Commit graph

203 commits

Author SHA1 Message Date
Angristan
8c26cadd06 Fix compression and add none choice
Fix compression choice (wasn't put in the client conf so connection was failing) and add the choice to disable compression
2017-11-16 23:51:02 +01:00
Angristan
2144fb03cc
Merge branch 'master' into openvpn-2.4-update 2017-11-12 23:07:38 +01:00
Angristan
f47fc795d5 Merge PR #83 : Remove rc.local and use an iptables systemd service
- Install iptables systemd service for Debian, Ubuntu and CentOS
- Fix iptables install for ArcLinux
- Remove the use rc.local file
- Remove all iptables rules when removing openvpn (cf. #60 )
2017-11-12 22:56:02 +01:00
Angristan
80fd8678a6 Revert "Merge PR #83 : Remove rc.local and use an iptables systemd service"
This reverts commit e874013112, reversing
changes made to 998d1e8b13.
2017-11-12 22:51:54 +01:00
Angristan
e874013112 Merge PR #83 : Remove rc.local and use an iptables systemd service 2017-11-12 22:43:55 +01:00
Angristan
aca3b4a019
Fix the network interface variable
Fix for https://github.com/Angristan/OpenVPN-install/pull/83#issuecomment-343758329
2017-11-12 19:54:44 +01:00
Angristan
dcec3f12a4
Disable firewalld to allow iptables to start upon reboot 2017-11-12 18:30:05 +01:00
Angristan
ed17fc074d
Resolve conflicts
Merge changes from master to resolve conflicts
2017-11-12 18:07:07 +01:00
Angristan
998d1e8b13
Merge pull request #92 from NathanZepol/master
Adding auth-nocache option to .ovpn configuration
2017-11-12 16:04:11 +01:00
Angristan
a7a277e2dc
Remove "local" parameter
Revert ad3c223385

On some servers, this prevented OpenVPN to start on boot. (Socket bind failed on local address [AF_INET] IP:1194 Cannot assign requested address)
2017-11-12 15:48:39 +01:00
Kcchouette
490b9fb249
Minor fix 2017-11-09 10:10:10 +01:00
Angristan
a0821ee5b4 Fix typo 2017-10-17 22:05:11 +02:00
Angristan
dccbe2f71d Add AdGuard DNS 2017-10-09 17:12:46 +02:00
Angristan
da55d77bb1 Merge branch 'master' into openvpn-2.4-update 2017-10-03 10:16:42 +02:00
lavalampa
d1ea93ea61 fixed typo 2017-10-02 11:39:24 +02:00
Jelle Dekker
603d6747b9 Extended the expiration date of the certificate revocation list to 10 years. 2017-09-29 16:13:02 -05:00
Angristan
ebe2a22bb8 Remove .ovpn config files after uninstalling OpenVPN
Also remove the if $1 = user. I prefer to put all the config files in the same directory
2017-09-28 12:25:54 +02:00
Angristan
9562799ec2 Remove useless apt update 2017-09-28 12:07:35 +02:00
Angristan
341135a6a3 Add compression algorithm choice 2017-09-28 11:10:12 +02:00
Angristan
07de8b9feb Update openvpn-install.sh 2017-09-25 17:10:06 +02:00
hybtoy
948b6511b7 "local" option removal
Remove "local" option from server.conf.
2017-09-25 10:40:38 +05:00
Angristan
d057de2309 Fix previous commit 2017-09-17 19:55:44 +02:00
Angristan
d0b1fbbe51 Drop Debian 7 and Ubuntu 12.04 support
Debian is oldstable and has a bug with iptables. Ubuntu 12.04 is unsupported.
2017-09-17 19:53:38 +02:00
Angristan
f6eecf3dcb Cleanup and rewrites 2017-09-17 18:09:52 +02:00
Angristan
f4b6742f36 Make some space 2017-09-17 17:40:32 +02:00
Angristan
a6e2481f50 Add 2.4 repo for Ubuntu 16.04 + some cleanup 2017-09-17 17:34:13 +02:00
Angristan
9f7663303f Fix if 2017-09-17 15:46:47 +02:00
Angristan
7596918204 Update openvpn-install.sh
Fix 4ec6e24e81
2017-09-17 15:36:11 +02:00
Angristan
ff10bd83e6 Disable cipher negotiation for 2.4 clients
This seems like a little change but it was not easy to find.

I want this script to support only OpenVPN 2.4 servers, but also 2.4 and 2.3 clients.

The thing is, the OpenVPN 2.3 client doesn't care at all what cipher the server wants to use. The cipher parameter in the client config is the king here.

But with OpenVPN 2.4, you can specify whatever cipher you want, the clients and the server will negotiate the best cipher possible, which is AES-256-GCM right now. The use of --ncp-ciphers cipher_list is useless because a 2.3 client will still use its cipher and a 2.4 client will still use AES-256-GCM.

I won't detail all my experiments here, but in the end, ncp-disable disable the cipher negotiation for 2.4 clients. But it will only work if the cipher in the server config and the client config are the same, and as they are in the script, it's ok. This is not the best solution because that means if you want to support a 2.3 client, you'll be forced to use one and only one AES-CBC cipher, even with your 2.4 clients, even though you could use a different cipher for each client. But as we're still using AES and OpenVPN 2.4 getting more and more deployed, this is not a too big issue in the end. Also adding menus to to choose what kind of client you want etc would make the script pretty complicated, so this is a good compromise here.

TL;DR: ncp-disable enforces a OpenVPN 2.4 client to use the specified cipher in the server and the client config.

See here for me details regarding the data channel cipher negotiation in OpenVPN 2.4 : https://community.openvpn.net/openvpn/wiki/Openvpn24ManPage#lbAJ
2017-09-17 12:19:59 +02:00
Angristan
57d5b6329f Fix case
Doesn't have any impact, but that's how it should be.
2017-09-17 11:16:24 +02:00
Angristan
4ec6e24e81 More precision concerning the use of "auth"
From the OpenVPN wiki:

>Authenticate data channel packets and (if enabled) tls-auth control channel packets with HMAC using message digest algorithm alg. (The default is SHA1 ). HMAC is a commonly used message authentication algorithm (MAC) that uses a data string, a secure hash algorithm, and a key, to produce a digital signature.

>If an AEAD cipher mode (e.g. GCM) is chosen, the specified --auth algorithm is ignored for the data channel, and the authentication method of the AEAD cipher is used instead. Note that alg still specifies the digest used for tls-auth.

Tl;DR: if we're using an AEAD cipher (AES GCM), `auth alg` won't have inpact on the impact channel, but only on the control channel if tls-auth/tls-crypt is enabled.
2017-09-17 11:11:08 +02:00
Angristan
d5e8a69426 Fix tls-crypt 2017-09-16 20:59:31 +02:00
Angristan
8c61a1afba Fix while condition 2017-09-14 14:19:12 +02:00
Angristan
2171003bda Fix variables 2017-09-14 14:12:25 +02:00
Angristan
7322a711ec Fix cert hash alg menu 2017-09-14 14:11:16 +02:00
Angristan
d5b5129f08 Fix HMAC auth alg menu 2017-09-14 14:09:47 +02:00
hybtoy
7d56181699 Update openvpn-install.sh 2017-09-14 16:37:57 +05:00
Angristan
4fa0544c72 Initial commit for OpenVPN 2.4 support
- Add support for AES-GCM ciphers for the data channel
- Add support for tls-crypt
- Add support for ECDSA certificates
- Add support for ECDHE
- Add choice for HMAC auth algorithm
- Add choice for certificate hash algorithm
- Add choice for the control channel's cipher

All these options have an OpenVPN 2.3-compatible choice (example : RSA cert and DH key)
2017-09-14 12:35:18 +02:00
Nathan
641510984b Adding auth-nocache Option to .ovpn Configuration 2017-08-27 13:59:08 -05:00
Angristan
37d42e25fe Update Easy-RSA to v3.0.3 2017-08-23 10:39:33 +02:00
Angristan
c0ed60e8cf Update openvpn-install.sh 2017-08-22 11:12:42 +02:00
Ola Tuvesson
ad3c223385 Will now set "local" in server.conf to the chosen IP adderess
If you want to run OpenVPN in UDP mode on an secondary IP, UDP routing will fail unless you explicitly bind OpenVPN to the chosen IP address. This change includes the "local" parameter in the config and sets it to the IP address entered at the beginning.
2017-08-22 00:39:43 +01:00
Angristan
edbe4fed90 Rename OpenVPN's APT list 2017-08-20 22:38:55 +02:00
Angristan
a3c005c556 Update Debian and Ubuntu repository
swupdate.openvpn.net hasn't been updated since OpenVPN 2.3.14 whereas build.openvpn.net supports OpenVPN 2.4.x as of today
Fixes https://github.com/Angristan/OpenVPN-install/issues/86
2017-08-07 16:44:16 +02:00
patlol
58a5282e17 Update openvpn-install.sh 2017-07-22 21:08:06 +02:00
patlol
3c5c87b031 Update openvpn-install.sh 2017-07-22 20:18:46 +02:00
patlol
5787c45a03 Update openvpn-install.sh 2017-07-22 19:40:29 +02:00
patlol
031afd587e fix #8 Client files not beeing created in the right folder when using sudo 2017-07-22 19:30:36 +02:00
DrXala
b5c624eb76 Adjust indents + change iptables.service 2017-07-20 17:12:40 +02:00
DrXala
8f28593112 Fix iptables.service 2017-07-16 16:01:05 +02:00