centos7 openvpn 搭建以及账号密码设置 (针对 easy-rsa 版本为 3.0.6)

olei 5,970 views 8

之前有一篇搭建 openvpn 的文章,很久以前写的了,easy-rsa 版本是 2 的吧,这里一篇 3.0.6 的教程奉上,之前的教程链接如下:https://iicats.com/181/

2,0 的配置过程有什么问题,我忘记了,可能回答不上来,这个 3.0.6 的近期给公司搭建了,很多人在用,没什么问题;各位搭建中遇到什么问题直接留言吧,或者邮件也可以~

安装阶段

添加源

Shell
  1. mv /etc/yum.repos.d/CentOS-Base.repo /etc/yum.repos.d/CentOS-Base.repo.backup
  2. wget -O /etc/yum.repos.d/CentOS-Base.repo http://mirrors.aliyun.com/repo/Centos-7.repo
  3. mv /etc/yum.repos.d/epel.repo /etc/yum.repos.d/epel.repo.backup
  4. mv /etc/yum.repos.d/epel-testing.repo /etc/yum.repos.d/epel-testing.repo.backup
  5. wget -O /etc/yum.repos.d/epel.repo http://mirrors.aliyun.com/repo/epel-7.repo
复制 文本 高亮

安装 openvpneasy-rsa(easy-rsa 版本为 3.0.6 为例)

Shell
  1. yum install -y openvpn easy-rsa
复制 文本 高亮

配置阶段

配置 easy-rsa3.0

Shell
  1. cp -r /usr/share/easy-rsa/ /etc/openvpn/easy-rsa
  2. cd /etc/openvpn/easy-rsa/
  3. cd 3.0.6/
  4. find / -type f -name "vars.example" | xargs -i cp {} . && mv vars.example vars
复制 文本 高亮

这里说明一下,正常来说 easy-rsa-3.0.6 安装完之后,vars.example 文件在 /usr/share/doc/easy-rsa-3.0.6/ 目录,至于有些人说找不到这个文件,我暂时还没遇到过,可能你的安装方式和我不一致,或版本不同

创建一个新的 PKICA

Shell
  1. $ pwd
  2. /etc/openvpn/easy-rsa/3.0.6
  3. ---
  4. $ ./easyrsa init-pki # 创建空的 pki
  5. Note: using Easy-RSA configuration from: ./vars
  6.  
  7. init-pki complete; you may now create a CA or requests.
  8. Your newly created PKI dir is: /etc/openvpn/easy-rsa/3.0.6/pki
  9. ---
  10. $ ./easyrsa build-ca nopass #创建新的 CA,不使用密码
  11. Note: using Easy-RSA configuration from: ./vars
  12. Generating a 2048 bit RSA private key
  13. ......................+++
  14. ................................................+++
  15. writing new private key to '/etc/openvpn/easy-rsa/3.0.6/pki/private/ca.key.pClvaQ1GLD'
  16. -----
  17. You are about to be asked to enter information that will be incorporated
  18. into your certificate request.
  19. What you are about to enter is what is called a Distinguished Name or a DN.
  20. There are quite a few fields but you can leave some blank
  21. For some fields there will be a default value,
  22. If you enter '.', the field will be left blank.
  23. -----
  24. Common Name (eg: your user, host, or server name) [Easy-RSA CA]: 回车
  25.  
  26. CA creation complete and you may now import and sign cert requests.
  27. Your new CA certificate file for publishing is at:
  28. /etc/openvpn/easy-rsa/3.0.6/pki/ca.crt
复制 文本 高亮

创建服务端证书

Shell
  1. $ pwd
  2. /etc/openvpn/easy-rsa/3.0.6
  3. ---
  4. $ ./easyrsa gen-req server nopass
  5. Note: using Easy-RSA configuration from: ./vars
  6. Generating a 2048 bit RSA private key
  7. ...........................+++
  8. ..............................................................................+++
  9. writing new private key to '/etc/openvpn/easy-rsa/3.0.6/pki/private/server.key.wy7Q0fuG6A'
  10. -----
  11. You are about to be asked to enter information that will be incorporated
  12. into your certificate request.
  13. What you are about to enter is what is called a Distinguished Name or a DN.
  14. There are quite a few fields but you can leave some blank
  15. For some fields there will be a default value,
  16. If you enter '.', the field will be left blank.
  17. -----
  18. Common Name (eg: your user, host, or server name) [server]: 回车
  19.  
  20. Keypair and certificate request completed. Your files are:
  21. req: /etc/openvpn/easy-rsa/3.0.6/pki/reqs/server.req
  22. key: /etc/openvpn/easy-rsa/3.0.6/pki/private/server.key
复制 文本 高亮

签约服务端证书

Shell
  1. $ pwd
  2. /etc/openvpn/easy-rsa/3.0.6
  3. ---
  4. $ ./easyrsa sign server server
  5.  
  6. Note: using Easy-RSA configuration from: ./vars
  7.  
  8.  
  9. You are about to sign the following certificate.
  10. Please check over the details shown below for accuracy. Note that this request
  11. has not been cryptographically verified. Please be sure it came from a trusted
  12. source or that you have verified the request checksum with the sender.
  13.  
  14. Request subject, to be signed as a server certificate for 3650 days:
  15.  
  16. subject=
  17. commonName = server
  18.  
  19.  
  20. Type the word 'yes' to continue, or any other input to abort.
  21. Confirm request details: yes
  22. Using configuration from ./openssl-1.0.cnf
  23. Check that the request matches the signature
  24. Signature ok
  25. The Subject's Distinguished Name is as follows
  26. commonName :ASN.1 12:'server'
  27. Certificate is to be certified until Apr 7 14:54:08 2028 GMT (3650 days)
  28.  
  29. Write out database with 1 new entries
  30. Data Base Updated
  31.  
  32. Certificate created at: /etc/openvpn/easy-rsa/3.0.6/pki/issued/server.crt
复制 文本 高亮

创建 Diffie-Hellman

Shell
  1. $ pwd
  2. /etc/openvpn/easy-rsa/3.0.6
  3. ---
  4. $ ./easyrsa gen-dh
  5.  
  6. ............................................................
  7. DH parameters of size 2048 created at /etc/openvpn/easy-rsa/3.0.6/pki/dh.pem
复制 文本 高亮

创建客户端证书

  • 复制文件
Shell
  1. $ cp -r /usr/share/easy-rsa/ /etc/openvpn/client/easy-rsa
  2. $ cd /etc/openvpn/client/easy-rsa/
  3. $ cd 3.0.6/
  4. $ find / -type f -name "vars.example" | xargs -i cp {} . && mv vars.example vars
复制 文本 高亮
  • 生成证书
Shell
  1. $ pwd
  2. /etc/openvpn/client/easy-rsa/3.0.6
  3. ---
  4. $ ./easyrsa init-pki #创建新的 pki
  5.  
  6. Note: using Easy-RSA configuration from: ./vars
  7.  
  8. init-pki complete; you may now create a CA or requests.
  9. Your newly created PKI dir is: /etc/openvpn/client/easy-rsa/3.0.6/pki
  10. ---
  11. $ ./easyrsa gen-req eicas nopass #客户证书名为 eicas,木有密码
  12.  
  13. Note: using Easy-RSA configuration from: ./vars
  14. Generating a 2048 bit RSA private key
  15. ....................................................+++
  16. ............+++
  17. writing new private key to '/etc/openvpn/client/easy-rsa/3.0.6/pki/private/eicas.key.FkrLzXH9Bm'
  18. -----
  19. You are about to be asked to enter information that will be incorporated
  20. into your certificate request.
  21. What you are about to enter is what is called a Distinguished Name or a DN.
  22. There are quite a few fields but you can leave some blank
  23. For some fields there will be a default value,
  24. If you enter '.', the field will be left blank.
  25. -----
  26. Common Name (eg: your user, host, or server name) [eicas]: 回车
  27.  
  28. Keypair and certificate request completed. Your files are:
  29. req: /etc/openvpn/client/easy-rsa/3.0.3/pki/reqs/eicas.req
  30. key: /etc/openvpn/client/easy-rsa/3.0.3/pki/private/eicas.key
复制 文本 高亮
  • 最后签约客户端证书
Shell
  1. $ cd /etc/openvpn/easy-rsa/3.0.6/
  2. $ pwd
  3. /etc/openvpn/easy-rsa/3.0.6
  4. ---
  5.  
  6. $ ./easyrsa import-req /etc/openvpn/client/easy-rsa/3.0.6/pki/reqs/eicas.req eicas
  7.  
  8. Note: using Easy-RSA configuration from: ./vars
  9.  
  10. The request has been successfully imported with a short name of: eicas
  11. You may now use this name to perform signing operations on this request.
  12. ---
  13.  
  14. $ ./easyrsa sign client eicas
  15.  
  16. Note: using Easy-RSA configuration from: ./vars
  17.  
  18.  
  19. You are about to sign the following certificate.
  20. Please check over the details shown below for accuracy. Note that this request
  21. has not been cryptographically verified. Please be sure it came from a trusted
  22. source or that you have verified the request checksum with the sender.
  23.  
  24. Request subject, to be signed as a client certificate for 3650 days:
  25.  
  26. subject=
  27. commonName = eicas
  28.  
  29.  
  30. Type the word 'yes' to continue, or any other input to abort.
  31. Confirm request details: yes
  32. Using configuration from ./openssl-1.0.cnf
  33. Check that the request matches the signature
  34. Signature ok
  35. The Subject's Distinguished Name is as follows
  36. commonName :ASN.1 12:'eicas'
  37. Certificate is to be certified until Apr 8 01:54:57 2028 GMT (3650 days)
  38.  
  39. Write out database with 1 new entries
  40. Data Base Updated
  41.  
  42. Certificate created at: /etc/openvpn/easy-rsa/3.0.6/pki/issued/eicas.crt
复制 文本 高亮

整理证书

现在所有的证书都已经生成完了,下面来整理一下。

  • 服务端所需要的文件
Shell
  1. $ mkdir /etc/openvpn/certs
  2. $ cd /etc/openvpn/certs/
  3. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/dh.pem .
  4. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/ca.crt .
  5. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/issued/server.crt .
  6. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/private/server.key .
  7. $ ll
  8. ---
  9. 总用量 20
  10. -rw-------. 1 root root 1172 4 11 10:02 ca.crt
  11. -rw-------. 1 root root 424 4 11 10:03 dh.pem
  12. -rw-------. 1 root root 4547 4 11 10:03 server.crt
  13. -rw-------. 1 root root 1704 4 11 10:02 server.key
复制 文本 高亮
  • 客户端所需的文件
Shell
  1. $ mkdir /etc/openvpn/client/eicas/
  2. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/ca.crt /etc/openvpn/client/eicas/
  3. $ cp /etc/openvpn/easy-rsa/3.0.6/pki/issued/eicas.crt /etc/openvpn/client/eicas/
  4. $ cp /etc/openvpn/client/easy-rsa/3.0.6/pki/private/eicas.key /etc/openvpn/client/eicas/
  5. $ ll /etc/openvpn/client/eicas/
  6. ---
  7. total 16
  8. -rw------- 1 root root 1147 Feb 11 10:08 ca.crt
  9. -rw------- 1 root root 4403 Feb 11 10:08 eicas.crt
  10. -rw------- 1 root root 1708 Feb 11 10:09 eicas.key
复制 文本 高亮

配置 server.conf

Shell
  1. local 0.0.0.0
  2. port 1194 #指定端口
  3. proto tcp #指定协议 (可以指定 udp,udp 比 tcp 快)
  4. dev tun
  5.  
  6. ca /etc/openvpn/certs/ca.crt
  7. cert /etc/openvpn/certs/server.crt
  8. key /etc/openvpn/certs/server.key
  9. dh /etc/openvpn/certs/dh.pem
  10.  
  11. server 10.8.0.0 255.255.255.0 #给客户端分配的地址池
  12. ifconfig-pool-persist /etc/openvpn/ipp.txt
  13. push "route 192.168.252.0 255.255.0.0" # route 根据实际情况修改
  14. push "redirect-gateway def1 bypass-dhcp" #客户端网关使用 openvpn 服务器网关
  15. push "dhcp-option DNS 8.8.8.8" #指定 dns
  16. push "dhcp-option DNS 114.114.114.114"
  17. client-to-client
  18.  
  19. keepalive 10 120 #心跳检测,10 秒检测一次,2 分钟内没有回应则视为断线
  20. #tls-auth ta.key 0 #服务端值为 0,客户端为 1
  21. cipher AES-256-CBC
  22. comp-lzo
  23. #传输数据压缩
  24. persist-key
  25. persist-tun
  26. status openvpn-status.log
  27. log-append openvpn.log
  28. verb 3
  29. mute 20
复制 文本 高亮

开启 IP 转发

Shell
  1. $ vim /etc/sysctl.conf
  2. # 添加:
  3. net.ipv4.ip_forward=1
  4.  
  5. # 生效
  6. $ sysctl -p
复制 文本 高亮

iptables 设置

Shell
  1. $ iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -j MASQUERADE
  2. $ iptables-save > /etc/openvpn-rule
  3. $ cd /etc/
  4. $ iptables-restore < openvpn-rule
复制 文本 高亮

启动 openvpn

Shell
  1. $ systemctl start openvpn@server
  2. $ systemctl enable openvpn@server
复制 文本 高亮

客户端准备

客户端连接工具

可能有的涉及到科学上网或者国外网速下载很慢,下面提供我的对象存储下载链接:

客户端.ovpn 文件制作

(这里使用把证书内容写入.ovpn 里面,当然在配置文件中写入路径也没问题)

  • 客户端所需要的证书路径如下
Shell
  1. ll /etc/openvpn/client/eicas/
  2. ---
  3. total 16
  4. -rw------- 1 root root 1147 Feb 11 10:08 ca.crt
  5. -rw------- 1 root root 4403 Feb 11 10:08 eicas.crt
  6. -rw------- 1 root root 1708 Feb 11 10:09 eicas.key
复制 文本 高亮
  • 本地编辑 client.ovpn
Source Code
  1. client
  2. proto tcp
  3. dev tun
  4. remote xxx.xxx.xxx.xxx 1194 # 服务端公网 IP,默认端口是 1194
  5.  
  6. # 此处 [inline] 也可以写下载下来本地的客户端各个证书的路径
  7. ca [inline]
  8. cert [inline]
  9. key [inline]
  10.  
  11. resolv-retry infinite
  12. nobind
  13. mute-replay-warnings
  14.  
  15. keepalive 20 120
  16. comp-lzo
  17. #user openvpn
  18. #group openvpn
  19.  
  20. persist-key
  21. persist-tun
  22. status openvpn-status.log
  23. log-append openvpn.log
  24. verb 3
  25. mute 20
  26.  
  27. <ca>
  28. ca 证书的内容粘贴此处
  29. </ca>
  30.  
  31. <cert>
  32. crt 证书内容粘贴此处
  33. </cert>
  34.  
  35. <key>
  36. 秘钥内容粘贴此处
  37. </key>
复制 文本 高亮

openvpn gui 使用

  • 直接打开软件,导入上述写的.ovpn 文件即可,成功的话,会有提示
  • mac 的那个也是导入就行了,具体还是不会可以百度一下

账号密码设置

开启服务端账号密码登录配置

  • 编辑服务端 server.conf 文件
Shell
  1. $ vim /etc/openvpn/server.conf
  2. # 添加如下内容
  3. # use username and password login
  4. script-security 3
  5. auth-user-pass-verify /etc/openvpn/checkpsw.sh via-env
  6. client-cert-not-required
  7. username-as-common-name
复制 文本 高亮
  • 添加密码检查脚本 checkpsw.sh
Shell
  1. $ vim /etc/openvpn/checkpsw.sh
  2. ---
  3. #!/bin/sh
  4. ###########################################################
  5. #
  6. # This script will authenticate OpenVPN users against
  7. # a plain text file. The passfile should simply contain
  8. # one row per user with the username first followed by
  9. # one or more space(s) or tab(s) and then the password.
  10. PASSFILE="/etc/openvpn/psw-file" # 账号密码的路径
  11. LOG_FILE="/etc/openvpn/openvpn-password.log" # 账号密码的日志
  12. TIME_STAMP=`date "+%Y-%m-%d %T"`
  13. ###########################################################
  14. if [ ! -r "${PASSFILE}" ]; then
  15. echo "${TIME_STAMP}: Could not open password file \"${PASSFILE}\" for reading." >> ${LOG_FILE}
  16. exit 1
  17. fi
  18. CORRECT_PASSWORD=`awk '!/^;/&&!/^#/&&$1=="'${username}'"{print $2;exit}' ${PASSFILE}`
  19. if [ "${CORRECT_PASSWORD}" = "" ]; then
  20. echo "${TIME_STAMP}: User does not exist: username=\"${username}\", password=\"${password}\"." >> ${LOG_FILE}
  21. exit 1
  22. fi
  23. if [ "${password}" = "${CORRECT_PASSWORD}" ]; then
  24. echo "${TIME_STAMP}: Successful authentication: username=\"${username}\"." >> ${LOG_FILE}
  25. exit 0
  26. fi
  27. echo "${TIME_STAMP}: Incorrect password: username=\"${username}\", password=\"${password}\"." >> ${LOG_FILE}
  28. exit 1
复制 文本 高亮
  • 添加账号密码
Shell
  1. $ vim /etc/openvpn/psw-file
  2. # 账号+空格+密码的形式,例如:
  3.  
  4. test 123456
复制 文本 高亮
  • 重启 openvpn
Shell
  1. systemctl restart openvpn@server
复制 文本 高亮

设置客户端.ovpn 密码账号登录内容

  • 编辑之前创建的 client.ovpn 文件,添加一行:
Source Code
  1. auth-user-pass
复制 文本 高亮
  • 完整如下
Source Code
  1. client
  2. proto tcp
  3. dev tun
  4. remote xxx.xxx.xxx.xxx 1194 # 服务端公网 IP,默认端口是 1194
  5.  
  6. # 此处 [inline] 也可以写下载下来本地的客户端各个证书的路径
  7. ca [inline]
  8. cert [inline]
  9. key [inline]
  10.  
  11. resolv-retry infinite
  12. nobind
  13. mute-replay-warnings
  14.  
  15. keepalive 20 120
  16. comp-lzo
  17. #user openvpn
  18. #group openvpn
  19.  
  20. persist-key
  21. persist-tun
  22. status openvpn-status.log
  23. log-append openvpn.log
  24. verb 3
  25. auth-user-pass
  26. mute 20
  27.  
  28. <ca>
  29. ca 证书的内容粘贴此处
  30. </ca>
  31. crt 证书内容粘贴此处
  32. <cert>
  33.  
  34. </cert>
  35.  
  36. <key>
  37. 秘钥内容粘贴此处
  38. </key>
复制 文本 高亮

之后重新连接即可

Windows 10 运行成功效果图

centos7 openvpn搭建以及账号密码设置(针对easy-rsa版本为3.0.6)

centos7 openvpn搭建以及账号密码设置(针对easy-rsa版本为3.0.6)

自动化安装脚本

  • 支持自动化安装、自动化生成客户端配置文件
  • 支持新增客户端配置文件
  • 支持移除客户端配置文件
  • 支持卸载服务端
  • 不支持多用户支持 (可自行修改程序实现)
Shell
  1. #!/bin/bash
  2.  
  3.  
  4. # Detect Debian users running the script with "sh" instead of bash
  5. if readlink /proc/$$/exe | grep -q "dash"; then
  6. echo 'This installer needs to be run with "bash", not "sh".'
  7. exit
  8. fi
  9.  
  10. # Discard stdin. Needed when running from an one-liner which includes a newline
  11. read -N 999999 -t 0.001
  12.  
  13. # Detect OpenVZ 6
  14. if [[ $(uname -r | cut -d "." -f 1) -eq 2 ]]; then
  15. echo "The system is running an old kernel, which is incompatible with this installer."
  16. exit
  17. fi
  18.  
  19. # Detect OS
  20. # $os_version variables aren't always in use, but are kept here for convenience
  21. if grep -qs "ubuntu" /etc/os-release; then
  22. os="ubuntu"
  23. os_version=$(grep 'VERSION_ID' /etc/os-release | cut -d '"' -f 2 | tr -d '.')
  24. group_name="nogroup"
  25. elif [[ -e /etc/debian_version ]]; then
  26. os="debian"
  27. os_version=$(grep -oE '[0-9]+' /etc/debian_version | head -1)
  28. group_name="nogroup"
  29. elif [[ -e /etc/centos-release ]]; then
  30. os="centos"
  31. os_version=$(grep -oE '[0-9]+' /etc/centos-release | head -1)
  32. group_name="nobody"
  33. elif [[ -e /etc/fedora-release ]]; then
  34. os="fedora"
  35. os_version=$(grep -oE '[0-9]+' /etc/fedora-release | head -1)
  36. group_name="nobody"
  37. else
  38. echo "This installer seems to be running on an unsupported distribution.
  39. Supported distributions are Ubuntu, Debian, CentOS, and Fedora."
  40. exit
  41. fi
  42.  
  43. if [[ "$os" == "ubuntu" && "$os_version" -lt 1804 ]]; then
  44. echo "Ubuntu 18.04 or higher is required to use this installer.
  45. This version of Ubuntu is too old and unsupported."
  46. exit
  47. fi
  48.  
  49. if [[ "$os" == "debian" && "$os_version" -lt 9 ]]; then
  50. echo "Debian 9 or higher is required to use this installer.
  51. This version of Debian is too old and unsupported."
  52. exit
  53. fi
  54.  
  55. if [[ "$os" == "centos" && "$os_version" -lt 7 ]]; then
  56. echo "CentOS 7 or higher is required to use this installer.
  57. This version of CentOS is too old and unsupported."
  58. exit
  59. fi
  60.  
  61. # Detect environments where $PATH does not include the sbin directories
  62. if ! grep -q sbin <<< "$PATH"; then
  63. echo '$PATH does not include sbin. Try using "su -" instead of "su".'
  64. exit
  65. fi
  66.  
  67. if [[ "$EUID" -ne 0 ]]; then
  68. echo "This installer needs to be run with superuser privileges."
  69. exit
  70. fi
  71.  
  72. if [[ ! -e /dev/net/tun ]] || ! ( exec 7<>/dev/net/tun ) 2>/dev/null; then
  73. echo "The system does not have the TUN device available.
  74. TUN needs to be enabled before running this installer."
  75. exit
  76. fi
  77.  
  78. new_client () {
  79. # Generates the custom client.ovpn
  80. {
  81. cat /etc/openvpn/server/client-common.txt
  82. echo "<ca>"
  83. cat /etc/openvpn/server/easy-rsa/pki/ca.crt
  84. echo "</ca>"
  85. echo "<cert>"
  86. sed -ne '/BEGIN CERTIFICATE/,$ p' /etc/openvpn/server/easy-rsa/pki/issued/"$client".crt
  87. echo "</cert>"
  88. echo "<key>"
  89. cat /etc/openvpn/server/easy-rsa/pki/private/"$client".key
  90. echo "</key>"
  91. echo "<tls-crypt>"
  92. sed -ne '/BEGIN OpenVPN Static key/,$ p' /etc/openvpn/server/tc.key
  93. echo "</tls-crypt>"
  94. } > ~/"$client".ovpn
  95. }
  96.  
  97. if [[ ! -e /etc/openvpn/server/server.conf ]]; then
  98. clear
  99. echo 'Welcome to this OpenVPN road warrior installer!'
  100. # If system has a single IPv4, it is selected automatically. Else, ask the user
  101. if [[ $(ip -4 addr | grep inet | grep -vEc '127(\.[0-9]{1,3}){3}') -eq 1 ]]; then
  102. ip=$(ip -4 addr | grep inet | grep -vE '127(\.[0-9]{1,3}){3}' | cut -d '/' -f 1 | grep -oE '[0-9]{1,3}(\.[0-9]{1,3}){3}')
  103. else
  104. number_of_ip=$(ip -4 addr | grep inet | grep -vEc '127(\.[0-9]{1,3}){3}')
  105. echo
  106. echo "Which IPv4 address should be used?"
  107. ip -4 addr | grep inet | grep -vE '127(\.[0-9]{1,3}){3}' | cut -d '/' -f 1 | grep -oE '[0-9]{1,3}(\.[0-9]{1,3}){3}' | nl -s ') '
  108. read -p "IPv4 address [1]: " ip_number
  109. until [[ -z "$ip_number" || "$ip_number" =~ ^[0-9]+$ && "$ip_number" -le "$number_of_ip" ]]; do
  110. echo "$ip_number: invalid selection."
  111. read -p "IPv4 address [1]: " ip_number
  112. done
  113. [[ -z "$ip_number" ]] && ip_number="1"
  114. ip=$(ip -4 addr | grep inet | grep -vE '127(\.[0-9]{1,3}){3}' | cut -d '/' -f 1 | grep -oE '[0-9]{1,3}(\.[0-9]{1,3}){3}' | sed -n "$ip_number"p)
  115. fi
  116. # If $ip is a private IP address, the server must be behind NAT
  117. if echo "$ip" | grep -qE '^(10\.|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.|192\.168)'; then
  118. echo
  119. echo "This server is behind NAT. What is the public IPv4 address or hostname?"
  120. # Get public IP and sanitize with grep
  121. get_public_ip=$(grep -m 1 -oE '^[0-9]{1,3}(\.[0-9]{1,3}){3}$' <<< "$(wget -T 10 -t 1 -4qO- "http://ip1.dynupdate.no-ip.com/" || curl -m 10 -4Ls "http://ip1.dynupdate.no-ip.com/")")
  122. read -p "Public IPv4 address / hostname [$get_public_ip]: " public_ip
  123. # If the checkip service is unavailable and user didn't provide input, ask again
  124. until [[ -n "$get_public_ip" || -n "$public_ip" ]]; do
  125. echo "Invalid input."
  126. read -p "Public IPv4 address / hostname: " public_ip
  127. done
  128. [[ -z "$public_ip" ]] && public_ip="$get_public_ip"
  129. fi
  130. # If system has a single IPv6, it is selected automatically
  131. if [[ $(ip -6 addr | grep -c 'inet6 [23]') -eq 1 ]]; then
  132. ip6=$(ip -6 addr | grep 'inet6 [23]' | cut -d '/' -f 1 | grep -oE '([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}')
  133. fi
  134. # If system has multiple IPv6, ask the user to select one
  135. if [[ $(ip -6 addr | grep -c 'inet6 [23]') -gt 1 ]]; then
  136. number_of_ip6=$(ip -6 addr | grep -c 'inet6 [23]')
  137. echo
  138. echo "Which IPv6 address should be used?"
  139. ip -6 addr | grep 'inet6 [23]' | cut -d '/' -f 1 | grep -oE '([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}' | nl -s ') '
  140. read -p "IPv6 address [1]: " ip6_number
  141. until [[ -z "$ip6_number" || "$ip6_number" =~ ^[0-9]+$ && "$ip6_number" -le "$number_of_ip6" ]]; do
  142. echo "$ip6_number: invalid selection."
  143. read -p "IPv6 address [1]: " ip6_number
  144. done
  145. [[ -z "$ip6_number" ]] && ip6_number="1"
  146. ip6=$(ip -6 addr | grep 'inet6 [23]' | cut -d '/' -f 1 | grep -oE '([0-9a-fA-F]{0,4}:){1,7}[0-9a-fA-F]{0,4}' | sed -n "$ip6_number"p)
  147. fi
  148. echo
  149. echo "Which protocol should OpenVPN use?"
  150. echo " 1) UDP (recommended)"
  151. echo " 2) TCP"
  152. read -p "Protocol [1]: " protocol
  153. until [[ -z "$protocol" || "$protocol" =~ ^[12]$ ]]; do
  154. echo "$protocol: invalid selection."
  155. read -p "Protocol [1]: " protocol
  156. done
  157. case "$protocol" in
  158. 1|"")
  159. protocol=udp
  160. ;;
  161. 2)
  162. protocol=tcp
  163. ;;
  164. esac
  165. echo
  166. echo "What port should OpenVPN listen to?"
  167. read -p "Port [1194]: " port
  168. until [[ -z "$port" || "$port" =~ ^[0-9]+$ && "$port" -le 65535 ]]; do
  169. echo "$port: invalid port."
  170. read -p "Port [1194]: " port
  171. done
  172. [[ -z "$port" ]] && port="1194"
  173. echo
  174. echo "Select a DNS server for the clients:"
  175. echo " 1) Current system resolvers"
  176. echo " 2) Google"
  177. echo " 3) 1.1.1.1"
  178. echo " 4) OpenDNS"
  179. echo " 5) Quad9"
  180. echo " 6) AdGuard"
  181. read -p "DNS server [1]: " dns
  182. until [[ -z "$dns" || "$dns" =~ ^[1-6]$ ]]; do
  183. echo "$dns: invalid selection."
  184. read -p "DNS server [1]: " dns
  185. done
  186. echo
  187. echo "Enter a name for the first client:"
  188. read -p "Name [client]: " unsanitized_client
  189. # Allow a limited set of characters to avoid conflicts
  190. client=$(sed 's/[^0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ_-]/_/g' <<< "$unsanitized_client")
  191. [[ -z "$client" ]] && client="client"
  192. echo
  193. echo "OpenVPN installation is ready to begin."
  194. # Install a firewall in the rare case where one is not already available
  195. if ! systemctl is-active --quiet firewalld.service && ! hash iptables 2>/dev/null; then
  196. if [[ "$os" == "centos" || "$os" == "fedora" ]]; then
  197. firewall="firewalld"
  198. # We don't want to silently enable firewalld, so we give a subtle warning
  199. # If the user continues, firewalld will be installed and enabled during setup
  200. echo "firewalld, which is required to manage routing tables, will also be installed."
  201. elif [[ "$os" == "debian" || "$os" == "ubuntu" ]]; then
  202. # iptables is way less invasive than firewalld so no warning is given
  203. firewall="iptables"
  204. fi
  205. fi
  206. read -n1 -r -p "Press any key to continue..."
  207. # If running inside a container, disable LimitNPROC to prevent conflicts
  208. if systemd-detect-virt -cq; then
  209. mkdir /etc/systemd/system/openvpn-server@server.service.d/ 2>/dev/null
  210. echo "[Service]
  211. LimitNPROC=infinity" > /etc/systemd/system/openvpn-server@server.service.d/disable-limitnproc.conf
  212. fi
  213. if [[ "$os" = "debian" || "$os" = "ubuntu" ]]; then
  214. apt-get update
  215. apt-get install -y openvpn openssl ca-certificates $firewall
  216. elif [[ "$os" = "centos" ]]; then
  217. yum install -y epel-release
  218. yum install -y openvpn openssl ca-certificates tar $firewall
  219. else
  220. # Else, OS must be Fedora
  221. dnf install -y openvpn openssl ca-certificates tar $firewall
  222. fi
  223. # If firewalld was just installed, enable it
  224. if [[ "$firewall" == "firewalld" ]]; then
  225. systemctl enable --now firewalld.service
  226. fi
  227. # Get easy-rsa
  228. easy_rsa_url='https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.8/EasyRSA-3.0.8.tgz'
  229. mkdir -p /etc/openvpn/server/easy-rsa/
  230. { wget -qO- "$easy_rsa_url" 2>/dev/null || curl -sL "$easy_rsa_url" ; } | tar xz -C /etc/openvpn/server/easy-rsa/ --strip-components 1
  231. chown -R root:root /etc/openvpn/server/easy-rsa/
  232. cd /etc/openvpn/server/easy-rsa/
  233. # Create the PKI, set up the CA and the server and client certificates
  234. ./easyrsa init-pki
  235. ./easyrsa --batch build-ca nopass
  236. EASYRSA_CERT_EXPIRE=3650 ./easyrsa build-server-full server nopass
  237. EASYRSA_CERT_EXPIRE=3650 ./easyrsa build-client-full "$client" nopass
  238. EASYRSA_CRL_DAYS=3650 ./easyrsa gen-crl
  239. # Move the stuff we need
  240. cp pki/ca.crt pki/private/ca.key pki/issued/server.crt pki/private/server.key pki/crl.pem /etc/openvpn/server
  241. # CRL is read with each client connection, while OpenVPN is dropped to nobody
  242. chown nobody:"$group_name" /etc/openvpn/server/crl.pem
  243. # Without +x in the directory, OpenVPN can't run a stat() on the CRL file
  244. chmod o+x /etc/openvpn/server/
  245. # Generate key for tls-crypt
  246. openvpn --genkey --secret /etc/openvpn/server/tc.key
  247. # Create the DH parameters file using the predefined ffdhe2048 group
  248. echo '-----BEGIN DH PARAMETERS-----
  249. MIIBCAKCAQEA//////////+t+FRYortKmq/cViAnPTzx2LnFg84tNpWp4TZBFGQz
  250. +8yTnc4kmz75fS/jY2MMddj2gbICrsRhetPfHtXV/WVhJDP1H18GbtCFY2VVPe0a
  251. 87VXE15/V8k1mE8McODmi3fipona8+/och3xWKE2rec1MKzKT0g6eXq8CrGCsyT7
  252. YdEIqUuyyOP7uWrat2DX9GgdT0Kj3jlN9K5W7edjcrsZCwenyO4KbXCeAvzhzffi
  253. 7MA0BM0oNC9hkXL+nOmFg/+OTxIy7vKBg8P+OxtMb61zO7X8vC7CIAXFjvGDfRaD
  254. ssbzSibBsu/6iGtCOGEoXJf//////////wIBAg==
  255. -----END DH PARAMETERS-----' > /etc/openvpn/server/dh.pem
  256. # Generate server.conf
  257. echo "local $ip
  258. port $port
  259. proto $protocol
  260. dev tun
  261. ca ca.crt
  262. cert server.crt
  263. key server.key
  264. dh dh.pem
  265. auth SHA512
  266. tls-crypt tc.key
  267. topology subnet
  268. server 10.8.0.0 255.255.255.0" > /etc/openvpn/server/server.conf
  269. # IPv6
  270. if [[ -z "$ip6" ]]; then
  271. echo 'push "redirect-gateway def1 bypass-dhcp"' >> /etc/openvpn/server/server.conf
  272. else
  273. echo 'server-ipv6 fddd:1194:1194:1194::/64' >> /etc/openvpn/server/server.conf
  274. echo 'push "redirect-gateway def1 ipv6 bypass-dhcp"' >> /etc/openvpn/server/server.conf
  275. fi
  276. echo 'ifconfig-pool-persist ipp.txt' >> /etc/openvpn/server/server.conf
  277. # DNS
  278. case "$dns" in
  279. 1|"")
  280. # Locate the proper resolv.conf
  281. # Needed for systems running systemd-resolved
  282. if grep -q '^nameserver 127.0.0.53' "/etc/resolv.conf"; then
  283. resolv_conf="/run/systemd/resolve/resolv.conf"
  284. else
  285. resolv_conf="/etc/resolv.conf"
  286. fi
  287. # Obtain the resolvers from resolv.conf and use them for OpenVPN
  288. grep -v '^#\|^;' "$resolv_conf" | grep '^nameserver' | grep -oE '[0-9]{1,3}(\.[0-9]{1,3}){3}' | while read line; do
  289. echo "push \"dhcp-option DNS $line\"" >> /etc/openvpn/server/server.conf
  290. done
  291. ;;
  292. 2)
  293. echo 'push "dhcp-option DNS 8.8.8.8"' >> /etc/openvpn/server/server.conf
  294. echo 'push "dhcp-option DNS 8.8.4.4"' >> /etc/openvpn/server/server.conf
  295. ;;
  296. 3)
  297. echo 'push "dhcp-option DNS 1.1.1.1"' >> /etc/openvpn/server/server.conf
  298. echo 'push "dhcp-option DNS 1.0.0.1"' >> /etc/openvpn/server/server.conf
  299. ;;
  300. 4)
  301. echo 'push "dhcp-option DNS 208.67.222.222"' >> /etc/openvpn/server/server.conf
  302. echo 'push "dhcp-option DNS 208.67.220.220"' >> /etc/openvpn/server/server.conf
  303. ;;
  304. 5)
  305. echo 'push "dhcp-option DNS 9.9.9.9"' >> /etc/openvpn/server/server.conf
  306. echo 'push "dhcp-option DNS 149.112.112.112"' >> /etc/openvpn/server/server.conf
  307. ;;
  308. 6)
  309. echo 'push "dhcp-option DNS 94.140.14.14"' >> /etc/openvpn/server/server.conf
  310. echo 'push "dhcp-option DNS 94.140.15.15"' >> /etc/openvpn/server/server.conf
  311. ;;
  312. esac
  313. echo "keepalive 10 120
  314. cipher AES-256-CBC
  315. user nobody
  316. group $group_name
  317. persist-key
  318. persist-tun
  319. verb 3
  320. crl-verify crl.pem" >> /etc/openvpn/server/server.conf
  321. if [[ "$protocol" = "udp" ]]; then
  322. echo "explicit-exit-notify" >> /etc/openvpn/server/server.conf
  323. fi
  324. # Enable net.ipv4.ip_forward for the system
  325. echo 'net.ipv4.ip_forward=1' > /etc/sysctl.d/30-openvpn-forward.conf
  326. # Enable without waiting for a reboot or service restart
  327. echo 1 > /proc/sys/net/ipv4/ip_forward
  328. if [[ -n "$ip6" ]]; then
  329. # Enable net.ipv6.conf.all.forwarding for the system
  330. echo "net.ipv6.conf.all.forwarding=1" >> /etc/sysctl.d/30-openvpn-forward.conf
  331. # Enable without waiting for a reboot or service restart
  332. echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
  333. fi
  334. if systemctl is-active --quiet firewalld.service; then
  335. # Using both permanent and not permanent rules to avoid a firewalld
  336. # reload.
  337. # We don't use --add-service=openvpn because that would only work with
  338. # the default port and protocol.
  339. firewall-cmd --add-port="$port"/"$protocol"
  340. firewall-cmd --zone=trusted --add-source=10.8.0.0/24
  341. firewall-cmd --permanent --add-port="$port"/"$protocol"
  342. firewall-cmd --permanent --zone=trusted --add-source=10.8.0.0/24
  343. # Set NAT for the VPN subnet
  344. firewall-cmd --direct --add-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to "$ip"
  345. firewall-cmd --permanent --direct --add-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to "$ip"
  346. if [[ -n "$ip6" ]]; then
  347. firewall-cmd --zone=trusted --add-source=fddd:1194:1194:1194::/64
  348. firewall-cmd --permanent --zone=trusted --add-source=fddd:1194:1194:1194::/64
  349. firewall-cmd --direct --add-rule ipv6 nat POSTROUTING 0 -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to "$ip6"
  350. firewall-cmd --permanent --direct --add-rule ipv6 nat POSTROUTING 0 -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to "$ip6"
  351. fi
  352. else
  353. # Create a service to set up persistent iptables rules
  354. iptables_path=$(command -v iptables)
  355. ip6tables_path=$(command -v ip6tables)
  356. # nf_tables is not available as standard in OVZ kernels. So use iptables-legacy
  357. # if we are in OVZ, with a nf_tables backend and iptables-legacy is available.
  358. if [[ $(systemd-detect-virt) == "openvz" ]] && readlink -f "$(command -v iptables)" | grep -q "nft" && hash iptables-legacy 2>/dev/null; then
  359. iptables_path=$(command -v iptables-legacy)
  360. ip6tables_path=$(command -v ip6tables-legacy)
  361. fi
  362. echo "[Unit]
  363. Before=network.target
  364. [Service]
  365. Type=oneshot
  366. ExecStart=$iptables_path -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $ip
  367. ExecStart=$iptables_path -I INPUT -p $protocol --dport $port -j ACCEPT
  368. ExecStart=$iptables_path -I FORWARD -s 10.8.0.0/24 -j ACCEPT
  369. ExecStart=$iptables_path -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
  370. ExecStop=$iptables_path -t nat -D POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $ip
  371. ExecStop=$iptables_path -D INPUT -p $protocol --dport $port -j ACCEPT
  372. ExecStop=$iptables_path -D FORWARD -s 10.8.0.0/24 -j ACCEPT
  373. ExecStop=$iptables_path -D FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT" > /etc/systemd/system/openvpn-iptables.service
  374. if [[ -n "$ip6" ]]; then
  375. echo "ExecStart=$ip6tables_path -t nat -A POSTROUTING -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to $ip6
  376. ExecStart=$ip6tables_path -I FORWARD -s fddd:1194:1194:1194::/64 -j ACCEPT
  377. ExecStart=$ip6tables_path -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
  378. ExecStop=$ip6tables_path -t nat -D POSTROUTING -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to $ip6
  379. ExecStop=$ip6tables_path -D FORWARD -s fddd:1194:1194:1194::/64 -j ACCEPT
  380. ExecStop=$ip6tables_path -D FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT" >> /etc/systemd/system/openvpn-iptables.service
  381. fi
  382. echo "RemainAfterExit=yes
  383. [Install]
  384. WantedBy=multi-user.target" >> /etc/systemd/system/openvpn-iptables.service
  385. systemctl enable --now openvpn-iptables.service
  386. fi
  387. # If SELinux is enabled and a custom port was selected, we need this
  388. if sestatus 2>/dev/null | grep "Current mode" | grep -q "enforcing" && [[ "$port" != 1194 ]]; then
  389. # Install semanage if not already present
  390. if ! hash semanage 2>/dev/null; then
  391. if [[ "$os_version" -eq 7 ]]; then
  392. # Centos 7
  393. yum install -y policycoreutils-python
  394. else
  395. # CentOS 8 or Fedora
  396. dnf install -y policycoreutils-python-utils
  397. fi
  398. fi
  399. semanage port -a -t openvpn_port_t -p "$protocol" "$port"
  400. fi
  401. # If the server is behind NAT, use the correct IP address
  402. [[ -n "$public_ip" ]] && ip="$public_ip"
  403. # client-common.txt is created so we have a template to add further users later
  404. echo "client
  405. dev tun
  406. proto $protocol
  407. remote $ip $port
  408. resolv-retry infinite
  409. nobind
  410. persist-key
  411. persist-tun
  412. remote-cert-tls server
  413. auth SHA512
  414. cipher AES-256-CBC
  415. ignore-unknown-option block-outside-dns
  416. block-outside-dns
  417. verb 3" > /etc/openvpn/server/client-common.txt
  418. # Enable and start the OpenVPN service
  419. systemctl enable --now openvpn-server@server.service
  420. # Generates the custom client.ovpn
  421. new_client
  422. echo
  423. echo "Finished!"
  424. echo
  425. echo "The client configuration is available in:" ~/"$client.ovpn"
  426. echo "New clients can be added by running this script again."
  427. else
  428. clear
  429. echo "OpenVPN is already installed."
  430. echo
  431. echo "Select an option:"
  432. echo " 1) Add a new client"
  433. echo " 2) Revoke an existing client"
  434. echo " 3) Remove OpenVPN"
  435. echo " 4) Exit"
  436. read -p "Option: " option
  437. until [[ "$option" =~ ^[1-4]$ ]]; do
  438. echo "$option: invalid selection."
  439. read -p "Option: " option
  440. done
  441. case "$option" in
  442. 1)
  443. echo
  444. echo "Provide a name for the client:"
  445. read -p "Name: " unsanitized_client
  446. client=$(sed 's/[^0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ_-]/_/g' <<< "$unsanitized_client")
  447. while [[ -z "$client" || -e /etc/openvpn/server/easy-rsa/pki/issued/"$client".crt ]]; do
  448. echo "$client: invalid name."
  449. read -p "Name: " unsanitized_client
  450. client=$(sed 's/[^0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ_-]/_/g' <<< "$unsanitized_client")
  451. done
  452. cd /etc/openvpn/server/easy-rsa/
  453. EASYRSA_CERT_EXPIRE=3650 ./easyrsa build-client-full "$client" nopass
  454. # Generates the custom client.ovpn
  455. new_client
  456. echo
  457. echo "$client added. Configuration available in:" ~/"$client.ovpn"
  458. exit
  459. ;;
  460. 2)
  461. # This option could be documented a bit better and maybe even be simplified
  462. # ...but what can I say, I want some sleep too
  463. number_of_clients=$(tail -n +2 /etc/openvpn/server/easy-rsa/pki/index.txt | grep -c "^V")
  464. if [[ "$number_of_clients" = 0 ]]; then
  465. echo
  466. echo "There are no existing clients!"
  467. exit
  468. fi
  469. echo
  470. echo "Select the client to revoke:"
  471. tail -n +2 /etc/openvpn/server/easy-rsa/pki/index.txt | grep "^V" | cut -d '=' -f 2 | nl -s ') '
  472. read -p "Client: " client_number
  473. until [[ "$client_number" =~ ^[0-9]+$ && "$client_number" -le "$number_of_clients" ]]; do
  474. echo "$client_number: invalid selection."
  475. read -p "Client: " client_number
  476. done
  477. client=$(tail -n +2 /etc/openvpn/server/easy-rsa/pki/index.txt | grep "^V" | cut -d '=' -f 2 | sed -n "$client_number"p)
  478. echo
  479. read -p "Confirm $client revocation? [y/N]: " revoke
  480. until [[ "$revoke" =~ ^[yYnN]*$ ]]; do
  481. echo "$revoke: invalid selection."
  482. read -p "Confirm $client revocation? [y/N]: " revoke
  483. done
  484. if [[ "$revoke" =~ ^[yY]$ ]]; then
  485. cd /etc/openvpn/server/easy-rsa/
  486. ./easyrsa --batch revoke "$client"
  487. EASYRSA_CRL_DAYS=3650 ./easyrsa gen-crl
  488. rm -f /etc/openvpn/server/crl.pem
  489. cp /etc/openvpn/server/easy-rsa/pki/crl.pem /etc/openvpn/server/crl.pem
  490. # CRL is read with each client connection, when OpenVPN is dropped to nobody
  491. chown nobody:"$group_name" /etc/openvpn/server/crl.pem
  492. echo
  493. echo "$client revoked!"
  494. else
  495. echo
  496. echo "$client revocation aborted!"
  497. fi
  498. exit
  499. ;;
  500. 3)
  501. echo
  502. read -p "Confirm OpenVPN removal? [y/N]: " remove
  503. until [[ "$remove" =~ ^[yYnN]*$ ]]; do
  504. echo "$remove: invalid selection."
  505. read -p "Confirm OpenVPN removal? [y/N]: " remove
  506. done
  507. if [[ "$remove" =~ ^[yY]$ ]]; then
  508. port=$(grep '^port ' /etc/openvpn/server/server.conf | cut -d " " -f 2)
  509. protocol=$(grep '^proto ' /etc/openvpn/server/server.conf | cut -d " " -f 2)
  510. if systemctl is-active --quiet firewalld.service; then
  511. ip=$(firewall-cmd --direct --get-rules ipv4 nat POSTROUTING | grep '\-s 10.8.0.0/24 '"'"'!'"'"' -d 10.8.0.0/24' | grep -oE '[^ ]+$')
  512. # Using both permanent and not permanent rules to avoid a firewalld reload.
  513. firewall-cmd --remove-port="$port"/"$protocol"
  514. firewall-cmd --zone=trusted --remove-source=10.8.0.0/24
  515. firewall-cmd --permanent --remove-port="$port"/"$protocol"
  516. firewall-cmd --permanent --zone=trusted --remove-source=10.8.0.0/24
  517. firewall-cmd --direct --remove-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to "$ip"
  518. firewall-cmd --permanent --direct --remove-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to "$ip"
  519. if grep -qs "server-ipv6" /etc/openvpn/server/server.conf; then
  520. ip6=$(firewall-cmd --direct --get-rules ipv6 nat POSTROUTING | grep '\-s fddd:1194:1194:1194::/64 '"'"'!'"'"' -d fddd:1194:1194:1194::/64' | grep -oE '[^ ]+$')
  521. firewall-cmd --zone=trusted --remove-source=fddd:1194:1194:1194::/64
  522. firewall-cmd --permanent --zone=trusted --remove-source=fddd:1194:1194:1194::/64
  523. firewall-cmd --direct --remove-rule ipv6 nat POSTROUTING 0 -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to "$ip6"
  524. firewall-cmd --permanent --direct --remove-rule ipv6 nat POSTROUTING 0 -s fddd:1194:1194:1194::/64 ! -d fddd:1194:1194:1194::/64 -j SNAT --to "$ip6"
  525. fi
  526. else
  527. systemctl disable --now openvpn-iptables.service
  528. rm -f /etc/systemd/system/openvpn-iptables.service
  529. fi
  530. if sestatus 2>/dev/null | grep "Current mode" | grep -q "enforcing" && [[ "$port" != 1194 ]]; then
  531. semanage port -d -t openvpn_port_t -p "$protocol" "$port"
  532. fi
  533. systemctl disable --now openvpn-server@server.service
  534. rm -rf /etc/openvpn/server
  535. rm -f /etc/systemd/system/openvpn-server@server.service.d/disable-limitnproc.conf
  536. rm -f /etc/sysctl.d/30-openvpn-forward.conf
  537. if [[ "$os" = "debian" || "$os" = "ubuntu" ]]; then
  538. apt-get remove --purge -y openvpn
  539. else
  540. # Else, OS must be CentOS or Fedora
  541. yum remove -y openvpn
  542. fi
  543. echo
  544. echo "OpenVPN removed!"
  545. else
  546. echo
  547. echo "OpenVPN removal aborted!"
  548. fi
  549. exit
  550. ;;
  551. 4)
  552. exit
  553. ;;
  554. esac
  555. fi
复制 文本 高亮

发表评论 取消回复
表情 图片 链接 代码

  1. 凌一
    凌一 Lv 1

    一 gi 我里 giao giao,最新版还能 Android 连接吗,好久没玩这个了。

    • olei
      olei 站长

      @凌一可以呀,这个只是一个内网 vpn 而已,并非科学上网哦

      • 陈anz
        陈 anz Lv 1

        @olei 不错 加 qq 了 开源精神 不错 好兄弟~

  2. 老猫
    老猫 Lv 1

    你有没有遇到 tap windows 数字签名的问题啊?因为数字签名不对,导致 tap-windows 无法正常工作。

  3. 34
    34 Lv 1

    谢谢大佬

  4. 今日新闻头条
    今日新闻头条 Lv 1

    文章不错支持一下

  5. 站元素主机
    站元素主机 Lv 1

    感谢分享 赞一个

  6. 幻彩灯带
    幻彩灯带 Lv 1

    支持博主!!!

分享