2021-09-07 10:55:37 +03:00
|
|
|
#!/bin/bash
|
|
|
|
#
|
2022-03-21 07:10:11 +03:00
|
|
|
# Script to uninstall IPsec VPN
|
2021-09-07 10:55:37 +03:00
|
|
|
#
|
|
|
|
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
|
|
|
|
#
|
|
|
|
# The latest version of this script is available at:
|
|
|
|
# https://github.com/hwdsl2/setup-ipsec-vpn
|
|
|
|
#
|
2022-01-02 09:09:03 +03:00
|
|
|
# Copyright (C) 2021-2022 Lin Song <linsongui@gmail.com>
|
2021-09-07 10:55:37 +03:00
|
|
|
#
|
|
|
|
# This work is licensed under the Creative Commons Attribution-ShareAlike 3.0
|
|
|
|
# Unported License: http://creativecommons.org/licenses/by-sa/3.0/
|
|
|
|
#
|
|
|
|
# Attribution required: please include my name in any derivative and let me
|
|
|
|
# know how you have improved it!
|
|
|
|
|
|
|
|
export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
|
|
SYS_DT=$(date +%F-%T | tr ':' '_')
|
|
|
|
|
|
|
|
exiterr() { echo "Error: $1" >&2; exit 1; }
|
|
|
|
conf_bk() { /bin/cp -f "$1" "$1.old-$SYS_DT" 2>/dev/null; }
|
|
|
|
bigecho() { echo "## $1"; }
|
|
|
|
|
2022-03-13 02:08:00 +03:00
|
|
|
check_cidr() {
|
|
|
|
CIDR_REGEX='^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(/(3[0-2]|[1-2][0-9]|[0-9]))$'
|
|
|
|
printf '%s' "$1" | tr -d '\n' | grep -Eq "$CIDR_REGEX"
|
|
|
|
}
|
|
|
|
|
2021-09-07 10:55:37 +03:00
|
|
|
check_root() {
|
|
|
|
if [ "$(id -u)" != 0 ]; then
|
2021-09-07 17:02:22 +03:00
|
|
|
exiterr "Script must be run as root. Try 'sudo bash $0'"
|
2021-09-07 10:55:37 +03:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
check_os() {
|
|
|
|
os_type=centos
|
|
|
|
rh_file="/etc/redhat-release"
|
|
|
|
if grep -qs "Red Hat" "$rh_file"; then
|
|
|
|
os_type=rhel
|
|
|
|
fi
|
2022-03-21 07:10:11 +03:00
|
|
|
[ -f /etc/oracle-release ] && os_type=ol
|
2022-07-30 10:59:49 +03:00
|
|
|
if grep -qs "release 7" "$rh_file" || grep -qs "release 8" "$rh_file" \
|
|
|
|
|| grep -qs "release 9" "$rh_file"; then
|
2021-09-07 10:55:37 +03:00
|
|
|
grep -qi rocky "$rh_file" && os_type=rocky
|
|
|
|
grep -qi alma "$rh_file" && os_type=alma
|
|
|
|
elif grep -qs "Amazon Linux release 2" /etc/system-release; then
|
|
|
|
os_type=amzn
|
|
|
|
else
|
|
|
|
os_type=$(lsb_release -si 2>/dev/null)
|
|
|
|
[ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID")
|
|
|
|
case $os_type in
|
|
|
|
[Uu]buntu)
|
|
|
|
os_type=ubuntu
|
|
|
|
;;
|
|
|
|
[Dd]ebian)
|
|
|
|
os_type=debian
|
|
|
|
;;
|
|
|
|
[Rr]aspbian)
|
|
|
|
os_type=raspbian
|
|
|
|
;;
|
2021-09-11 23:00:29 +03:00
|
|
|
[Aa]lpine)
|
|
|
|
os_type=alpine
|
|
|
|
;;
|
2021-09-07 10:55:37 +03:00
|
|
|
*)
|
2021-09-20 05:51:14 +03:00
|
|
|
cat 1>&2 <<'EOF'
|
|
|
|
Error: This script only supports one of the following OS:
|
2022-03-21 07:10:11 +03:00
|
|
|
Ubuntu, Debian, CentOS/RHEL, Rocky Linux, AlmaLinux,
|
|
|
|
Oracle Linux, Amazon Linux 2 or Alpine Linux
|
2021-09-20 05:51:14 +03:00
|
|
|
EOF
|
2021-09-11 23:00:29 +03:00
|
|
|
exit 1
|
2021-09-07 10:55:37 +03:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
check_libreswan() {
|
|
|
|
ipsec_ver=$(ipsec --version 2>/dev/null)
|
|
|
|
if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
|
2022-03-08 06:29:13 +03:00
|
|
|
|| ! printf '%s' "$ipsec_ver" | grep -qi 'libreswan'; then
|
2021-09-07 10:55:37 +03:00
|
|
|
exiterr "Cannot remove IPsec VPN because it has not been set up on this server."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
check_iface() {
|
|
|
|
def_iface=$(route 2>/dev/null | grep -m 1 '^default' | grep -o '[^ ]*$')
|
2021-09-11 23:00:29 +03:00
|
|
|
if [ "$os_type" != "alpine" ]; then
|
|
|
|
[ -z "$def_iface" ] && def_iface=$(ip -4 route list 0/0 2>/dev/null | grep -m 1 -Po '(?<=dev )(\S+)')
|
|
|
|
fi
|
2021-09-07 10:55:37 +03:00
|
|
|
def_state=$(cat "/sys/class/net/$def_iface/operstate" 2>/dev/null)
|
|
|
|
if [ -n "$def_state" ] && [ "$def_state" != "down" ]; then
|
|
|
|
check_wl=0
|
|
|
|
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
|
|
|
|
if ! uname -m | grep -qi -e '^arm' -e '^aarch64'; then
|
|
|
|
check_wl=1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
check_wl=1
|
|
|
|
fi
|
|
|
|
if [ "$check_wl" = "1" ]; then
|
|
|
|
case $def_iface in
|
|
|
|
wl*)
|
|
|
|
exiterr "Wireless interface '$def_iface' detected. DO NOT run this script on your PC or Mac!"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
NET_IFACE="$def_iface"
|
|
|
|
else
|
|
|
|
eth0_state=$(cat "/sys/class/net/eth0/operstate" 2>/dev/null)
|
|
|
|
if [ -z "$eth0_state" ] || [ "$eth0_state" = "down" ]; then
|
|
|
|
exiterr "Could not detect the default network interface."
|
|
|
|
fi
|
|
|
|
NET_IFACE=eth0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
abort_and_exit() {
|
|
|
|
echo "Abort. No changes were made." >&2
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
|
|
|
confirm_or_abort() {
|
|
|
|
printf '%s' "$1"
|
|
|
|
read -r response
|
|
|
|
case $response in
|
|
|
|
[yY][eE][sS]|[yY])
|
|
|
|
echo
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
abort_and_exit
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
|
|
|
confirm_remove() {
|
|
|
|
cat <<'EOF'
|
|
|
|
|
|
|
|
WARNING: This script will remove IPsec VPN from this server. All VPN configuration
|
|
|
|
will be *permanently deleted*, and Libreswan and xl2tpd will be removed.
|
|
|
|
This *cannot* be undone!
|
|
|
|
|
|
|
|
EOF
|
|
|
|
confirm_or_abort "Are you sure you want to remove the VPN? [y/N] "
|
|
|
|
}
|
|
|
|
|
|
|
|
stop_services() {
|
|
|
|
bigecho "Stopping services..."
|
|
|
|
service ipsec stop
|
|
|
|
service xl2tpd stop
|
|
|
|
}
|
|
|
|
|
|
|
|
remove_ipsec() {
|
|
|
|
bigecho "Removing IPsec..."
|
2021-09-09 08:14:26 +03:00
|
|
|
/bin/rm -rf /usr/local/sbin/ipsec /usr/local/libexec/ipsec /usr/local/share/doc/libreswan
|
|
|
|
/bin/rm -f /etc/init/ipsec.conf /lib/systemd/system/ipsec.service /etc/init.d/ipsec \
|
|
|
|
/usr/lib/systemd/system/ipsec.service /etc/logrotate.d/libreswan \
|
|
|
|
/usr/lib/tmpfiles.d/libreswan.conf
|
2021-09-07 10:55:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
remove_xl2tpd() {
|
|
|
|
bigecho "Removing xl2tpd..."
|
|
|
|
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
|
|
|
|
export DEBIAN_FRONTEND=noninteractive
|
|
|
|
apt-get -yqq purge xl2tpd >/dev/null
|
2021-09-11 23:00:29 +03:00
|
|
|
elif [ "$os_type" = "alpine" ]; then
|
|
|
|
apk del -q xl2tpd
|
2021-09-07 10:55:37 +03:00
|
|
|
else
|
|
|
|
yum -y -q remove xl2tpd >/dev/null
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2022-03-14 02:15:52 +03:00
|
|
|
remove_helper_scripts() {
|
|
|
|
bigecho "Removing helper scripts..."
|
|
|
|
for sc in ikev2.sh addvpnuser.sh delvpnuser.sh; do
|
|
|
|
if [ "$(readlink -f "/usr/bin/$sc" 2>/dev/null)" = "/opt/src/$sc" ]; then
|
|
|
|
/bin/rm -f "/usr/bin/$sc" "/opt/src/$sc"
|
|
|
|
fi
|
|
|
|
done
|
2021-09-22 08:03:20 +03:00
|
|
|
}
|
|
|
|
|
2021-09-07 10:55:37 +03:00
|
|
|
update_sysctl() {
|
|
|
|
if grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then
|
|
|
|
bigecho "Updating sysctl settings..."
|
|
|
|
conf_bk "/etc/sysctl.conf"
|
2021-09-11 23:00:29 +03:00
|
|
|
if [ "$os_type" = "alpine" ]; then
|
|
|
|
sed -i '/# Added by hwdsl2 VPN script/,+17d' /etc/sysctl.conf
|
|
|
|
else
|
|
|
|
sed --follow-symlinks -i '/# Added by hwdsl2 VPN script/,+17d' /etc/sysctl.conf
|
|
|
|
fi
|
2022-05-21 04:05:10 +03:00
|
|
|
if [ ! -f /usr/bin/wg-quick ] && [ ! -f /usr/sbin/openvpn ]; then
|
|
|
|
echo 0 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
fi
|
2022-05-08 16:31:14 +03:00
|
|
|
echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter
|
2021-09-07 10:55:37 +03:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
update_rclocal() {
|
|
|
|
if grep -qs "hwdsl2 VPN script" /etc/rc.local; then
|
|
|
|
bigecho "Updating rc.local..."
|
|
|
|
conf_bk "/etc/rc.local"
|
2021-09-11 23:00:29 +03:00
|
|
|
if [ "$os_type" = "alpine" ]; then
|
|
|
|
sed -i '/# Added by hwdsl2 VPN script/,+4d' /etc/rc.local
|
|
|
|
else
|
|
|
|
sed --follow-symlinks -i '/# Added by hwdsl2 VPN script/,+4d' /etc/rc.local
|
|
|
|
fi
|
2021-09-07 10:55:37 +03:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2022-03-13 02:08:00 +03:00
|
|
|
get_vpn_subnets() {
|
|
|
|
L2TP_NET=192.168.42.0/24
|
|
|
|
XAUTH_NET=192.168.43.0/24
|
|
|
|
if [ -s /etc/ipsec.conf ]; then
|
|
|
|
if ! grep -q "$L2TP_NET" /etc/ipsec.conf \
|
|
|
|
|| ! grep -q "$XAUTH_NET" /etc/ipsec.conf; then
|
|
|
|
vipr=$(grep "virtual-private=" /etc/ipsec.conf)
|
|
|
|
l2tpnet=$(printf '%s' "$vipr" | cut -f2 -d '!' | sed 's/,%v4://')
|
|
|
|
xauthnet=$(printf '%s' "$vipr" | cut -f3 -d '!')
|
|
|
|
check_cidr "$l2tpnet" && L2TP_NET="$l2tpnet"
|
|
|
|
check_cidr "$xauthnet" && XAUTH_NET="$xauthnet"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-09-07 10:55:37 +03:00
|
|
|
update_iptables_rules() {
|
|
|
|
use_nft=0
|
2021-09-11 23:00:29 +03:00
|
|
|
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ] \
|
|
|
|
|| [ "$os_type" = "alpine" ]; then
|
2021-09-07 10:55:37 +03:00
|
|
|
IPT_FILE=/etc/iptables.rules
|
|
|
|
IPT_FILE2=/etc/iptables/rules.v4
|
|
|
|
else
|
|
|
|
IPT_FILE=/etc/sysconfig/iptables
|
|
|
|
if grep -qs "hwdsl2 VPN script" /etc/sysconfig/nftables.conf; then
|
|
|
|
use_nft=1
|
|
|
|
IPT_FILE=/etc/sysconfig/nftables.conf
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
ipt_flag=0
|
|
|
|
if grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
|
|
|
|
ipt_flag=1
|
|
|
|
fi
|
|
|
|
ipi='iptables -D INPUT'
|
|
|
|
ipf='iptables -D FORWARD'
|
|
|
|
ipp='iptables -t nat -D POSTROUTING'
|
|
|
|
res='RELATED,ESTABLISHED'
|
|
|
|
if [ "$ipt_flag" = "1" ]; then
|
|
|
|
if [ "$use_nft" = "0" ]; then
|
|
|
|
bigecho "Updating IPTables rules..."
|
2022-03-13 02:08:00 +03:00
|
|
|
get_vpn_subnets
|
2021-09-07 10:55:37 +03:00
|
|
|
iptables-save > "$IPT_FILE.old-$SYS_DT"
|
|
|
|
$ipi -p udp --dport 1701 -m policy --dir in --pol none -j DROP
|
|
|
|
$ipi -m conntrack --ctstate INVALID -j DROP
|
|
|
|
$ipi -m conntrack --ctstate "$res" -j ACCEPT
|
|
|
|
$ipi -p udp -m multiport --dports 500,4500 -j ACCEPT
|
|
|
|
$ipi -p udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
|
|
|
|
$ipi -p udp --dport 1701 -j DROP
|
|
|
|
$ipf -m conntrack --ctstate INVALID -j DROP
|
|
|
|
$ipf -i "$NET_IFACE" -o ppp+ -m conntrack --ctstate "$res" -j ACCEPT
|
|
|
|
$ipf -i ppp+ -o "$NET_IFACE" -j ACCEPT
|
|
|
|
$ipf -i ppp+ -o ppp+ -j ACCEPT
|
2022-03-13 02:08:00 +03:00
|
|
|
$ipf -i "$NET_IFACE" -d "$XAUTH_NET" -m conntrack --ctstate "$res" -j ACCEPT
|
|
|
|
$ipf -s "$XAUTH_NET" -o "$NET_IFACE" -j ACCEPT
|
|
|
|
$ipf -s "$XAUTH_NET" -o ppp+ -j ACCEPT
|
2021-09-07 10:55:37 +03:00
|
|
|
iptables -D FORWARD -j DROP
|
2022-03-13 02:08:00 +03:00
|
|
|
$ipp -s "$XAUTH_NET" -o "$NET_IFACE" -m policy --dir out --pol none -j MASQUERADE
|
|
|
|
$ipp -s "$L2TP_NET" -o "$NET_IFACE" -j MASQUERADE
|
2021-09-07 10:55:37 +03:00
|
|
|
iptables-save > "$IPT_FILE"
|
|
|
|
if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
|
|
|
|
if [ -f "$IPT_FILE2" ]; then
|
|
|
|
conf_bk "$IPT_FILE2"
|
|
|
|
/bin/cp -f "$IPT_FILE" "$IPT_FILE2"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
2021-09-09 08:14:26 +03:00
|
|
|
nft_bk=$(find /etc/sysconfig -maxdepth 1 -name 'nftables.conf.old-*-*-*-*_*_*' -print0 \
|
|
|
|
| xargs -r -0 ls -1 -t | head -1)
|
2022-07-30 10:59:49 +03:00
|
|
|
diff_count=24
|
|
|
|
if grep -qs "release 9" /etc/redhat-release; then
|
|
|
|
diff_count=38
|
|
|
|
fi
|
2021-09-09 08:14:26 +03:00
|
|
|
if [ -f "$nft_bk" ] \
|
2022-07-30 10:59:49 +03:00
|
|
|
&& [ "$(diff -y --suppress-common-lines "$IPT_FILE" "$nft_bk" | wc -l)" = "$diff_count" ]; then
|
2021-09-09 08:14:26 +03:00
|
|
|
bigecho "Restoring nftables rules..."
|
|
|
|
conf_bk "$IPT_FILE"
|
|
|
|
/bin/cp -f "$nft_bk" "$IPT_FILE" && /bin/rm -f "$nft_bk"
|
|
|
|
nft flush ruleset
|
|
|
|
systemctl restart nftables
|
|
|
|
else
|
2021-09-07 10:55:37 +03:00
|
|
|
cat <<'EOF'
|
|
|
|
|
|
|
|
Note: This script cannot automatically remove nftables rules for the VPN.
|
|
|
|
To manually clean them up, edit /etc/sysconfig/nftables.conf
|
|
|
|
and remove unneeded rules. Your original rules are backed up as file
|
|
|
|
/etc/sysconfig/nftables.conf.old-date-time.
|
|
|
|
|
|
|
|
EOF
|
2021-09-09 08:14:26 +03:00
|
|
|
fi
|
2021-09-07 10:55:37 +03:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2022-05-13 17:26:08 +03:00
|
|
|
update_crontabs() {
|
|
|
|
if [ "$os_type" = "alpine" ]; then
|
|
|
|
cron_cmd="rc-service -c ipsec zap start"
|
|
|
|
if grep -qs "$cron_cmd" /etc/crontabs/root; then
|
|
|
|
bigecho "Updating crontabs..."
|
|
|
|
sed -i "/$cron_cmd/d" /etc/crontabs/root
|
|
|
|
touch /etc/crontabs/cron.update
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-09-07 10:55:37 +03:00
|
|
|
remove_config_files() {
|
|
|
|
bigecho "Removing VPN configuration..."
|
2021-09-09 08:14:26 +03:00
|
|
|
/bin/rm -f /etc/ipsec.conf* /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ppp/options.xl2tpd* \
|
2021-09-07 10:55:37 +03:00
|
|
|
/etc/pam.d/pluto /etc/sysconfig/pluto /etc/default/pluto
|
2021-09-09 08:14:26 +03:00
|
|
|
/bin/rm -rf /etc/ipsec.d /etc/xl2tpd
|
2021-09-07 10:55:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
remove_vpn() {
|
|
|
|
stop_services
|
|
|
|
remove_ipsec
|
|
|
|
remove_xl2tpd
|
2022-03-14 02:15:52 +03:00
|
|
|
remove_helper_scripts
|
2021-09-07 10:55:37 +03:00
|
|
|
update_sysctl
|
|
|
|
update_rclocal
|
|
|
|
update_iptables_rules
|
2022-05-13 17:26:08 +03:00
|
|
|
update_crontabs
|
2021-09-07 10:55:37 +03:00
|
|
|
remove_config_files
|
|
|
|
}
|
|
|
|
|
|
|
|
print_vpn_removed() {
|
|
|
|
echo
|
2022-05-08 16:31:14 +03:00
|
|
|
echo "IPsec VPN removed!"
|
2021-09-07 10:55:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
vpnuninstall() {
|
|
|
|
check_root
|
|
|
|
check_os
|
|
|
|
check_libreswan
|
|
|
|
check_iface
|
|
|
|
confirm_remove
|
|
|
|
remove_vpn
|
|
|
|
print_vpn_removed
|
|
|
|
}
|
|
|
|
|
|
|
|
## Defer until we have the complete script
|
|
|
|
vpnuninstall "$@"
|
|
|
|
|
|
|
|
exit 0
|