vpn:create_an_intranet_with_openvpn
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
vpn:create_an_intranet_with_openvpn [2016/10/19 14:27] – [Connecting from Ubuntu] peter | vpn:create_an_intranet_with_openvpn [2019/12/04 22:12] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== VPN - Create an Intranet with OpenVPN ====== | ||
- | TODO | ||
- | |||
- | ===== Introduction ===== | ||
- | |||
- | Intranets are private networks created by organizations to ease communication and data transfers. | ||
- | |||
- | In this tutorial you'll configure services that are only available to clients who are connected to the VPN, including file shares and a web site, and you'll learn how to manage access to those resources. | ||
- | |||
- | ===== Prerequisites ===== | ||
- | |||
- | To complete this tutorial, you'll need the following: | ||
- | |||
- | * OpenVPN installed and configured on your server. | ||
- | |||
- | We will assume that the VPN server is located at the IP address 10.8.0.1 on the VPN, which is the address used in the OpenVPN tutorial, and that you can connect to the VPN from your local machine. | ||
- | |||
- | * A WebServer installed with two virtual hosts configured for your domain. | ||
- | |||
- | We assume there are two virtual hosts called **example.com** and **intranet.example.com**, | ||
- | |||
- | |||
- | ===== Step 1 — Installing and Configuring a Samba File Server ===== | ||
- | |||
- | Let's start by setting up Samba so people on our intranet can share files. | ||
- | |||
- | We will create two share directories. | ||
- | |||
- | First, install Samba and its prerequisites with the following command: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get install samba samba-common python-glade2 system-config-samba | ||
- | </ | ||
- | |||
- | Next, make a backup of the Samba configuration file just in case we make a mistake when we modify it later. | ||
- | |||
- | <code bash> | ||
- | sudo cp / | ||
- | </ | ||
- | |||
- | Samba also needs access through the firewall, so add a rule for Samba traffic: | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow samba | ||
- | </ | ||
- | |||
- | Now create the directories we'll share. | ||
- | |||
- | <code bash> | ||
- | sudo mkdir -p / | ||
- | </ | ||
- | |||
- | Then create the restricted directory: | ||
- | |||
- | <code bash> | ||
- | sudo mkdir -p / | ||
- | </ | ||
- | |||
- | Now, let's edit the Samba configuration file to set up the service and define the shares. | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Then delete all the content as we will be writing our own configuration from scratch piece by piece. | ||
- | |||
- | First, we specify some global settings for the Samba server. | ||
- | |||
- | <file bash / | ||
- | [global] | ||
- | workgroup = WORKGROUP | ||
- | server string = Samba Server %v | ||
- | netbios name = ubuntu | ||
- | security = user | ||
- | map to guest = bad user | ||
- | dns proxy = no | ||
- | interfaces = 10.8.0.1/8 | ||
- | bind interfaces only = yes | ||
- | </ | ||
- | | ||
- | Let's break down each setting: | ||
- | |||
- | The **workgroup** setting specifies the workgroup the server will appear on when queried by clients. The default group is **WORKGROUP** for Windows, but you can change it if you already have a workgroup name you're using. | ||
- | |||
- | The **server string** and **netbios** lines specify the name of the Samba server and its platform respectively. | ||
- | |||
- | The **security** setting specifies that this will be a stand-alone file server with its own user accounts. | ||
- | |||
- | With the **interfaces** setting, we specify that we're only listening for connections using the VPN server' | ||
- | |||
- | Next, we need to specify the logging settings for Samba. Add this configuration block to the file, in the [global] section: | ||
- | |||
- | <file bash / | ||
- | [global] | ||
- | ... | ||
- | |||
- | ## Logging | ||
- | log level = 2 | ||
- | log file = / | ||
- | max log size = 50 | ||
- | debug timestamp = yes | ||
- | </ | ||
- | | ||
- | The **log level** setting determines the level of detail you want in your log files. | ||
- | |||
- | That takes care of the global settings for our server. | ||
- | |||
- | We want two shares; one called **Allusers**, | ||
- | |||
- | <file bash / | ||
- | # | ||
- | [Allusers] | ||
- | path = / | ||
- | browsable = yes | ||
- | writable = yes | ||
- | guest ok = yes | ||
- | read only = no | ||
- | force user = nobody | ||
- | </ | ||
- | | ||
- | The **[Allusers]** block indicates that the settings that follow are only applicable to the **Allusers** share. | ||
- | |||
- | We want all users to access this share, even if they do not have a user account on the server. | ||
- | |||
- | The **nobody** user group is a known default user group on any Linux system. | ||
- | |||
- | For more information on the nobody user, visit the [[https:// | ||
- | |||
- | Now let's create the **Restricted** file share, which should only be accessible by members of the **smbrestricted** group: | ||
- | |||
- | <file bash / | ||
- | [Restricted] | ||
- | path = / | ||
- | valid users = @smbrestricted | ||
- | guest ok = no | ||
- | writable = yes | ||
- | browsable = yes | ||
- | </ | ||
- | | ||
- | Once again we start by specifying the directory we want to share and grant browsing and writing permissions, | ||
- | |||
- | That does it for the **smb.conf** file. Your file should look like the following example: | ||
- | |||
- | <file bash / | ||
- | [global] | ||
- | workgroup = WORKGROUP | ||
- | server string = Samba Server %v | ||
- | netbios name = ubuntu | ||
- | security = user | ||
- | map to guest = bad user | ||
- | dns proxy = no | ||
- | interfaces = 10.8.0.1/8 | ||
- | bind interfaces only = yes | ||
- | |||
- | ## Logging | ||
- | log level = 2 | ||
- | log file = / | ||
- | max log size = 50 | ||
- | debug timestamp = yes | ||
- | |||
- | # | ||
- | |||
- | [Allusers] | ||
- | path = / | ||
- | browsable = yes | ||
- | writable = yes | ||
- | guest ok = yes | ||
- | read only = no | ||
- | force user = nobody | ||
- | |||
- | [Restricted] | ||
- | path = / | ||
- | valid users = @smbrestricted | ||
- | guest ok = no | ||
- | writable = yes | ||
- | browsable = yes | ||
- | </ | ||
- | | ||
- | With the Samba configuration in place, we can create the **smbrestricted** group and create our first user. | ||
- | |||
- | |||
- | ===== Step 2 — Configuring Access to Samba Shares ===== | ||
- | |||
- | To allow access to our shares, we have to create a user account and apply appropriate permissions to the folders we're planning to share. | ||
- | |||
- | First, create the **smbrestricted** group with the following command: | ||
- | |||
- | <code bash> | ||
- | sudo addgroup smbrestriced | ||
- | </ | ||
- | |||
- | Now create a user account on the server and add it to the **smbrestricted** group. | ||
- | |||
- | <code bash> | ||
- | sudo useradd client1 -G smbrestricted | ||
- | </ | ||
- | |||
- | Finally, we need to assign a Samba password for **client1**. | ||
- | |||
- | Create the Samba password for the **client1** user with the following command: | ||
- | |||
- | <code bash> | ||
- | sudo smbpasswd -a client1 | ||
- | </ | ||
- | |||
- | **NOTE**: | ||
- | |||
- | Next, we set the permissions for the directories we want to share. | ||
- | |||
- | <code bash> | ||
- | sudo chmod -R 766 / | ||
- | sudo chown -R nobody: | ||
- | </ | ||
- | |||
- | This grants the owner of the directory full permissions, | ||
- | |||
- | There is, however, a small problem with changing the owner and group to **nobody: | ||
- | |||
- | To overcome this problem we make use of Access Control Lists, or ACLs. ACL rules let us automatically assign permissions for a user and/or group to newly created files and directories. | ||
- | |||
- | Set the ACL rules for the / | ||
- | |||
- | <code bash> | ||
- | sudo setfacl -dm g: | ||
- | sudo setfacl -dm u:nobody:rw / | ||
- | < | ||
- | |||
- | The command **setfacl -dm** indicates that we are defining new permission rules for a directory or file, and that in the future these permissions should be applied to newly created objects as well. **g: | ||
- | |||
- | You can learn more about ACLs from the [[https:// | ||
- | |||
- | That takes care of the guest share. | ||
- | |||
- | <code bash> | ||
- | sudo chmod -R 770 / | ||
- | sudo chown root: | ||
- | </ | ||
- | |||
- | This time we completely block access to this directory except for the owner and members of the **smbrestricted** group with chmod 770. We don't need to set ACL rules because the permissions function normally within this shared folder since we're using authenticated user accounts. | ||
- | |||
- | Now that we have the shares configured, restart the Samba server so that it uses the new configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo service smbd restart | ||
- | </ | ||
- | |||
- | We can now connect to the Samba server to upload or download files. | ||
- | |||
- | |||
- | ===== Step 3 — Connecting to the Samba Server From a Client ===== | ||
- | |||
- | The goal of our intranet is to access and share files in a secure environment as if we were connected to the main network. | ||
- | |||
- | ==== Connecting from Windows ==== | ||
- | |||
- | To connect from Windows, open Windows Explorer. | ||
- | |||
- | Windows explore connection through the navbar | ||
- | |||
- | It might take a few moments for Windows to connect. | ||
- | |||
- | Available shares | ||
- | |||
- | Notice that a new network mount point is created under the **Network** tab in the **Quick access** toolbar. | ||
- | |||
- | You access the **Allusers** share just like any other folder, as no credentials are needed. | ||
- | |||
- | The Allusers share contents | ||
- | |||
- | To access the **Restricted** share, double-click on the folder named **Restricted**. | ||
- | |||
- | Restricted share permissions prompt | ||
- | |||
- | Type in the username and password for the user you created, and optionally check the box to remember your credentials. | ||
- | |||
- | The contents of the restricted share | ||
- | |||
- | Once connected, you can create new files or folders, or even drag folders over to your server to upload them. | ||
- | |||
- | |||
- | ==== Connecting from Ubuntu ==== | ||
- | |||
- | To connect from Ubuntu, open the file explorer and select the Connect to Server option in the sidebar on the left. This opens a new screen where we can input a server address. | ||
- | |||
- | The Connect To Server option | ||
- | |||
- | Enter **< | ||
- | |||
- | Available shares | ||
- | |||
- | To access the Allusers share, just double click on the folder. | ||
- | |||
- | Connecting anonymously | ||
- | |||
- | Notice how these share directories are mounted in your file system after you have accessed them. The **Allusers** share is mounted as a network drive alongside the other local drives. | ||
- | |||
- | Samba-6 | ||
- | |||
- | The drive will stay mounted until the system is restarted or the drive is unmounted. | ||
- | |||
- | To access the **Restricted** share, you need a valid username and password for login. | ||
- | and the login screen will appear again. | ||
- | in the appropriate fields, leaving the **Domain** option as it is. Then click on **Connect**, | ||
- | |||
- | Connecting as the client1 user | ||
- | |||
- | ==== Connecting from a Mac ==== | ||
- | |||
- | To connect from your Mac, open Finder, select the **Go** menu, and choose **Connect to Server...**. | ||
- | |||
- | Connecting from a Mac | ||
- | |||
- | The rest of the connection process is identical to the process for connecting from Linux or Windows. | ||
- | |||
- | That takes care of our file server. | ||
- | |||
- | |||
- | ===== Step 4 — Configuring Access to Apache Virtual Hosts ===== | ||
- | |||
- | Prior to this tutorial, you created two virtual hosts, which we'll configure for use on our server. | ||
- | |||
- | To restrict access to intranet.example.com, | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Then change the **VirtualHost** declaration from this: | ||
- | |||
- | <file bash / | ||
- | < | ||
- | </ | ||
- | |||
- | to this: | ||
- | |||
- | <file bash / | ||
- | < | ||
- | </ | ||
- | |||
- | Before the change, Apache would serve requests for **internal.example.com** on all network interfaces. | ||
- | |||
- | Save the file and restart the Apache service: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl restart apache2 | ||
- | </ | ||
- | |||
- | We also need to allow connections through UFW for Apache to work properly. | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow http | ||
- | </ | ||
- | |||
- | And if you plan to allow HTTPS traffic, allow that as well now, or configure it later with: | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow https | ||
- | </ | ||
- | |||
- | Now let's configure domain names so we can more easily access our resources. | ||
- | |||
- | |||
- | ===== Step 5 — Configuring Domain Names ===== | ||
- | |||
- | In this step, we will configure our domain name to redirect traffic for the intranet while also serving the publicly accessible website. | ||
- | |||
- | **NOTE**: | ||
- | |||
- | We need to add three records for this domain. | ||
- | |||
- | Creating the Intranet record | ||
- | |||
- | |||
- | First, create an ' | ||
- | |||
- | Use **intranet** as the Name field. | ||
- | For the IP address, enter the **private IP address** for your server, which should be 10.8.0.1. | ||
- | |||
- | |||
- | Creating the Intranet subdomain record | ||
- | |||
- | Next, we need a a record that directs non-intranet traffic to the right place. | ||
- | |||
- | |||
- | Creating the @ A record | ||
- | |||
- | Finally, create a CNAME record for **www**. | ||
- | |||
- | Creating the www CNAME record | ||
- | |||
- | When you are done, your domain records should look like the following image: | ||
- | |||
- | Reviewing All records | ||
- | |||
- | The **intranet** A-record directs requests to **intranet.example.com** only if it originates from the VPN server. | ||
- | |||
- | **NOTE**: | ||
- | |||
- | Go to your browser and visit **http:// | ||
- | |||
- | Successful connection to the internal web site | ||
- | |||
- | Now that we have thoroughly configured and tested our intranet, let's look at how we manage access to this newly created network. | ||
- | |||
- | |||
- | ===== Step 6 — Managing Access to the Intranet ===== | ||
- | |||
- | The final step in this tutorial will deal with managing access to our intranet and its shared files. | ||
- | |||
- | ===== Revoking VPN Access ===== | ||
- | |||
- | To revoke access to the VPN, we would revoke a client' | ||
- | |||
- | First, we need to add an additional line to our VPN server' | ||
- | |||
- | Open the VPN configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Add the following line of code at the end of the file: | ||
- | |||
- | <file bash / | ||
- | crl-verify crl.pem | ||
- | </ | ||
- | |||
- | This tells the VPN server to look for the file **crl.pem**, | ||
- | |||
- | Save and close the configuration file, but don't restart the server yet; we need to create the **crl.pem** file our configuration is looking for. | ||
- | |||
- | To create this file, change to the **~/ | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | </ | ||
- | |||
- | Let's pretend that we need to revoke the certificates of **client1** because they no longer work for our organization. | ||
- | |||
- | <code bash> | ||
- | source vars | ||
- | ./ | ||
- | </ | ||
- | |||
- | You'll see the following output: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | Using configuration from / | ||
- | Revoking Certificate 02. | ||
- | Data Base Updated | ||
- | Using configuration from / | ||
- | client1.crt: | ||
- | error 23 at 0 depth lookup: | ||
- | </ | ||
- | |||
- | The last line of the output should **always** indicate a **error 23**. This error only confirms that the certificates have been revoked. | ||
- | |||
- | This also creates **crl.pem** in the **~/ | ||
- | |||
- | <code bash> | ||
- | cat keys/ | ||
- | </ | ||
- | |||
- | There will be an " | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | V | ||
- | R | ||
- | </ | ||
- | |||
- | Now copy the **crl.pem** file to the **/ | ||
- | |||
- | <code bash> | ||
- | sudo cp keys/ | ||
- | </ | ||
- | |||
- | Then restart the OpenVPN server for the certificate revoking option to take effect. | ||
- | |||
- | <code bash> | ||
- | sudo systemctl restart openvpn@server | ||
- | </ | ||
- | |||
- | The OpenVPN server consults the **crl.pem** file every time a new connection is made to the server. | ||
- | |||
- | It is important to note that once a VPN certificate has been revoked, it can not be re-used in the future. | ||
- | |||
- | |||
- | ===== Blocking a user's access to the Restricted share. ===== | ||
- | |||
- | We created a shared directory that is only accessible by users in the **smbrestricted** group. | ||
- | |||
- | <code bash> | ||
- | sudo deluser client1 -G smbrestricted | ||
- | </ | ||
- | |||
- | You'll see the following output: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | Removing user `client1' | ||
- | Done. | ||
- | </ | ||
- | |||
- | If you are unsure if a user is already included in the group, or you want to double-check if a user has been removed, you can use the members command: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get install members | ||
- | members smbrestricted | ||
- | </ | ||
- | |||
- | Any users in the group will be displayed on the screen. | ||
- | |||
- | |||
- | ===== Adding a new user to the intranet ===== | ||
- | |||
- | Each new user of the intranet will require their own VPN certificate, | ||
- | |||
- | First, build the key: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | ./build-key client2 | ||
- | </ | ||
- | |||
- | Then generate the client configuration: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | ./ | ||
- | </ | ||
- | |||
- | Then, on your local machine, download the client configuration: | ||
- | |||
- | <code bash> | ||
- | sftp john@openvpn_server_ip: | ||
- | </ | ||
- | |||
- | To grant the new user access to the restricted files, follow the same steps you used for **client1** in the Samba section of this tutorial: | ||
- | |||
- | * Create the user and add them to the **smbrestricted** group. | ||
- | * Create the Samba password for the user with **smbpassword**. | ||
- | * Test the connection. | ||
- | |||
- | Then repeat this process for each user you need to add. | ||
- | |||
- | |||
- | ===== Conclusion ===== | ||
- | |||
- | You've successfully created and secured your own private intranet using OpenVPN, Samba, and Apache. | ||
- | |||
- | Where you go next depends on what you'll use your intranet for. As most server applications make use of a web page to display information, | ||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// | ||
- | |||
- |
vpn/create_an_intranet_with_openvpn.1476887256.txt.gz · Last modified: 2020/07/15 09:30 (external edit)