vpn:create_an_intranet_with_openvpn
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
vpn:create_an_intranet_with_openvpn [2016/10/19 13:36] – peter | vpn:create_an_intranet_with_openvpn [2019/12/04 22:12] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== VPN - Create an Intranet with OpenVPN ====== | ||
- | TODO | ||
- | |||
- | ===== Introduction ===== | ||
- | |||
- | Intranets are private networks created by organizations to ease communication and data transfers. | ||
- | |||
- | In this tutorial you'll configure services that are only available to clients who are connected to the VPN, including file shares and a web site, and you'll learn how to manage access to those resources. | ||
- | |||
- | ===== Prerequisites ===== | ||
- | |||
- | To complete this tutorial, you'll need the following: | ||
- | |||
- | * OpenVPN installed and configured on your server. | ||
- | * A registered domain name and access to add DNS entries. | ||
- | * Apache installed with two virtual hosts configured for your domain. | ||
- | |||
- | |||
- | ===== Step 1 — Installing and Configuring a Samba File Server ===== | ||
- | |||
- | Let's start by setting up Samba so people on our intranet can share files. | ||
- | |||
- | We will create two share directories. | ||
- | |||
- | First, install Samba and its prerequisites with the following command: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get install samba samba-common python-glade2 system-config-samba | ||
- | </ | ||
- | |||
- | Next, make a backup of the Samba configuration file just in case we make a mistake when we modify it later. | ||
- | |||
- | <code bash> | ||
- | sudo cp / | ||
- | </ | ||
- | |||
- | Samba also needs access through the firewall, so add a rule for Samba traffic: | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow samba | ||
- | </ | ||
- | |||
- | Now create the directories we'll share. | ||
- | |||
- | <code bash> | ||
- | sudo mkdir -p / | ||
- | </ | ||
- | |||
- | Then create the restricted directory: | ||
- | |||
- | <code bash> | ||
- | sudo mkdir -p / | ||
- | </ | ||
- | |||
- | Now, let's edit the Samba configuration file to set up the service and define the shares. | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Then delete all the content as we will be writing our own configuration from scratch piece by piece. | ||
- | |||
- | First, we specify some global settings for the Samba server. | ||
- | |||
- | <file bash / | ||
- | [global] | ||
- | workgroup = WORKGROUP | ||
- | server string = Samba Server %v | ||
- | netbios name = ubuntu | ||
- | security = user | ||
- | map to guest = bad user | ||
- | dns proxy = no | ||
- | interfaces = 10.8.0.1/8 | ||
- | bind interfaces only = yes | ||
- | </ | ||
- | | ||
- | Let's break down each setting: | ||
- | |||
- | The **workgroup** setting specifies the workgroup the server will appear on when queried by clients. The default group is **WORKGROUP** for Windows, but you can change it if you already have a workgroup name you're using. | ||
- | |||
- | The **server string** and **netbios** lines specify the name of the Samba server and its platform respectively. | ||
- | |||
- | The **security** setting specifies that this will be a stand-alone file server with its own user accounts. | ||
- | |||
- | With the **interfaces** setting, we specify that we're only listening for connections using the VPN server' | ||
- | |||
- | Next, we need to specify the logging settings for Samba. Add this configuration block to the file, in the [global] section: | ||
- | |||
- | <file bash / | ||
- | [global] | ||
- | ... | ||
- | |||
- | ## Logging | ||
- | log level = 2 | ||
- | log file = / | ||
- | max log size = 50 | ||
- | debug timestamp = yes | ||
- | </ | ||
- | | ||
- | The **log level** setting determines the level of detail you want in your log files. | ||
- | |||
- | That takes care of the global settings for our server. | ||
- | |||
- | We want two shares; one called **Allusers**, | ||
- | |||
- | / | ||
- | # | ||
- | [Allusers] | ||
- | path = / | ||
- | browsable = yes | ||
- | writable = yes | ||
- | guest ok = yes | ||
- | read only = no | ||
- | force user = nobody | ||
- | The [Allusers] block indicates that the settings that follow are only applicable to the Allusers share. It also defines the name of the share that users will see. The path setting specifies the file directory of the folder we want to share on our intranet. Setting browsable and writable to yes gives users the permission to browse within that folder as well as read and write files. | ||
- | |||
- | We want all users to access this share, even if they do not have a user account on the server. Remember that in the global section we specified the map to guest setting, meaning that users that do not have an account or valid login credentials can still access files shared as a guest. We allow those guests to access this share by setting guest ok to yes and then we force that user to assume the identity of nobody with force user = nobody. | ||
- | |||
- | The nobody user group is a known default user group on any Linux system. We can set the desired permissions on the / | ||
- | |||
- | For more information on the nobody user, visit the Ubuntu wiki and this answer on StackExchange. | ||
- | |||
- | Now let's create the Restricted file share, which should only be accessible by members of the smbrestricted group: | ||
- | |||
- | / | ||
- | [Restricted] | ||
- | path = / | ||
- | valid users = @smbrestricted | ||
- | guest ok = no | ||
- | writable = yes | ||
- | browsable = yes | ||
- | Once again we start by specifying the directory we want to share and grant browsing and writing permissions, | ||
- | |||
- | That does it for the smb.conf file. Your file should look like the following example: | ||
- | |||
- | / | ||
- | [global] | ||
- | workgroup = WORKGROUP | ||
- | server string = Samba Server %v | ||
- | netbios name = ubuntu | ||
- | security = user | ||
- | map to guest = bad user | ||
- | dns proxy = no | ||
- | interfaces = 10.8.0.1/8 | ||
- | bind interfaces only = yes | ||
- | |||
- | ## Logging | ||
- | log level = 2 | ||
- | log file = / | ||
- | max log size = 50 | ||
- | debug timestamp = yes | ||
- | |||
- | # | ||
- | |||
- | [Allusers] | ||
- | path = / | ||
- | browsable = yes | ||
- | writable = yes | ||
- | guest ok = yes | ||
- | read only = no | ||
- | force user = nobody | ||
- | |||
- | [Restricted] | ||
- | path = / | ||
- | valid users = @smbrestricted | ||
- | guest ok = no | ||
- | writable = yes | ||
- | browsable = yes | ||
- | With the Samba configuration in place, we can create the smbrestricted group and create our first user. | ||
- | |||
- | Step 2 — Configuring Access to Samba Shares | ||
- | To allow access to our shares, we have to create a user account and apply appropriate permissions to the folders we're planning to share. | ||
- | |||
- | First, create the smbrestricted group with the following command: | ||
- | |||
- | sudo addgroup smbrestriced | ||
- | Now create a user account on the server and add it to the smbrestricted group. We'll create an account for client1, which matches the name of the VPN connection created in the prerequisite tutorial: | ||
- | |||
- | sudo useradd client1 -G smbrestricted | ||
- | Finally, we need to assign a Samba password for client1. With the configuration we've set up, Samba uses its own credential verification system that's separate from the normal Linux system' | ||
- | |||
- | Create the Samba password for the client1 user with the following command: | ||
- | |||
- | sudo smbpasswd -a client1 | ||
- | Note: If you have users on your system that you'd like to also be able to access Samba shares, you'll need to create a Samba password for those users as well, since the login systems are separate with this configuration. | ||
- | |||
- | Next, we set the permissions for the directories we want to share. First, we'll set the permissions for the allusers directory: | ||
- | |||
- | sudo chmod -R 766 / | ||
- | sudo chown -R nobody: | ||
- | This grants the owner of the directory full permissions, | ||
- | |||
- | There is, however, a small problem with changing the owner and group to nobody: | ||
- | |||
- | To overcome this problem we make use of Access Control Lists, or ACLs. ACL rules let us automatically assign permissions for a user and/or group to newly created files and directories. | ||
- | |||
- | Set the ACL rules for the / | ||
- | |||
- | sudo setfacl -dm g: | ||
- | sudo setfacl -dm u:nobody:rw / | ||
- | The command setfacl -dm indicates that we are defining new permission rules for a directory or file, and that in the future these permissions should be applied to newly created objects as well. g: | ||
- | |||
- | You can learn more about ACLs from the Ubuntu Wiki. | ||
- | |||
- | That takes care of the guest share. Now we can set permissions for the restricted directory: | ||
- | |||
- | sudo chmod -R 770 / | ||
- | sudo chown root: | ||
- | This time we completely block access to this directory except for the owner and members of the smbrestricted group with chmod 770. We don't need to set ACL rules because the permissions function normally within this shared folder since we're using authenticated user accounts. | ||
- | |||
- | Now that we have the shares configured, restart the Samba server so that it uses the new configuration file: | ||
- | |||
- | sudo service smbd restart | ||
- | We can now connect to the Samba server to upload or download files. | ||
- | |||
- | Step 3 — Connecting to the Samba Server From a Client | ||
- | The goal of our intranet is to access and share files in a secure environment as if we were connected to the main network. When a client connects to Samba, it mounts the share directories in the file explorer of that client. Let's test this out. | ||
- | |||
- | Connecting from Windows | ||
- | |||
- | To connect from Windows, open Windows Explorer. In the navigation bar, type in the Samba server address, \\10.8.0.1 and press the Enter key. | ||
- | |||
- | Windows explore connection through the navbar | ||
- | |||
- | It might take a few moments for Windows to connect. When the connection is successful you'll see the shared folders hosted on the intranet: | ||
- | |||
- | Available shares | ||
- | |||
- | Notice that a new network mount point is created under the Network tab in the Quick access toolbar. The name of the mount point is 10.8.0.1, the same as the VPN's IP. | ||
- | |||
- | You access the Allusers share just like any other folder, as no credentials are needed. Just double-click on the folder to view its contents: | ||
- | |||
- | The Allusers share contents | ||
- | |||
- | To access the Restricted share, double-click on the folder named Restricted. A Windows Security pop-up will appear stating that network credentials are required to gain access. | ||
- | |||
- | Restricted share permissions prompt | ||
- | |||
- | Type in the username and password for the user you created, and optionally check the box to remember your credentials. Then click Ok to connect. | ||
- | |||
- | The contents of the restricted share | ||
- | |||
- | Once connected, you can create new files or folders, or even drag folders over to your server to upload them. | ||
- | |||
- | Connecting from Ubuntu | ||
- | |||
- | To connect from Ubuntu, open the file explorer and select the Connect to Server option in the sidebar on the left. This opens a new screen where we can input a server address. | ||
- | |||
- | The Connect To Server option | ||
- | |||
- | Enter smb:// | ||
- | |||
- | Available shares | ||
- | |||
- | To access the Allusers share, just double click on the folder. A login screen will appear asking for a username and password. The Allusers share does not require any username and password, so you should select Anonymous for the Connect As option. Click on Connect and it will open the share directory for you. | ||
- | |||
- | Connecting anonymously | ||
- | |||
- | Notice how these share directories are mounted in your file system after you have accessed them. The Allusers share is mounted as a network drive alongside the other local drives. | ||
- | |||
- | Samba-6 | ||
- | |||
- | The drive will stay mounted until the system is restarted or the drive is unmounted. | ||
- | |||
- | To access the Restricted share, you need a valid username and password for login. Double click on the Restricted share | ||
- | and the login screen will appear again. For the Connect As option select Registered User and fill in the username and password | ||
- | in the appropriate fields, leaving the Domain option as it is. Then click on Connect, and you will be able to access the shared files. | ||
- | |||
- | Connecting as the client1 user | ||
- | |||
- | Connecting from a Mac | ||
- | |||
- | To connect from your Mac, open Finder, select the Go menu, and choose Connect to Server.... Then use smb:// | ||
- | |||
- | Connecting from a Mac | ||
- | |||
- | The rest of the connection process is identical to the process for connecting from Linux or Windows. You'll be prompted for a username and password and will be able to view and connect to the available shares. | ||
- | |||
- | That takes care of our file server. Now let's look at how to configure Apache to host websites internally and externally on the same server. | ||
- | |||
- | Step 4 — Configuring Access to Apache Virtual Hosts | ||
- | Prior to this tutorial, you created two virtual hosts, which we'll configure for use on our server. The first host, example.com, | ||
- | |||
- | To restrict access to intranet.example.com, | ||
- | |||
- | sudo nano / | ||
- | Then change the VirtualHost declaration from this: | ||
- | |||
- | example.com.conf'>/ | ||
- | < | ||
- | to this: | ||
- | |||
- | example.com.conf'>/ | ||
- | < | ||
- | Before the change, Apache would serve requests for internal.example.com on all network interfaces. After this change, it only serves requests on our intranet interface. This is similar to the configuration we used for Samba. | ||
- | |||
- | Save the file and restart the Apache service: | ||
- | |||
- | sudo systemctl restart apache2 | ||
- | We also need to allow connections through UFW for Apache to work properly. If you haven' | ||
- | |||
- | sudo ufw allow http | ||
- | And if you plan to allow HTTPS traffic, allow that as well now, or configure it later with: | ||
- | |||
- | sudo ufw allow https | ||
- | Now let's configure domain names so we can more easily access our resources. | ||
- | |||
- | Step 5 — Configuring Domain Names | ||
- | In this step, we will configure our domain name to redirect traffic for the intranet while also serving the publicly accessible website. Before starting this article, you should have pointed your domain name to DigitalOcean' | ||
- | |||
- | Note: If you have your own name servers, you'll want to make these settings in your DNS provider' | ||
- | |||
- | Log into your DigitalOcean account and click on the Networking tab in the top bar. You'll then see a screen like the following: | ||
- | |||
- | Domain-screen-1 | ||
- | |||
- | To add a domain to your DigitalOcean account, type in your domain name in the first box under the Add a domain heading. In the second box type in the public IP of your intranet server, and click on the Create record button. | ||
- | |||
- | Domain-screen-2 | ||
- | |||
- | Your new domain name will then appear under the Domains subheading as in the second picture. Now click on More next to the domain you want to use, and then select View domain. | ||
- | |||
- | View-domain | ||
- | |||
- | This will open up the settings page for that specific domain. | ||
- | |||
- | Domain-settings | ||
- | |||
- | We need to add three records for this domain. One for the Intranet, and two more to ensure that requests for our public website is resolved correctly. | ||
- | |||
- | First, create a record for the intranet. | ||
- | |||
- | Click on the orange ' | ||
- | Enter intranet into the Enter Name field. | ||
- | For the IP address, enter the private IP address for your server, which should be 10.8.0.1. | ||
- | Creating the Intranet subdomain record | ||
- | |||
- | Next, we need a a record that directs non-intranet traffic to the right place. Create another ' | ||
- | |||
- | Creating the @ A record | ||
- | |||
- | Finally, create a CNAME record for www. Click on the CNAME tab in the top corner, set the name to www and enter your domain name (example.com as the Hostname: | ||
- | |||
- | Creating the www CNAME record | ||
- | |||
- | When you are done, your domain records should look like the following image: | ||
- | |||
- | Reviewing All records | ||
- | |||
- | The intranet A-record directs requests to intranet.example.com only if it originates from the VPN server. This means that only clients connected to the VPN would be able to access web content hosted on intranet.example.com. The second ' | ||
- | |||
- | Note: It may take up to 72 hours for these DNS changes to propagate. | ||
- | |||
- | Go to your browser and visit http:// | ||
- | |||
- | Successful connection to the internal web site | ||
- | |||
- | Now that we have thoroughly configured and tested our intranet, let's look at how we manage access to this newly created network. | ||
- | |||
- | Step 6 — Managing Access to the Intranet | ||
- | The final step in this tutorial will deal with managing access to our intranet and its shared files. First, we will look at how to revoke client certificates for VPN access. Then we'll look at how to remove users from the smbrestricted group. Finally, we'll review adding additional users and getting them the access they need. | ||
- | |||
- | Revoking VPN Access | ||
- | |||
- | To revoke access to the VPN, we would revoke a client' | ||
- | |||
- | First, we need to add an additional line to our VPN server' | ||
- | much easier as you can now easily revoke a single certificate on-the-fly without disrupting any other client connections. | ||
- | |||
- | Open the VPN configuration file: | ||
- | |||
- | sudo nano / | ||
- | Add the following line of code at the end of the file: | ||
- | |||
- | / | ||
- | crl-verify crl.pem | ||
- | This tells the VPN server to look for the file crl.pem, which is a Certificate Revocation List. It will contain a list of all the certificates that are no longer allowed to access our VPN. | ||
- | |||
- | Save and close the configuration file, but don't restart the server yet; we need to create the crl.pem file our configuration is looking for. | ||
- | |||
- | To create this file, change to the ~/ | ||
- | |||
- | cd ~/ | ||
- | Let's pretend that we need to revoke the certificates of client1 because they no longer work for our organization. To do this, run the following commands: | ||
- | |||
- | source vars | ||
- | ./ | ||
- | You'll see the following output: | ||
- | |||
- | Output | ||
- | Using configuration from / | ||
- | Revoking Certificate 02. | ||
- | Data Base Updated | ||
- | Using configuration from / | ||
- | client1.crt: | ||
- | error 23 at 0 depth lookup: | ||
- | The last line of the output should always indicate a error 23. This error only confirms that the certificates have been revoked. | ||
- | |||
- | This also creates crl.pem in the ~/ | ||
- | |||
- | cat keys/ | ||
- | There will be an " | ||
- | |||
- | Output | ||
- | V | ||
- | R | ||
- | Now copy the crl.pem file to the / | ||
- | |||
- | sudo cp keys/ | ||
- | Then restart the OpenVPN server for the certificate revoking option to take effect. | ||
- | |||
- | sudo systemctl restart openvpn@server | ||
- | The OpenVPN server consults the crl.pem file every time a new connection is made to the server. Each time you revoke a client' | ||
- | |||
- | It is important to note that once a VPN certificate has been revoked, it can not be re-used in the future. A client whose VPN certificate has been revoked would require a new certificate if we want them to be able to connect to the network again. | ||
- | |||
- | Blocking a user's access to the Restricted share. | ||
- | |||
- | We created a shared directory that is only accessible by users in the smbrestricted group. To deny access for a user already in that group we remove the user from that group. For example, to remove client1, use the following command: | ||
- | |||
- | sudo deluser client1 -G smbrestricted | ||
- | You'll see the following output: | ||
- | |||
- | Output | ||
- | Removing user `client1' | ||
- | Done. | ||
- | If you are unsure if a user is already included in the group, or you want to double-check if a user has been removed, you can use the members command: | ||
- | |||
- | sudo apt-get install members | ||
- | members smbrestricted | ||
- | Any users in the group will be displayed on the screen. | ||
- | |||
- | Adding a new user to the intranet | ||
- | |||
- | Each new user of the intranet will require their own VPN certificate, | ||
- | |||
- | First, build the key: | ||
- | |||
- | cd ~/ | ||
- | ./build-key client2 | ||
- | Then generate the client configuration: | ||
- | |||
- | cd ~/ | ||
- | ./ | ||
- | Then, on your local machine, download the client configuration: | ||
- | |||
- | sftp sammy@openvpn_server_ip: | ||
- | To grant the new user access to the restricted files, follow the same steps you used for client1 in the Samba section of this tutorial: | ||
- | |||
- | Create the user and add them to the smbrestricted group. | ||
- | Create the Samba password for the user with smbpassword. | ||
- | Test the connection. | ||
- | Then repeat this process for each user you need to add. | ||
- | |||
- | Conclusion | ||
- | You've successfully created and secured your own private intranet using OpenVPN, Samba, and Apache. You have an internal web site and two file shares. | ||
- | |||
- | Where you go next depends on what you'll use your intranet for. As most server applications make use of a web page to display information, | ||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// | ||
- | |||
- |
vpn/create_an_intranet_with_openvpn.1476884172.txt.gz · Last modified: 2020/07/15 09:30 (external edit)