freedombone-app-vpn 27KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # VPN functions
  12. # https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-debian-8
  13. # https://jamielinux.com/blog/force-all-network-traffic-through-openvpn-using-iptables/
  14. # http://www.farrellf.com/projects/software/2016-05-04_Running_a_VPN_Server_with_OpenVPN_and_Stunnel/index_.php
  15. #
  16. # License
  17. # =======
  18. #
  19. # Copyright (C) 2014-2017 Bob Mottram <bob@freedombone.net>
  20. #
  21. # This program is free software: you can redistribute it and/or modify
  22. # it under the terms of the GNU Affero General Public License as published by
  23. # the Free Software Foundation, either version 3 of the License, or
  24. # (at your option) any later version.
  25. #
  26. # This program is distributed in the hope that it will be useful,
  27. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  28. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  29. # GNU Affero General Public License for more details.
  30. #
  31. # You should have received a copy of the GNU Affero General Public License
  32. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  33. VARIANTS='full full-vim'
  34. IN_DEFAULT_INSTALL=0
  35. SHOW_ON_ABOUT=0
  36. OPENVPN_SERVER_NAME="server"
  37. OPENVPN_KEY_FILENAME='client.ovpn'
  38. VPN_COUNTRY_CODE="US"
  39. VPN_AREA="Apparent Free Speech Zone"
  40. VPN_LOCATION="Freedomville"
  41. VPN_ORGANISATION="Freedombone"
  42. VPN_UNIT="Freedombone Unit"
  43. STUNNEL_PORT=3439
  44. VPN_TLS_PORT=553
  45. VPN_MESH_TLS_PORT=653
  46. vpn_variables=(MY_EMAIL_ADDRESS
  47. DEFAULT_DOMAIN_NAME
  48. MY_USERNAME
  49. VPN_COUNTRY_CODE
  50. VPN_AREA
  51. VPN_LOCATION
  52. VPN_ORGANISATION
  53. VPN_UNIT
  54. VPN_TLS_PORT)
  55. function logging_on_vpn {
  56. if [ ! -f /etc/openvpn/server.conf ]; then
  57. return
  58. fi
  59. sed -i 's|status .*|status /var/log/openvpn.log|g' /etc/openvpn/server.conf
  60. systemctl restart openvpn
  61. }
  62. function logging_off_vpn {
  63. if [ ! -f /etc/openvpn/server.conf ]; then
  64. return
  65. fi
  66. sed -i 's|status .*|status /dev/null|g' /etc/openvpn/server.conf
  67. systemctl restart openvpn
  68. }
  69. function install_interactive_vpn {
  70. read_config_param VPN_TLS_PORT
  71. if [ ! $VPN_TLS_PORT ]; then
  72. VPN_TLS_PORT=553
  73. fi
  74. VPN_DETAILS_COMPLETE=
  75. while [ ! $VPN_DETAILS_COMPLETE ]
  76. do
  77. data=$(tempfile 2>/dev/null)
  78. trap "rm -f $data" 0 1 2 5 15
  79. currtlsport=$(grep 'VPN_TLS_PORT' temp.cfg | awk -F '=' '{print $2}')
  80. if [ $currtlsport ]; then
  81. VPN_TLS_PORT=$currtlsport
  82. fi
  83. dialog --backtitle $"Freedombone Configuration" \
  84. --title $"VPN Configuration" \
  85. --form $"\nPlease enter your VPN details. Changing the port to 443 will help defend against censorship but will prevent other web apps from running." 12 65 1 \
  86. $"TLS port:" 1 1 "$VPN_TLS_PORT" 1 12 5 5 \
  87. 2> $data
  88. sel=$?
  89. case $sel in
  90. 1) exit 1;;
  91. 255) exit 1;;
  92. esac
  93. tlsport=$(cat $data | sed -n 1p)
  94. if [ ${#tlsport} -gt 1 ]; then
  95. if [[ "$tlsport" != *' '* && "$tlsport" != *'.'* ]]; then
  96. VPN_TLS_PORT="$tlsport"
  97. VPN_DETAILS_COMPLETE="yes"
  98. write_config_param "VPN_TLS_PORT" "$VPN_TLS_PORT"
  99. fi
  100. fi
  101. done
  102. clear
  103. APP_INSTALLED=1
  104. }
  105. function vpn_change_tls_port {
  106. if ! grep -q "VPN-TLS" $FIREWALL_CONFIG; then
  107. EXISTING_VPN_TLS_PORT=443
  108. else
  109. EXISTING_VPN_TLS_PORT=$(cat $FIREWALL_CONFIG | grep "VPN-TLS" | awk -F '=' '{print $2}')
  110. fi
  111. data=$(tempfile 2>/dev/null)
  112. trap "rm -f $data" 0 1 2 5 15
  113. dialog --title $"VPN Configuration" \
  114. --backtitle $"Freedombone Control Panel" \
  115. --inputbox $'Change TLS port' 10 50 $EXISTING_VPN_TLS_PORT 2>$data
  116. sel=$?
  117. case $sel in
  118. 0)
  119. tlsport=$(<$data)
  120. if [ ${#tlsport} -gt 0 ]; then
  121. if [[ "$tlsport" != "$EXISTING_VPN_TLS_PORT" ]]; then
  122. clear
  123. VPN_TLS_PORT=$tlsport
  124. write_config_param "VPN_TLS_PORT" "$VPN_TLS_PORT"
  125. sed -i "s|accept =.*|accept = $VPN_TLS_PORT|g" /etc/stunnel/stunnel.conf
  126. sed -i "s|connect =.*|connect = :$VPN_TLS_PORT|g" /etc/stunnel/stunnel-client.conf
  127. for d in /home/*/ ; do
  128. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  129. if [ -f /home/$USERNAME/stunnel-client.conf ]; then
  130. cp /etc/stunnel/stunnel-client.conf /home/$USERNAME/stunnel-client.conf
  131. chown $USERNAME:$USERNAME /home/$USERNAME/stunnel-client.conf
  132. fi
  133. done
  134. if [ $VPN_TLS_PORT -eq 443 ]; then
  135. if [[ "$PREVIOUS_VPN_TLS_PORT" != "443" ]]; then
  136. firewall_remove VPN-TLS ${EXISTING_VPN_TLS_PORT}
  137. fi
  138. systemctl stop nginx
  139. systemctl disable nginx
  140. else
  141. if [[ "$PREVIOUS_VPN_TLS_PORT" != "$VPN_TLS_PORT" ]]; then
  142. firewall_remove VPN-TLS ${EXISTING_VPN_TLS_PORT}
  143. firewall_add VPN-TLS ${VPN_TLS_PORT} tcp
  144. fi
  145. systemctl enable nginx
  146. systemctl restart nginx
  147. fi
  148. systemctl restart stunnel
  149. if [ $VPN_TLS_PORT -eq 443 ]; then
  150. dialog --title $"VPN Configuration" \
  151. --msgbox $"TLS port changed to ${VPN_TLS_PORT}. Forward this port from your internet router." 10 60
  152. else
  153. dialog --title $"VPN Configuration" \
  154. --msgbox $"TLS port changed to ${VPN_TLS_PORT}. Forward this port from your internet router." 10 60
  155. fi
  156. fi
  157. fi
  158. ;;
  159. esac
  160. }
  161. function vpn_regenerate_client_keys {
  162. data=$(tempfile 2>/dev/null)
  163. trap "rm -f $data" 0 1 2 5 15
  164. dialog --title $"Regenerate VPN keys for a user" \
  165. --backtitle $"Freedombone Control Panel" \
  166. --inputbox $'username' 10 50 2>$data
  167. sel=$?
  168. case $sel in
  169. 0)
  170. USERNAME=$(<$data)
  171. if [ ${#USERNAME} -gt 0 ]; then
  172. if [ -d /home/$USERNAME ]; then
  173. clear
  174. create_user_vpn_key $USERNAME
  175. dialog --title $"Regenerate VPN keys for a user" \
  176. --msgbox $"VPN keys were regenerated for $USERNAME" 6 60
  177. fi
  178. fi
  179. ;;
  180. esac
  181. }
  182. function configure_interactive_vpn {
  183. read_config_param VPN_TLS_PORT
  184. while true
  185. do
  186. data=$(tempfile 2>/dev/null)
  187. trap "rm -f $data" 0 1 2 5 15
  188. dialog --backtitle $"Freedombone Control Panel" \
  189. --title $"VPN Configuration" \
  190. --radiolist $"Choose an operation:" 13 70 3 \
  191. 1 $"Change TLS port (currently $VPN_TLS_PORT)" off \
  192. 2 $"Regenerate keys for a user" off \
  193. 3 $"Exit" on 2> $data
  194. sel=$?
  195. case $sel in
  196. 1) return;;
  197. 255) return;;
  198. esac
  199. case $(cat $data) in
  200. 1) vpn_change_tls_port;;
  201. 2) vpn_regenerate_client_keys;;
  202. 3) break;;
  203. esac
  204. done
  205. }
  206. function reconfigure_vpn {
  207. echo -n ''
  208. }
  209. function upgrade_vpn {
  210. echo -n ''
  211. }
  212. function backup_local_vpn {
  213. for d in /home/*/ ; do
  214. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  215. if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
  216. cp /home/$USERNAME/$OPENVPN_KEY_FILENAME /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME}
  217. fi
  218. done
  219. function_check backup_directory_to_usb
  220. backup_directory_to_usb /etc/openvpn/easy-rsa/keys vpn
  221. backup_directory_to_usb /etc/stunnel vpnstunnel
  222. }
  223. function restore_local_vpn {
  224. temp_restore_dir=/root/tempvpn
  225. restore_directory_from_usb $temp_restore_dir vpn
  226. if [ -d ${temp_restore_dir} ]; then
  227. cp -r ${temp_restore_dir}/* /etc/openvpn/easy-rsa/keys
  228. cp -r ${temp_restore_dir}/${OPENVPN_SERVER_NAME}* /etc/openvpn/
  229. cp -r ${temp_restore_dir}/dh* /etc/openvpn/
  230. rm -rf ${temp_restore_dir}
  231. for d in /home/*/ ; do
  232. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  233. if [ -f /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} ]; then
  234. cp /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} /home/$USERNAME/$OPENVPN_KEY_FILENAME
  235. chown $USERNAME:$USERNAME /home/$USERNAME/$OPENVPN_KEY_FILENAME
  236. fi
  237. done
  238. fi
  239. temp_restore_dir=/root/tempvpnstunnel
  240. restore_directory_from_usb $temp_restore_dir vpnstunnel
  241. if [ -d ${temp_restore_dir} ]; then
  242. cp -r ${temp_restore_dir}/* /etc/stunnel
  243. rm -rf ${temp_restore_dir}
  244. for d in /home/*/ ; do
  245. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  246. if [ -f /home/$USERNAME/stunnel.pem ]; then
  247. cp /etc/stunnel/stunnel.pem /home/$USERNAME/stunnel.pem
  248. chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.pem
  249. fi
  250. if [ -f /home/$USERNAME/stunnel.p12 ]; then
  251. cp /etc/stunnel/stunnel.p12 /home/$USERNAME/stunnel.p12
  252. chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.p12
  253. fi
  254. done
  255. fi
  256. }
  257. function backup_remote_vpn {
  258. for d in /home/*/ ; do
  259. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  260. if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
  261. cp /home/$USERNAME/$OPENVPN_KEY_FILENAME /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME}
  262. fi
  263. done
  264. function_check backup_directory_to_friend
  265. backup_directory_to_friend /etc/openvpn/easy-rsa/keys vpn
  266. backup_directory_to_friend /etc/stunnel vpnstunnel
  267. }
  268. function restore_remote_vpn {
  269. temp_restore_dir=/root/tempvpn
  270. restore_directory_from_friend $temp_restore_dir vpn
  271. if [ -d ${temp_restore_dir} ]; then
  272. cp -r ${temp_restore_dir}/* /etc/openvpn/easy-rsa/keys
  273. cp -r ${temp_restore_dir}/${OPENVPN_SERVER_NAME}* /etc/openvpn/
  274. cp -r ${temp_restore_dir}/dh* /etc/openvpn/
  275. rm -rf ${temp_restore_dir}
  276. for d in /home/*/ ; do
  277. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  278. if [ -f /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} ]; then
  279. cp /etc/openvpn/easy-rsa/keys/${USERNAME}_${OPENVPN_KEY_FILENAME} /home/$USERNAME/$OPENVPN_KEY_FILENAME
  280. chown $USERNAME:$USERNAME /home/$USERNAME/$OPENVPN_KEY_FILENAME
  281. fi
  282. done
  283. fi
  284. temp_restore_dir=/root/tempvpnstunnel
  285. restore_directory_from_friend $temp_restore_dir vpnstunnel
  286. if [ -d ${temp_restore_dir} ]; then
  287. cp -r ${temp_restore_dir}/* /etc/stunnel
  288. rm -rf ${temp_restore_dir}
  289. for d in /home/*/ ; do
  290. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  291. if [ -f /home/$USERNAME/stunnel.pem ]; then
  292. cp /etc/stunnel/stunnel.pem /home/$USERNAME/stunnel.pem
  293. chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.pem
  294. fi
  295. if [ -f /home/$USERNAME/stunnel.p12 ]; then
  296. cp /etc/stunnel/stunnel.p12 /home/$USERNAME/stunnel.p12
  297. chown $USERNAME:$USERNAME /home/$USERNAME/stunnel.p12
  298. fi
  299. done
  300. fi
  301. }
  302. function remove_vpn {
  303. systemctl stop stunnel
  304. systemctl disable stunnel
  305. rm /etc/systemd/system/stunnel.service
  306. systemctl stop openvpn
  307. if [ $VPN_TLS_PORT -ne 443 ]; then
  308. firewall_remove VPN-TLS $VPN_TLS_PORT
  309. else
  310. systemctl enable nginx
  311. systemctl restart nginx
  312. fi
  313. apt-get -yq remove --purge fastd openvpn easy-rsa
  314. apt-get -yq remove stunnel4
  315. if [ -d /etc/openvpn ]; then
  316. rm -rf /etc/openvpn
  317. fi
  318. firewall_disable_vpn
  319. echo 0 > /proc/sys/net/ipv4/ip_forward
  320. sed -i 's|net.ipv4.ip_forward=.*|net.ipv4.ip_forward=0|g' /etc/sysctl.conf
  321. remove_completion_param install_vpn
  322. # remove any client keys
  323. for d in /home/*/ ; do
  324. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  325. if [ -f /home/$USERNAME/$OPENVPN_KEY_FILENAME ]; then
  326. shred -zu /home/$USERNAME/$OPENVPN_KEY_FILENAME
  327. fi
  328. rm /home/$USERNAME/stunnel*
  329. done
  330. userdel -f vpn
  331. groupdel -f vpn
  332. if [ -d /etc/stunnel ]; then
  333. rm -rf /etc/stunnel
  334. fi
  335. }
  336. function create_user_vpn_key {
  337. username=$1
  338. if [ ! -d /home/$username ]; then
  339. return
  340. fi
  341. echo $"Creating VPN key for $username"
  342. cd /etc/openvpn/easy-rsa
  343. if [ -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
  344. rm /etc/openvpn/easy-rsa/keys/$username.crt
  345. fi
  346. if [ -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
  347. rm /etc/openvpn/easy-rsa/keys/$username.key
  348. fi
  349. if [ -f /etc/openvpn/easy-rsa/keys/$username.csr ]; then
  350. rm /etc/openvpn/easy-rsa/keys/$username.csr
  351. fi
  352. sed -i 's| --interact||g' build-key
  353. ./build-key "$username"
  354. if [ ! -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
  355. echo $'VPN user cert not generated'
  356. exit 783528
  357. fi
  358. user_cert=$(cat /etc/openvpn/easy-rsa/keys/$username.crt)
  359. if [ ${#user_cert} -lt 10 ]; then
  360. cat /etc/openvpn/easy-rsa/keys/$username.crt
  361. echo $'User cert generation failed'
  362. exit 634659
  363. fi
  364. if [ ! -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
  365. echo $'VPN user key not generated'
  366. exit 682523
  367. fi
  368. user_key=$(cat /etc/openvpn/easy-rsa/keys/$username.key)
  369. if [ ${#user_key} -lt 10 ]; then
  370. cat /etc/openvpn/easy-rsa/keys/$username.key
  371. echo $'User key generation failed'
  372. exit 285838
  373. fi
  374. user_vpn_cert_file=/home/$username/$OPENVPN_KEY_FILENAME
  375. echo 'client' > $user_vpn_cert_file
  376. echo 'dev tun' >> $user_vpn_cert_file
  377. echo 'proto tcp' >> $user_vpn_cert_file
  378. echo "remote localhost $STUNNEL_PORT" >> $user_vpn_cert_file
  379. echo "route $DEFAULT_DOMAIN_NAME 255.255.255.255 net_gateway" >> $user_vpn_cert_file
  380. echo 'resolv-retry infinite' >> $user_vpn_cert_file
  381. echo 'nobind' >> $user_vpn_cert_file
  382. echo 'tun-mtu 1500' >> $user_vpn_cert_file
  383. echo 'tun-mtu-extra 32' >> $user_vpn_cert_file
  384. echo 'mssfix 1450' >> $user_vpn_cert_file
  385. echo 'persist-key' >> $user_vpn_cert_file
  386. echo 'persist-tun' >> $user_vpn_cert_file
  387. echo 'auth-nocache' >> $user_vpn_cert_file
  388. echo 'remote-cert-tls server' >> $user_vpn_cert_file
  389. echo 'comp-lzo' >> $user_vpn_cert_file
  390. echo 'verb 3' >> $user_vpn_cert_file
  391. echo '' >> $user_vpn_cert_file
  392. echo '<ca>' >> $user_vpn_cert_file
  393. cat /etc/openvpn/ca.crt >> $user_vpn_cert_file
  394. echo '</ca>' >> $user_vpn_cert_file
  395. echo '<cert>' >> $user_vpn_cert_file
  396. cat /etc/openvpn/easy-rsa/keys/$username.crt >> $user_vpn_cert_file
  397. echo '</cert>' >> $user_vpn_cert_file
  398. echo '<key>' >> $user_vpn_cert_file
  399. cat /etc/openvpn/easy-rsa/keys/$username.key >> $user_vpn_cert_file
  400. echo '</key>' >> $user_vpn_cert_file
  401. chown $username:$username $user_vpn_cert_file
  402. # keep a backup
  403. cp $user_vpn_cert_file /etc/openvpn/easy-rsa/keys/$username.ovpn
  404. #rm /etc/openvpn/easy-rsa/keys/$username.crt
  405. #rm /etc/openvpn/easy-rsa/keys/$username.csr
  406. shred -zu /etc/openvpn/easy-rsa/keys/$username.key
  407. echo $"VPN key created at $user_vpn_cert_file"
  408. }
  409. function add_user_vpn {
  410. new_username="$1"
  411. new_user_password="$2"
  412. create_user_vpn_key $new_username
  413. if [ -f /etc/stunnel/stunnel.pem ]; then
  414. cp /etc/stunnel/stunnel.pem /home/$new_username/stunnel.pem
  415. chown $new_username:$new_username /home/$new_username/stunnel.pem
  416. fi
  417. if [ -f /etc/stunnel/stunnel.p12 ]; then
  418. cp /etc/stunnel/stunnel.p12 /home/$new_username/stunnel.p12
  419. chown $new_username:$new_username /home/$new_username/stunnel.p12
  420. fi
  421. cp /etc/stunnel/stunnel-client.conf /home/$new_username/stunnel-client.conf
  422. chown $new_username:$new_username /home/$new_username/stunnel-client.conf
  423. }
  424. function remove_user_vpn {
  425. new_username="$1"
  426. }
  427. function mesh_setup_vpn {
  428. vpn_generate_keys
  429. if [ -d /home/fbone ]; then
  430. cp /etc/stunnel/stunnel-client.conf /home/fbone/stunnel-client.conf
  431. chown fbone:fbone /home/fbone/stunnel*
  432. fi
  433. generate_stunnel_keys
  434. systemctl restart openvpn
  435. }
  436. function generate_stunnel_keys {
  437. openssl req -x509 -nodes -days 3650 -sha256 \
  438. -subj "/O=$VPN_ORGANISATION/OU=$VPN_UNIT/C=$VPN_COUNTRY_CODE/ST=$VPN_AREA/L=$VPN_LOCATION/CN=$HOSTNAME" \
  439. -newkey rsa:2048 -keyout /etc/stunnel/key.pem \
  440. -out /etc/stunnel/cert.pem
  441. if [ ! -f /etc/stunnel/key.pem ]; then
  442. echo $'stunnel key not created'
  443. exit 793530
  444. fi
  445. if [ ! -f /etc/stunnel/cert.pem ]; then
  446. echo $'stunnel cert not created'
  447. exit 204587
  448. fi
  449. chmod 400 /etc/stunnel/key.pem
  450. chmod 640 /etc/stunnel/cert.pem
  451. cat /etc/stunnel/key.pem /etc/stunnel/cert.pem >> /etc/stunnel/stunnel.pem
  452. chmod 640 /etc/stunnel/stunnel.pem
  453. openssl pkcs12 -export -out /etc/stunnel/stunnel.p12 -inkey /etc/stunnel/key.pem -in /etc/stunnel/cert.pem -passout pass:
  454. if [ ! -f /etc/stunnel/stunnel.p12 ]; then
  455. echo $'stunnel pkcs12 not created'
  456. exit 639353
  457. fi
  458. chmod 640 /etc/stunnel/stunnel.p12
  459. cp /etc/stunnel/stunnel.pem /home/$MY_USERNAME/stunnel.pem
  460. cp /etc/stunnel/stunnel.p12 /home/$MY_USERNAME/stunnel.p12
  461. chown $MY_USERNAME:$MY_USERNAME $prefix$userhome/stunnel*
  462. }
  463. function install_stunnel {
  464. prefix=
  465. prefixchroot=
  466. if [ $rootdir ]; then
  467. prefix=$rootdir
  468. prefixchroot="chroot $rootdir"
  469. VPN_TLS_PORT=$VPN_MESH_TLS_PORT
  470. fi
  471. $prefixchroot apt-get -yq install stunnel4
  472. if [ ! $prefix ]; then
  473. cd /etc/stunnel
  474. generate_stunnel_keys
  475. fi
  476. echo 'chroot = /var/lib/stunnel4' > $prefix/etc/stunnel/stunnel.conf
  477. echo 'pid = /stunnel4.pid' >> $prefix/etc/stunnel/stunnel.conf
  478. echo 'setuid = stunnel4' >> $prefix/etc/stunnel/stunnel.conf
  479. echo 'setgid = stunnel4' >> $prefix/etc/stunnel/stunnel.conf
  480. echo 'socket = l:TCP_NODELAY=1' >> $prefix/etc/stunnel/stunnel.conf
  481. echo 'socket = r:TCP_NODELAY=1' >> $prefix/etc/stunnel/stunnel.conf
  482. echo 'cert = /etc/stunnel/stunnel.pem' >> $prefix/etc/stunnel/stunnel.conf
  483. echo '[openvpn]' >> $prefix/etc/stunnel/stunnel.conf
  484. echo "accept = $VPN_TLS_PORT" >> $prefix/etc/stunnel/stunnel.conf
  485. echo 'connect = localhost:1194' >> $prefix/etc/stunnel/stunnel.conf
  486. echo 'cert = /etc/stunnel/stunnel.pem' >> $prefix/etc/stunnel/stunnel.conf
  487. echo 'protocol = socks' >> $prefix/etc/stunnel/stunnel.conf
  488. sed -i 's|ENABLED=.*|ENABLED=1|g' $prefix/etc/default/stunnel4
  489. echo '[openvpn]' > $prefix/etc/stunnel/stunnel-client.conf
  490. echo 'client = yes' >> $prefix/etc/stunnel/stunnel-client.conf
  491. echo "accept = $STUNNEL_PORT" >> $prefix/etc/stunnel/stunnel-client.conf
  492. echo "connect = $DEFAULT_DOMAIN_NAME:$VPN_TLS_PORT" >> $prefix/etc/stunnel/stunnel-client.conf
  493. echo 'cert = stunnel.pem' >> $prefix/etc/stunnel/stunnel-client.conf
  494. echo 'protocol = socks' >> $prefix/etc/stunnel/stunnel-client.conf
  495. echo '[Unit]' > $prefix/etc/systemd/system/stunnel.service
  496. echo 'Description=SSL tunnel for network daemons' >> $prefix/etc/systemd/system/stunnel.service
  497. echo 'Documentation=man:stunnel https://www.stunnel.org/docs.html' >> $prefix/etc/systemd/system/stunnel.service
  498. echo 'DefaultDependencies=no' >> $prefix/etc/systemd/system/stunnel.service
  499. echo 'After=network.target' >> $prefix/etc/systemd/system/stunnel.service
  500. echo 'After=syslog.target' >> $prefix/etc/systemd/system/stunnel.service
  501. echo '' >> $prefix/etc/systemd/system/stunnel.service
  502. echo '[Install]' >> $prefix/etc/systemd/system/stunnel.service
  503. echo 'WantedBy=multi-user.target' >> $prefix/etc/systemd/system/stunnel.service
  504. echo 'Alias=stunnel.target' >> $prefix/etc/systemd/system/stunnel.service
  505. echo '' >> $prefix/etc/systemd/system/stunnel.service
  506. echo '[Service]' >> $prefix/etc/systemd/system/stunnel.service
  507. echo 'Type=forking' >> $prefix/etc/systemd/system/stunnel.service
  508. echo 'RuntimeDirectory=stunnel' >> $prefix/etc/systemd/system/stunnel.service
  509. echo 'EnvironmentFile=-/etc/stunnel/stunnel.conf' >> $prefix/etc/systemd/system/stunnel.service
  510. echo 'ExecStart=/usr/bin/stunnel /etc/stunnel/stunnel.conf' >> $prefix/etc/systemd/system/stunnel.service
  511. echo 'ExecStop=/usr/bin/killall -9 stunnel' >> $prefix/etc/systemd/system/stunnel.service
  512. echo 'RemainAfterExit=yes' >> $prefix/etc/systemd/system/stunnel.service
  513. if [ ! $prefix ]; then
  514. if [ $VPN_TLS_PORT -eq 443 ]; then
  515. systemctl stop nginx
  516. systemctl disable nginx
  517. else
  518. systemctl enable nginx
  519. systemctl restart nginx
  520. fi
  521. systemctl enable stunnel
  522. systemctl daemon-reload
  523. systemctl start stunnel
  524. cp /etc/stunnel/stunnel-client.conf /home/$MY_USERNAME/stunnel-client.conf
  525. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/stunnel*
  526. fi
  527. }
  528. function vpn_generate_keys {
  529. # generate host keys
  530. if [ ! -f /etc/openvpn/dh2048.pem ]; then
  531. ${PROJECT_NAME}-dhparam -o /etc/openvpn/dh2048.pem
  532. fi
  533. if [ ! -f /etc/openvpn/dh2048.pem ]; then
  534. echo $'vpn dhparams were not generated'
  535. exit 73724523
  536. fi
  537. cp /etc/openvpn/dh2048.pem /etc/openvpn/easy-rsa/keys/dh2048.pem
  538. cd /etc/openvpn/easy-rsa
  539. . ./vars
  540. ./clean-all
  541. vpn_openssl_version='1.0.0'
  542. if [ ! -f openssl-${vpn_openssl_version}.cnf ]; then
  543. echo $"openssl-${vpn_openssl_version}.cnf was not found"
  544. exit 7392353
  545. fi
  546. cp openssl-${vpn_openssl_version}.cnf openssl.cnf
  547. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
  548. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
  549. fi
  550. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
  551. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key
  552. fi
  553. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr ]; then
  554. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr
  555. fi
  556. sed -i 's| --interact||g' build-key-server
  557. sed -i 's| --interact||g' build-ca
  558. ./build-ca
  559. ./build-key-server ${OPENVPN_SERVER_NAME}
  560. if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
  561. echo $'OpenVPN crt not found'
  562. exit 7823352
  563. fi
  564. server_cert=$(cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt)
  565. if [ ${#server_cert} -lt 10 ]; then
  566. cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
  567. echo $'Server cert generation failed'
  568. exit 3284682
  569. fi
  570. if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
  571. echo $'OpenVPN key not found'
  572. exit 6839436
  573. fi
  574. if [ ! -f /etc/openvpn/easy-rsa/keys/ca.key ]; then
  575. echo $'OpenVPN ca not found'
  576. exit 7935203
  577. fi
  578. cp /etc/openvpn/easy-rsa/keys/{$OPENVPN_SERVER_NAME.crt,$OPENVPN_SERVER_NAME.key,ca.crt} /etc/openvpn
  579. create_user_vpn_key ${MY_USERNAME}
  580. }
  581. function install_vpn {
  582. prefix=
  583. prefixchroot=
  584. if [ $rootdir ]; then
  585. prefix=$rootdir
  586. prefixchroot="chroot $rootdir"
  587. VPN_TLS_PORT=$VPN_MESH_TLS_PORT
  588. fi
  589. $prefixchroot apt-get -yq install fastd openvpn easy-rsa
  590. $prefixchroot groupadd vpn
  591. $prefixchroot useradd -r -s /bin/false -g vpn vpn
  592. # server configuration
  593. echo 'port 1194' > $prefix/etc/openvpn/server.conf
  594. echo 'proto tcp' >> $prefix/etc/openvpn/server.conf
  595. echo 'dev tun' >> $prefix/etc/openvpn/server.conf
  596. echo 'tun-mtu 1500' >> $prefix/etc/openvpn/server.conf
  597. echo 'tun-mtu-extra 32' >> $prefix/etc/openvpn/server.conf
  598. echo 'mssfix 1450' >> $prefix/etc/openvpn/server.conf
  599. echo 'ca /etc/openvpn/ca.crt' >> $prefix/etc/openvpn/server.conf
  600. echo 'cert /etc/openvpn/server.crt' >> $prefix/etc/openvpn/server.conf
  601. echo 'key /etc/openvpn/server.key' >> $prefix/etc/openvpn/server.conf
  602. echo 'dh /etc/openvpn/dh2048.pem' >> $prefix/etc/openvpn/server.conf
  603. echo 'server 10.8.0.0 255.255.255.0' >> $prefix/etc/openvpn/server.conf
  604. echo 'push "redirect-gateway def1 bypass-dhcp"' >> $prefix/etc/openvpn/server.conf
  605. echo "push \"dhcp-option DNS 85.214.73.63\"" >> $prefix/etc/openvpn/server.conf
  606. echo "push \"dhcp-option DNS 213.73.91.35\"" >> $prefix/etc/openvpn/server.conf
  607. echo 'keepalive 5 30' >> $prefix/etc/openvpn/server.conf
  608. echo 'comp-lzo' >> $prefix/etc/openvpn/server.conf
  609. echo 'persist-key' >> $prefix/etc/openvpn/server.conf
  610. echo 'persist-tun' >> $prefix/etc/openvpn/server.conf
  611. echo 'status /dev/null' >> $prefix/etc/openvpn/server.conf
  612. echo 'verb 3' >> $prefix/etc/openvpn/server.conf
  613. echo '' >> $prefix/etc/openvpn/server.conf
  614. if [ ! $prefix ]; then
  615. echo 1 > /proc/sys/net/ipv4/ip_forward
  616. fi
  617. sed -i 's|# net.ipv4.ip_forward|net.ipv4.ip_forward|g' $prefix/etc/sysctl.conf
  618. sed -i 's|#net.ipv4.ip_forward|net.ipv4.ip_forward|g' $prefix/etc/sysctl.conf
  619. sed -i 's|net.ipv4.ip_forward.*|net.ipv4.ip_forward=1|g' $prefix/etc/sysctl.conf
  620. cp -r $prefix/usr/share/easy-rsa/ $prefix/etc/openvpn
  621. if [ ! -d $prefix/etc/openvpn/easy-rsa/keys ]; then
  622. mkdir $prefix/etc/openvpn/easy-rsa/keys
  623. fi
  624. # keys configuration
  625. sed -i "s|export KEY_COUNTRY.*|export KEY_COUNTRY=\"US\"|g" $prefix/etc/openvpn/easy-rsa/vars
  626. sed -i "s|export KEY_PROVINCE.*|export KEY_PROVINCE=\"TX\"|g" $prefix/etc/openvpn/easy-rsa/vars
  627. sed -i "s|export KEY_CITY.*|export KEY_CITY=\"Dallas\"|g" $prefix/etc/openvpn/easy-rsa/vars
  628. sed -i "s|export KEY_ORG.*|export KEY_ORG=\"$PROJECT_NAME\"|g" $prefix/etc/openvpn/easy-rsa/vars
  629. sed -i "s|export KEY_EMAIL.*|export KEY_EMAIL=\"$MY_EMAIL_ADDRESS\"|g" $prefix/etc/openvpn/easy-rsa/vars
  630. sed -i "s|export KEY_OU=.*|export KEY_OU=\"MoonUnit\"|g" $prefix/etc/openvpn/easy-rsa/vars
  631. sed -i "s|export KEY_NAME.*|export KEY_NAME=\"$OPENVPN_SERVER_NAME\"|g" $prefix/etc/openvpn/easy-rsa/vars
  632. if [ ! $prefix ]; then
  633. vpn_generate_keys
  634. firewall_enable_vpn
  635. if [ ${VPN_TLS_PORT} -ne 443 ]; then
  636. firewall_add VPN-TLS ${VPN_TLS_PORT} tcp
  637. fi
  638. systemctl start openvpn
  639. fi
  640. install_stunnel
  641. if [ ! $prefix ]; then
  642. systemctl restart openvpn
  643. fi
  644. APP_INSTALLED=1
  645. }
  646. # NOTE: deliberately there is no "exit 0"