vpn:setup_an_openvpn_server
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
vpn:setup_an_openvpn_server [2017/03/16 20:29] – [Creating a Base Configuration] peter | vpn:setup_an_openvpn_server [2019/12/04 22:14] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== VPN - Setup an OpenVPN Server ====== | ||
- | |||
- | ===== Introduction ===== | ||
- | |||
- | To access the Internet safely and securely when connected to an untrusted network such as an external WiFi connection. | ||
- | |||
- | When combined with [[https:// | ||
- | |||
- | [[https:// | ||
- | |||
- | |||
- | ===== Step 1: Install OpenVPN ===== | ||
- | |||
- | Install OpenVPN. | ||
- | |||
- | To update your server' | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update | ||
- | sudo apt-get install openvpn easy-rsa | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 2: Set Up the CA Directory ===== | ||
- | |||
- | OpenVPN is an TLS/SSL VPN. This means that it utilizes certificates in order to encrypt traffic between the server and clients. | ||
- | |||
- | To begin, we can copy the **easy-rsa** template directory into our home directory with the **make-cadir** command: | ||
- | |||
- | <code bash> | ||
- | make-cadir ~/ | ||
- | </ | ||
- | |||
- | Move into the newly created directory to begin configuring the CA: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 3: Configure the CA Variables ===== | ||
- | |||
- | To configure the values our CA will use, we need to edit the **vars** file within the directory. | ||
- | |||
- | <code bash> | ||
- | vi vars | ||
- | </ | ||
- | |||
- | Inside, there are variables that can be adjusted to determine how your certificates will be created. | ||
- | |||
- | Towards the bottom of the file, find the settings that sets field defaults for new certificates. | ||
- | |||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | |||
- | export KEY_COUNTRY=" | ||
- | export KEY_PROVINCE=" | ||
- | export KEY_CITY=" | ||
- | export KEY_ORG=" | ||
- | export KEY_EMAIL=" | ||
- | export KEY_OU=" | ||
- | |||
- | . . . | ||
- | </ | ||
- | |||
- | Edit the values to whatever you'd prefer, but do not leave them blank: | ||
- | |||
- | For example | ||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | |||
- | export KEY_COUNTRY=" | ||
- | export KEY_PROVINCE=" | ||
- | export KEY_CITY=" | ||
- | export KEY_ORG=" | ||
- | export KEY_EMAIL=" | ||
- | export KEY_OU=" | ||
- | |||
- | . . . | ||
- | </ | ||
- | |||
- | While we are here, we will also edit the **KEY_NAME** value just below this section, which populates the subject field. | ||
- | |||
- | <file bash ~/ | ||
- | export KEY_NAME=" | ||
- | </ | ||
- | |||
- | When you are finished, save and close the file. | ||
- | |||
- | |||
- | ===== Step 4: Build the Certificate Authority ===== | ||
- | |||
- | Now, we can use the variables we set and the easy-rsa utilities to build our certificate authority. | ||
- | |||
- | Ensure you are in your CA directory, and then source the vars file you just edited: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | </ | ||
- | |||
- | You should see the following if it was sourced correctly: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | NOTE: If you run ./ | ||
- | </ | ||
- | |||
- | Make sure we're operating in a clean environment by typing: | ||
- | |||
- | <code bash> | ||
- | ./clean-all | ||
- | </ | ||
- | |||
- | Now, we can build our root CA by typing: | ||
- | |||
- | <code bash> | ||
- | ./build-ca | ||
- | </ | ||
- | |||
- | This will initiate the process of creating the root certificate authority key and certificate. | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | Generating a 2048 bit RSA private key | ||
- | ..........................................................................................+++ | ||
- | ...............................+++ | ||
- | writing new private key to ' | ||
- | ----- | ||
- | You are about to be asked to enter information that will be incorporated | ||
- | into your certificate request. | ||
- | What you are about to enter is what is called a Distinguished Name or a DN. | ||
- | There are quite a few fields but you can leave some blank | ||
- | For some fields there will be a default value, | ||
- | If you enter ' | ||
- | ----- | ||
- | Country Name (2 letter code) [UK]: | ||
- | State or Province Name (full name) [JE]: | ||
- | Locality Name (eg, city) [St. Helier]: | ||
- | Organization Name (eg, company) [ShareWiz]: | ||
- | Organizational Unit Name (eg, section) [Community]: | ||
- | Common Name (eg, your name or your server' | ||
- | Name [server]: | ||
- | Email Address [admin@example.com]: | ||
- | </ | ||
- | |||
- | We now have a CA that can be used to create the rest of the files we need. | ||
- | |||
- | |||
- | ===== Step 5: Create the Server Certificate, | ||
- | |||
- | Next, we will generate our server certificate and key pair, as well as some additional files used during the encryption process. | ||
- | |||
- | Start by generating the OpenVPN server certificate and key pair. We can do this by typing: | ||
- | |||
- | **NOTE**: | ||
- | |||
- | <code bash> | ||
- | ./ | ||
- | </ | ||
- | |||
- | Once again, the prompts will have default values based on the argument we just passed in (server) and the contents of our vars file we sourced. | ||
- | |||
- | Feel free to accept the default values by pressing **ENTER**. | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | . . . | ||
- | |||
- | Certificate is to be certified until May 1 17:51:16 2026 GMT (3650 days) | ||
- | Sign the certificate? | ||
- | |||
- | |||
- | 1 out of 1 certificate requests certified, commit? [y/n]y | ||
- | Write out database with 1 new entries | ||
- | Data Base Updated | ||
- | </ | ||
- | |||
- | |||
- | Next, we'll generate a few other items. | ||
- | |||
- | <code bash> | ||
- | ./build-dh | ||
- | </ | ||
- | |||
- | This might take a few minutes to complete. | ||
- | |||
- | Afterwards, we can generate an HMAC signature to strengthen the server' | ||
- | |||
- | <code bash> | ||
- | openvpn --genkey --secret keys/ta.key | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 6: Generate a Client Certificate and Key Pair ===== | ||
- | |||
- | Next, we can generate a client certificate and key pair. Although this can be done on the client machine and then signed by the server/CA for security purposes, for this guide we will generate the signed key on the server for the sake of simplicity. | ||
- | |||
- | We will generate a single client key/ | ||
- | |||
- | Because you may come back to this step at a later time, we'll re-source the vars file. We will use **client1** as the value for our first certificate/ | ||
- | |||
- | To produce credentials without a password, to aid in automated connections, | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | ./build-key client1 | ||
- | </ | ||
- | |||
- | If instead, you wish to create a password-protected set of credentials, | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | ./ | ||
- | </ | ||
- | |||
- | Again, the defaults should be populated, so you can just hit **ENTER** to continue. | ||
- | |||
- | |||
- | ===== Step 7: Configure the OpenVPN Service ===== | ||
- | |||
- | Next, we can begin configuring the OpenVPN service using the credentials and files we've generated. | ||
- | |||
- | ==== Copy the Files to the OpenVPN Directory ==== | ||
- | |||
- | To begin, we need to copy the files we need to the **/ | ||
- | |||
- | We can start with all of the files that we just generated. | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | sudo cp ca.crt ca.key server.crt server.key ta.key dh2048.pem / | ||
- | </ | ||
- | |||
- | Next, we need to copy and unzip a sample OpenVPN configuration file into configuration directory so that we can use it as a basis for our setup: | ||
- | |||
- | <code bash> | ||
- | gunzip -c / | ||
- | </ | ||
- | |||
- | |||
- | ===== Adjust the OpenVPN Configuration ===== | ||
- | |||
- | Now that our files are in place, we can modify the server configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | ==== Basic Configuration ==== | ||
- | |||
- | First, find the HMAC section by looking for the **tls-auth** directive. | ||
- | |||
- | <file bash / | ||
- | tls-auth ta.key 0 # This file is secret | ||
- | key-direction 0 | ||
- | </ | ||
- | |||
- | Next, find the section on cryptographic ciphers by looking for the commented out **cipher** lines. | ||
- | |||
- | <file bash / | ||
- | cipher AES-128-CBC | ||
- | </ | ||
- | |||
- | Below this, add an **auth** line to select the HMAC message digest algorithm. | ||
- | |||
- | <file bash / | ||
- | auth SHA256 | ||
- | </ | ||
- | |||
- | Finally, find the **user** and **group** settings and remove the ";" | ||
- | |||
- | <file bash / | ||
- | user nobody | ||
- | group nogroup | ||
- | </ | ||
- | |||
- | |||
- | ===== Push DNS Changes to Redirect All Traffic Through the VPN (Optional) ===== | ||
- | |||
- | The settings above will create the VPN connection between the two machines, but will not force any connections to use the tunnel. | ||
- | |||
- | You can do this, uncomment a few directives that will configure client machines to redirect all web traffic through the VPN. Find the **redirect-gateway** section and remove the semicolon ";" | ||
- | |||
- | <file bash / | ||
- | push " | ||
- | </ | ||
- | |||
- | Just below this, find the **dhcp-option** section. | ||
- | |||
- | <file bash / | ||
- | push " | ||
- | push " | ||
- | </ | ||
- | |||
- | This should assist clients in reconfiguring their DNS settings to use the VPN tunnel for as the default gateway. | ||
- | |||
- | ==== Adjust the Port and Protocol (Optional) ==== | ||
- | |||
- | By default, the OpenVPN server uses port 1194 and the UDP protocol to accept client connections. | ||
- | |||
- | <file bash / | ||
- | # Optional! | ||
- | port 443 | ||
- | </ | ||
- | |||
- | Often if the protocol will be restricted to that port as well. If so, change proto from UDP to TCP: | ||
- | |||
- | <file bash / | ||
- | # Optional! | ||
- | proto tcp | ||
- | </ | ||
- | |||
- | If you have no need to use a different port, it is best to leave these two settings as their default. | ||
- | |||
- | |||
- | ==== Point to Non-Default Credentials (Optional) ==== | ||
- | |||
- | If you selected a different name during the **./ | ||
- | |||
- | <file bash / | ||
- | cert server.crt | ||
- | key server.key | ||
- | </ | ||
- | |||
- | When you are finished, save and close the file. | ||
- | |||
- | |||
- | ===== Step 8: Adjust the Server Networking Configuration ===== | ||
- | |||
- | Next, we need to adjust some aspects of the server' | ||
- | |||
- | ==== Allow IP Forwarding ==== | ||
- | |||
- | First, we need to allow the server to forward traffic. | ||
- | |||
- | We can adjust this setting by modifying the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Inside, look for the line that sets **net.ipv4.ip_forward**. | ||
- | |||
- | <file bash / | ||
- | net.ipv4.ip_forward=1 | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | To read the file and adjust the values for the current session, type: | ||
- | |||
- | <code bash> | ||
- | sudo sysctl -p | ||
- | </ | ||
- | |||
- | |||
- | ==== Adjust the UFW Rules to Masquerade Client Connections ==== | ||
- | |||
- | Regardless of whether you use the firewall to block unwanted traffic (which you almost always should do), we need the firewall in this guide to manipulate some of the traffic coming into the server. | ||
- | |||
- | Before we open the firewall configuration file to add masquerading, | ||
- | |||
- | <code bash> | ||
- | ip route | grep default | ||
- | </ | ||
- | |||
- | Your public interface should follow the word " | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | default via 203.0.113.1 dev eth0 proto static | ||
- | </ | ||
- | |||
- | When you have the interface associated with your default route, open the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | This file handles configuration that should be put into place before the conventional UFW rules are loaded. | ||
- | |||
- | **NOTE**: | ||
- | |||
- | <file bash / | ||
- | # | ||
- | # rules.before | ||
- | # | ||
- | # Rules that should be run before the ufw command line added rules. Custom | ||
- | # rules should be added to one of these chains: | ||
- | # | ||
- | # | ||
- | # | ||
- | # | ||
- | |||
- | # START OPENVPN RULES | ||
- | # NAT table rules | ||
- | *nat | ||
- | : | ||
- | # Allow traffic from OpenVPN client to eth0 | ||
- | -A POSTROUTING -s 10.8.0.0/8 -o eth0 -j MASQUERADE | ||
- | COMMIT | ||
- | # END OPENVPN RULES | ||
- | |||
- | # Don't delete these required lines, otherwise there will be errors | ||
- | *filter | ||
- | . . . | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | We need to tell UFW to allow forwarded packages by default as well. To do this, we will open the **/ | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Inside, find the **DEFAULT_FORWARD_POLICY** directive. | ||
- | |||
- | <file bash / | ||
- | DEFAULT_FORWARD_POLICY=" | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | |||
- | ==== Open the OpenVPN Port and Enable the Changes ==== | ||
- | |||
- | Next, we'll adjust the firewall itself to allow traffic to OpenVPN. | ||
- | |||
- | If you did not change the port and protocol in the **/ | ||
- | |||
- | We'll also add the SSH port in case you forgot to add it when following the prerequisite tutorial: | ||
- | |||
- | <code bash> | ||
- | sudo ufw allow 1194/udp | ||
- | sudo ufw allow OpenSSH | ||
- | </ | ||
- | |||
- | Now, we can disable and re-enable UFW to load the changes from all of the files we've modified: | ||
- | |||
- | <code bash> | ||
- | sudo ufw disable | ||
- | sudo ufw enable | ||
- | </ | ||
- | |||
- | Our server is now configured to correctly handle OpenVPN traffic. | ||
- | |||
- | |||
- | ===== Step 9: Start and Enable the OpenVPN Service ===== | ||
- | |||
- | We're finally ready to start the OpenVPN service on our server. | ||
- | |||
- | We need to start the OpenVPN server by specifying our configuration file name as an instance variable after the systemd unit file name. Our configuration file for our server is called **/ | ||
- | |||
- | <code bash> | ||
- | sudo systemctl start openvpn@server | ||
- | </ | ||
- | |||
- | Double-check that the service has started successfully by typing: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl status openvpn@server | ||
- | </ | ||
- | |||
- | If everything went well, your output should look something that looks like this: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | ● openvpn@server.service - OpenVPN connection to server | ||
- | | ||
- | | ||
- | Docs: man: | ||
- | | ||
- | | ||
- | Process: 5852 ExecStart=/ | ||
- | Main PID: 5856 (openvpn) | ||
- | Tasks: 1 (limit: 512) | ||
- | | ||
- | | ||
- | |||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | May 03 15:30:05 openvpn2 ovpn-server[5856]: | ||
- | </ | ||
- | |||
- | You can also check that the OpenVPN **tun0** interface is available by typing: | ||
- | |||
- | <code bash> | ||
- | ip addr show tun0 | ||
- | </ | ||
- | |||
- | You should see a configured interface: | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | 4: tun0: < | ||
- | link/ | ||
- | inet 10.8.0.1 peer 10.8.0.2/32 scope global tun0 | ||
- | | ||
- | </ | ||
- | |||
- | If everything went well, enable the service so that it starts automatically at boot: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl enable openvpn@server | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 10: Create Client Configuration Infrastructure ===== | ||
- | |||
- | Next, we need to set up a system that will allow us to create client configuration files easily. | ||
- | |||
- | ==== Creating the Client Config Directory Structure ==== | ||
- | |||
- | Create a directory structure within your home directory to store the files: | ||
- | |||
- | <code bash> | ||
- | mkdir -p ~/ | ||
- | </ | ||
- | |||
- | Since our client configuration files will have the client keys embedded, we should lock down permissions on our inner directory: | ||
- | |||
- | <code bash> | ||
- | chmod 700 ~/ | ||
- | </ | ||
- | |||
- | |||
- | ==== Creating a Base Configuration ==== | ||
- | |||
- | Next, let's copy an example client configuration into our directory to use as our base configuration: | ||
- | |||
- | <code bash> | ||
- | cp / | ||
- | </ | ||
- | |||
- | Open this new file in your text editor: | ||
- | |||
- | <code bash> | ||
- | vi ~/ | ||
- | </ | ||
- | |||
- | Inside, we need to make a few adjustments. | ||
- | |||
- | First, locate the **remote** directive. | ||
- | |||
- | <file bash ~/ | ||
- | . . . | ||
- | # The hostname/IP and port of the server. | ||
- | # You can have multiple remote entries | ||
- | # to load balance between the servers. | ||
- | remote server_IP_address 1194 | ||
- | . . . | ||
- | </ | ||
- | |||
- | Be sure that the protocol matches the value you are using in the server configuration: | ||
- | |||
- | <file bash ~/ | ||
- | proto udp | ||
- | </ | ||
- | |||
- | Next, uncomment the user and group directives by removing the ";": | ||
- | |||
- | <file bash ~/ | ||
- | # Downgrade privileges after initialization (non-Windows only) | ||
- | user nobody | ||
- | group nogroup | ||
- | </ | ||
- | |||
- | Find the directives that set the **ca**, **cert**, and **key**. | ||
- | |||
- | <file bash ~/ | ||
- | # SSL/TLS parms. | ||
- | # See the server config file for more | ||
- | # description. | ||
- | # a separate .crt/.key file pair | ||
- | # for each client. | ||
- | # file can be used for all clients. | ||
- | #ca ca.crt | ||
- | #cert client.crt | ||
- | #key client.key | ||
- | </ | ||
- | |||
- | Mirror the **cipher** and **auth** settings that we set in the **/ | ||
- | |||
- | <file bash ~/ | ||
- | cipher AES-128-CBC | ||
- | auth SHA256 | ||
- | </ | ||
- | |||
- | Next, add the **key-direction** directive somewhere in the file. This must be set to " | ||
- | |||
- | <file bash ~/ | ||
- | key-direction 1 | ||
- | </ | ||
- | |||
- | Finally, add a few **commented out** lines. | ||
- | |||
- | <file bash ~/ | ||
- | # script-security 2 | ||
- | # up / | ||
- | # down / | ||
- | </ | ||
- | |||
- | If your client is running Linux and has an **/ | ||
- | |||
- | Save the file when you are finished. | ||
- | |||
- | |||
- | ==== Creating a Configuration Generation Script ==== | ||
- | |||
- | Next, we will create a simple script to compile our base configuration with the relevant certificate, | ||
- | |||
- | Create and open a file called **make_config.sh** within the **~/ | ||
- | |||
- | <code bash> | ||
- | vi ~/ | ||
- | </ | ||
- | |||
- | Inside, paste the following script: | ||
- | |||
- | <file bash ~/ | ||
- | #!/bin/bash | ||
- | |||
- | # First argument: Client identifier | ||
- | |||
- | KEY_DIR=~/ | ||
- | OUTPUT_DIR=~/ | ||
- | BASE_CONFIG=~/ | ||
- | |||
- | cat ${BASE_CONFIG} \ | ||
- | <(echo -e '< | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | ${KEY_DIR}/ | ||
- | <(echo -e '</ | ||
- | > ${OUTPUT_DIR}/ | ||
- | </ | ||
- | | ||
- | Save and close the file when you are finished. | ||
- | |||
- | Mark the file as executable by typing: | ||
- | |||
- | <code bash> | ||
- | chmod 700 ~/ | ||
- | </ | ||
- | |||
- | |||
- | ===== Step 11: Generate Client Configurations ===== | ||
- | |||
- | Now, we can easily generate client configuration files. | ||
- | |||
- | If you followed along with the guide, you created a client certificate and key called **client1.crt** and **client1.key** respectively by running the **./ | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | ./ | ||
- | </ | ||
- | |||
- | If everything went well, we should have a **client1.ovpn** file in our **~/ | ||
- | |||
- | <code bash> | ||
- | ls ~/ | ||
- | </ | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | client1.ovpn | ||
- | </ | ||
- | |||
- | |||
- | ==== Transferring Configuration to Client Devices ==== | ||
- | |||
- | We need to transfer the client configuration file to the relevant device. | ||
- | |||
- | While the exact applications used to accomplish this transfer will depend on your choice and device' | ||
- | |||
- | Here is an example SFTP command using our **client1.ovpn** example. | ||
- | |||
- | <code bash> | ||
- | sftp john@openvpn_server_ip: | ||
- | </ | ||
- | |||
- | Here are several tools and tutorials for securely transferring files from the server to a local computer: | ||
- | |||
- | * [[http:// | ||
- | * [[https:// | ||
- | * [[https:// | ||
- | |||
- | |||
- | ==== Step 12: Install the Client Configuration ==== | ||
- | |||
- | Now, we'll discuss how to install a client VPN profile on Windows, OS X, iOS, and Android. | ||
- | |||
- | The OpenVPN connection will be called whatever you named the **.ovpn** file. In our example, this means that the connection will be called **client1.ovpn** for the first client file we generated. | ||
- | |||
- | === Windows === | ||
- | |||
- | == Installing == | ||
- | |||
- | The OpenVPN client application for Windows can be found on [[https:// | ||
- | |||
- | **NOTE**: | ||
- | |||
- | After installing OpenVPN, copy the **.ovpn** file to: | ||
- | |||
- | < | ||
- | C:\Program Files\OpenVPN\config | ||
- | </ | ||
- | |||
- | When you launch OpenVPN, it will automatically see the profile and makes it available. | ||
- | |||
- | OpenVPN must be run as an administrator each time it's used, even by administrative accounts. | ||
- | |||
- | To set the OpenVPN application to always run as an administrator, | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | Each time you launch the OpenVPN GUI, Windows will ask if you want to allow the program to make changes to your computer. Click **Yes**. | ||
- | |||
- | Once OpenVPN is started, initiate a connection by going into the system tray applet and right-clicking on the OpenVPN applet icon. This opens the context menu. Select **client1** at the top of the menu (that' | ||
- | |||
- | A status window will open showing the log output while the connection is established, | ||
- | |||
- | Disconnect from the VPN the same way: Go into the system tray applet, right-click the OpenVPN applet icon, select the client profile and click **Disconnect**. | ||
- | |||
- | |||
- | === OS X === | ||
- | |||
- | == Installing == | ||
- | |||
- | [[https:// | ||
- | |||
- | Towards the end of the installation process, Tunnelblick will ask if you have any configuration files. | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | Launch Tunnelblick by double-clicking Tunnelblick in the **Applications** folder. | ||
- | |||
- | |||
- | === Linux === | ||
- | |||
- | == Installing == | ||
- | |||
- | If you are using Linux, there are a variety of tools that you can use depending on your distribution. Your desktop environment or window manager might also include connection utilities. | ||
- | |||
- | The most universal way of connecting, however, is to just use the OpenVPN software. | ||
- | |||
- | On Ubuntu or Debian, you can install it just as you did on the server by typing: | ||
- | |||
- | <code bash> | ||
- | sudo apt-get update | ||
- | sudo apt-get install openvpn | ||
- | </ | ||
- | |||
- | On CentOS you can enable the EPEL repositories and then install it by typing: | ||
- | |||
- | <code bash> | ||
- | sudo yum install epel-release | ||
- | sudo yum install openvpn | ||
- | </ | ||
- | |||
- | |||
- | == Configuring == | ||
- | |||
- | Check to see if your distribution includes a **/ | ||
- | |||
- | <code bash> | ||
- | ls / | ||
- | </ | ||
- | |||
- | Output | ||
- | |||
- | < | ||
- | update-resolve-conf | ||
- | </ | ||
- | |||
- | Next, edit the OpenVPN client configuration file you transfered: | ||
- | |||
- | <code bash> | ||
- | vi client1.ovpn | ||
- | </ | ||
- | |||
- | Uncomment the three lines we placed in to adjust the DNS settings if you were able to find an update-resolv-conf file: | ||
- | |||
- | <file bash client1.ovpn> | ||
- | script-security 2 | ||
- | up / | ||
- | down / | ||
- | </ | ||
- | |||
- | If you are using CentOS, change the group from nogroup to nobody to match the distribution' | ||
- | |||
- | <file bash client1.ovpn> | ||
- | group nobody | ||
- | </ | ||
- | |||
- | Save and close the file. | ||
- | |||
- | Now, you can connect to the VPN by just pointing the openvpn command to the client configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo openvpn --config client1.ovpn | ||
- | </ | ||
- | |||
- | This should connect you to your server. | ||
- | |||
- | |||
- | === iOS === | ||
- | |||
- | == Installing == | ||
- | |||
- | From the iTunes App Store, search for and install [[https:// | ||
- | |||
- | Completing the transfer with iTunes will be outlined here. Open iTunes on the computer and click on **iPhone > apps**. | ||
- | |||
- | Now launch the OpenVPN app on the iPhone. | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | OpenVPN is now ready to use with the new profile. | ||
- | |||
- | |||
- | === Android === | ||
- | |||
- | == Installing == | ||
- | |||
- | Open the Google Play Store. | ||
- | |||
- | The **.ovpn** profile can be transferred by connecting the Android device to your computer by USB and copying the file over. Alternatively, | ||
- | |||
- | Start the OpenVPN app and tap the menu to import the profile. | ||
- | |||
- | Then navigate to the location of the saved profile (the screenshot uses / | ||
- | |||
- | |||
- | == Connecting == | ||
- | |||
- | To connect, simply tap the **Connect** button. | ||
- | |||
- | |||
- | ===== Step 13: Test Your VPN Connection ===== | ||
- | |||
- | Once everything is installed, a simple check confirms everything is working properly. | ||
- | |||
- | The site will return the IP address assigned by your internet service provider and as you appear to the rest of the world. | ||
- | |||
- | Now connect the OpenVPN client to your Droplet' | ||
- | |||
- | |||
- | ===== Step 14: Revoking Client Certificates ===== | ||
- | |||
- | Occasionally, | ||
- | |||
- | To do so, enter your CA directory and re-source the vars file: | ||
- | |||
- | <code bash> | ||
- | cd ~/ | ||
- | source vars | ||
- | </ | ||
- | |||
- | Next, call the **revoke-full** command using the client name that you wish to revoke: | ||
- | |||
- | <code bash> | ||
- | ./ | ||
- | </ | ||
- | |||
- | This will show some output, ending in **error 23**. This is normal and the process should have successfully generated the necessary revocation information, | ||
- | |||
- | Transfer this file to the **/ | ||
- | |||
- | <code bash> | ||
- | sudo cp ~/ | ||
- | </ | ||
- | |||
- | Next, open the OpenVPN server configuration file: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | At the bottom of the file, add the **crl-verify** option, so that the OpenVPN server checks the certificate revocation list that we've created each time a connection attempt is made: | ||
- | |||
- | <file bash / | ||
- | crl-verify crl.pem | ||
- | </ | ||
- | |||
- | Save and close the file. | ||
- | |||
- | Finally, restart OpenVPN to implement the certificate revocation: | ||
- | |||
- | <code bash> | ||
- | sudo systemctl restart openvpn@server | ||
- | </ | ||
- | |||
- | The client should now longer be able to successfully connect to the server using the old credential. | ||
- | |||
- | To revoke additional clients, follow this process: | ||
- | |||
- | - Generate a new certificate revocation list by sourcing the vars file in the **~/ | ||
- | - Copy the new certificate revocation list to the **/ | ||
- | - Restart the OpenVPN service. | ||
- | |||
- | This process can be used to revoke any certificates that you've previously issued for your server. | ||
- | |||
- | ===== Conclusion ===== | ||
- | |||
- | Congratulations! | ||
- | |||
- | To configure more clients, you only need to follow steps 6, and 11-13 for each additional device. | ||
- | |||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// | ||
vpn/setup_an_openvpn_server.1489696144.txt.gz · Last modified: 2020/07/15 09:30 (external edit)