User Tools

Site Tools


picoenterprise:openvpn

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
picoenterprise:openvpn [2013/12/01 15:05]
Olivier Brugman [pre-install]
picoenterprise:openvpn [2013/12/01 18:57] (current)
Olivier Brugman [configuration openvpn server]
Line 27: Line 27:
  
 In case you have a lot of users, you might want to store their credentials in LDAP instead of creating separate user accounts on the openvpn server. Check our existing [[hannibal:​ldap-auth|Hannibal documentation]] on howto configure pam and nss to connect to an LDAP backend. In case you have a lot of users, you might want to store their credentials in LDAP instead of creating separate user accounts on the openvpn server. Check our existing [[hannibal:​ldap-auth|Hannibal documentation]] on howto configure pam and nss to connect to an LDAP backend.
 +
 ====install openvpn server==== ====install openvpn server====
  
-1) Add the repository for Wheezy-backports to /​etc/​apt/​sources.list+Add the repository for Wheezy-backports to /​etc/​apt/​sources.list
  
   deb http://​ftp.debian.org/​debian/​ wheezy-backports main contrib   deb http://​ftp.debian.org/​debian/​ wheezy-backports main contrib
Line 41: Line 42:
  
  
-2) In order to be able to create the necessary keys and certificates we have to configure the '​easy-rsa'​ tool. First we adjust the /​etc/​openvpn/​easy-rsa/​2.0/​vars file so that the '​easy-rsa'​ output will represent the correct data for our organization. Don't forget to increase the '​KEY_SIZE'​ to 2048.+In order to be able to create the necessary keys and certificates we have to configure the '​easy-rsa'​ tool. First we adjust the /​etc/​openvpn/​easy-rsa/​2.0/​vars file so that the '​easy-rsa'​ output will represent the correct data for our organization. Don't forget to increase the '​KEY_SIZE'​ to 2048.
 Then we have to add its variables to our environment and clean the existing history. Now '​easy-rsa'​ is ready for usage. We'll create a certificate authority, a key/cert pair for the openvpn server, a Diffie-Hellman parameters file and individual key/cert pairs for our remote users. Then we have to add its variables to our environment and clean the existing history. Now '​easy-rsa'​ is ready for usage. We'll create a certificate authority, a key/cert pair for the openvpn server, a Diffie-Hellman parameters file and individual key/cert pairs for our remote users.
  
Line 63: Line 64:
  
  
-3) The main configuration file for openvpn is /​etc/​openvpn/​server.conf+Openvpn stores the IP addresses it dynamically assignes to clients in a file (cfm. the '​ifconfig-pool-persist'​ directive in server.conf as described in the next chapter)
 + 
 +  cd /​etc/​openvpn 
 +  touch ipp.txt 
 +  chown nobody.nogroup ipp.txt 
 + 
 +Create an openvpn status log file: 
 + 
 +  touch openvpn-status.log 
 + 
 + 
 +In order to harden the security level of our openvpn server, we'll tell openvpn to run chrooted in subdirectory /​etc/​openvpn/​jail 
 +Openvpn needs access to /dev and /tmp directories within the chroot. 
 + 
 +  mkdir -p /​etc/​openvpn/​jail/​dev 
 +  mkdir -p /​etc/​openvpn/​jail/​tmp 
 +  chown -R nobody.nogroup /​etc/​openvpn/​jail/​tmp 
 +  chmod -R 770 /​etc/​openvpn/​jail/​tmp 
 + 
 +As soon as openvpn will run chrooted, it can't open new file handles outside the chroot. So we'll configure rsyslog to add a socket for logging within the openvpn chroot. 
 + 
 +  echo '​$AddUnixListenSocket /​etc/​openvpn/​jail/​dev/​log'​ > /​etc/​rsyslog.d/​openvpn.conf 
 + 
 +  service rsyslog restart 
 + 
 + 
 +====configuration openvpn server==== 
 + 
 +The main configuration file for openvpn is /​etc/​openvpn/​server.conf
 <​code>​ <​code>​
 port 1194 port 1194
Line 96: Line 125:
 </​code>​ </​code>​
  
- +Now our openvpn server ​setup should be ready! Restart the service:
-4) Openvpn stores the IP addresses it dynamically assignes to clients in a file (cfm. the '​ifconfig-pool-persist'​ directive in server.conf):​ +
- +
-  cd /​etc/​openvpn +
-  touch ipp.txt +
-  chown nobody.nogroup ipp.txt +
- +
-Create an openvpn status log file: +
- +
-  touch openvpn-status.log +
- +
- +
-5) In order to harden the security level of our openvpn server, we'll tell openvpn to run chrooted in subdirectory /​etc/​openvpn/​jail +
-Openvpn needs access to /dev and /tmp directories within the chroot. +
- +
-  mkdir -p /​etc/​openvpn/​jail/​dev +
-  mkdir -p /​etc/​openvpn/​jail/​tmp +
-  chown -R nobody.nogroup /​etc/​openvpn/​jail/​tmp +
-  chmod -R 770 /​etc/​openvpn/​jail/​tmp +
- +
-As soon as openvpn will run chrooted, it can't open new file handles outside the chroot. So we'll configure rsyslog to add a socket for logging within the openvpn chroot. +
- +
-  echo '​$AddUnixListenSocket /​etc/​openvpn/​jail/​dev/​log'​ > /​etc/​rsyslog.d/​openvpn.conf +
- +
-  service rsyslog restart +
- +
- +
-6) Now our openvpn server ​configuration ​should be ready! Restart the service:+
  
   service openvpn restart   service openvpn restart
  
  
-7)+At last, we're done:
  
   service coffee refill   service coffee refill
picoenterprise/openvpn.1385906706.txt.gz · Last modified: 2013/12/01 15:05 by Olivier Brugman