mirror of
https://github.com/pivpn/pivpn.git
synced 2024-12-18 10:50:16 +00:00
First commit of reworked installer
This commit is contained in:
parent
3fb4f4e995
commit
53565dd4fe
13 changed files with 1116 additions and 2 deletions
15
Default.txt
Normal file
15
Default.txt
Normal file
|
@ -0,0 +1,15 @@
|
|||
client
|
||||
dev tun
|
||||
proto udp
|
||||
remote IPv4pub 1194
|
||||
resolv-retry infinite
|
||||
nobind
|
||||
persist-key
|
||||
persist-tun
|
||||
mute-replay-warnings
|
||||
ns-cert-type server
|
||||
key-direction 1
|
||||
cipher AES-128-CBC
|
||||
comp-lzo
|
||||
verb 1
|
||||
mute 20
|
156
README.md
156
README.md
|
@ -1,2 +1,154 @@
|
|||
# pivpn
|
||||
Simple OpenVPN installer, designed for raspberry pi.
|
||||
PiVPN
|
||||
============
|
||||
|
||||
About
|
||||
-----
|
||||
|
||||
Visit the [PiVPN](http://pivpn.io) site for more information.
|
||||
This is a set of shell scripts that server to easily turn your Raspberry Pi (TM)
|
||||
into a VPN server using the free, open-source [OpenVPN](https://openvpn.net) software.
|
||||
|
||||
The master branch of this script installs and configures OpenVPN on Raspbian
|
||||
Jessie, and should be used if you are running Jessie or Jessie Lite. Jessie Lite
|
||||
is recommended if this will just be a server. The goal is for this to also work
|
||||
on Debian Jessie built on a free-tier Amazon AWS server for those that want thier
|
||||
tunneled traffic to be encrypted out of their home ISP.
|
||||
|
||||
Prerequisites
|
||||
-------------
|
||||
|
||||
To follow this guide and use the script to setup OpenVPN, you will need to have
|
||||
a Raspberry Pi Model B or later with an ethernet port, an SD or microSD card
|
||||
(depending on the model) with Raspbian installed, a power adapter appropriate to
|
||||
the power needs of your model, and an ethernet cable or wifi adapter to connect your Pi to your
|
||||
router or gateway. It is recommended that you use a fresh image of Raspbian
|
||||
Jessie Lite from https://raspberrypi.org/downloads, but if you don't,
|
||||
be sure to make a backup image of your existing installation before proceeding.
|
||||
You should also setup your Pi with a static IP address (see either source
|
||||
1 or 2 at the bottom of this Readme) but it is not required as the script can do this for you.
|
||||
You will need to have your router forward UPD port 1194
|
||||
(varies by model & manufacturer; consult your router manufacturer's
|
||||
documentation to do this).
|
||||
Enabling SSH on your Pi is also highly recommended, so that
|
||||
you can run a very compact headless server without a monitor or keyboard and
|
||||
be able to access it even more conveniently (This is also covered by source 2).
|
||||
|
||||
|
||||
Installation
|
||||
-----------------
|
||||
|
||||
|
||||
```shell
|
||||
curl -L install.pivpn.io | bash
|
||||
```
|
||||
|
||||
The script will first update your APT repositories, upgrade packages, and install OpenVPN,
|
||||
which will take some time.
|
||||
It will ask which encryption method you wish the guts of your server to use, 1024-bit or 2048-bit.
|
||||
2048-bit is more secure, but will take much longer to set up. If you're unsure or don't
|
||||
have a convincing reason one way or the other I'd use 2048 today.
|
||||
|
||||
After this, the script will go back to the command line as it builds the server's own
|
||||
certificate authority. If you wish to enter identifying information for the
|
||||
CA, replace the default values in the file ca_info.txt (CO for country, ST for
|
||||
state/province/territory, ORG for organization, etc.) before executing the setup script;
|
||||
however, this is not required, and you may leave the ca_info.txt file as-is. After this,
|
||||
the script will prompt you in the command line for input in similar identifying information
|
||||
fields as it generates your server certificate. Enter whatever you like, or if you do not
|
||||
desire to fill them out, skip them by pressing enter; make sure to skip the challenge field
|
||||
and leave it blank. After these fields, you will be asked whether you want to sign the
|
||||
certificate; you must press 'y'. You'll also be asked if you want to commit - press 'y'
|
||||
again.
|
||||
|
||||
Finally, the script will take some time to build the server's Diffie-Hellman key
|
||||
exchange. If you chose 1024-bit encryption, this will just take a few minutes, but if you
|
||||
chose 2048-bit, it will take much longer (anywhere from 40 minutes to several hours on a
|
||||
Model B+). The script will also make some changes to your system to allow it to forward
|
||||
internet traffic and allow VPN connections through the Pi's firewall. When the script
|
||||
informs you that it has finished configuring OpenVPN, reboot the system to apply the
|
||||
changes, and the VPN server-side setup will be complete!
|
||||
|
||||
Managing the PiVPN
|
||||
----------------------
|
||||
|
||||
After the installation is complete you can use the command 'pivpn' to manage the server.
|
||||
|
||||
"pivpn add"
|
||||
You will be prompted to enter a name for your client. Pick anything you like and hit 'enter'.
|
||||
You will be asked to enter a pass phrase for the client key; make sure it's one you'll remember.
|
||||
You'll then be prompted for input in more identification fields, which you can again ignore if
|
||||
you like; make sure you again leave the challenge field blank. The script will then ask if you
|
||||
want to sign the client certificate and commit; press 'y' for both. You'll then be asked to enter
|
||||
the pass phrase you just chose in order to encrypt the client key, and immediately after to choose
|
||||
another pass phrase for the encrypted key - if you're normal, just use the same one. After this,
|
||||
the script will assemble the client .ovpn file and place it in the directory 'ovpns' within your
|
||||
home directory.
|
||||
|
||||
Importing .ovpn Profiles on Client Machines
|
||||
--------------------------------------------
|
||||
|
||||
To move a client .ovpn profile to Windows, use a program like WinSCP or Cyberduck. Note that
|
||||
you may need administrator permission to move files to some folders on your Windows machine,
|
||||
so if you have trouble transferring the profile to a particular folder with your chosen file
|
||||
transfer program, try moving it to your desktop. To move a profile to Android, you can either
|
||||
retrieve it on PC and then move it to your device via USB, or you can use an app like Turbo
|
||||
FTP & SFTP client to retrieve it directly from your Android device.
|
||||
|
||||
To import the profile to OpenVPN on Windows, download the OpenVPN GUI from the community downloads
|
||||
section of openvpn.net, install it, and place the profile in the 'config' folder of your OpenVPN
|
||||
directory, i.e., in 'C:\Program Files\OpenVPN\config'. To import the profile on Android, install
|
||||
the OpenVPN Connect app, select 'Import' from the drop-down menu in the upper right corner of the
|
||||
main screen, choose the directory on your device where you stored the .ovpn file, and select the
|
||||
file.
|
||||
|
||||
After importing, connect to the VPN server on Windows by running the OpenVPN GUI with
|
||||
administrator permissions, right-clicking on the icon in the system tray, and clicking 'Connect',
|
||||
or on Android by selecting the profile under 'OpenVPN Profile' and pressing 'Connect'. You'll be
|
||||
asked to enter the pass phrase you chose. Do so, and you're in! Enjoy your ~$50 USD private VPN.
|
||||
|
||||
Removing OpenVPN
|
||||
----------------
|
||||
|
||||
If at any point you wish to remove OpenVPN from your Pi and revert it to a
|
||||
pre-installation state, such as if you want to undo a failed installation to try again or
|
||||
you want to remove OpenVPN without installing a fresh Raspbian image, just run
|
||||
'pivpn uninstall'
|
||||
|
||||
Feedback & Support
|
||||
--------
|
||||
|
||||
I am interested in making this script work for as many people as possible, so I
|
||||
welcome any feedback on your experience. If you have problems using it, feel
|
||||
free to post an issue here on github. I'll classify the issues the best I can
|
||||
to keep things sorted.
|
||||
|
||||
I also encourage discussion of issues, solutions, and ideas on the RaspberryPi.org forum thread for the project [here.](https://www.raspberrypi.org/forums/viewtopic.php?f=36&t=137240&p=911599&hilit=OpenVPN#p911599) I'd love for users to have the opportunity to discuss their ideas with each other!
|
||||
|
||||
Contributions
|
||||
-------------
|
||||
|
||||
I'm also interested in improving this script, and will be adding features to it
|
||||
over time to make it easier, more intuitive, and more versatile. If you have any
|
||||
feature ideas or requests, or are interested in adding your ideas to it,
|
||||
testing it on other platforms, or localizing it to another language, please
|
||||
comment or leave a pull request. I will be happy to work with you!
|
||||
|
||||
If you have found this tool to be useful and want to use
|
||||
[this PayPal link](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=K99QGVL7KA6ZL)
|
||||
to buy me a gallon of gas, I would be very grateful!
|
||||
|
||||
If you decide to do so, please also consider supporting OpenVPN; they
|
||||
have produced a wonderful open-source product, and all credit for it goes to
|
||||
their community and their hard work. All I did was write a little automated
|
||||
front-end for its installation on Raspbian.
|
||||
|
||||
Sources
|
||||
-------
|
||||
|
||||
1: [ModMyPi: How to give your Raspberry Pi a Static IP Address](https://www.modmypi.com/blog/tutorial-how-to-give-your-raspberry-pi-a-static-ip-address)
|
||||
|
||||
2: [ReadWrite: 5 Pointers To Supercharge Your Raspberry Pi Projects](http://readwrite.com/2014/04/09/raspberry-pi-projects-ssh-remote-desktop-static-ip-tutorial?utm_content=readwrite3-orionautotweet&awesm=readwr.it_b1UN&utm_campaign=&utm_medium=readwr.it-twitter&utm_source=t.co#awesm=~oAXilI0BMOHsS3)
|
||||
|
||||
3: [ReadWrite: Building A Raspberry Pi VPN Part 1](http://readwrite.com/2014/04/10/raspberry-pi-vpn-tutorial-server-secure-web-browsing)
|
||||
|
||||
4: [ReadWrite: Building A Raspberry Pi VPN Part 2](http://readwrite.com/2014/04/11/building-a-raspberry-pi-vpn-part-two-creating-an-encrypted-client-side#awesm=~oB89WBfWrt21bV)
|
||||
|
|
531
auto_install/install.sh
Normal file
531
auto_install/install.sh
Normal file
|
@ -0,0 +1,531 @@
|
|||
#!/usr/bin/env bash
|
||||
# PiVPN: Trivial openvpn setup and configuration
|
||||
# Easiest setup and mangement of openvpn on Raspberry Pi
|
||||
# https://github.com/StarshipEngineer/OpenVPN-Setup/
|
||||
# Installs pivpn
|
||||
# Heavily adapted from the pi-hole project
|
||||
#
|
||||
# Install with this command (from your Pi):
|
||||
#
|
||||
# curl -L vigilcode.com/pivpnsetup | bash
|
||||
|
||||
|
||||
######## VARIABLES #########
|
||||
|
||||
tmpLog=/tmp/pivpn-install.log
|
||||
instalLogLoc=/etc/pivpn/install.log
|
||||
|
||||
pivpnGitUrl="https://github.com/0-kaladin/OpenVPN-Setup.git"
|
||||
pivpnFilesDir="/etc/.pivpn"
|
||||
|
||||
|
||||
# Find the rows and columns
|
||||
rows=$(tput lines)
|
||||
columns=$(tput cols)
|
||||
|
||||
# Divide by two so the dialogs take up half of the screen, which looks nice.
|
||||
r=$(( rows / 2 ))
|
||||
c=$(( columns / 2 ))
|
||||
|
||||
|
||||
# Find IP used to route to outside world
|
||||
|
||||
IPv4dev=$(ip route get 8.8.8.8 | awk '{for(i=1;i<=NF;i++)if($i~/dev/)print $(i+1)}')
|
||||
IPv4addr=$(ip -o -f inet addr show dev "$IPv4dev" | awk '{print $4}' | awk 'END {print}')
|
||||
IPv4gw=$(ip route get 8.8.8.8 | awk '{print $3}')
|
||||
|
||||
availableInterfaces=$(ip -o link | awk '{print $2}' | grep -v "lo" | cut -d':' -f1)
|
||||
availableUsers=$(awk -F':' '$3>=500 && $3<=60000 {print $1}' /etc/passwd)
|
||||
dhcpcdFile=/etc/dhcpcd.conf
|
||||
|
||||
######## FIRST CHECK ########
|
||||
# Must be root to install
|
||||
echo ":::"
|
||||
if [[ $EUID -eq 0 ]];then
|
||||
echo "::: You are root."
|
||||
else
|
||||
echo "::: sudo will be used for the install."
|
||||
# Check if it is actually installed
|
||||
# If it isn't, exit because the install cannot complete
|
||||
if [[ $(dpkg-query -s sudo) ]];then
|
||||
export SUDO="sudo"
|
||||
else
|
||||
echo "::: Please install sudo or run this as root."
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
####### FUNCTIONS ##########
|
||||
spinner()
|
||||
{
|
||||
local pid=$1
|
||||
local delay=0.50
|
||||
local spinstr='/-\|'
|
||||
while [ "$(ps a | awk '{print $1}' | grep "$pid")" ]; do
|
||||
local temp=${spinstr#?}
|
||||
printf " [%c] " "$spinstr"
|
||||
local spinstr=$temp${spinstr%"$temp"}
|
||||
sleep $delay
|
||||
printf "\b\b\b\b\b\b"
|
||||
done
|
||||
printf " \b\b\b\b"
|
||||
}
|
||||
|
||||
welcomeDialogs() {
|
||||
# Display the welcome dialog
|
||||
whiptail --msgbox --backtitle "Welcome" --title "PiVPN Automated Installer" "This installer will transform your Raspberry Pi into an openvpn server!" $r $c
|
||||
|
||||
# Explain the need for a static address
|
||||
whiptail --msgbox --backtitle "Initiating network interface" --title "Static IP Needed" "The PiVPN is a SERVER so it needs a STATIC IP ADDRESS to function properly.
|
||||
|
||||
In the next section, you can choose to use your current network settings (DHCP) or to manually edit them." $r $c
|
||||
}
|
||||
|
||||
chooseUser() {
|
||||
# Explain the local user
|
||||
whiptail --msgbox --backtitle "Parsing User List" --title "Local Users" "Choose a local user that will hold your ovpn configurations." $r $c
|
||||
|
||||
userArray=()
|
||||
firstloop=1
|
||||
|
||||
while read -r line
|
||||
do
|
||||
mode="OFF"
|
||||
if [[ $firstloop -eq 1 ]]; then
|
||||
firstloop=0
|
||||
mode="ON"
|
||||
fi
|
||||
userArray+=("$line" "available" "$mode")
|
||||
done <<< "$availableUsers"
|
||||
|
||||
# Find out how many users are available to choose from
|
||||
userCount=$(echo "$availableUsers" | wc -l)
|
||||
chooseUserCmd=(whiptail --title "Choose A User" --separate-output --radiolist "Choose:" $r $c $userCount)
|
||||
chooseUserOptions=$("${chooseUserCmd[@]}" "${userArray[@]}" 2>&1 >/dev/tty)
|
||||
if [[ $? = 0 ]]; then
|
||||
for desiredUser in $chooseUserOptions
|
||||
do
|
||||
pivpnUser=$desiredUser
|
||||
echo "::: Using User: $pivpnUser"
|
||||
echo "${pivpnUser}" > /tmp/pivpnUSR
|
||||
done
|
||||
else
|
||||
echo "::: Cancel selected, exiting...."
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
|
||||
verifyFreeDiskSpace() {
|
||||
# I have no idea what the minimum space needed is, but checking for at least 50MB sounds like a good idea.
|
||||
requiredFreeBytes=51200
|
||||
|
||||
existingFreeBytes=$(df -lk / 2>&1 | awk '{print $4}' | head -2 | tail -1)
|
||||
if ! [[ "$existingFreeBytes" =~ ^([0-9])+$ ]]; then
|
||||
existingFreeBytes=$(df -lk /dev 2>&1 | awk '{print $4}' | head -2 | tail -1)
|
||||
fi
|
||||
|
||||
if [[ $existingFreeBytes -lt $requiredFreeBytes ]]; then
|
||||
whiptail --msgbox --backtitle "Insufficient Disk Space" --title "Insufficient Disk Space" "\nYour system appears to be low on disk space. PiVPN recomends a minimum of $requiredFreeBytes Bytes.\nYou only have $existingFreeBytes Free.\n\nIf this is a new install you may need to expand your disk.\n\nTry running:\n 'sudo raspi-config'\nChoose the 'expand file system option'\n\nAfter rebooting, run this installation again.\n\ncurl -L vigilcode.com/pivpnsetup | bash\n" $r $c
|
||||
echo "$existingFreeBytes is less than $requiredFreeBytes"
|
||||
echo "Insufficient free space, exiting..."
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
|
||||
chooseInterface() {
|
||||
# Turn the available interfaces into an array so it can be used with a whiptail dialog
|
||||
interfacesArray=()
|
||||
firstloop=1
|
||||
|
||||
while read -r line
|
||||
do
|
||||
mode="OFF"
|
||||
if [[ $firstloop -eq 1 ]]; then
|
||||
firstloop=0
|
||||
mode="ON"
|
||||
fi
|
||||
interfacesArray+=("$line" "available" "$mode")
|
||||
done <<< "$availableInterfaces"
|
||||
|
||||
# Find out how many interfaces are available to choose from
|
||||
interfaceCount=$(echo "$availableInterfaces" | wc -l)
|
||||
chooseInterfaceCmd=(whiptail --separate-output --radiolist "Choose An Interface" $r $c $interfaceCount)
|
||||
chooseInterfaceOptions=$("${chooseInterfaceCmd[@]}" "${interfacesArray[@]}" 2>&1 >/dev/tty)
|
||||
if [[ $? = 0 ]]; then
|
||||
for desiredInterface in $chooseInterfaceOptions
|
||||
do
|
||||
pivpnInterface=$desiredInterface
|
||||
echo "::: Using interface: $pivpnInterface"
|
||||
echo "${pivpnInterface}" > /tmp/pivpnINT
|
||||
done
|
||||
else
|
||||
echo "::: Cancel selected, exiting...."
|
||||
exit 1
|
||||
fi
|
||||
}
|
||||
|
||||
getStaticIPv4Settings() {
|
||||
# Ask if the user wants to use DHCP settings as their static IP
|
||||
if (whiptail --backtitle "Calibrating network interface" --title "Static IP Address" --yesno "Do you want to use your current network settings as a static address?
|
||||
IP address: $IPv4addr
|
||||
Gateway: $IPv4gw" $r $c) then
|
||||
# If they choose yes, let the user know that the IP address will not be available via DHCP and may cause a conflict.
|
||||
whiptail --msgbox --backtitle "IP information" --title "FYI: IP Conflict" "It is possible your router could still try to assign this IP to a device, which would cause a conflict. But in most cases the router is smart enough to not do that.
|
||||
If you are worried, either manually set the address, or modify the DHCP reservation pool so it does not include the IP you want.
|
||||
It is also possible to use a DHCP reservation, but if you are going to do that, you might as well set a static address." $r $c
|
||||
# Nothing else to do since the variables are already set above
|
||||
else
|
||||
# Otherwise, we need to ask the user to input their desired settings.
|
||||
# Start by getting the IPv4 address (pre-filling it with info gathered from DHCP)
|
||||
# Start a loop to let the user enter their information with the chance to go back and edit it if necessary
|
||||
until [[ $ipSettingsCorrect = True ]]
|
||||
do
|
||||
# Ask for the IPv4 address
|
||||
IPv4addr=$(whiptail --backtitle "Calibrating network interface" --title "IPv4 address" --inputbox "Enter your desired IPv4 address" $r $c "$IPv4addr" 3>&1 1>&2 2>&3)
|
||||
if [[ $? = 0 ]];then
|
||||
echo "::: Your static IPv4 address: $IPv4addr"
|
||||
# Ask for the gateway
|
||||
IPv4gw=$(whiptail --backtitle "Calibrating network interface" --title "IPv4 gateway (router)" --inputbox "Enter your desired IPv4 default gateway" $r $c "$IPv4gw" 3>&1 1>&2 2>&3)
|
||||
if [[ $? = 0 ]];then
|
||||
echo "::: Your static IPv4 gateway: $IPv4gw"
|
||||
# Give the user a chance to review their settings before moving on
|
||||
if (whiptail --backtitle "Calibrating network interface" --title "Static IP Address" --yesno "Are these settings correct?
|
||||
IP address: $IPv4addr
|
||||
Gateway: $IPv4gw" $r $c)then
|
||||
# If the settings are correct, then we need to set the piVPNIP
|
||||
# Saving it to a temporary file us to retrieve it later when we run the gravity.sh script
|
||||
echo "${IPv4addr%/*}" > /tmp/pivpnIP
|
||||
echo "$pivpnInterface" > /tmp/pivpnINT
|
||||
# After that's done, the loop ends and we move on
|
||||
ipSettingsCorrect=True
|
||||
else
|
||||
# If the settings are wrong, the loop continues
|
||||
ipSettingsCorrect=False
|
||||
fi
|
||||
else
|
||||
# Cancelling gateway settings window
|
||||
ipSettingsCorrect=False
|
||||
echo "::: Cancel selected. Exiting..."
|
||||
exit 1
|
||||
fi
|
||||
else
|
||||
# Cancelling IPv4 settings window
|
||||
ipSettingsCorrect=False
|
||||
echo "::: Cancel selected. Exiting..."
|
||||
exit 1
|
||||
fi
|
||||
done
|
||||
# End the if statement for DHCP vs. static
|
||||
fi
|
||||
}
|
||||
|
||||
setDHCPCD() {
|
||||
# Append these lines to dhcpcd.conf to enable a static IP
|
||||
echo "::: interface $pivpnInterface
|
||||
static ip_address=$IPv4addr
|
||||
static routers=$IPv4gw
|
||||
static domain_name_servers=$IPv4gw" | $SUDO tee -a $dhcpcdFile >/dev/null
|
||||
}
|
||||
|
||||
setStaticIPv4() {
|
||||
# Tries to set the IPv4 address
|
||||
if grep -q "$IPv4addr" $dhcpcdFile; then
|
||||
# address already set, noop
|
||||
:
|
||||
else
|
||||
setDHCPCD
|
||||
$SUDO ip addr replace dev "$pivpnInterface" "$IPv4addr"
|
||||
echo ":::"
|
||||
echo "::: Setting IP to $IPv4addr. You may need to restart after the install is complete."
|
||||
echo ":::"
|
||||
fi
|
||||
}
|
||||
|
||||
function valid_ip()
|
||||
{
|
||||
local ip=$1
|
||||
local stat=1
|
||||
|
||||
if [[ $ip =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]; then
|
||||
OIFS=$IFS
|
||||
IFS='.'
|
||||
ip=($ip)
|
||||
IFS=$OIFS
|
||||
[[ ${ip[0]} -le 255 && ${ip[1]} -le 255 \
|
||||
&& ${ip[2]} -le 255 && ${ip[3]} -le 255 ]]
|
||||
stat=$?
|
||||
fi
|
||||
return $stat
|
||||
}
|
||||
|
||||
installScripts() {
|
||||
# Install the scripts from /etc/.pivpn to their various locations
|
||||
$SUDO echo ":::"
|
||||
$SUDO echo -n "::: Installing scripts to /opt/pivpn..."
|
||||
if [ ! -d /opt/pivpn ]; then
|
||||
$SUDO mkdir /opt/pivpn
|
||||
$SUDO chown "$pivpnUser":root /opt/pivpn
|
||||
$SUDO chmod u+srwx /opt/pivpn
|
||||
fi
|
||||
$SUDO cp /etc/.pivpn/scripts/makeOVPN.sh /opt/pivpn/makeOVPN.sh
|
||||
$SUDO cp /etc/.pivpn/scripts/listOVPN.sh /opt/pivpn/listOVPN.sh
|
||||
$SUDO cp /etc/.pivpn/scripts/removeOVPN.sh /opt/pivpn/removeOVPN.sh
|
||||
$SUDO cp /etc/.pivpn/scripts/uninstall.sh /opt/pivpn/uninstall.sh
|
||||
$SUDO cp /etc/.pivpn/scripts/pivpnDebug.sh /opt/pivpn/pivpnDebug.sh
|
||||
$SUDO chmod 0755 /opt/pivpn/{makeOVPN,listOVPN,removeOVPN,uninstall,pivpnDebug}.sh
|
||||
$SUDO cp /etc/.pivpn/pivpn /usr/local/bin/pivpn
|
||||
$SUDO chmod 0755 /usr/local/bin/pivpn
|
||||
$SUDO cp /etc/.pivpn/scripts/bash-completion /etc/bash_completion.d/pivpn
|
||||
source /etc/bash_completion.d/pivpn
|
||||
|
||||
$SUDO echo " done."
|
||||
}
|
||||
|
||||
stopServices() {
|
||||
# Stop openvpn
|
||||
$SUDO echo ":::"
|
||||
$SUDO echo -n "::: Stopping openvpn service..."
|
||||
$SUDO service openvpn stop || true
|
||||
$SUDO echo " done."
|
||||
}
|
||||
|
||||
checkForDependencies() {
|
||||
#Running apt-get update/upgrade with minimal output can cause some issues with
|
||||
#requiring user input (e.g password for phpmyadmin see #218)
|
||||
#We'll change the logic up here, to check to see if there are any updates availible and
|
||||
# if so, advise the user to run apt-get update/upgrade at their own discretion
|
||||
#Check to see if apt-get update has already been run today
|
||||
# it needs to have been run at least once on new installs!
|
||||
|
||||
timestamp=$(stat -c %Y /var/cache/apt/)
|
||||
timestampAsDate=$(date -d @"$timestamp" "+%b %e")
|
||||
today=$(date "+%b %e")
|
||||
|
||||
if [ ! "$today" == "$timestampAsDate" ]; then
|
||||
#update package lists
|
||||
echo ":::"
|
||||
echo -n "::: apt-get update has not been run today. Running now..."
|
||||
$SUDO apt-get -qq update & spinner $!
|
||||
echo " done!"
|
||||
fi
|
||||
echo ":::"
|
||||
echo -n "::: Checking apt-get for upgraded packages...."
|
||||
updatesToInstall=$($SUDO apt-get -s -o Debug::NoLocking=true upgrade | grep -c ^Inst)
|
||||
echo " done!"
|
||||
echo ":::"
|
||||
if [[ $updatesToInstall -eq "0" ]]; then
|
||||
echo "::: Your pi is up to date! Continuing with PiVPN installation..."
|
||||
else
|
||||
echo "::: There are $updatesToInstall updates availible for your pi!"
|
||||
echo "::: We recommend you run 'sudo apt-get upgrade' after installing PiVPN! "
|
||||
echo ":::"
|
||||
fi
|
||||
echo ":::"
|
||||
echo "::: Checking dependencies:"
|
||||
|
||||
dependencies=( openvpn easy-rsa git iptables-persistent dnsutils )
|
||||
for i in "${dependencies[@]}"; do
|
||||
echo -n "::: Checking for $i..."
|
||||
if [ "$(dpkg-query -W -f='${Status}' "$i" 2>/dev/null | grep -c "ok installed")" -eq 0 ]; then
|
||||
echo -n " Not found! Installing...."
|
||||
#Supply answers to the questions so we don't prompt user
|
||||
if [[ $i -eq "iptables-persistent" ]]; then
|
||||
echo iptables-persistent iptables-persistent/autosave_v4 boolean true | $SUDO debconf-set-selections
|
||||
echo iptables-persistent iptables-persistent/autosave_v6 boolean false | $SUDO debconf-set-selections
|
||||
fi
|
||||
$SUDO apt-get -y -qq install "$i" > /dev/null & spinner $!
|
||||
echo " done!"
|
||||
else
|
||||
echo " already installed!"
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
getGitFiles() {
|
||||
# Setup git repos for base files
|
||||
echo ":::"
|
||||
echo "::: Checking for existing base files..."
|
||||
if is_repo $pivpnFilesDir; then
|
||||
make_repo $pivpnFilesDir $pivpnGitUrl
|
||||
else
|
||||
update_repo $pivpnFilesDir
|
||||
fi
|
||||
}
|
||||
|
||||
is_repo() {
|
||||
# If the directory does not have a .git folder it is not a repo
|
||||
echo -n "::: Checking $1 is a repo..."
|
||||
if [ -d "$1/.git" ]; then
|
||||
echo " OK!"
|
||||
return 1
|
||||
fi
|
||||
echo " not found!!"
|
||||
return 0
|
||||
}
|
||||
|
||||
make_repo() {
|
||||
# Remove the non-repos interface and clone the interface
|
||||
echo -n "::: Cloning $2 into $1..."
|
||||
$SUDO rm -rf "$1"
|
||||
$SUDO git clone -q "$2" "$1" > /dev/null & spinner $!
|
||||
echo " done!"
|
||||
}
|
||||
|
||||
update_repo() {
|
||||
# Pull the latest commits
|
||||
echo -n "::: Updating repo in $1..."
|
||||
cd "$1" || exit
|
||||
$SUDO git pull -q > /dev/null & spinner $!
|
||||
echo " done!"
|
||||
}
|
||||
|
||||
confOpenVPN () {
|
||||
# Ask user for desired level of encryption
|
||||
ENCRYPT=$(whiptail --backtitle "Setup OpenVPN" --title "Encryption Strength" --radiolist \
|
||||
"Choose your desired level of encryption:" $r $c 2 \
|
||||
"2048" "Use 2048-bit encryption. Slower to set up, but more secure." ON \
|
||||
"1024" "Use 1024-bit encryption. Faster to set up, but less secure." OFF 3>&1 1>&2 2>&3)
|
||||
|
||||
exitstatus=$?
|
||||
if [ $exitstatus != 0 ]; then
|
||||
echo "::: Cancel selected. Exiting..."
|
||||
exit 1
|
||||
fi
|
||||
# Copy the easy-rsa files to a directory inside the new openvpn directory
|
||||
cp -r /usr/share/easy-rsa /etc/openvpn
|
||||
|
||||
# Edit the EASY_RSA variable in the vars file to point to the new easy-rsa directory,
|
||||
# And change from default 1024 encryption if desired
|
||||
cd /etc/openvpn/easy-rsa
|
||||
sed -i 's:"`pwd`":"/etc/openvpn/easy-rsa":' vars
|
||||
if [[ $ENCRYPT -eq "1024" ]]; then
|
||||
sed -i 's:KEY_SIZE=2048:KEY_SIZE=1024:' vars
|
||||
fi
|
||||
|
||||
# source the vars file just edited
|
||||
source ./vars
|
||||
|
||||
# Remove any previous keys
|
||||
./clean-all
|
||||
|
||||
# Build the certificate authority
|
||||
./build-ca < /etc/.pivpn/ca_info.txt
|
||||
|
||||
whiptail --msgbox --backtitle "Setup OpenVPN" --title "Server Information" "You will now be asked for identifying information for the server. Press 'Enter' to skip a field." $r $c
|
||||
# can export env variables here for users to provide. export KEY_EMAIL will set email field for example.
|
||||
|
||||
# Build the server
|
||||
./build-key-server --batch server
|
||||
|
||||
# Generate Diffie-Hellman key exchange
|
||||
./build-dh
|
||||
|
||||
# Generate static HMAC key to defend against DDoS
|
||||
openvpn --genkey --secret keys/ta.key
|
||||
|
||||
# Write config file for server using the template .txt file
|
||||
LOCALIP=$(ifconfig $pivpnInterface | grep -Eo 'inet (addr:)?([0-9]*\.){3}[0-9]*' | grep -Eo '([0-9]*\.){3}[0-9]*')
|
||||
sed 's/LOCALIP/'$LOCALIP'/' </etc/.pivpn/server_config.txt >/etc/openvpn/server.conf
|
||||
if [ $ENCRYPT = 2048 ]; then
|
||||
sed -i 's:dh1024:dh2048:' /etc/openvpn/server.conf
|
||||
fi
|
||||
}
|
||||
|
||||
confNetwork() {
|
||||
# Enable forwarding of internet traffic
|
||||
sed -i '/#net.ipv4.ip_forward=1/c\net.ipv4.ip_forward=1' /etc/sysctl.conf
|
||||
$SUDO sysctl -p
|
||||
|
||||
# Write script to run openvpn and allow it through firewall on boot using the template .txt file
|
||||
$SUDO iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o $IPv4dev -j MASQUERADE
|
||||
$SUDO netfilter-persistent save
|
||||
}
|
||||
|
||||
confOVPN() {
|
||||
IPv4pub=$(dig +short myip.opendns.com @resolver1.opendns.com)
|
||||
$SUDO cp /tmp/pivpnUSR /etc/pivpn/INSTALL_USER
|
||||
|
||||
# Set status that no certs have been revoked
|
||||
$SUDO echo 0 > /etc/pivpn/REVOKE_STATUS
|
||||
|
||||
METH=$(whiptail --title "Public IP or DNS" --radiolist "Will clients use a Public IP or DNS?" $r $c 2 \
|
||||
"$IPv4pub" "Use this public IP" "ON" \
|
||||
"DNS Entry" "Use a public DNS" "OFF" 3>&1 1>&2 2>&3)
|
||||
|
||||
exitstatus=$?
|
||||
if [ $exitstatus != 0 ]; then
|
||||
echo "::: Cancel selected. Exiting..."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
|
||||
if [ "$METH" == "$IPv4pub" ]; then
|
||||
sed 's/IPv4pub/'$IPv4pub'/' </etc/.pivpn/Default.txt >/etc/openvpn/easy-rsa/keys/Default.txt
|
||||
else
|
||||
PUBLICDNS=$(whiptail --title "PiVPN Setup" --inputbox "What is the public DNS name of this Raspberry Pi?" $r $c 3>&1 1>&2 2>&3)
|
||||
exitstatus=$?
|
||||
if [ $exitstatus = 0 ]; then
|
||||
sed 's/IPv4pub/'$PUBLICDNS'/' </etc/.pivpn/Default.txt >/etc/openvpn/easy-rsa/keys/Default.txt
|
||||
whiptail --title "Setup OpenVPN" --infobox "Using PUBLIC DNS: $PUBLICDNS" $r $c
|
||||
else
|
||||
whiptail --title "Setup OpenVPN" --infobox "Cancelled" $r $c
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
mkdir /home/$pivpnUser/ovpns
|
||||
chmod 0777 -R /home/$pivpnUser/ovpns
|
||||
}
|
||||
|
||||
installPiVPN() {
|
||||
checkForDependencies
|
||||
stopServices
|
||||
$SUDO mkdir -p /etc/pivpn/
|
||||
getGitFiles
|
||||
installScripts
|
||||
confOpenVPN
|
||||
confNetwork
|
||||
confOVPN
|
||||
}
|
||||
|
||||
displayFinalMessage() {
|
||||
# Final completion message to user
|
||||
$SUDO systemctl enable openvpn.service
|
||||
$SUDO systemctl start openvpn.service
|
||||
whiptail --msgbox --backtitle "Make it so." --title "Installation Complete!" "Now run 'pivpn add' to create the ovpn profiles.
|
||||
Run 'pivpn help' to see what else you can do!
|
||||
The install log is in /etc/pivpn." $r $c
|
||||
if (whiptail --title "Reboot" --yesno --defaultno "It is strongly recommended you reboot after installation. Would you like to reboot now?" $r $c); then
|
||||
whiptail --title "Rebooting" --msgbox "The system will now reboot." $r $c
|
||||
printf "\nRebooting system...\n"
|
||||
sleep 3
|
||||
shutdown -r now
|
||||
fi
|
||||
}
|
||||
|
||||
######## SCRIPT ############
|
||||
# Start the installer
|
||||
welcomeDialogs
|
||||
|
||||
# Verify there is enough disk space for the install
|
||||
verifyFreeDiskSpace
|
||||
|
||||
# Find interfaces and let the user choose one
|
||||
chooseInterface
|
||||
getStaticIPv4Settings
|
||||
setStaticIPv4
|
||||
|
||||
# Choose the user for the ovpns
|
||||
chooseUser
|
||||
|
||||
# Install and log everything to a file
|
||||
installPiVPN
|
||||
|
||||
# Move the log file into /etc/pivpn for storage
|
||||
#$SUDO mv $tmpLog $installLogLoc
|
||||
|
||||
displayFinalMessage
|
||||
|
||||
echo "::: Install Complete..."
|
8
ca_info.txt
Normal file
8
ca_info.txt
Normal file
|
@ -0,0 +1,8 @@
|
|||
CO
|
||||
ST
|
||||
CITY
|
||||
ORG
|
||||
ORG-UNIT
|
||||
COMMON-NAME
|
||||
NAME
|
||||
EMAIL
|
3
firewall-openvpn-rules.txt
Normal file
3
firewall-openvpn-rules.txt
Normal file
|
@ -0,0 +1,3 @@
|
|||
#!/bin/sh
|
||||
|
||||
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o IPv4dev -j MASQUERADE
|
71
pivpn
Normal file
71
pivpn
Normal file
|
@ -0,0 +1,71 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Must be root to use this tool
|
||||
if [[ ! $EUID -eq 0 ]];then
|
||||
#echo "::: You are root."
|
||||
#else
|
||||
#echo "::: Sudo will be used for this tool."
|
||||
# Check if it is actually installed
|
||||
# If it isn't, exit because the pivpn cannot be invoked without privileges.
|
||||
if [[ $(dpkg-query -s sudo) ]];then
|
||||
export SUDO="sudo"
|
||||
else
|
||||
echo "::: Please install sudo or run this as root."
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
function makeOVPNFunc {
|
||||
$SUDO /opt/pivpn/makeOVPN.sh
|
||||
exit 1
|
||||
}
|
||||
|
||||
function listOVPNFunc {
|
||||
$SUDO /opt/pivpn/listOVPN.sh
|
||||
exit 1
|
||||
}
|
||||
|
||||
function debugFunc {
|
||||
$SUDO /opt/pivpn/pivpnDebug.sh
|
||||
exit 1
|
||||
}
|
||||
|
||||
function removeOVPNFunc {
|
||||
$SUDO /opt/pivpn/removeOVPN.sh
|
||||
exit 1
|
||||
}
|
||||
|
||||
function uninstallFunc {
|
||||
$SUDO /opt/pivpn/uninstall.sh
|
||||
exit 1
|
||||
}
|
||||
|
||||
function helpFunc {
|
||||
echo "::: Control all PiVPN specific functions!"
|
||||
echo ":::"
|
||||
echo "::: Usage: pivpn [options]"
|
||||
echo ":::"
|
||||
echo "::: Options:"
|
||||
echo "::: -a, add Create a client ovpn profile"
|
||||
echo "::: -d, debug Start a debugging session if having trouble"
|
||||
echo "::: -l, list List all valid and revoked certificates"
|
||||
echo "::: -r, revoke Revoke a client ovpn profile"
|
||||
echo "::: -h, help Show this help dialog"
|
||||
echo "::: -u, uninstall Uninstall PiVPN from your system!"
|
||||
exit 1
|
||||
}
|
||||
|
||||
if [[ $# = 0 ]]; then
|
||||
helpFunc
|
||||
fi
|
||||
|
||||
# Handle redirecting to specific functions based on arguments
|
||||
case "$1" in
|
||||
"-a" | "add" ) makeOVPNFunc;;
|
||||
"-d" | "debug" ) debugFunc;;
|
||||
"-l" | "list" ) listOVPNFunc;;
|
||||
"-r" | "revoke" ) removeOVPNFunc;;
|
||||
"-h" | "help" ) helpFunc;;
|
||||
"-u" | "uninstall" ) uninstallFunc;;
|
||||
* ) helpFunc;;
|
||||
esac
|
18
scripts/bash-completion
Normal file
18
scripts/bash-completion
Normal file
|
@ -0,0 +1,18 @@
|
|||
_pivpn()
|
||||
{
|
||||
local cur prev opts
|
||||
COMPREPLY=()
|
||||
cur="${COMP_WORDS[COMP_CWORD]}"
|
||||
prev="${COMP_WORDS[COMP_CWORD-1]}"
|
||||
opts="debug add list revoke uninstall help"
|
||||
|
||||
if [[ ${cur} == -* ]] ; then
|
||||
opts="-a -d -l -r -h -u"
|
||||
COMPREPLY=( $(compgen -W "${opts}" -- ${cur}) )
|
||||
return 0
|
||||
fi
|
||||
|
||||
COMPREPLY=( $(compgen -W "${opts}" -- ${cur}) )
|
||||
return 0
|
||||
}
|
||||
complete -F _pivpn pivpn
|
32
scripts/listOVPN.sh
Normal file
32
scripts/listOVPN.sh
Normal file
|
@ -0,0 +1,32 @@
|
|||
#!/usr/bin/env bash
|
||||
# PiVPN: list clients script
|
||||
|
||||
INDEX="/etc/openvpn/easy-rsa/keys/index.txt"
|
||||
printf "\n"
|
||||
if [ ! -f $INDEX ]; then
|
||||
printf "The file: $INDEX \n"
|
||||
printf "Was not Found!\n"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
printf ": NOTE : You should always have a valid server entry below!\n"
|
||||
printf "\n"
|
||||
printf "\e[1m::: Certificate Status List :::\e[0m\n"
|
||||
printf " ::\e[4m Status \e[0m||\e[4m Name \e[0m:: \n"
|
||||
|
||||
while read -r line || [[ -n "$line" ]]; do
|
||||
status=$(echo $line | awk '{print $1}')
|
||||
if [[ $status = "V" ]]; then
|
||||
printf " Valid :: "
|
||||
var=$(echo $line | awk '{print $5}' | cut -d'/' -f7)
|
||||
var=${var#CN=}
|
||||
printf " $var\n"
|
||||
fi
|
||||
if [[ $status = "R" ]]; then
|
||||
printf " Revoked :: "
|
||||
var=$(echo $line | awk '{print $6}' | cut -d'/' -f7)
|
||||
var=${var#CN=}
|
||||
printf " $var\n"
|
||||
fi
|
||||
done <$INDEX
|
||||
printf "\n"
|
81
scripts/makeOVPN.sh
Normal file
81
scripts/makeOVPN.sh
Normal file
|
@ -0,0 +1,81 @@
|
|||
#!/bin/bash
|
||||
# Create OVPN Client
|
||||
# Default Variable Declarations
|
||||
DEFAULT="Default.txt"
|
||||
FILEEXT=".ovpn"
|
||||
CRT=".crt"
|
||||
OKEY=".key"
|
||||
KEY=".3des.key"
|
||||
CA="ca.crt"
|
||||
TA="ta.key"
|
||||
INSTALL_USER=$(cat /etc/pivpn/INSTALL_USER)
|
||||
|
||||
echo "Please enter a Name for the Client:"
|
||||
read NAME
|
||||
|
||||
#Build the client key and then encrypt the key
|
||||
cd /etc/openvpn/easy-rsa
|
||||
source /etc/openvpn/easy-rsa/vars
|
||||
./build-key-pass $NAME
|
||||
cd keys
|
||||
openssl rsa -in $NAME$OKEY -des3 -out $NAME$KEY
|
||||
|
||||
#1st Verify that clients Public Key Exists
|
||||
if [ ! -f $NAME$CRT ]; then
|
||||
echo "[ERROR]: Client Public Key Certificate not found: $NAME$CRT"
|
||||
exit
|
||||
fi
|
||||
echo "Client's cert found: $NAME$CRT"
|
||||
|
||||
#Then, verify that there is a private key for that client
|
||||
if [ ! -f $NAME$KEY ]; then
|
||||
echo "[ERROR]: Client 3des Private Key not found: $NAME$KEY"
|
||||
exit
|
||||
fi
|
||||
echo "Client's Private Key found: $NAME$KEY"
|
||||
|
||||
#Confirm the CA public key exists
|
||||
if [ ! -f $CA ]; then
|
||||
echo "[ERROR]: CA Public Key not found: $CA"
|
||||
exit
|
||||
fi
|
||||
echo "CA public Key found: $CA"
|
||||
|
||||
#Confirm the tls-auth ta key file exists
|
||||
if [ ! -f $TA ]; then
|
||||
echo "[ERROR]: tls-auth Key not found: $TA"
|
||||
exit
|
||||
fi
|
||||
echo "tls-auth Private Key found: $TA"
|
||||
|
||||
#Ready to make a new .ovpn file - Start by populating with the
|
||||
#default file
|
||||
cat $DEFAULT > $NAME$FILEEXT
|
||||
|
||||
#Now, append the CA Public Cert
|
||||
echo "<ca>" >> $NAME$FILEEXT
|
||||
cat $CA >> $NAME$FILEEXT
|
||||
echo "</ca>" >> $NAME$FILEEXT
|
||||
|
||||
#Next append the client Public Cert
|
||||
echo "<cert>" >> $NAME$FILEEXT
|
||||
cat $NAME$CRT | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' >> $NAME$FILEEXT
|
||||
echo "</cert>" >> $NAME$FILEEXT
|
||||
|
||||
#Then, append the client Private Key
|
||||
echo "<key>" >> $NAME$FILEEXT
|
||||
cat $NAME$KEY >> $NAME$FILEEXT
|
||||
echo "</key>" >> $NAME$FILEEXT
|
||||
|
||||
#Finally, append the TA Private Key
|
||||
echo "<tls-auth>" >> $NAME$FILEEXT
|
||||
cat $TA >> $NAME$FILEEXT
|
||||
echo "</tls-auth>" >> $NAME$FILEEXT
|
||||
|
||||
# Copy the .ovpn profile to the home directory for convenient remote access
|
||||
cp /etc/openvpn/easy-rsa/keys/$NAME$FILEEXT /home/$INSTALL_USER/ovpns/$NAME$FILEEXT
|
||||
echo "$NAME$FILEEXT moved to home directory."
|
||||
whiptail --title "MakeOVPN" --msgbox "Done! $NAME$FILEEXT successfully created and \
|
||||
moved to directory /home/$INSTALL_USER/ovpns." 8 78
|
||||
|
||||
# Original script written by Eric Jodoin.
|
2
scripts/pivpnDebug.sh
Normal file
2
scripts/pivpnDebug.sh
Normal file
|
@ -0,0 +1,2 @@
|
|||
#!/usr/bin/env bash
|
||||
echo "::: This feature is not yet implemented... stay tuned!"
|
47
scripts/removeOVPN.sh
Normal file
47
scripts/removeOVPN.sh
Normal file
|
@ -0,0 +1,47 @@
|
|||
#!/usr/bin/env bash
|
||||
# PiVPN: revoke client script
|
||||
|
||||
INSTALL_USER=$(cat /etc/pivpn/INSTALL_USER)
|
||||
REVOKE_STATUS=$(cat /etc/pivpn/REVOKE_STATUS)
|
||||
INDEX="/etc/openvpn/easy-rsa/keys/index.txt"
|
||||
|
||||
if [ ! -f $INDEX ]; then
|
||||
printf "The file: $INDEX \n"
|
||||
printf "Was not Found!\n"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
printf "\n"
|
||||
printf " ::\e[4m Certificate List \e[0m:: \n"
|
||||
|
||||
while read -r line || [[ -n "$line" ]]; do
|
||||
status=$(echo $line | awk '{print $1}')
|
||||
if [[ $status = "V" ]]; then
|
||||
var=$(echo $line | awk '{print $5}' | cut -d'/' -f7)
|
||||
var=${var#CN=}
|
||||
if [ "$var" != "server" ]; then
|
||||
printf " $var\n"
|
||||
fi
|
||||
fi
|
||||
done <$INDEX
|
||||
printf "\n"
|
||||
|
||||
echo "::: Please enter the Name of the client to be revoked from the list above:"
|
||||
read NAME
|
||||
|
||||
cd /etc/openvpn/easy-rsa
|
||||
source /etc/openvpn/easy-rsa/vars
|
||||
|
||||
./revoke-full $NAME
|
||||
echo "::: Certificate revoked, removing ovpns from /home/$INSTALL_USER/ovpns"
|
||||
rm /home/$INSTALL_USER/ovpns/$NAME.ovpn
|
||||
cp /etc/openvpn/easy-rsa/keys/crl.pem /etc/openvpn/crl.pem
|
||||
echo "::: Completed!"
|
||||
|
||||
if [ $REVOKE_STATUS == 0 ]; then
|
||||
echo 1 > /etc/pivpn/REVOKE_STATUS
|
||||
printf "\nThis seems to be the first time you have revoked a cert.\n"
|
||||
printf "We are adding the CRL to the server.conf and restarting openvpn.\n"
|
||||
sed -i '/#crl-verify/c\crl-verify /etc/openvpn/crl.pem' /etc/openvpn/server.conf
|
||||
systemctl restart openvpn.service
|
||||
fi
|
117
scripts/uninstall.sh
Normal file
117
scripts/uninstall.sh
Normal file
|
@ -0,0 +1,117 @@
|
|||
#!/usr/bin/env bash
|
||||
# PiVPN: Uninstall Script
|
||||
|
||||
# Must be root to uninstall
|
||||
if [[ $EUID -eq 0 ]];then
|
||||
echo "::: You are root."
|
||||
else
|
||||
echo "::: Sudo will be used for the uninstall."
|
||||
# Check if it is actually installed
|
||||
# If it isn't, exit because the unnstall cannot complete
|
||||
if [[ $(dpkg-query -s sudo) ]];then
|
||||
export SUDO="sudo"
|
||||
else
|
||||
echo "::: Please install sudo or run this as root."
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
INSTALL_USER=$(cat /etc/pivpn/INSTALL_USER)
|
||||
|
||||
# Find the rows and columns
|
||||
rows=$(tput lines)
|
||||
columns=$(tput cols)
|
||||
|
||||
# Divide by two so the dialogs take up half of the screen, which looks nice.
|
||||
r=$(( rows / 2 ))
|
||||
c=$(( columns / 2 ))
|
||||
|
||||
spinner()
|
||||
{
|
||||
local pid=$1
|
||||
local delay=0.50
|
||||
local spinstr='/-\|'
|
||||
while [ "$(ps a | awk '{print $1}' | grep "$pid")" ]; do
|
||||
local temp=${spinstr#?}
|
||||
printf " [%c] " "$spinstr"
|
||||
local spinstr=$temp${spinstr%"$temp"}
|
||||
sleep $delay
|
||||
printf "\b\b\b\b\b\b"
|
||||
done
|
||||
printf " \b\b\b\b"
|
||||
}
|
||||
|
||||
function removeAll {
|
||||
# Purge dependencies
|
||||
echo ":::"
|
||||
dependencies=( openvpn easy-rsa git iptables-persistent dnsutils )
|
||||
for i in "${dependencies[@]}"; do
|
||||
if [ "$(dpkg-query -W --showformat='${Status}\n' "$i" 2> /dev/null | grep -c "ok installed")" -eq 1 ]; then
|
||||
while true; do
|
||||
read -rp "::: Do you wish to remove $i from your system? [y/n]: " yn
|
||||
case $yn in
|
||||
[Yy]* ) printf ":::\tRemoving %s..." "$i"; $SUDO apt-get -y remove --purge "$i" &> /dev/null & spinner $!; printf "done!\n";
|
||||
if [ "$i" == "openvpn" ]; then UINST_OVPN=1 ; fi
|
||||
break;;
|
||||
[Nn]* ) printf ":::\tSkipping %s" "$i\n"; break;;
|
||||
* ) printf "::: You must answer yes or no!\n";;
|
||||
esac
|
||||
done
|
||||
else
|
||||
printf ":::\tPackage %s not installed... Not removing.\n" "$i"
|
||||
fi
|
||||
done
|
||||
|
||||
# Take care of any additional package cleaning
|
||||
printf "::: Auto removing remaining dependencies..."
|
||||
$SUDO apt-get -y autoremove &> /dev/null & spinner $!; printf "done!\n";
|
||||
printf "::: Auto cleaning remaining dependencies..."
|
||||
$SUDO apt-get -y autoclean &> /dev/null & spinner $!; printf "done!\n";
|
||||
|
||||
echo ":::"
|
||||
# Removing pivpn files
|
||||
echo "::: Removing pivpn system files..."
|
||||
$SUDO rm -rf /opt/pivpn &> /dev/null
|
||||
$SUDO rm -rf /etc/.pivpn &> /dev/null
|
||||
$SUDO rm -rf /etc/pivpn &> /dev/null
|
||||
$SUDO rm -rf /home/$INSTALL_USER/ovpns &> /dev/null
|
||||
|
||||
$SUDO rm -rf /var/log/*pivpn* &> /dev/null
|
||||
$SUDO rm -rf /var/log/*openvpn* &> /dev/null
|
||||
if [[ $UINST_OVPN = 1 ]]; then
|
||||
$SUDO rm -rf /etc/openvpn &> /dev/null
|
||||
fi
|
||||
$SUDO rm /usr/local/bin/pivpn &> /dev/null
|
||||
$SUDO rm /etc/bash_completion.d/pivpn
|
||||
|
||||
# Disable IPv4 forwarding
|
||||
sed -i '/net.ipv4.ip_forward=1/c\#net.ipv4.ip_forward=1' /etc/sysctl.conf
|
||||
sysctl -p
|
||||
|
||||
echo ":::"
|
||||
printf "::: Finished removing PiVPN from your system.\n"
|
||||
printf "::: Reinstall by simpling running\n:::\n:::\tcurl -L vigilcode.com/pivpnsetup | bash\n:::\n::: at any time!\n:::\n"
|
||||
}
|
||||
|
||||
function askreboot() {
|
||||
printf "It is \e[1mstrongly\e[0m recommended to reboot after un-installation.\n"
|
||||
read -p "Would you like to reboot now (y/n)? " -n 1 -r
|
||||
echo
|
||||
if [[ $REPLY =~ ^[Yy]$ ]]; then
|
||||
printf "\nRebooting system...\n"
|
||||
sleep 3
|
||||
shutdown -r now
|
||||
fi
|
||||
}
|
||||
|
||||
######### SCRIPT ###########
|
||||
echo "::: Preparing to remove packages, be sure that each may be safely removed depending on your operating system."
|
||||
echo "::: (SAFE TO REMOVE ALL ON RASPBIAN)"
|
||||
while true; do
|
||||
read -rp "::: Do you wish to completely remove PiVPN configuration and installed packages from your system? (You will be prompted for each package) [y/n]: " yn
|
||||
case $yn in
|
||||
[Yy]* ) removeAll; askreboot; break;;
|
||||
|
||||
[Nn]* ) printf "::: Not removing anything, exiting...\n"; break;;
|
||||
esac
|
||||
done
|
37
server_config.txt
Normal file
37
server_config.txt
Normal file
|
@ -0,0 +1,37 @@
|
|||
dev tun
|
||||
proto udp
|
||||
port 1194
|
||||
ca /etc/openvpn/easy-rsa/keys/ca.crt
|
||||
cert /etc/openvpn/easy-rsa/keys/server.crt
|
||||
key /etc/openvpn/easy-rsa/keys/server.key
|
||||
dh /etc/openvpn/easy-rsa/keys/dh1024.pem
|
||||
server 10.8.0.0 255.255.255.0
|
||||
# server and remote endpoints
|
||||
ifconfig 10.8.0.1 10.8.0.2
|
||||
# Add route to Client routing table for the OpenVPN Server
|
||||
push "route 10.8.0.1 255.255.255.255"
|
||||
# Add route to Client routing table for the OPenVPN Subnet
|
||||
push "route 10.8.0.0 255.255.255.0"
|
||||
# your local subnet
|
||||
push "route LOCALIP 255.255.255.0"
|
||||
# Set your primary domain name server address to Google DNS 8.8.8.8
|
||||
push "dhcp-option DNS 8.8.8.8"
|
||||
# Override the Client default gateway by using 0.0.0.0/1 and
|
||||
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
|
||||
# overriding but not wiping out the original default gateway.
|
||||
push "redirect-gateway def1"
|
||||
client-to-client
|
||||
duplicate-cn
|
||||
keepalive 10 120
|
||||
tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
|
||||
cipher AES-128-CBC
|
||||
comp-lzo
|
||||
user nobody
|
||||
group nogroup
|
||||
persist-key
|
||||
persist-tun
|
||||
#crl-verify /etc/openvpn/crl.pem
|
||||
status /var/log/openvpn-status.log 20
|
||||
log /var/log/openvpn.log
|
||||
verb 1
|
||||
# This configuration file was originally written by Lauren Orsini at ReadWrite.
|
Loading…
Reference in a new issue