Compare commits
207 commits
bash-good-
...
master
Author | SHA1 | Date | |
---|---|---|---|
b30a4df25d | |||
292fd74bbd | |||
1b9b7fa38b | |||
dab03933e1 | |||
51b7c7c445 | |||
![]() |
e2d4990ae1 | ||
![]() |
e1f19e0f24 | ||
![]() |
dc114f3243 | ||
![]() |
0d58ddcb8c | ||
![]() |
56660eefeb | ||
![]() |
2ce1ee765e | ||
![]() |
a189535563 | ||
![]() |
67701fac77 | ||
![]() |
0cc002e17d | ||
![]() |
a2725d61a3 | ||
![]() |
305e9868cf | ||
![]() |
6a127fa2b6 | ||
![]() |
5a4b31bd0d | ||
![]() |
651e36c6cb | ||
![]() |
1a249c621d | ||
![]() |
80feebed16 | ||
![]() |
d096f7a3a2 | ||
![]() |
33fe6af131 | ||
![]() |
d2556ff235 | ||
![]() |
2f76bb5e40 | ||
![]() |
ca8d58d5f0 | ||
![]() |
0ac1bf4f51 | ||
![]() |
64cbbce0b7 | ||
![]() |
580c617d98 | ||
![]() |
2d0eca1a1d | ||
![]() |
48f8c16d3a | ||
![]() |
38d3bf9afa | ||
![]() |
2a57e89489 | ||
![]() |
4ee44c8e46 | ||
![]() |
9b5361d32d | ||
![]() |
039ebaafe1 | ||
![]() |
8e427ee9c2 | ||
![]() |
638b51168a | ||
![]() |
d629791a95 | ||
![]() |
86a6d2d3e7 | ||
![]() |
d3751457ab | ||
![]() |
0de56f8f33 | ||
![]() |
83111c58e7 | ||
![]() |
a7e54a47ce | ||
![]() |
4553dd9c21 | ||
![]() |
deb5867979 | ||
![]() |
b3b7593b2d | ||
![]() |
c2059d684d | ||
![]() |
fdc3f25987 | ||
![]() |
15d8fb053d | ||
![]() |
f8ec7c39be | ||
![]() |
6e12bf0b2c | ||
![]() |
45f4ebcc6e | ||
![]() |
8349bf66d4 | ||
![]() |
6be8f0aeb5 | ||
![]() |
194077bcf7 | ||
![]() |
ee862414cd | ||
![]() |
ad9c069411 | ||
![]() |
68f2080f0c | ||
![]() |
b4d6acac83 | ||
![]() |
5fcce43d8d | ||
![]() |
db2fe12258 | ||
![]() |
8c6266053b | ||
![]() |
3d0014c026 | ||
![]() |
3a5bcf5d2d | ||
![]() |
8f83781d00 | ||
![]() |
6c4d91e5e8 | ||
![]() |
89b591a160 | ||
![]() |
dd9d0aa281 | ||
![]() |
506c86f720 | ||
![]() |
fa123bede7 | ||
![]() |
29deb4cfdf | ||
![]() |
7d5c2d962d | ||
![]() |
8783719459 | ||
![]() |
d03d8d4580 | ||
![]() |
bcd1d8a53e | ||
![]() |
1d55f856ae | ||
![]() |
2ab48f2265 | ||
![]() |
2be9932fde | ||
![]() |
995d244587 | ||
![]() |
faf43047e2 | ||
![]() |
b9deadef61 | ||
![]() |
c379bf3b67 | ||
![]() |
ac8d41f0cb | ||
![]() |
31551a7176 | ||
![]() |
2b897dc64a | ||
![]() |
126f575655 | ||
![]() |
248a85f5da | ||
![]() |
b840f56f3e | ||
![]() |
bfdf48c392 | ||
![]() |
f642f4c6da | ||
![]() |
319459ae77 | ||
![]() |
e965518dc7 | ||
![]() |
d1de5c64fe | ||
![]() |
1abb6a6948 | ||
![]() |
29d4dc20f8 | ||
![]() |
353ce9c534 | ||
![]() |
c68518566b | ||
![]() |
1fceec27db | ||
![]() |
1cc1978477 | ||
![]() |
ea236de3e3 | ||
![]() |
5acd9a0446 | ||
![]() |
b2e96b0762 | ||
![]() |
860aaa8bf4 | ||
![]() |
7d18ef4337 | ||
![]() |
82c3c2430b | ||
![]() |
8db952d2b7 | ||
![]() |
e16d93f314 | ||
![]() |
54dc74904c | ||
![]() |
bd047c08d7 | ||
![]() |
7b7567e7cb | ||
![]() |
2e193e33cb | ||
![]() |
197b7b9fb5 | ||
![]() |
73c5304fda | ||
![]() |
9935c96cdf | ||
![]() |
cef199916d | ||
![]() |
8d05ce62e8 | ||
![]() |
4eb349bf10 | ||
![]() |
7ddd525edf | ||
![]() |
2950fd4457 | ||
![]() |
cb23f0ec24 | ||
![]() |
9623867026 | ||
![]() |
423419de74 | ||
![]() |
25d00c197e | ||
![]() |
1e3006c9ec | ||
![]() |
e52a54b92f | ||
![]() |
99ebd3d9bc | ||
![]() |
9579e29ccf | ||
![]() |
3b1af0e889 | ||
![]() |
a486d07436 | ||
![]() |
5c2a86f27e | ||
![]() |
54b884e7b1 | ||
![]() |
e13141d859 | ||
![]() |
8f9e80d63c | ||
![]() |
2e981a9898 | ||
![]() |
b4773385a4 | ||
![]() |
d37ffde48e | ||
![]() |
bbd29a8178 | ||
![]() |
a35cd2eca4 | ||
![]() |
9e1fe367bf | ||
![]() |
eca5be8aac | ||
![]() |
de41f8b7ff | ||
![]() |
3f04a554ef | ||
![]() |
2a73a41f71 | ||
![]() |
0d0396a7c7 | ||
![]() |
ed26d6a649 | ||
![]() |
b11296870f | ||
![]() |
002c64efc5 | ||
![]() |
101f0365ba | ||
![]() |
8645298d01 | ||
![]() |
15b2c986af | ||
![]() |
b2888fa514 | ||
![]() |
6ee5787a29 | ||
![]() |
ca00c6b7ce | ||
![]() |
317c4dbdbf | ||
![]() |
5e2e67f78d | ||
![]() |
9096af1677 | ||
![]() |
c24928162d | ||
![]() |
80e89836f1 | ||
![]() |
a7c860187e | ||
![]() |
aa20ae6ba6 | ||
![]() |
565ef861a1 | ||
![]() |
1cb4d744f0 | ||
![]() |
e952d58995 | ||
![]() |
137284e55f | ||
![]() |
ec36253e75 | ||
![]() |
2370f802b7 | ||
![]() |
3ece6f394d | ||
![]() |
83f70fe71f | ||
![]() |
0e961a2e6b | ||
![]() |
529d365693 | ||
![]() |
c785b230e9 | ||
![]() |
369c8dadaa | ||
![]() |
182c43316f | ||
![]() |
96e6ea71e9 | ||
![]() |
f411d9dec7 | ||
![]() |
c758418c6d | ||
![]() |
2a35a3db16 | ||
![]() |
fdb35b86c6 | ||
![]() |
29980e6bef | ||
![]() |
3b2c84b94d | ||
![]() |
87bfd046dd | ||
![]() |
c2d7729c20 | ||
![]() |
af3bf12bb6 | ||
![]() |
08aeed2c5b | ||
![]() |
b4cbb54320 | ||
![]() |
0f871f26d8 | ||
![]() |
6cc0022dff | ||
![]() |
e3139cd877 | ||
![]() |
8d5bb43aed | ||
![]() |
a3e6652d6d | ||
![]() |
62a4ff3b41 | ||
![]() |
159ab9af6e | ||
![]() |
fe0b995bdf | ||
![]() |
3b0c2ace90 | ||
![]() |
957712e73d | ||
![]() |
0481e10bce | ||
![]() |
ecd2b45c9f | ||
![]() |
72c99f3e8f | ||
![]() |
0188c442a2 | ||
![]() |
fcc4cc4afd | ||
![]() |
777bedaa38 | ||
![]() |
2e17007cb3 | ||
![]() |
124606468d | ||
![]() |
2b9c108232 | ||
![]() |
8e9ca3ad10 | ||
![]() |
c2a4edc714 |
15 changed files with 965 additions and 582 deletions
3
.editorconfig
Normal file
3
.editorconfig
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[*.sh]
|
||||||
|
indent_style = tab
|
||||||
|
indent_size = 4
|
5
.github/FUNDING.yml
vendored
5
.github/FUNDING.yml
vendored
|
@ -1,3 +1,2 @@
|
||||||
patreon: angristan
|
ko_fi: stanislas
|
||||||
liberapay: angristan
|
custom: https://coindrop.to/stanislas
|
||||||
ko_fi: angristan
|
|
||||||
|
|
13
.github/ISSUE_TEMPLATE.md
vendored
13
.github/ISSUE_TEMPLATE.md
vendored
|
@ -1,13 +0,0 @@
|
||||||
<!---
|
|
||||||
|
|
||||||
Before opening an issue, please make sure:
|
|
||||||
|
|
||||||
- You installed OpenVPN with the latest version of the script
|
|
||||||
- You read the FAQ
|
|
||||||
- Your issue is about the script, NOT OpenVPN itself
|
|
||||||
- ⚠ PLEASE Post your OpenVPN version and OS for both the server and the client if needed
|
|
||||||
|
|
||||||
FYI, you can execute the script with `bash -x openvpn-install.sh` to enable debug mode.
|
|
||||||
|
|
||||||
You can format your comments with Markdown: https://guides.github.com/features/mastering-markdown/
|
|
||||||
--->
|
|
6
.github/dependabot.yml
vendored
Normal file
6
.github/dependabot.yml
vendored
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "monthly"
|
10
.github/issue_template.md
vendored
Normal file
10
.github/issue_template.md
vendored
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
<!---
|
||||||
|
❗️ Please read ❗️
|
||||||
|
➡️ If you need help with OpenVPN itself, please use the community forums (https://forums.openvpn.net/) or Stack Overflow (https://stackoverflow.com/questions/tagged/openvpn)
|
||||||
|
➡️ For the script, prefer opening a discussion thread for help: https://github.com/angristan/openvpn-install/discussions
|
||||||
|
💡 It helps keep the issue tracker clean and focused on bugs and feature requests.
|
||||||
|
|
||||||
|
🙏 Please include as much information as possible, and make sure you're running the latest version of the script.
|
||||||
|
✍️ Please state the Linux distribution you're using and its version, as well as the OpenVPN version.
|
||||||
|
✋ For feature requests, remember that this script is meant to be simple and easy to use. If you want to add a lot of options, it's better to fork the project.
|
||||||
|
--->
|
1
.github/linters/.markdown-lint.yml
vendored
Normal file
1
.github/linters/.markdown-lint.yml
vendored
Normal file
|
@ -0,0 +1 @@
|
||||||
|
{ "MD013": null, "MD045": null, "MD040": null, "MD036": null }
|
7
.github/pull_request_template.md
vendored
Normal file
7
.github/pull_request_template.md
vendored
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
<!---
|
||||||
|
❗️ Please read ❗️
|
||||||
|
➡️ Please make sure you've followed the guidelines: https://github.com/angristan/openvpn-install#contributing
|
||||||
|
✅ Please make sure your changes are tested and working
|
||||||
|
🗣️ Please avoid large PRs, and discuss changes in a GitHub issue first
|
||||||
|
✋ If the changes are too big and not in line with the project, they will probably be rejected. Remember that this script is meant to be simple and easy to use.
|
||||||
|
--->
|
14
.github/workflows/lint.yml
vendored
Normal file
14
.github/workflows/lint.yml
vendored
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
on: [push, pull_request, workflow_dispatch]
|
||||||
|
|
||||||
|
name: Lint
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
super-linter:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout Code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Lint Code Base
|
||||||
|
uses: github/super-linter@v4.1.0
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
11
.github/workflows/push.yml
vendored
11
.github/workflows/push.yml
vendored
|
@ -1,11 +0,0 @@
|
||||||
on: [push, pull_request]
|
|
||||||
name: ShellCheck
|
|
||||||
jobs:
|
|
||||||
shellcheck:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@master
|
|
||||||
- name: shellcheck
|
|
||||||
uses: ludeeus/action-shellcheck@0.0.1
|
|
||||||
with:
|
|
||||||
args: openvpn-install.sh -e SC1091,SC2164,SC2034,SC1072,SC1073,SC1009
|
|
97
.github/workflows/test.yml
vendored
Normal file
97
.github/workflows/test.yml
vendored
Normal file
|
@ -0,0 +1,97 @@
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- master
|
||||||
|
- ci
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
name: Test
|
||||||
|
jobs:
|
||||||
|
install:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
if: github.repository == 'angristan/openvpn-install' && github.actor == 'angristan'
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
os-image:
|
||||||
|
- debian-11-x64
|
||||||
|
- debian-12-x64
|
||||||
|
- ubuntu-22-04-x64
|
||||||
|
- ubuntu-24-04-x64
|
||||||
|
- fedora-39-x64
|
||||||
|
- fedora-40-x64
|
||||||
|
# - centos-stream-9-x64 # yum oomkill
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Setup doctl
|
||||||
|
uses: digitalocean/action-doctl@v2
|
||||||
|
with:
|
||||||
|
token: ${{ secrets.DIGITALOCEAN_ACCESS_TOKEN }}
|
||||||
|
|
||||||
|
- name: Create server
|
||||||
|
run: doctl compute droplet create openvpn-action-$GITHUB_RUN_ID-$GITHUB_RUN_NUMBER-${{ matrix.os-image }} --size s-1vcpu-1gb --image ${{ matrix.os-image }} --region lon1 --enable-ipv6 --ssh-keys be:66:76:61:a8:71:93:aa:e3:19:ba:d8:0d:d2:2d:d4 --wait
|
||||||
|
|
||||||
|
- name: Get server ID
|
||||||
|
run: echo ::set-output name=value::$(doctl compute droplet list -o json | jq -r '.[] | select(.name == "'openvpn-action-$GITHUB_RUN_ID-$GITHUB_RUN_NUMBER-${{ matrix.os-image }}'").id')
|
||||||
|
id: server_id
|
||||||
|
|
||||||
|
- name: Move server to dedicated project
|
||||||
|
run: doctl projects resources assign ${{ secrets.DIGITALOCEAN_PROJECT_ID }} --resource=do:droplet:${{ steps.server_id.outputs.value }}
|
||||||
|
|
||||||
|
- name: Wait for server to boot
|
||||||
|
run: sleep 90
|
||||||
|
|
||||||
|
- name: Get server IP
|
||||||
|
run: echo ::set-output name=value::$(doctl compute droplet list -o json | jq -r '.[] | select(.name == "'openvpn-action-$GITHUB_RUN_ID-$GITHUB_RUN_NUMBER-${{ matrix.os-image }}'").networks.v4 | .[] | select(.type == "'public'").ip_address')
|
||||||
|
id: server_ip
|
||||||
|
|
||||||
|
- name: Get server OS
|
||||||
|
run: echo ::set-output name=value::$(echo ${{ matrix.os-image }} | cut -d '-' -f1)
|
||||||
|
id: server_os
|
||||||
|
|
||||||
|
- name: Setup remote server (Debian/Ubuntu)
|
||||||
|
if: steps.server_os.outputs.value == 'debian' || steps.server_os.outputs.value == 'ubuntu'
|
||||||
|
uses: appleboy/ssh-action@v0.1.6
|
||||||
|
with:
|
||||||
|
host: ${{ steps.server_ip.outputs.value }}
|
||||||
|
username: root
|
||||||
|
key: ${{ secrets.SSH_KEY }}
|
||||||
|
script: set -x && apt-get update && apt-get -o DPkg::Lock::Timeout=120 install -y git
|
||||||
|
|
||||||
|
- name: Setup remote server (Fedora)
|
||||||
|
if: steps.server_os.outputs.value == 'fedora'
|
||||||
|
uses: appleboy/ssh-action@v0.1.6
|
||||||
|
with:
|
||||||
|
host: ${{ steps.server_ip.outputs.value }}
|
||||||
|
username: root
|
||||||
|
key: ${{ secrets.SSH_KEY }}
|
||||||
|
script: set -x && dnf install -y git
|
||||||
|
|
||||||
|
- name: Setup remote server (CentOS)
|
||||||
|
if: steps.server_os.outputs.value == 'centos'
|
||||||
|
uses: appleboy/ssh-action@v0.1.6
|
||||||
|
with:
|
||||||
|
host: ${{ steps.server_ip.outputs.value }}
|
||||||
|
username: root
|
||||||
|
key: ${{ secrets.SSH_KEY }}
|
||||||
|
script: set -x && yum install -y git
|
||||||
|
|
||||||
|
- name: Download repo and checkout current commit
|
||||||
|
uses: appleboy/ssh-action@v0.1.6
|
||||||
|
with:
|
||||||
|
host: ${{ steps.server_ip.outputs.value }}
|
||||||
|
username: root
|
||||||
|
key: ${{ secrets.SSH_KEY }}
|
||||||
|
script: set -x && git clone https://github.com/angristan/openvpn-install.git && cd openvpn-install && git checkout ${{ github.sha }}
|
||||||
|
|
||||||
|
- name: Run openvpn-install.sh in headless mode
|
||||||
|
uses: appleboy/ssh-action@v0.1.6
|
||||||
|
with:
|
||||||
|
host: ${{ steps.server_ip.outputs.value }}
|
||||||
|
username: root
|
||||||
|
key: ${{ secrets.SSH_KEY }}
|
||||||
|
script: 'set -x && AUTO_INSTALL=y bash -x ~/openvpn-install/openvpn-install.sh && ps aux | grep openvpn | grep -v grep > /dev/null 2>&1 && echo "Success: OpenVPN is running" && exit 0 || echo "Failure: OpenVPN is not running" && exit 1'
|
||||||
|
|
||||||
|
- name: Delete server
|
||||||
|
run: doctl compute droplet delete -f openvpn-action-$GITHUB_RUN_ID-$GITHUB_RUN_NUMBER-${{ matrix.os-image }}
|
||||||
|
if: always()
|
2
.gitignore
vendored
2
.gitignore
vendored
|
@ -1,2 +0,0 @@
|
||||||
.vagrant/
|
|
||||||
*.log
|
|
138
FAQ.md
138
FAQ.md
|
@ -10,7 +10,46 @@ You can, of course, it's even recommended, update the `openvpn` package with you
|
||||||
|
|
||||||
**Q:** How do I check for DNS leaks?
|
**Q:** How do I check for DNS leaks?
|
||||||
|
|
||||||
**A:** Go to [dnsleaktest.com](https://dnsleaktest.com/) or [ipleak.net](https://ipleak.net/) with your browser. Only your server's IP should show up.
|
**A:** Go to [browserleaks.com](https://browserleaks.com/dns) or [ipleak.net](https://ipleak.net/) (both perform IPv4 and IPv6 check) with your browser. Your IP should not show up (test without and without the VPN). The DNS servers should be the ones you selected during the setup, not your IP address nor your ISP's DNS servers' addresses.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** How do I fix DNS leaks?
|
||||||
|
|
||||||
|
**A:** On Windows 10 DNS leaks are blocked by default with the `block-outside-dns` option.
|
||||||
|
On Linux you need to add these lines to your `.ovpn` file based on your Distribution.
|
||||||
|
|
||||||
|
Debian 9, 10 and Ubuntu 16.04, 18.04
|
||||||
|
|
||||||
|
```
|
||||||
|
script-security 2
|
||||||
|
up /etc/openvpn/update-resolv-conf
|
||||||
|
down /etc/openvpn/update-resolv-conf
|
||||||
|
```
|
||||||
|
|
||||||
|
Centos 6, 7
|
||||||
|
|
||||||
|
```
|
||||||
|
script-security 2
|
||||||
|
up /usr/share/doc/openvpn-2.4.8/contrib/pull-resolv-conf/client.up
|
||||||
|
down /usr/share/doc/openvpn-2.4.8/contrib/pull-resolv-conf/client.down
|
||||||
|
```
|
||||||
|
|
||||||
|
Centos 8, Fedora 30, 31
|
||||||
|
|
||||||
|
```
|
||||||
|
script-security 2
|
||||||
|
up /usr/share/doc/openvpn/contrib/pull-resolv-conf/client.up
|
||||||
|
down /usr/share/doc/openvpn/contrib/pull-resolv-conf/client.down
|
||||||
|
```
|
||||||
|
|
||||||
|
Arch Linux
|
||||||
|
|
||||||
|
```
|
||||||
|
script-security 2
|
||||||
|
up /usr/share/openvpn/contrib/pull-resolv-conf/client.up
|
||||||
|
down /usr/share/openvpn/contrib/pull-resolv-conf/client.down
|
||||||
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -30,18 +69,107 @@ If your client is <2.3.3, remove `tls-version-min 1.2` from your `/etc/openvpn/s
|
||||||
|
|
||||||
**Q:** IPv6 is not working on my Hetzner VM
|
**Q:** IPv6 is not working on my Hetzner VM
|
||||||
|
|
||||||
**A:** This an issue on their side. See https://angristan.xyz/fix-ipv6-hetzner-cloud/
|
**A:** This an issue on their side. See <https://angristan.xyz/fix-ipv6-hetzner-cloud/>
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
**Q:** DNS is not working on my Linux client
|
**Q:** DNS is not working on my Linux client
|
||||||
|
|
||||||
**A:** Make sure the `resolvconf` package is installed. If it does not solve the issue, look at https://wiki.archlinux.org/index.php/OpenVPN#Update_systemd-resolved_script
|
**A:** See "How do I fix DNS leaks?" question
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
**Q:** How to setup openVPN in a LXC container? (f.e. Proxmox)
|
**Q:** What syctl and iptables changes are made by the script?
|
||||||
|
|
||||||
**A:** See https://github.com/Nyr/openvpn-install/wiki/How-to-setup-openVPN-in-a-LXC-container-(f.e.-Proxmox)
|
**A:** Iptables rules are saved at `/etc/iptables/add-openvpn-rules.sh` and `/etc/iptables/rm-openvpn-rules.sh`. They are managed by the service `/etc/systemd/system/iptables-openvpn.service`
|
||||||
|
|
||||||
|
Sysctl options are at `/etc/sysctl.d/20-openvpn.conf`
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
**Q:** How can I access other clients connected to the same OpenVPN server?
|
||||||
|
|
||||||
|
**A:** Add `client-to-client` to your `server.conf`
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** My router can't connect
|
||||||
|
|
||||||
|
**A:**
|
||||||
|
|
||||||
|
- `Options error: No closing quotation (") in config.ovpn:46` :
|
||||||
|
|
||||||
|
type `yes` when asked to customize encryption settings and choose `tls-auth`
|
||||||
|
|
||||||
|
- `Options error: Unrecognized option or missing parameter(s) in config.ovpn:36: tls-version-min (2.3.2)` :
|
||||||
|
|
||||||
|
see question "Can I use an OpenVPN 2.3 client?"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** How can I access computers the OpenVPN server's remote LAN?
|
||||||
|
|
||||||
|
**A:** Add a route with the subnet of the remote network to `/etc/openvpn/server.conf` and restart openvpn. Example: `push "route 192.168.1.0 255.255.255.0"` if the server's LAN is `192.168.1.0/24`
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** How can I add multiple users in one go?
|
||||||
|
|
||||||
|
**A:** Here is a sample bash script to achieve this:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
userlist=(user1 user2 user3)
|
||||||
|
|
||||||
|
for i in ${userlist[@]};do
|
||||||
|
MENU_OPTION=1 CLIENT=$i PASS=1 ./openvpn-install.sh
|
||||||
|
done
|
||||||
|
```
|
||||||
|
|
||||||
|
From a list in a text file:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
while read USER
|
||||||
|
do MENU_OPTION="1" CLIENT="$USER" PASS="1" ./openvpn-install.sh
|
||||||
|
done < users.txt
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** How do I change the default `.ovpn` file created for future clients?
|
||||||
|
|
||||||
|
**A:** You can edit the template out of which `.ovpn` files are created by editing `/etc/openvpn/client-template.txt`
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** For my clients - I want to set my internal network to pass through the VPN and the rest to go through my internet?
|
||||||
|
|
||||||
|
**A:** You would need to edit the `.ovpn` file. You can edit the template out of which those files are created by editing `/etc/openvpn/client-template.txt` file and adding
|
||||||
|
|
||||||
|
```sh
|
||||||
|
route-nopull
|
||||||
|
route 10.0.0.0 255.0.0.0
|
||||||
|
```
|
||||||
|
|
||||||
|
So for example - here it would route all traffic of `10.0.0.0/8` to the vpn. And the rest through the internet.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**Q:** I have enabled IPv6 and my VPN client gets an IPv6 address. Why do I reach the websites or other dual-stacked destionations via IPv4 only?
|
||||||
|
|
||||||
|
**A:** This is because inside the tunnel you don't get a publicly routable IPv6 address, instead you get an ULA (Unlique Local Lan) address. Operating systems don't prefer this all the time. You can fix this in your operating system policies as it's unrelated to the VPN itself:
|
||||||
|
|
||||||
|
Windows (commands needs to run cmd.exe as Administrator):
|
||||||
|
|
||||||
|
```
|
||||||
|
netsh interface ipv6 add prefixpolicy fd00::/8 3 1
|
||||||
|
```
|
||||||
|
|
||||||
|
Linux:
|
||||||
|
|
||||||
|
edit `/etc/gai.conf` and uncomment the following line and also change its value to `1`:
|
||||||
|
|
||||||
|
```
|
||||||
|
label fc00::/7 1
|
||||||
|
```
|
||||||
|
|
||||||
|
This will not work properly unless you add you your VPN server `server.conf` one or two lines to push at least 1 (one) IPv6 DNS server. Most providers have IPv6 servers as well, add two more lines of `push "dhcp-option DNS <IPv6>"`
|
||||||
|
|
167
README.md
167
README.md
|
@ -1,21 +1,88 @@
|
||||||
|
# openvpn-install Fabio
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
First, get the script and make it executable:
|
||||||
|
```bash
|
||||||
|
curl -O https://forgit.patachina.it/Fabio/openvpn-install/raw/branch/master/openvpn-install.sh
|
||||||
|
chmod +x openvpn-install.sh
|
||||||
|
```
|
||||||
|
Then run it:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
./openvpn-install.sh
|
||||||
|
```
|
||||||
|
The first time you run it, you'll have to follow the assistant and answer a few questions to setup your VPN server.
|
||||||
|
|
||||||
|
When OpenVPN is installed, you can run the script again, and you will get the choice to:
|
||||||
|
|
||||||
|
Add a client
|
||||||
|
Remove a client
|
||||||
|
Uninstall OpenVPN
|
||||||
|
In your home directory, you will have .ovpn files. These are the client configuration files. Download them from your server and connect using your favorite OpenVPN client.
|
||||||
|
|
||||||
|
if you change the port this installer change only the server if you use different port in your router port forwarder you have to change .opvn file and modify the port 1194 using the new
|
||||||
|
|
||||||
|
## Example:
|
||||||
|
|
||||||
|
in the OpenVPN use for example port 51194 and public router IP git.patachina.duckdns.org and local IP 192.168.1.4 you have to change also .ovpn file changing 1194 to 51194. In your router open a channel port forwarder with "external port 51194 and local 192.168.1.4 with port 51194"
|
||||||
|
|
||||||
|
Otherwise if you don't change .ovpn you have to set router open a channel port forwarder with "external port 1194 and local 192.168.1.4 with port 51194"
|
||||||
|
|
||||||
|
## How run
|
||||||
|
```bash
|
||||||
|
./openvpn-install.sh
|
||||||
|
Welcome to OpenVPN-install!
|
||||||
|
The git repository is available at: https://github.com/angristan/openvpn-install
|
||||||
|
It seems like OpenVPN is already installed.
|
||||||
|
What would you like to do?
|
||||||
|
1) Add a new user
|
||||||
|
2) Revoke an existing user
|
||||||
|
3) Remove OpenVPN
|
||||||
|
4) Exit
|
||||||
|
Select an option [1-4]:
|
||||||
|
```
|
||||||
|
|
||||||
# openvpn-install
|
# openvpn-install
|
||||||
|
|
||||||
OpenVPN installer for Debian, Ubuntu, Fedora, CentOS and Arch Linux.
|

|
||||||
|

|
||||||
|
[](https://saythanks.io/to/angristan)
|
||||||
|
|
||||||
|
OpenVPN installer for Debian, Ubuntu, Fedora, CentOS, Arch Linux, Oracle Linux, Rocky Linux and AlmaLinux.
|
||||||
|
|
||||||
This script will let you setup your own secure VPN server in just a few seconds.
|
This script will let you setup your own secure VPN server in just a few seconds.
|
||||||
|
|
||||||
You can also check out [wireguard-install](https://github.com/angristan/wireguard-install), a simple installer for a simpler, safer, faster and more modern VPN protocol.
|
You can also check out [wireguard-install](https://github.com/angristan/wireguard-install), a simple installer for a simpler, safer, faster and more modern VPN protocol.
|
||||||
|
|
||||||
|
## What is this?
|
||||||
|
|
||||||
|
This script is meant to be run on your own server, whether it's a VPS or a dedicated server, or even a computer at home.
|
||||||
|
|
||||||
|
Once set up, you will be able to generate client configuration files for every device you want to connect.
|
||||||
|
|
||||||
|
Each client will be able to route its internet traffic through the server, fully encrypted.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
graph LR
|
||||||
|
A[Phone] --> VPN
|
||||||
|
B[Laptop] --> VPN
|
||||||
|
C[Computer] --> VPN
|
||||||
|
|
||||||
|
VPN[OpenVPN Server]
|
||||||
|
|
||||||
|
VPN -->|Encrypted Traffic| I[Internet]
|
||||||
|
```
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
First, get the script and make it executable :
|
First, get the script and make it executable:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
curl -O https://raw.githubusercontent.com/angristan/openvpn-install/master/openvpn-install.sh
|
curl -O https://raw.githubusercontent.com/angristan/openvpn-install/master/openvpn-install.sh
|
||||||
chmod +x openvpn-install.sh
|
chmod +x openvpn-install.sh
|
||||||
```
|
```
|
||||||
|
|
||||||
Then run it :
|
Then run it:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
./openvpn-install.sh
|
./openvpn-install.sh
|
||||||
|
@ -25,7 +92,7 @@ You need to run the script as root and have the TUN module enabled.
|
||||||
|
|
||||||
The first time you run it, you'll have to follow the assistant and answer a few questions to setup your VPN server.
|
The first time you run it, you'll have to follow the assistant and answer a few questions to setup your VPN server.
|
||||||
|
|
||||||
When OpenVPN is installed, you can run the script again, and you will get the choice to :
|
When OpenVPN is installed, you can run the script again, and you will get the choice to:
|
||||||
|
|
||||||
- Add a client
|
- Add a client
|
||||||
- Remove a client
|
- Remove a client
|
||||||
|
@ -33,15 +100,14 @@ When OpenVPN is installed, you can run the script again, and you will get the ch
|
||||||
|
|
||||||
In your home directory, you will have `.ovpn` files. These are the client configuration files. Download them from your server and connect using your favorite OpenVPN client.
|
In your home directory, you will have `.ovpn` files. These are the client configuration files. Download them from your server and connect using your favorite OpenVPN client.
|
||||||
|
|
||||||
If you have any question, head to the [FAQ](#faq) first. Please read everything before opening an issue.
|
If you have any question, head to the [FAQ](#faq) first. And if you need help, you can open a [discussion](https://github.com/angristan/openvpn-install/discussions). Please search existing issues and dicussions first.
|
||||||
|
|
||||||
**PLEASE do net send me emails or private messages asking for help.** The only place to get help is the issues. Other people may be able to help and in the future, other users may also run into the same issue as you. My time is not available for free just for you, you're not special.
|
|
||||||
|
|
||||||
### Headless install
|
### Headless install
|
||||||
|
|
||||||
It's also possible to run the script headless, e.g. without waiting for user input, in an automated manner.
|
It's also possible to run the script headless, e.g. without waiting for user input, in an automated manner.
|
||||||
|
|
||||||
Example usage:
|
Example usage:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
AUTO_INSTALL=y ./openvpn-install.sh
|
AUTO_INSTALL=y ./openvpn-install.sh
|
||||||
|
|
||||||
|
@ -72,11 +138,14 @@ Other variables can be set depending on your choice (encryption, compression). Y
|
||||||
|
|
||||||
Password-protected clients are not supported by the headless installation method since user input is expected by Easy-RSA.
|
Password-protected clients are not supported by the headless installation method since user input is expected by Easy-RSA.
|
||||||
|
|
||||||
|
The headless install is more-or-less idempotent, in that it has been made safe to run multiple times with the same parameters, e.g. by a state provisioner like Ansible/Terraform/Salt/Chef/Puppet. It will only install and regenerate the Easy-RSA PKI if it doesn't already exist, and it will only install OpenVPN and other upstream dependencies if OpenVPN isn't already installed. It will recreate all local config and re-generate the client file on each headless run.
|
||||||
|
|
||||||
### Headless User Addition
|
### Headless User Addition
|
||||||
|
|
||||||
It's also possible to automate the addition of a new user. Here, the key is to provide the (string) value of the `MENU_OPTION` variable along with the remaining mandatory variables before invoking the script.
|
It's also possible to automate the addition of a new user. Here, the key is to provide the (string) value of the `MENU_OPTION` variable along with the remaining mandatory variables before invoking the script.
|
||||||
|
|
||||||
The following Bash script adds a new user `foo` to an existing OpenVPN configuration
|
The following Bash script adds a new user `foo` to an existing OpenVPN configuration
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
export MENU_OPTION="1"
|
export MENU_OPTION="1"
|
||||||
|
@ -105,28 +174,28 @@ export PASS="1"
|
||||||
|
|
||||||
## Compatibility
|
## Compatibility
|
||||||
|
|
||||||
The script supports these OS and architectures:
|
The script supports these Linux distributions:
|
||||||
|
|
||||||
| | i386 | amd64 | armhf | arm64 |
|
| | Support |
|
||||||
| -------------- | ---- | ----- | ----- | ----- |
|
| ------------------ | ------- |
|
||||||
| Amazon Linux 2 | ❔ | ✅ | ❔ | ❔ |
|
| AlmaLinux 8 | ✅ |
|
||||||
| Arch Linux | ❔ | ✅ | ❔ | ✅ |
|
| Amazon Linux 2 | ✅ |
|
||||||
| Centos 8 | ❌ | ✅ | ❔ | ❔ |
|
| Arch Linux | ✅ |
|
||||||
| CentOS 7 | ❔ | ✅ | ❌ | ✅ |
|
| CentOS 7 | ✅ |
|
||||||
| Debian 8 | ✅ | ✅ | ❌ | ❌ |
|
| CentOS Stream >= 8 | ✅ 🤖 |
|
||||||
| Debian 9 | ❌ | ✅ | ✅ | ✅ |
|
| Debian >= 10 | ✅ 🤖 |
|
||||||
| Debian 10 | ❔ | ✅ | ✅ | ❔ |
|
| Fedora >= 35 | ✅ 🤖 |
|
||||||
| Fedora 27 | ❔ | ✅ | ❔ | ❔ |
|
| Oracle Linux 8 | ✅ |
|
||||||
| Fedora 28 | ❔ | ✅ | ❔ | ❔ |
|
| Rocky Linux 8 | ✅ |
|
||||||
| Ubuntu 16.04 | ✅ | ✅ | ❌ | ❌ |
|
| Ubuntu >= 18.04 | ✅ 🤖 |
|
||||||
| Ubuntu 18.04 | ❌ | ✅ | ✅ | ✅ |
|
|
||||||
| Ubuntu 19.04 | ❌ | ✅ | ✅ | ✅ |
|
|
||||||
|
|
||||||
To be noted:
|
To be noted:
|
||||||
|
|
||||||
- It should work on Debian 8+ and Ubuntu 16.04+. But versions not in the table above are not officially supported.
|
- The script is regularly tested against the distributions marked with a 🤖 only.
|
||||||
|
- It's only tested on `amd64` architecture.
|
||||||
|
- It should work on older versions such as Debian 8+, Ubuntu 16.04+ and previous Fedora releases. But versions not in the table above are not officially supported.
|
||||||
|
- It should also support versions between the LTS versions, but these are not tested.
|
||||||
- The script requires `systemd`.
|
- The script requires `systemd`.
|
||||||
- The script is regularly tested against `amd64` only.
|
|
||||||
|
|
||||||
## Fork
|
## Fork
|
||||||
|
|
||||||
|
@ -142,9 +211,9 @@ More Q&A in [FAQ.md](FAQ.md).
|
||||||
|
|
||||||
**A:** I recommend these:
|
**A:** I recommend these:
|
||||||
|
|
||||||
- [Vultr](https://goo.gl/Xyd1Sc): Worldwide locations, IPv6 support, starting at $3.50/month
|
- [Vultr](https://www.vultr.com/?ref=8948982-8H): Worldwide locations, IPv6 support, starting at \$5/month
|
||||||
- [PulseHeberg](https://goo.gl/76yqW5): France, unlimited bandwidth, starting at €3/month
|
- [Hetzner](https://hetzner.cloud/?ref=ywtlvZsjgeDq): Germany, Finland and USA. IPv6, 20 TB of traffic, starting at 4.5€/month
|
||||||
- [Digital Ocean](https://goo.gl/qXrNLK): Worldwide locations, IPv6 support, starting at $5/month
|
- [Digital Ocean](https://m.do.co/c/ed0ba143fe53): Worldwide locations, IPv6 support, starting at \$4/month
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -154,7 +223,7 @@ More Q&A in [FAQ.md](FAQ.md).
|
||||||
|
|
||||||
- Windows: [The official OpenVPN community client](https://openvpn.net/index.php/download/community-downloads.html).
|
- Windows: [The official OpenVPN community client](https://openvpn.net/index.php/download/community-downloads.html).
|
||||||
- Linux: The `openvpn` package from your distribution. There is an [official APT repository](https://community.openvpn.net/openvpn/wiki/OpenvpnSoftwareRepos) for Debian/Ubuntu based distributions.
|
- Linux: The `openvpn` package from your distribution. There is an [official APT repository](https://community.openvpn.net/openvpn/wiki/OpenvpnSoftwareRepos) for Debian/Ubuntu based distributions.
|
||||||
- macOS: [Tunnelblick](https://tunnelblick.net/), [Viscosity](https://www.sparklabs.com/viscosity/).
|
- macOS: [Tunnelblick](https://tunnelblick.net/), [Viscosity](https://www.sparklabs.com/viscosity/), [OpenVPN for Mac](https://openvpn.net/client-connect-vpn-for-mac-os/).
|
||||||
- Android: [OpenVPN for Android](https://play.google.com/store/apps/details?id=de.blinkt.openvpn).
|
- Android: [OpenVPN for Android](https://play.google.com/store/apps/details?id=de.blinkt.openvpn).
|
||||||
- iOS: [The official OpenVPN Connect client](https://itunes.apple.com/us/app/openvpn-connect/id590379981).
|
- iOS: [The official OpenVPN Connect client](https://itunes.apple.com/us/app/openvpn-connect/id590379981).
|
||||||
|
|
||||||
|
@ -174,27 +243,41 @@ More Q&A in [FAQ.md](FAQ.md).
|
||||||
|
|
||||||
More Q&A in [FAQ.md](FAQ.md).
|
More Q&A in [FAQ.md](FAQ.md).
|
||||||
|
|
||||||
## One-stop solutions for public cloud
|
## One-stop solutions for public cloud
|
||||||
|
|
||||||
Solutions that provision a ready to use OpenVPN server based on this script in one go are available for:
|
Solutions that provision a ready to use OpenVPN server based on this script in one go are available for:
|
||||||
|
|
||||||
- AWS using Terraform at [`openvpn-terraform-install`](https://github.com/dumrauf/openvpn-terraform-install)
|
- AWS using Terraform at [`openvpn-terraform-install`](https://github.com/dumrauf/openvpn-terraform-install)
|
||||||
|
- Terraform AWS module [`openvpn-ephemeral`](https://registry.terraform.io/modules/paulmarsicloud/openvpn-ephemeral/aws/latest)
|
||||||
|
|
||||||
|
## Contributing
|
||||||
|
|
||||||
|
## Discuss changes
|
||||||
|
|
||||||
|
Please open an issue before submitting a PR if you want to discuss a change, especially if it's a big one.
|
||||||
|
|
||||||
|
### Code formatting
|
||||||
|
|
||||||
|
We use [shellcheck](https://github.com/koalaman/shellcheck) and [shfmt](https://github.com/mvdan/sh) to enforce bash styling guidelines and good practices. They are executed for each commit / PR with GitHub Actions, so you can check the configuration [here](https://github.com/angristan/openvpn-install/blob/master/.github/workflows/push.yml).
|
||||||
|
|
||||||
## Security and Encryption
|
## Security and Encryption
|
||||||
|
|
||||||
|
> **Warning**
|
||||||
|
> This has not been updated for OpenVPN 2.5 and later.
|
||||||
|
|
||||||
OpenVPN's default settings are pretty weak regarding encryption. This script aims to improve that.
|
OpenVPN's default settings are pretty weak regarding encryption. This script aims to improve that.
|
||||||
|
|
||||||
OpenVPN 2.4 was a great update regarding encryption. It added support for ECDSA, ECDH, AES GCM, NCP and tls-crypt.
|
OpenVPN 2.4 was a great update regarding encryption. It added support for ECDSA, ECDH, AES GCM, NCP and tls-crypt.
|
||||||
|
|
||||||
If you want more information about an option mentioned below, head to the [OpenVPN manual](https://community.openvpn.net/openvpn/wiki/Openvpn24ManPage). It is very complete.
|
If you want more information about an option mentioned below, head to the [OpenVPN manual](https://community.openvpn.net/openvpn/wiki/Openvpn24ManPage). It is very complete.
|
||||||
|
|
||||||
Most of OpenVPN's encryption-related stuff is managed by [Easy-RSA](https://github.com/OpenVPN/easy-rsa). Defaults parameters are in the [vars.example](https://github.com/OpenVPN/easy-rsa/blob/v3.0.6/easyrsa3/vars.example) file.
|
Most of OpenVPN's encryption-related stuff is managed by [Easy-RSA](https://github.com/OpenVPN/easy-rsa). Defaults parameters are in the [vars.example](https://github.com/OpenVPN/easy-rsa/blob/v3.0.7/easyrsa3/vars.example) file.
|
||||||
|
|
||||||
### Compression
|
### Compression
|
||||||
|
|
||||||
By default, OpenVPN doesn't enable compression. This script provides support for LZ0 and LZ4 (v1/v2) algorithms, the latter being more efficient.
|
By default, OpenVPN doesn't enable compression. This script provides support for LZ0 and LZ4 (v1/v2) algorithms, the latter being more efficient.
|
||||||
|
|
||||||
However, it is discouraged to use compression since it since the [VORACLE attack](https://protonvpn.com/blog/voracle-attack/) makes use of it.
|
However, it is discouraged to use compression since the [VORACLE attack](https://protonvpn.com/blog/voracle-attack/) makes use of it.
|
||||||
|
|
||||||
### TLS version
|
### TLS version
|
||||||
|
|
||||||
|
@ -225,17 +308,16 @@ By default, OpenVPN uses `BF-CBC` as the data channel cipher. Blowfish is an old
|
||||||
|
|
||||||
> The default is BF-CBC, an abbreviation for Blowfish in Cipher Block Chaining mode.
|
> The default is BF-CBC, an abbreviation for Blowfish in Cipher Block Chaining mode.
|
||||||
>
|
>
|
||||||
> Using BF-CBC is no longer recommended, because of its 64-bit block size. This small block size allows attacks based on collisions, as demonstrated by SWEET32. See https://community.openvpn.net/openvpn/wiki/SWEET32 for details.
|
> Using BF-CBC is no longer recommended, because of its 64-bit block size. This small block size allows attacks based on collisions, as demonstrated by SWEET32. See <https://community.openvpn.net/openvpn/wiki/SWEET32> for details.
|
||||||
|
> Security researchers at INRIA published an attack on 64-bit block ciphers, such as 3DES and Blowfish. They show that they are able to recover plaintext when the same data is sent often enough, and show how they can use cross-site scripting vulnerabilities to send data of interest often enough. This works over HTTPS, but also works for HTTP-over-OpenVPN. See <https://sweet32.info/> for a much better and more elaborate explanation.
|
||||||
>Security researchers at INRIA published an attack on 64-bit block ciphers, such as 3DES and Blowfish. They show that they are able to recover plaintext when the same data is sent often enough, and show how they can use cross-site scripting vulnerabilities to send data of interest often enough. This works over HTTPS, but also works for HTTP-over-OpenVPN. See https://sweet32.info/ for a much better and more elaborate explanation.
|
|
||||||
>
|
>
|
||||||
> OpenVPN's default cipher, BF-CBC, is affected by this attack.
|
> OpenVPN's default cipher, BF-CBC, is affected by this attack.
|
||||||
|
|
||||||
Indeed, AES is today's standard. It's the fastest and more secure cipher available today. [SEED](https://en.wikipedia.org/wiki/SEED) and [Camellia](https://en.wikipedia.org/wiki/Camellia_(cipher)) are not vulnerable to date but are slower than AES and relatively less trusted.
|
Indeed, AES is today's standard. It's the fastest and more secure cipher available today. [SEED](https://en.wikipedia.org/wiki/SEED) and [Camellia](<https://en.wikipedia.org/wiki/Camellia_(cipher)>) are not vulnerable to date but are slower than AES and relatively less trusted.
|
||||||
|
|
||||||
> Of the currently supported ciphers, OpenVPN currently recommends using AES-256-CBC or AES-128-CBC. OpenVPN 2.4 and newer will also support GCM. For 2.4+, we recommend using AES-256-GCM or AES-128-GCM.
|
> Of the currently supported ciphers, OpenVPN currently recommends using AES-256-CBC or AES-128-CBC. OpenVPN 2.4 and newer will also support GCM. For 2.4+, we recommend using AES-256-GCM or AES-128-GCM.
|
||||||
|
|
||||||
AES-256 is 40% slower than AES-128, and there isn't any real reason to use a 256 bits key over a 128 bits key with AES. (Source : [1](http://security.stackexchange.com/questions/14068/why-most-people-use-256-bit-encryption-instead-of-128-bit),[2](http://security.stackexchange.com/questions/6141/amount-of-simple-operations-that-is-safely-out-of-reach-for-all-humanity/6149#6149)). Moreover, AES-256 is more vulnerable to [Timing attacks](https://en.wikipedia.org/wiki/Timing_attack).
|
AES-256 is 40% slower than AES-128, and there isn't any real reason to use a 256 bits key over a 128 bits key with AES. (Source: [1](http://security.stackexchange.com/questions/14068/why-most-people-use-256-bit-encryption-instead-of-128-bit),[2](http://security.stackexchange.com/questions/6141/amount-of-simple-operations-that-is-safely-out-of-reach-for-all-humanity/6149#6149)). Moreover, AES-256 is more vulnerable to [Timing attacks](https://en.wikipedia.org/wiki/Timing_attack).
|
||||||
|
|
||||||
AES-GCM is an [AEAD cipher](https://en.wikipedia.org/wiki/Authenticated_encryption) which means it simultaneously provides confidentiality, integrity, and authenticity assurances on the data.
|
AES-GCM is an [AEAD cipher](https://en.wikipedia.org/wiki/Authenticated_encryption) which means it simultaneously provides confidentiality, integrity, and authenticity assurances on the data.
|
||||||
|
|
||||||
|
@ -250,7 +332,7 @@ The script supports the following ciphers:
|
||||||
|
|
||||||
And defaults to `AES-128-GCM`.
|
And defaults to `AES-128-GCM`.
|
||||||
|
|
||||||
OpenVPN 2.4 added a feature called "NCP": *Negotiable Crypto Parameters*. It means you can provide a cipher suite like with HTTPS. It is set to `AES-256-GCM:AES-128-GCM` by default and overrides the `--cipher` parameter when used with an OpenVPN 2.4 client. For the sake of simplicity, the script set both the `--cipher` and `--ncp-cipher` to the cipher chosen above.
|
OpenVPN 2.4 added a feature called "NCP": _Negotiable Crypto Parameters_. It means you can provide a cipher suite like with HTTPS. It is set to `AES-256-GCM:AES-128-GCM` by default and overrides the `--cipher` parameter when used with an OpenVPN 2.4 client. For the sake of simplicity, the script set both the `--cipher` and `--ncp-cipher` to the cipher chosen above.
|
||||||
|
|
||||||
### Control channel
|
### Control channel
|
||||||
|
|
||||||
|
@ -311,6 +393,7 @@ About `tls-crypt`:
|
||||||
> Encrypt and authenticate all control channel packets with the key from keyfile. (See --tls-auth for more background.)
|
> Encrypt and authenticate all control channel packets with the key from keyfile. (See --tls-auth for more background.)
|
||||||
>
|
>
|
||||||
> Encrypting (and authenticating) control channel packets:
|
> Encrypting (and authenticating) control channel packets:
|
||||||
|
>
|
||||||
> - provides more privacy by hiding the certificate used for the TLS connection,
|
> - provides more privacy by hiding the certificate used for the TLS connection,
|
||||||
> - makes it harder to identify OpenVPN traffic as such,
|
> - makes it harder to identify OpenVPN traffic as such,
|
||||||
> - provides "poor-man's" post-quantum security, against attackers who will never know the pre-shared key (i.e. no forward secrecy).
|
> - provides "poor-man's" post-quantum security, against attackers who will never know the pre-shared key (i.e. no forward secrecy).
|
||||||
|
@ -323,12 +406,14 @@ The script supports both and uses `tls-crypt` by default.
|
||||||
|
|
||||||
## Say thanks
|
## Say thanks
|
||||||
|
|
||||||
*Sadly saythanks.io doesn't exist anymore... Thanks for the dozens of messages! It's really meaninful to me.*
|
You can [say thanks](https://saythanks.io/to/angristan) if you want!
|
||||||
|
|
||||||
*Still want to help? Check the "sponsor" button at the top of the page!*
|
|
||||||
|
|
||||||
## Credits & Licence
|
## Credits & Licence
|
||||||
|
|
||||||
Many thanks to the [contributors](https://github.com/Angristan/OpenVPN-install/graphs/contributors) and Nyr's original work.
|
Many thanks to the [contributors](https://github.com/Angristan/OpenVPN-install/graphs/contributors) and Nyr's original work.
|
||||||
|
|
||||||
This project is under the [MIT Licence](https://raw.githubusercontent.com/Angristan/openvpn-install/master/LICENSE)
|
This project is under the [MIT Licence](https://raw.githubusercontent.com/Angristan/openvpn-install/master/LICENSE)
|
||||||
|
|
||||||
|
## Star History
|
||||||
|
|
||||||
|
[](https://star-history.com/#angristan/openvpn-install&Date)
|
||||||
|
|
35
Vagrantfile
vendored
35
Vagrantfile
vendored
|
@ -1,35 +0,0 @@
|
||||||
# This Vagrantfile is used to test the script
|
|
||||||
|
|
||||||
# To run the script on all machines, export VAGRANT_AUTOSTART=true
|
|
||||||
autostart_machines = ENV['VAGRANT_AUTOSTART'] == 'true' || false
|
|
||||||
# else, run `vagrant up <hostname>`
|
|
||||||
|
|
||||||
machines = [
|
|
||||||
{ hostname: 'debian-10', box: 'debian/stretch64' },
|
|
||||||
{ hostname: 'debian-9', box: 'debian/stretch64' },
|
|
||||||
{ hostname: 'debian-8', box: 'debian/jessie64' },
|
|
||||||
{ hostname: 'ubuntu-1604', box: 'ubuntu/bionic64' },
|
|
||||||
{ hostname: 'ubuntu-1804', box: 'ubuntu/xenial64' },
|
|
||||||
{ hostname: 'centos-7', box: 'centos/7' },
|
|
||||||
{ hostname: 'fedora-29', box: 'fedora/29-cloud-base' },
|
|
||||||
{ hostname: 'fedora-28', box: 'fedora/28-cloud-base' },
|
|
||||||
{ hostname: 'archlinux', box: 'archlinux/archlinux' }
|
|
||||||
]
|
|
||||||
|
|
||||||
Vagrant.configure('2') do |config|
|
|
||||||
machines.each do |machine|
|
|
||||||
config.vm.provider 'virtualbox' do |v|
|
|
||||||
v.memory = 1024
|
|
||||||
v.cpus = 2
|
|
||||||
end
|
|
||||||
config.vm.define machine[:hostname], autostart: autostart_machines do |machineconfig|
|
|
||||||
machineconfig.vm.hostname = machine[:hostname]
|
|
||||||
machineconfig.vm.box = machine[:box]
|
|
||||||
|
|
||||||
machineconfig.vm.provision 'shell', inline: <<-SHELL
|
|
||||||
AUTO_INSTALL=y /vagrant/openvpn-install.sh
|
|
||||||
ps aux | grep openvpn | grep -v grep > /dev/null 2>&1 && echo "Success: OpenVPN is running" && exit 0 || echo "Failure: OpenVPN is not running" && exit 1
|
|
||||||
SHELL
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
1038
openvpn-install.sh
1038
openvpn-install.sh
File diff suppressed because it is too large
Load diff
Loading…
Reference in a new issue