vpn:setup_an_openvpn_server
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
vpn:setup_an_openvpn_server [2016/10/19 13:23] – created peter | vpn:setup_an_openvpn_server [2019/12/04 22:14] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== VPN - Setup an OpenVPN Server ====== | ||
- | |||
- | ===== Introduction ===== | ||
- | |||
- | To access the Internet safely and securely when connected to an untrusted network such as an external WiFi connection. | ||
- | |||
- | When combined with [[https:// | ||
- | |||
- | [[https:// | ||
- | |||
- | |||
- | ===== Step 1: Install OpenVPN ===== | ||
- | |||
- | Install OpenVPN. | ||
- | |||
- | To update your server' | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update | ||
- | sudo apt-get install openvpn easy-rsa | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 2: Set Up the CA Directory ===== | ||
- | |||
- | OpenVPN is an TLS/SSL VPN. This means that it utilizes certificates in order to encrypt traffic between the server and clients. | ||
- | |||
- | To begin, we can copy the **easy-rsa** template directory into our home directory with the **make-cadir** command: | ||
- | |||
- | <code bash> | ||
- | make-cadir ~/ | ||
- | </ | ||
- | |||
- | Move into the newly created directory to begin configuring the CA: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 3: Configure the CA Variables ===== | ||
- | |||
- | To configure the values our CA will use, we need to edit the **vars** file within the directory. | ||
- | |||
- | <code bash> | ||
- | vi vars | ||
- | </ | ||
- | |||
- | Inside, there are variables that can be adjusted to determine how your certificates will be created. | ||
- | |||
- | Towards the bottom of the file, find the settings that sets field defaults for new certificates. | ||
- | |||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | |||
- | export KEY_COUNTRY=" | ||
- | export KEY_PROVINCE=" | ||
- | export KEY_CITY=" | ||
- | export KEY_ORG=" | ||
- | export KEY_EMAIL=" | ||
- | export KEY_OU=" | ||
- | |||
- | . . . | ||
- | </ | ||
- | |||
- | Edit the values to whatever you'd prefer, but do not leave them blank: | ||
- | |||
- | For example | ||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | |||
- | export KEY_COUNTRY=" | ||
- | export KEY_PROVINCE=" | ||
- | export KEY_CITY=" | ||
- | export KEY_ORG=" | ||
- | export KEY_EMAIL=" | ||
- | export KEY_OU=" | ||
- | |||
- | . . . | ||
- | </ | ||
- | |||
- | While we are here, we will also edit the **KEY_NAME** value just below this section, which populates the subject field. | ||
- | |||
- | <file bash ~/ | ||
- | export KEY_NAME=" | ||
- | </ | ||
- | |||
- | When you are finished, save and close the file. | ||
- | |||
- | |||
- | ===== Step 4: Build the Certificate Authority ===== | ||
- | |||
- | Now, we can use the variables we set and the easy-rsa utilities to build our certificate authority. | ||
- | |||
- | Ensure you are in your CA directory, and then source the vars file you just edited: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | </ | ||
- | |||
- | You should see the following if it was sourced correctly: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | NOTE: If you run ./ | ||
- | </ | ||
- | |||
- | Make sure we're operating in a clean environment by typing: | ||
- | |||
- | <code bash> | ||
- | ./clean-all | ||
- | </ | ||
- | |||
- | Now, we can build our root CA by typing: | ||
- | |||
- | <code bash> | ||
- | ./build-ca | ||
- | </ | ||
- | |||
- | This will initiate the process of creating the root certificate authority key and certificate. | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | Generating a 2048 bit RSA private key | ||
- | ..........................................................................................+++ | ||
- | ...............................+++ | ||
- | writing new private key to ' | ||
- | ----- | ||
- | You are about to be asked to enter information that will be incorporated | ||
- | into your certificate request. | ||
- | What you are about to enter is what is called a Distinguished Name or a DN. | ||
- | There are quite a few fields but you can leave some blank | ||
- | For some fields there will be a default value, | ||
- | If you enter ' | ||
- | ----- | ||
- | Country Name (2 letter code) [UK]: | ||
- | State or Province Name (full name) [JE]: | ||
- | Locality Name (eg, city) [St. Helier]: | ||
- | Organization Name (eg, company) [ShareWiz]: | ||
- | Organizational Unit Name (eg, section) [Community]: | ||
- | Common Name (eg, your name or your server' | ||
- | Name [server]: | ||
- | Email Address [admin@example.com]: | ||
- | </ | ||
- | |||
- | We now have a CA that can be used to create the rest of the files we need. | ||
- | |||
- | |||
- | ===== Step 5: Create the Server Certificate, | ||
- | |||
- | Next, we will generate our server certificate and key pair, as well as some additional files used during the encryption process. | ||
- | |||
- | Start by generating the OpenVPN server certificate and key pair. We can do this by typing: | ||
- | |||
- | **NOTE**: | ||
- | |||
- | <code bash> | ||
- | ./ | ||
- | </ | ||
- | |||
- | Once again, the prompts will have default values based on the argument we just passed in (server) and the contents of our vars file we sourced. | ||
- | |||
- | Feel free to accept the default values by pressing **ENTER**. | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | . . . | ||
- | |||
- | Certificate is to be certified until May 1 17:51:16 2026 GMT (3650 days) | ||
- | Sign the certificate? | ||
- | |||
- | |||
- | 1 out of 1 certificate requests certified, commit? [y/n]y | ||
- | Write out database with 1 new entries | ||
- | Data Base Updated | ||
- | </ | ||
- | |||
- | |||
- | Next, we'll generate a few other items. | ||
- | |||
- | <code bash> | ||
- | ./build-dh | ||
- | </ | ||
- | |||
- | This might take a few minutes to complete. | ||
- | |||
- | Afterwards, we can generate an HMAC signature to strengthen the server' | ||
- | |||
- | <code bash> | ||
- | openvpn --genkey --secret keys/ta.key | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 6: Generate a Client Certificate and Key Pair ===== | ||
- | |||
- | Next, we can generate a client certificate and key pair. Although this can be done on the client machine and then signed by the server/CA for security purposes, for this guide we will generate the signed key on the server for the sake of simplicity. | ||
- | |||
- | We will generate a single client key/ | ||
- | |||
- | Because you may come back to this step at a later time, we'll re-source the vars file. We will use **client1** as the value for our first certificate/ | ||
- | |||
- | To produce credentials without a password, to aid in automated connections, | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | ./build-key client1 | ||
- | </ | ||
- | |||
- | If instead, you wish to create a password-protected set of credentials, | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | ./ | ||
- | </ | ||
- | |||
- | Again, the defaults should be populated, so you can just hit **ENTER** to continue. | ||
- | |||
- | |||
- | ===== Step 7: Configure the OpenVPN Service ===== | ||
- | |||
- | Next, we can begin configuring the OpenVPN service using the credentials and files we've generated. | ||
- | |||
- | ==== Copy the Files to the OpenVPN Directory ==== | ||
- | |||
- | To begin, we need to copy the files we need to the **/ | ||
- | |||
- | We can start with all of the files that we just generated. | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | sudo cp ca.crt ca.key server.crt server.key ta.key dh2048.pem / | ||
- | </ | ||
- | |||
- | Next, we need to copy and unzip a sample OpenVPN configuration file into configuration directory so that we can use it as a basis for our setup: | ||
- | |||
- | <code bash> | ||
- | gunzip -c / | ||
- | </ | ||
- | |||
- | |||
- | ===== Adjust the OpenVPN Configuration ===== | ||
- | |||
- | Now that our files are in place, we can modify the server configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | ==== Basic Configuration ==== | ||
- | |||
- | First, find the HMAC section by looking for the **tls-auth** directive. | ||
- | |||
- | <file bash / | ||
- | tls-auth ta.key 0 # This file is secret | ||
- | key-direction 0 | ||
- | </ | ||
- | |||
- | Next, find the section on cryptographic ciphers by looking for the commented out **cipher** lines. | ||
- | |||
- | <file bash / | ||
- | cipher AES-128-CBC | ||
- | </ | ||
- | |||
- | Below this, add an **auth** line to select the HMAC message digest algorithm. | ||
- | |||
- | <file bash / | ||
- | auth SHA256 | ||
- | </ | ||
- | |||
- | Finally, find the **user** and **group** settings and remove the ";" | ||
- | |||
- | <file bash / | ||
- | user nobody | ||
- | group nogroup | ||
- | </ | ||
- | |||
- | |||
- | ===== Push DNS Changes to Redirect All Traffic Through the VPN (Optional) ===== | ||
- | |||
- | The settings above will create the VPN connection between the two machines, but will not force any connections to use the tunnel. | ||
- | |||
- | You can do this, uncomment a few directives that will configure client machines to redirect all web traffic through the VPN. Find the **redirect-gateway** section and remove the semicolon ";" | ||
- | |||
- | <file bash / | ||
- | push " | ||
- | </ | ||
- | |||
- | Just below this, find the **dhcp-option** section. | ||
- | |||
- | <file bash / | ||
- | push " | ||
- | push " | ||
- | </ | ||
- | |||
- | This should assist clients in reconfiguring their DNS settings to use the VPN tunnel for as the default gateway. | ||
- | |||
- | ==== Adjust the Port and Protocol (Optional) ==== | ||
- | |||
- | By default, the OpenVPN server uses port 1194 and the UDP protocol to accept client connections. | ||
- | |||
- | <file bash / | ||
- | # Optional! | ||
- | port 443 | ||
- | </ | ||
- | |||
- | Often if the protocol will be restricted to that port as well. If so, change proto from UDP to TCP: | ||
- | |||
- | <file bash / | ||
- | # Optional! | ||
- | proto tcp | ||
- | </ | ||
- | |||
- | If you have no need to use a different port, it is best to leave these two settings as their default. | ||
- | |||
- | |||
- | ==== Point to Non-Default Credentials (Optional) ==== | ||
- | |||
- | If you selected a different name during the **./ | ||
- | |||
- | <file bash / | ||
- | cert server.crt | ||
- | key server.key | ||
- | </ | ||
- | |||
- | When you are finished, save and close the file. | ||
- | |||
- | |||
- | ===== Step 8: Adjust the Server Networking Configuration ===== | ||
- | |||
- | Next, we need to adjust some aspects of the server' | ||
- | |||
- | ==== Allow IP Forwarding ==== | ||
- | |||
- | First, we need to allow the server to forward traffic. | ||
- | |||
- | We can adjust this setting by modifying the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Inside, look for the line that sets **net.ipv4.ip_forward**. | ||
- | |||
- | <file bash / | ||
- | net.ipv4.ip_forward=1 | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | To read the file and adjust the values for the current session, type: | ||
- | |||
- | <code bash> | ||
- | sudo sysctl -p | ||
- | </ | ||
- | |||
- | |||
- | ==== Adjust the UFW Rules to Masquerade Client Connections ==== | ||
- | |||
- | Regardless of whether you use the firewall to block unwanted traffic (which you almost always should do), we need the firewall in this guide to manipulate some of the traffic coming into the server. | ||
- | |||
- | Before we open the firewall configuration file to add masquerading, | ||
- | |||
- | <code bash> | ||
- | ip route | grep default | ||
- | </ | ||
- | |||
- | Your public interface should follow the word " | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | default via 203.0.113.1 dev eth0 proto static | ||
- | </ | ||
- | |||
- | When you have the interface associated with your default route, open the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | This file handles configuration that should be put into place before the conventional UFW rules are loaded. | ||
- | |||
- | **NOTE**: | ||
- | |||
- | <file bash / | ||
- | # | ||
- | # rules.before | ||
- | # | ||
- | # Rules that should be run before the ufw command line added rules. Custom | ||
- | # rules should be added to one of these chains: | ||
- | # | ||
- | # | ||
- | # | ||
- | # | ||
- | |||
- | # START OPENVPN RULES | ||
- | # NAT table rules | ||
- | *nat | ||
- | : | ||
- | # Allow traffic from OpenVPN client to eth0 | ||
- | -A POSTROUTING -s 10.8.0.0/8 -o eth0 -j MASQUERADE | ||
- | COMMIT | ||
- | # END OPENVPN RULES | ||
- | |||
- | # Don't delete these required lines, otherwise there will be errors | ||
- | *filter | ||
- | . . . | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | We need to tell UFW to allow forwarded packages by default as well. To do this, we will open the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Inside, find the **DEFAULT_FORWARD_POLICY** directive. | ||
- | |||
- | <file bash / | ||
- | DEFAULT_FORWARD_POLICY=" | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | |||
- | ==== Open the OpenVPN Port and Enable the Changes ==== | ||
- | |||
- | Next, we'll adjust the firewall itself to allow traffic to OpenVPN. | ||
- | |||
- | If you did not change the port and protocol in the **/ | ||
- | |||
- | We'll also add the SSH port in case you forgot to add it when following the prerequisite tutorial: | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow 1194/udp | ||
- | sudo ufw allow OpenSSH | ||
- | </ | ||
- | |||
- | Now, we can disable and re-enable UFW to load the changes from all of the files we've modified: | ||
- | |||
- | <code bash> | ||
- | sudo ufw disable | ||
- | sudo ufw enable | ||
- | </ | ||
- | |||
- | Our server is now configured to correctly handle OpenVPN traffic. | ||
- | |||
- | |||
- | ===== Step 9: Start and Enable the OpenVPN Service ===== | ||
- | |||
- | We're finally ready to start the OpenVPN service on our server. | ||
- | |||
- | We need to start the OpenVPN server by specifying our configuration file name as an instance variable after the systemd unit file name. Our configuration file for our server is called **/ | ||
- | |||
- | <code bash> | ||
- | sudo systemctl start openvpn@server | ||
- | </ | ||
- | |||
- | Double-check that the service has started successfully by typing: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl status openvpn@server | ||
- | </ | ||
- | |||
- | If everything went well, your output should look something that looks like this: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | ● openvpn@server.service - OpenVPN connection to server | ||
- | | ||
- | | ||
- | Docs: man: | ||
- | | ||
- | | ||
- | Process: 5852 ExecStart=/ | ||
- | Main PID: 5856 (openvpn) | ||
- | Tasks: 1 (limit: 512) | ||
- | | ||
- | | ||
- | |||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | </ | ||
- | |||
- | You can also check that the OpenVPN **tun0** interface is available by typing: | ||
- | |||
- | <code bash> | ||
- | ip addr show tun0 | ||
- | </ | ||
- | |||
- | You should see a configured interface: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | 4: tun0: < | ||
- | link/ | ||
- | inet 10.8.0.1 peer 10.8.0.2/32 scope global tun0 | ||
- | | ||
- | </ | ||
- | |||
- | If everything went well, enable the service so that it starts automatically at boot: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl enable openvpn@server | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 10: Create Client Configuration Infrastructure ===== | ||
- | |||
- | Next, we need to set up a system that will allow us to create client configuration files easily. | ||
- | |||
- | ==== Creating the Client Config Directory Structure ==== | ||
- | |||
- | Create a directory structure within your home directory to store the files: | ||
- | |||
- | <code bash> | ||
- | mkdir -p ~/ | ||
- | </ | ||
- | |||
- | Since our client configuration files will have the client keys embedded, we should lock down permissions on our inner directory: | ||
- | |||
- | <code bash> | ||
- | chmod 700 ~/ | ||
- | </ | ||
- | |||
- | |||
- | ==== Creating a Base Configuration ==== | ||
- | |||
- | Next, let's copy an example client configuration into our directory to use as our base configuration: | ||
- | |||
- | <code bash> | ||
- | cp / | ||
- | </ | ||
- | |||
- | Open this new file in your text editor: | ||
- | |||
- | <code bash> | ||
- | vi ~/ | ||
- | </ | ||
- | |||
- | Inside, we need to make a few adjustments. | ||
- | |||
- | First, locate the **remote** directive. | ||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | # The hostname/IP and port of the server. | ||
- | # You can have multiple remote entries | ||
- | # to load balance between the servers. | ||
- | remote server_IP_address 1194 | ||
- | . . . | ||
- | </ | ||
- | |||
- | Be sure that the protocol matches the value you are using in the server configuration: | ||
- | |||
- | <file bash ~/ | ||
- | proto udp | ||
- | </ | ||
- | |||
- | Next, uncomment the user and group directives by removing the ";": | ||
- | |||
- | <file bash ~/ | ||
- | # Downgrade privileges after initialization (non-Windows only) | ||
- | user nobody | ||
- | group nogroup | ||
- | </ | ||
- | |||
- | Find the directives that set the **ca**, **cert**, and **key**. | ||
- | |||
- | <file bash ~/ | ||
- | # SSL/TLS parms. | ||
- | # See the server config file for more | ||
- | # description. | ||
- | # a separate .crt/.key file pair | ||
- | # for each client. | ||
- | # file can be used for all clients. | ||
- | #ca ca.crt | ||
- | #cert client.crt | ||
- | #key client.key | ||
- | </ | ||
- | |||
- | Mirror the **cipher** and **auth** settings that we set in the **/ | ||
- | |||
- | <file bash ~/ | ||
- | cipher AES-128-CBC | ||
- | auth SHA256 | ||
- | </ | ||
- | |||
- | Next, add the **key-direction** directive somewhere in the file. This must be set to " | ||
- | |||
- | <file bash ~/ | ||
- | key-direction 1 | ||
- | </ | ||
- | |||
- | Finally, add a few **commented out** lines. | ||
- | |||
- | <file bash ~/ | ||
- | # script-security 2 | ||
- | # up / | ||
- | # down / | ||
- | </ | ||
- | |||
- | If your client is running Linux and has an **/ | ||
- | |||
- | Save the file when you are finished. | ||
- | |||
- | |||
- | ==== Creating a Configuration Generation Script ==== | ||
- | |||
- | Next, we will create a simple script to compile our base configuration with the relevant certificate, | ||
- | |||
- | Create and open a file called **make_config.sh** within the **~/ | ||
- | |||
- | <code bash> | ||
- | vi ~/ | ||
- | </ | ||
- | |||
- | Inside, paste the following script: | ||
- | |||
- | <file bash ~/ | ||
- | #!/bin/bash | ||
- | |||
- | # First argument: Client identifier | ||
- | |||
- | KEY_DIR=~/ | ||
- | OUTPUT_DIR=~/ | ||
- | BASE_CONFIG=~/ | ||
- | |||
- | cat ${BASE_CONFIG} \ | ||
- | <(echo -e '< | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | > ${OUTPUT_DIR}/ | ||
- | </ | ||
- | | ||
- | Save and close the file when you are finished. | ||
- | |||
- | Mark the file as executable by typing: | ||
- | |||
- | <code bash> | ||
- | chmod 700 ~/ | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 11: Generate Client Configurations ===== | ||
- | |||
- | Now, we can easily generate client configuration files. | ||
- | |||
- | If you followed along with the guide, you created a client certificate and key called **client1.crt** and **client1.key** respectively by running the **./ | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | ./ | ||
- | </ | ||
- | |||
- | If everything went well, we should have a **client1.ovpn** file in our **~/ | ||
- | |||
- | <code bash> | ||
- | ls ~/ | ||
- | </ | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | client1.ovpn | ||
- | </ | ||
- | |||
- | |||
- | ==== Transferring Configuration to Client Devices ==== | ||
- | |||
- | We need to transfer the client configuration file to the relevant device. | ||
- | |||
- | While the exact applications used to accomplish this transfer will depend on your choice and device' | ||
- | |||
- | Here is an example SFTP command using our **client1.ovpn** example. | ||
- | |||
- | <code bash> | ||
- | sftp john@openvpn_server_ip: | ||
- | </ | ||
- | |||
- | Here are several tools and tutorials for securely transferring files from the server to a local computer: | ||
- | |||
- | * [[http:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | |||
- | |||
- | ==== Step 12: Install the Client Configuration ==== | ||
- | |||
- | Now, we'll discuss how to install a client VPN profile on Windows, OS X, iOS, and Android. | ||
- | |||
- | The OpenVPN connection will be called whatever you named the **.ovpn** file. In our example, this means that the connection will be called **client1.ovpn** for the first client file we generated. | ||
- | |||
- | === Windows === | ||
- | |||
- | == Installing == | ||
- | |||
- | The OpenVPN client application for Windows can be found on [[https:// | ||
- | |||
- | **NOTE**: | ||
- | |||
- | After installing OpenVPN, copy the **.ovpn** file to: | ||
- | |||
- | < | ||
- | C:\Program Files\OpenVPN\config | ||
- | </ | ||
- | |||
- | When you launch OpenVPN, it will automatically see the profile and makes it available. | ||
- | |||
- | OpenVPN must be run as an administrator each time it's used, even by administrative accounts. | ||
- | |||
- | To set the OpenVPN application to always run as an administrator, | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | Each time you launch the OpenVPN GUI, Windows will ask if you want to allow the program to make changes to your computer. Click **Yes**. | ||
- | |||
- | Once OpenVPN is started, initiate a connection by going into the system tray applet and right-clicking on the OpenVPN applet icon. This opens the context menu. Select **client1** at the top of the menu (that' | ||
- | |||
- | A status window will open showing the log output while the connection is established, | ||
- | |||
- | Disconnect from the VPN the same way: Go into the system tray applet, right-click the OpenVPN applet icon, select the client profile and click **Disconnect**. | ||
- | |||
- | |||
- | === OS X === | ||
- | |||
- | == Installing == | ||
- | |||
- | [[https:// | ||
- | |||
- | Towards the end of the installation process, Tunnelblick will ask if you have any configuration files. | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | Launch Tunnelblick by double-clicking Tunnelblick in the **Applications** folder. | ||
- | |||
- | |||
- | === Linux === | ||
- | |||
- | == Installing == | ||
- | |||
- | If you are using Linux, there are a variety of tools that you can use depending on your distribution. Your desktop environment or window manager might also include connection utilities. | ||
- | |||
- | The most universal way of connecting, however, is to just use the OpenVPN software. | ||
- | |||
- | On Ubuntu or Debian, you can install it just as you did on the server by typing: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update | ||
- | sudo apt-get install openvpn | ||
- | </ | ||
- | |||
- | On CentOS you can enable the EPEL repositories and then install it by typing: | ||
- | |||
- | <code bash> | ||
- | sudo yum install epel-release | ||
- | sudo yum install openvpn | ||
- | </ | ||
- | |||
- | |||
- | == Configuring == | ||
- | |||
- | Check to see if your distribution includes a **/ | ||
- | |||
- | <code bash> | ||
- | ls / | ||
- | </ | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | update-resolve-conf | ||
- | </ | ||
- | |||
- | Next, edit the OpenVPN client configuration file you transfered: | ||
- | |||
- | <code bash> | ||
- | vi client1.ovpn | ||
- | </ | ||
- | |||
- | Uncomment the three lines we placed in to adjust the DNS settings if you were able to find an update-resolv-conf file: | ||
- | |||
- | <file bash client1.ovpn> | ||
- | script-security 2 | ||
- | up / | ||
- | down / | ||
- | </ | ||
- | |||
- | If you are using CentOS, change the group from nogroup to nobody to match the distribution' | ||
- | |||
- | <file bash client1.ovpn> | ||
- | group nobody | ||
- | </ | ||
- | |||
- | Save and close the file. | ||
- | |||
- | Now, you can connect to the VPN by just pointing the openvpn command to the client configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo openvpn --config client1.ovpn | ||
- | </ | ||
- | |||
- | This should connect you to your server. | ||
- | |||
- | |||
- | === iOS === | ||
- | |||
- | == Installing == | ||
- | |||
- | From the iTunes App Store, search for and install [[https:// | ||
- | |||
- | Completing the transfer with iTunes will be outlined here. Open iTunes on the computer and click on iPhone > apps. Scroll down to the bottom to the File Sharing section and click the OpenVPN app. The blank window to the right, OpenVPN Documents, is for sharing files. Drag the .ovpn file to the OpenVPN Documents window. | ||
vpn/setup_an_openvpn_server.1476883432.txt.gz · Last modified: 2020/07/15 09:30 (external edit)