
+ # server configuration
|
|
549
|
+ echo 'port 1194' > /etc/openvpn/server.conf
|
|
550
|
+ echo 'proto tcp' >> /etc/openvpn/server.conf
|
|
551
|
+ echo 'dev tun' >> /etc/openvpn/server.conf
|
|
552
|
+ echo 'tun-mtu 1500' >> /etc/openvpn/server.conf
|
|
553
|
+ echo 'tun-mtu-extra 32' >> /etc/openvpn/server.conf
|
|
554
|
+ echo 'mssfix 1450' >> /etc/openvpn/server.conf
|
|
555
|
+ echo 'ca /etc/openvpn/ca.crt' >> /etc/openvpn/server.conf
|
|
556
|
+ echo 'cert /etc/openvpn/server.crt' >> /etc/openvpn/server.conf
|
|
557
|
+ echo 'key /etc/openvpn/server.key' >> /etc/openvpn/server.conf
|
|
558
|
+ echo 'dh /etc/openvpn/dh2048.pem' >> /etc/openvpn/server.conf
|
|
559
|
+ echo 'server 10.8.0.0 255.255.255.0' >> /etc/openvpn/server.conf
|
|
560
|
+ echo 'push "redirect-gateway def1 bypass-dhcp"' >> /etc/openvpn/server.conf
|
|
561
|
+ echo "push \"dhcp-option DNS 85.214.73.63\"" >> /etc/openvpn/server.conf
|
|
562
|
+ echo "push \"dhcp-option DNS 213.73.91.35\"" >> /etc/openvpn/server.conf
|
|
563
|
+ echo 'keepalive 5 30' >> /etc/openvpn/server.conf
|
|
564
|
+ echo 'comp-lzo' >> /etc/openvpn/server.conf
|
|
565
|
+ echo 'persist-key' >> /etc/openvpn/server.conf
|
|
566
|
+ echo 'persist-tun' >> /etc/openvpn/server.conf
|
|
567
|
+ echo 'status /dev/null' >> /etc/openvpn/server.conf
|
|
568
|
+ echo 'verb 3' >> /etc/openvpn/server.conf
|
|
569
|
+ echo '' >> /etc/openvpn/server.conf
|
|
570
|
+
|
|
571
|
+ echo 1 > /proc/sys/net/ipv4/ip_forward
|
|
572
|
+ sed -i 's|# net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
|
|
573
|
+ sed -i 's|#net.ipv4.ip_forward|net.ipv4.ip_forward|g' /etc/sysctl.conf
|
|
574
|
+ sed -i 's|net.ipv4.ip_forward.*|net.ipv4.ip_forward=1|g' /etc/sysctl.conf
|
|
575
|
+
|
|
576
|
+ cp -r /usr/share/easy-rsa/ /etc/openvpn
|
|
577
|
+ if [ ! -d /etc/openvpn/easy-rsa/keys ]; then
|
|
578
|
+ mkdir /etc/openvpn/easy-rsa/keys
|
|
579
|
+ fi
|
|
580
|
+
|
|
581
|
+ # keys configuration
|
|
582
|
+ sed -i "s|export KEY_COUNTRY.*|export KEY_COUNTRY=\"US\"|g" /etc/openvpn/easy-rsa/vars
|
|
583
|
+ sed -i "s|export KEY_PROVINCE.*|export KEY_PROVINCE=\"TX\"|g" /etc/openvpn/easy-rsa/vars
|
|
584
|
+ sed -i "s|export KEY_CITY.*|export KEY_CITY=\"Dallas\"|g" /etc/openvpn/easy-rsa/vars
|
|
585
|
+ sed -i "s|export KEY_ORG.*|export KEY_ORG=\"$PROJECT_NAME\"|g" /etc/openvpn/easy-rsa/vars
|
|
586
|
+ sed -i "s|export KEY_EMAIL.*|export KEY_EMAIL=\"$MY_EMAIL_ADDRESS\"|g" /etc/openvpn/easy-rsa/vars
|
|
587
|
+ sed -i "s|export KEY_OU=.*|export KEY_OU=\"MoonUnit\"|g" /etc/openvpn/easy-rsa/vars
|
|
588
|
+ sed -i "s|export KEY_NAME.*|export KEY_NAME=\"$OPENVPN_SERVER_NAME\"|g" /etc/openvpn/easy-rsa/vars
|
|
589
|
+
|
|
590
|
+ # generate host keys
|
|
591
|
+ if [ ! -f /etc/openvpn/dh2048.pem ]; then
|
|
592
|
+ openssl dhparam -out /etc/openvpn/dh2048.pem 2048
|
|
593
|
+ fi
|
|
594
|
+ if [ ! -f /etc/openvpn/dh2048.pem ]; then
|
|
595
|
+ echo $'vpn dhparams were not generated'
|
|
596
|
+ exit 73724523
|
|
597
|
+ fi
|
|
598
|
+ cp /etc/openvpn/dh2048.pem /etc/openvpn/easy-rsa/keys/dh2048.pem
|
|
599
|
+
|
|
600
|
+ cd /etc/openvpn/easy-rsa
|
|
601
|
+ . ./vars
|
|
602
|
+ ./clean-all
|
|
603
|
+ vpn_openssl_version='1.0.0'
|
|
604
|
+ if [ ! -f openssl-${vpn_openssl_version}.cnf ]; then
|
|
605
|
+ echo $"openssl-${vpn_openssl_version}.cnf was not found"
|
|
606
|
+ exit 7392353
|
|
607
|
+ fi
|
|
608
|
+ cp openssl-${vpn_openssl_version}.cnf openssl.cnf
|
|
609
|
+
|
|
610
|
+ if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
|
|
611
|
+ rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
|
|
612
|
+ fi
|
|
613
|
+ if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
|
|
614
|
+ rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key
|
93
|
615
|
fi
|
|
616
|
+ if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr ]; then
|
|
617
|
+ rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr
|
|
618
|
+ fi
|
|
619
|
+ sed -i 's| --interact||g' build-key-server
|
|
620
|
+ sed -i 's| --interact||g' build-ca
|
|
621
|
+ ./build-ca
|
|
622
|
+ ./build-key-server $OPENVPN_SERVER_NAME
|
|
623
|
+ if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
|
|
624
|
+ echo $'OpenVPN crt not found'
|
|
625
|
+ exit 7823352
|
|
626
|
+ fi
|
|
627
|
+ server_cert=$(cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt)
|
|
628
|
+ if [ ${#server_cert} -lt 10 ]; then
|
|
629
|
+ cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
|
|
630
|
+ echo $'Server cert generation failed'
|
|
631
|
+ exit 3284682
|
|
632
|
+ fi
|
|
633
|
+
|
|
634
|
+ if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
|
|
635
|
+ echo $'OpenVPN key not found'
|
|
636
|
+ exit 6839436
|
|
637
|
+ fi
|
|
638
|
+ if [ ! -f /etc/openvpn/easy-rsa/keys/ca.key ]; then
|
|
639
|
+ echo $'OpenVPN ca not found'
|
|
640
|
+ exit 7935203
|
|
641
|
+ fi
|
|
642
|
+ cp /etc/openvpn/easy-rsa/keys/{$OPENVPN_SERVER_NAME.crt,$OPENVPN_SERVER_NAME.key,ca.crt} /etc/openvpn
|
|
643
|
+
|
|
644
|
+ create_user_vpn_key $MY_USERNAME
|
|
645
|
+
|
|
646
|
+ firewall_enable_vpn
|
|
647
|
+
|
|
648
|
+ if [ $VPN_TLS_PORT -ne 443 ]; then
|
|
649
|
+ firewall_add VPN-TLS $VPN_TLS_PORT tcp
|
|
650
|
+ fi
|
|
651
|
+
|
|
652
|
+ systemctl start openvpn
|
|
653
|
+
|
|
654
|
+ install_stunnel
|
|
655
|
+
|
|
656
|
+ systemctl restart openvpn
|
|
657
|
+
|
94
|
658
|
APP_INSTALLED=1
|
95
|
659
|
}
|
96
|
660
|
|