1
0
mirror of https://github.com/Nyr/openvpn-install.git synced 2024-11-24 05:56:08 +03:00
openvpn-install/openvpn-install.sh

457 lines
16 KiB
Bash
Raw Normal View History

2013-05-14 16:04:19 +04:00
#!/bin/bash
2018-07-08 23:05:16 +03:00
# https://github.com/birkhoffcheng/openvpn-install
2013-05-14 16:04:19 +04:00
# Detect Debian users running the script with "sh" instead of bash
if readlink /proc/$$/exe | grep -q "dash"; then
echo "This script needs to be run with bash, not sh"
2018-05-10 18:24:43 +03:00
exit
2013-05-14 16:04:19 +04:00
fi
if [[ "$EUID" -ne 0 ]]; then
echo "Sorry, you need to run this as root"
2018-05-10 18:24:43 +03:00
exit
fi
2013-05-14 16:04:19 +04:00
if [[ ! -e /dev/net/tun ]]; then
2017-03-31 14:52:08 +03:00
echo "The TUN device is not available
You need to enable TUN before running this script"
2018-05-10 18:24:43 +03:00
exit
fi
2015-02-11 21:51:19 +03:00
if [[ -e /etc/debian_version ]]; then
OS=debian
2016-05-15 21:50:37 +03:00
GROUPNAME=nogroup
RCLOCAL='/etc/rc.local'
2015-02-11 21:51:19 +03:00
elif [[ -e /etc/centos-release || -e /etc/redhat-release ]]; then
OS=centos
2016-05-15 21:50:37 +03:00
GROUPNAME=nobody
RCLOCAL='/etc/rc.d/rc.local'
2015-02-11 21:51:19 +03:00
else
2017-03-31 14:52:08 +03:00
echo "Looks like you aren't running this installer on Debian, Ubuntu or CentOS"
2018-05-10 18:24:43 +03:00
exit
2013-05-14 16:04:19 +04:00
fi
2014-10-23 02:19:08 +04:00
newclient () {
# Generates the custom client.ovpn
cp /etc/openvpn/client-common.txt ~/$1.ovpn
2014-10-23 05:16:09 +04:00
echo "<ca>" >> ~/$1.ovpn
cat /etc/openvpn/easy-rsa/pki/ca.crt >> ~/$1.ovpn
2014-10-23 05:16:09 +04:00
echo "</ca>" >> ~/$1.ovpn
echo "<cert>" >> ~/$1.ovpn
cat /etc/openvpn/easy-rsa/pki/issued/$1.crt >> ~/$1.ovpn
2014-10-23 05:16:09 +04:00
echo "</cert>" >> ~/$1.ovpn
echo "<key>" >> ~/$1.ovpn
cat /etc/openvpn/easy-rsa/pki/private/$1.key >> ~/$1.ovpn
2014-10-23 05:16:09 +04:00
echo "</key>" >> ~/$1.ovpn
2016-05-15 20:22:32 +03:00
echo "<tls-auth>" >> ~/$1.ovpn
cat /etc/openvpn/ta.key >> ~/$1.ovpn
echo "</tls-auth>" >> ~/$1.ovpn
2014-10-23 02:19:08 +04:00
}
if [[ -e /etc/openvpn/server.conf ]]; then
2013-05-14 16:04:19 +04:00
while :
do
clear
2018-04-21 21:41:16 +03:00
echo "Looks like OpenVPN is already installed."
echo
echo "What do you want to do?"
2017-01-31 20:19:19 +03:00
echo " 1) Add a new user"
echo " 2) Revoke an existing user"
echo " 3) Remove OpenVPN"
echo " 4) Exit"
read -p "Select an option [1-4]: " option
2013-05-14 16:04:19 +04:00
case $option in
2018-07-11 08:18:45 +03:00
1)
2018-04-21 21:41:16 +03:00
echo
echo "Tell me a name for the client certificate."
echo "Please, use one word only, no special characters."
2018-05-10 18:24:43 +03:00
read -p "Client name: " -e CLIENT
cd /etc/openvpn/easy-rsa/
./easyrsa build-client-full $CLIENT nopass
# Generates the custom client.ovpn
2014-10-23 02:19:08 +04:00
newclient "$CLIENT"
2018-04-21 21:41:16 +03:00
echo
echo "Client $CLIENT added, configuration is available at:" ~/"$CLIENT.ovpn"
2018-07-11 08:18:45 +03:00
echo "and ~/client.ssl. Install stunnel4 on client before you continue."
2013-05-14 16:04:19 +04:00
exit
;;
2)
# This option could be documented a bit better and maybe even be simplified
# ...but what can I say, I want some sleep too
NUMBEROFCLIENTS=$(tail -n +2 /etc/openvpn/easy-rsa/pki/index.txt | grep -c "^V")
if [[ "$NUMBEROFCLIENTS" = '0' ]]; then
2018-04-21 21:41:16 +03:00
echo
echo "You have no existing clients!"
2018-05-10 18:24:43 +03:00
exit
fi
2018-04-21 21:41:16 +03:00
echo
echo "Select the existing client certificate you want to revoke:"
tail -n +2 /etc/openvpn/easy-rsa/pki/index.txt | grep "^V" | cut -d '=' -f 2 | nl -s ') '
if [[ "$NUMBEROFCLIENTS" = '1' ]]; then
read -p "Select one client [1]: " CLIENTNUMBER
else
read -p "Select one client [1-$NUMBEROFCLIENTS]: " CLIENTNUMBER
fi
CLIENT=$(tail -n +2 /etc/openvpn/easy-rsa/pki/index.txt | grep "^V" | cut -d '=' -f 2 | sed -n "$CLIENTNUMBER"p)
2018-04-21 21:41:16 +03:00
echo
2018-05-10 18:24:43 +03:00
read -p "Do you really want to revoke access for client $CLIENT? [y/N]: " -e REVOKE
if [[ "$REVOKE" = 'y' || "$REVOKE" = 'Y' ]]; then
cd /etc/openvpn/easy-rsa/
./easyrsa --batch revoke $CLIENT
EASYRSA_CRL_DAYS=3650 ./easyrsa gen-crl
rm -f pki/reqs/$CLIENT.req
rm -f pki/private/$CLIENT.key
rm -f pki/issued/$CLIENT.crt
rm -f /etc/openvpn/crl.pem
cp /etc/openvpn/easy-rsa/pki/crl.pem /etc/openvpn/crl.pem
# CRL is read with each client connection, when OpenVPN is dropped to nobody
chown nobody:$GROUPNAME /etc/openvpn/crl.pem
echo
echo "Certificate for client $CLIENT revoked!"
else
echo
echo "Certificate revocation for client $CLIENT aborted!"
fi
exit
;;
2018-07-11 08:18:45 +03:00
3)
2018-04-21 21:41:16 +03:00
echo
2018-05-10 18:24:43 +03:00
read -p "Do you really want to remove OpenVPN? [y/N]: " -e REMOVE
if [[ "$REMOVE" = 'y' || "$REMOVE" = 'Y' ]]; then
PORT=$(grep '^port ' /etc/openvpn/server.conf | cut -d " " -f 2)
PROTOCOL=$(grep '^proto ' /etc/openvpn/server.conf | cut -d " " -f 2)
if pgrep firewalld; then
2017-04-27 15:46:34 +03:00
IP=$(firewall-cmd --direct --get-rules ipv4 nat POSTROUTING | grep '\-s 10.8.0.0/24 '"'"'!'"'"' -d 10.8.0.0/24 -j SNAT --to ' | cut -d " " -f 10)
# Using both permanent and not permanent rules to avoid a firewalld reload.
firewall-cmd --zone=public --remove-port=$PORT/$PROTOCOL
firewall-cmd --zone=trusted --remove-source=10.8.0.0/24
firewall-cmd --permanent --zone=public --remove-port=$PORT/$PROTOCOL
firewall-cmd --permanent --zone=trusted --remove-source=10.8.0.0/24
2017-04-27 15:46:34 +03:00
firewall-cmd --direct --remove-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
firewall-cmd --permanent --direct --remove-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
else
IP=$(grep 'iptables -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to ' $RCLOCAL | cut -d " " -f 14)
2017-04-27 15:46:34 +03:00
iptables -t nat -D POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
sed -i '/iptables -t nat -A POSTROUTING -s 10.8.0.0\/24 ! -d 10.8.0.0\/24 -j SNAT --to /d' $RCLOCAL
if iptables -L -n | grep -qE '^ACCEPT'; then
iptables -D INPUT -p $PROTOCOL --dport $PORT -j ACCEPT
iptables -D FORWARD -s 10.8.0.0/24 -j ACCEPT
iptables -D FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
sed -i "/iptables -I INPUT -p $PROTOCOL --dport $PORT -j ACCEPT/d" $RCLOCAL
sed -i "/iptables -I FORWARD -s 10.8.0.0\/24 -j ACCEPT/d" $RCLOCAL
sed -i "/iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT/d" $RCLOCAL
fi
fi
if sestatus 2>/dev/null | grep "Current mode" | grep -q "enforcing" && [[ "$PORT" != '1194' ]]; then
semanage port -d -t openvpn_port_t -p $PROTOCOL $PORT
fi
2015-02-11 21:51:19 +03:00
if [[ "$OS" = 'debian' ]]; then
apt remove --purge openvpn stunnel4 -y
2015-02-11 21:51:19 +03:00
else
yum remove openvpn stunnel4 -y
2015-02-11 21:51:19 +03:00
fi
rm -rf /etc/openvpn
rm -f /etc/sysctl.d/30-openvpn-forward.conf
2018-04-21 21:41:16 +03:00
echo
echo "OpenVPN removed!"
2015-01-25 22:45:07 +03:00
else
2018-04-21 21:41:16 +03:00
echo
2015-01-25 22:45:07 +03:00
echo "Removal aborted!"
fi
2013-05-14 16:04:19 +04:00
exit
;;
4) exit;;
2013-05-14 16:04:19 +04:00
esac
done
else
clear
2018-07-08 23:24:38 +03:00
echo 'Welcome to OpenVPN installer!'
2018-04-21 21:41:16 +03:00
echo
2013-05-14 16:04:19 +04:00
# OpenVPN setup and first user creation
2018-04-21 21:41:16 +03:00
echo "I need to ask you a few questions before starting the setup."
echo "You can leave the default options and just press enter if you are ok with them."
echo
echo "First, provide the IPv4 address of the network interface you want OpenVPN"
2013-05-14 16:04:19 +04:00
echo "listening to."
# Autodetect IP address and pre-fill for the user
IP=$(ip addr | grep 'inet' | grep -v inet6 | grep -vE '127\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | grep -oE '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | head -1)
2013-05-14 16:04:19 +04:00
read -p "IP address: " -e -i $IP IP
# If $IP is a private IP address, the server must be behind NAT
if echo "$IP" | grep -qE '^(10\.|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.|192\.168)'; then
2018-04-21 21:41:16 +03:00
echo
echo "This server is behind NAT. What is the public IPv4 address or hostname?"
read -p "Public IP address / hostname: " -e PUBLICIP
2018-04-21 21:41:16 +03:00
fi
echo
2017-01-04 05:41:47 +03:00
echo "Which protocol do you want for OpenVPN connections?"
echo " 1) UDP (recommended)"
echo " 2) TCP"
2018-07-11 21:14:03 +03:00
echo " 3) OpenVPN over SSL"
2018-07-11 08:18:45 +03:00
read -p "Protocol [1-3]: " -e -i 1 PROTOCOLCHOICE
case $PROTOCOLCHOICE in
1)
PROTOCOL=udp
2018-07-11 08:18:45 +03:00
SSL=0
;;
2018-07-11 08:18:45 +03:00
2)
PROTOCOL=tcp
2018-07-11 08:18:45 +03:00
SSL=0
;;
2018-07-11 08:18:45 +03:00
3)
PROTOCOL=tcp
SSL=1
2018-07-11 21:14:03 +03:00
;;
esac
2018-04-21 21:41:16 +03:00
echo
2017-01-04 05:41:47 +03:00
echo "What port do you want OpenVPN listening to?"
2018-07-11 08:18:45 +03:00
read -p "Port: " -e -i 443 PORT
2018-04-21 21:41:16 +03:00
echo
2018-07-08 23:22:47 +03:00
echo "Which cipher mode do you want to use?"
echo " 1) AES-256-GCM (provides authenticated encryption)"
echo " 2) AES-256-CBC (compatible with versions of OpenVPN older than 2.4)"
2018-07-11 08:18:45 +03:00
read -p "Cipher Mode [1-2]: " -e -i 1 CIPHERCHOICE
2018-07-08 23:22:47 +03:00
case $CIPHERCHOICE in
1)
CIPHER=AES-256-GCM
;;
2)
CIPHER=AES-256-CBC
;;
esac
echo
2017-01-04 05:41:47 +03:00
echo "Which DNS do you want to use with the VPN?"
echo " 1) Current system resolvers"
echo " 2) 1.1.1.1"
echo " 3) Google"
echo " 4) OpenDNS"
echo " 5) Verisign"
read -p "DNS [1-5]: " -e -i 1 DNS
2018-04-21 21:41:16 +03:00
echo
echo "Finally, tell me your name for the client certificate."
echo "Please, use one word only, no special characters."
2013-05-14 16:04:19 +04:00
read -p "Client name: " -e -i client CLIENT
2018-07-08 23:05:16 +03:00
read -p "For how long should each session key be used? (seconds) " -e -i 3600 RENEGKEY
2018-04-21 21:41:16 +03:00
echo
echo "Okay, that was all I needed. We are ready to set up your OpenVPN server now."
2013-05-14 16:04:19 +04:00
read -n1 -r -p "Press any key to continue..."
if [[ "$OS" = 'debian' ]]; then
2018-07-11 21:14:03 +03:00
apt update
apt dist-upgrade -y
apt install openvpn iptables openssl ca-certificates stunnel4 -y
2015-02-11 21:51:19 +03:00
else
# Else, the distro is CentOS
yum install epel-release -y
2018-07-11 08:18:45 +03:00
yum install openvpn iptables openssl ca-certificates stunnel4 -y
fi
# Get easy-rsa
EASYRSAURL='https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.4/EasyRSA-3.0.4.tgz'
wget -O ~/easyrsa.tgz "$EASYRSAURL" 2>/dev/null || curl -Lo ~/easyrsa.tgz "$EASYRSAURL"
tar xzf ~/easyrsa.tgz -C ~/
2018-01-21 19:54:33 +03:00
mv ~/EasyRSA-3.0.4/ /etc/openvpn/
mv /etc/openvpn/EasyRSA-3.0.4/ /etc/openvpn/easy-rsa/
chown -R root:root /etc/openvpn/easy-rsa/
rm -f ~/easyrsa.tgz
cd /etc/openvpn/easy-rsa/
# Create the PKI, set up the CA, the DH params and the server + client certificates
./easyrsa init-pki
./easyrsa --batch build-ca nopass
./easyrsa gen-dh
./easyrsa build-server-full server nopass
./easyrsa build-client-full $CLIENT nopass
EASYRSA_CRL_DAYS=3650 ./easyrsa gen-crl
# Move the stuff we need
cp pki/ca.crt pki/private/ca.key pki/dh.pem pki/issued/server.crt pki/private/server.key pki/crl.pem /etc/openvpn
2016-05-15 21:50:37 +03:00
# CRL is read with each client connection, when OpenVPN is dropped to nobody
chown nobody:$GROUPNAME /etc/openvpn/crl.pem
2016-05-15 20:22:32 +03:00
# Generate key for tls-auth
openvpn --genkey --secret /etc/openvpn/ta.key
# Generate server.conf
2018-07-11 08:18:45 +03:00
if [[ $SSL==1 ]]; then
2018-07-11 21:14:03 +03:00
echo "local 127.0.0.1" > /etc/openvpn/server.conf
echo "port 1194" >> /etc/openvpn/server.conf
csplit -f /etc/openvpn/cert. /etc/openvpn/server.crt '/-----BEGIN CERTIFICATE-----/' '{*}'
rm /etc/openvpn/cert.00 /etc/openvpn/server.crt
mv /etc/openvpn/cert.01 /etc/openvpn/server.crt
cp /etc/openvpn/server.crt /etc/stunnel/
2018-07-11 21:14:03 +03:00
cp /etc/openvpn/server.key /etc/stunnel/
2018-07-11 08:18:45 +03:00
echo "sslVersion = all
2018-07-11 21:14:03 +03:00
;chroot = /var/lib/stunnel4/
pid = /var/run/stunnel4.pid
debug = 3
output = /var/log/stunnel4/stunnel.log
2018-07-11 08:18:45 +03:00
[openvpn]
2018-07-11 21:14:03 +03:00
accept = 0.0.0.0:443
2018-07-11 08:18:45 +03:00
connect = 127.0.0.1:1194
2018-07-11 21:14:03 +03:00
cert=/etc/stunnel/server.crt
key=/etc/stunnel/server.key" > /etc/stunnel/stunnel.conf
2018-07-11 08:18:45 +03:00
else
echo "port $PORT" > /etc/openvpn/server.conf
fi
echo "proto $PROTOCOL
dev tun
sndbuf 0
rcvbuf 0
ca ca.crt
cert server.crt
key server.key
dh dh.pem
auth SHA512
2016-05-15 20:22:32 +03:00
tls-auth ta.key 0
topology subnet
server 10.8.0.0 255.255.255.0
2018-07-11 08:18:45 +03:00
ifconfig-pool-persist ipp.txt" >> /etc/openvpn/server.conf
echo 'push "redirect-gateway def1 bypass-dhcp"' >> /etc/openvpn/server.conf
# DNS
case $DNS in
1)
# Locate the proper resolv.conf
# Needed for systems running systemd-resolved
if grep -q "127.0.0.53" "/etc/resolv.conf"; then
RESOLVCONF='/run/systemd/resolve/resolv.conf'
else
RESOLVCONF='/etc/resolv.conf'
fi
# Obtain the resolvers from resolv.conf and use them for OpenVPN
grep -v '#' $RESOLVCONF | grep 'nameserver' | grep -E -o '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | while read line; do
echo "push \"dhcp-option DNS $line\"" >> /etc/openvpn/server.conf
done
;;
2)
echo 'push "dhcp-option DNS 1.1.1.1"' >> /etc/openvpn/server.conf
echo 'push "dhcp-option DNS 1.0.0.1"' >> /etc/openvpn/server.conf
;;
3)
echo 'push "dhcp-option DNS 8.8.8.8"' >> /etc/openvpn/server.conf
echo 'push "dhcp-option DNS 8.8.4.4"' >> /etc/openvpn/server.conf
;;
4)
echo 'push "dhcp-option DNS 208.67.222.222"' >> /etc/openvpn/server.conf
echo 'push "dhcp-option DNS 208.67.220.220"' >> /etc/openvpn/server.conf
;;
5)
2016-04-07 17:57:47 +03:00
echo 'push "dhcp-option DNS 64.6.64.6"' >> /etc/openvpn/server.conf
echo 'push "dhcp-option DNS 64.6.65.6"' >> /etc/openvpn/server.conf
;;
esac
echo "keepalive 10 120
2018-07-08 23:22:47 +03:00
cipher $CIPHER
comp-lzo
2016-05-15 21:50:37 +03:00
user nobody
group $GROUPNAME
persist-key
persist-tun
status openvpn-status.log
verb 3
crl-verify crl.pem" >> /etc/openvpn/server.conf
2013-05-14 16:04:19 +04:00
# Enable net.ipv4.ip_forward for the system
echo 'net.ipv4.ip_forward=1' > /etc/sysctl.d/30-openvpn-forward.conf
# Enable without waiting for a reboot or service restart
2013-05-14 16:04:19 +04:00
echo 1 > /proc/sys/net/ipv4/ip_forward
if pgrep firewalld; then
# Using both permanent and not permanent rules to avoid a firewalld
# reload.
# We don't use --add-service=openvpn because that would only work with
# the default port and protocol.
firewall-cmd --zone=public --add-port=$PORT/$PROTOCOL
firewall-cmd --zone=trusted --add-source=10.8.0.0/24
firewall-cmd --permanent --zone=public --add-port=$PORT/$PROTOCOL
firewall-cmd --permanent --zone=trusted --add-source=10.8.0.0/24
# Set NAT for the VPN subnet
2017-04-27 15:46:34 +03:00
firewall-cmd --direct --add-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
firewall-cmd --permanent --direct --add-rule ipv4 nat POSTROUTING 0 -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
else
# Needed to use rc.local with some systemd distros
if [[ "$OS" = 'debian' && ! -e $RCLOCAL ]]; then
echo '#!/bin/sh -e
exit 0' > $RCLOCAL
fi
chmod +x $RCLOCAL
# Set NAT for the VPN subnet
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP
sed -i "1 a\iptables -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to $IP" $RCLOCAL
if iptables -L -n | grep -qE '^(REJECT|DROP)'; then
# If iptables has at least one REJECT rule, we asume this is needed.
# Not the best approach but I can't think of other and this shouldn't
# cause problems.
iptables -I INPUT -p $PROTOCOL --dport $PORT -j ACCEPT
iptables -I FORWARD -s 10.8.0.0/24 -j ACCEPT
iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
sed -i "1 a\iptables -I INPUT -p $PROTOCOL --dport $PORT -j ACCEPT" $RCLOCAL
sed -i "1 a\iptables -I FORWARD -s 10.8.0.0/24 -j ACCEPT" $RCLOCAL
sed -i "1 a\iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT" $RCLOCAL
fi
fi
# If SELinux is enabled and a custom port was selected, we need this
if sestatus 2>/dev/null | grep "Current mode" | grep -q "enforcing" && [[ "$PORT" != '1194' ]]; then
# Install semanage if not already present
if ! hash semanage 2>/dev/null; then
yum install policycoreutils-python -y
fi
semanage port -a -t openvpn_port_t -p $PROTOCOL $PORT
fi
2013-05-14 16:04:19 +04:00
# And finally, restart OpenVPN
2015-02-11 21:51:19 +03:00
if [[ "$OS" = 'debian' ]]; then
# Little hack to check for systemd
if pgrep systemd-journal; then
systemctl restart openvpn@server.service
else
/etc/init.d/openvpn restart
fi
else
if pgrep systemd-journal; then
2015-02-11 21:51:19 +03:00
systemctl restart openvpn@server.service
systemctl enable openvpn@server.service
else
service openvpn restart
chkconfig openvpn on
fi
fi
2018-05-03 12:03:15 +03:00
# If the server is behind a NAT, use the correct IP address
2018-04-21 21:41:16 +03:00
if [[ "$PUBLICIP" != "" ]]; then
IP=$PUBLICIP
fi
# client-common.txt is created so we have a template to add further users later
echo "client
dev tun
proto $PROTOCOL
sndbuf 0
2018-07-11 08:18:45 +03:00
rcvbuf 0" > /etc/openvpn/client-common.txt
if [[ $SSL=1 ]]; then
echo "remote 127.0.0.1 1194" >> /etc/openvpn/client-common.txt
else
echo "remote $IP $PORT" >> /etc/openvpn/client-common.txt
fi
echo "resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
auth SHA512
2018-07-08 23:22:47 +03:00
cipher $CIPHER
comp-lzo
setenv opt block-outside-dns
2016-05-15 20:22:32 +03:00
key-direction 1
2018-07-08 23:05:16 +03:00
reneg-sec $RENEGKEY
2018-07-11 08:18:45 +03:00
verb 3" >> /etc/openvpn/client-common.txt
echo "client = yes
debug = 6
[openvpn]
accept = 127.0.0.1:1194
connect = $IP:$PORT
TIMEOUTclose = 0
verify = 3
CAfile = ssl.crt" > /etc/stunnel/stunnel-client.conf
cp /etc/stunnel/stunnel-client.conf $HOME/stunnel.conf
cp /etc/openvpn/server.crt $HOME/stunnel.crt
# Generates the custom client.ovpn
2014-10-23 02:19:08 +04:00
newclient "$CLIENT"
2018-04-21 21:41:16 +03:00
echo
2013-05-14 16:04:19 +04:00
echo "Finished!"
2018-04-21 21:41:16 +03:00
echo
2018-07-11 08:18:45 +03:00
echo "Your client configuration is available at: ~/$CLIENT.ovpn"
if [[ $SSL=1 ]]; then
echo "~/stunnel.crt and ~/stunnel.conf. Install stunnel4 on client before you continue."
2018-07-11 08:18:45 +03:00
fi
2017-01-31 20:19:19 +03:00
echo "If you want to add more clients, you simply need to run this script again!"
2018-05-03 12:03:15 +03:00
fi