diff --git a/extras/vpnupgrade_amzn.sh b/extras/vpnupgrade_amzn.sh index ec7235e..acbe4a1 100755 --- a/extras/vpnupgrade_amzn.sh +++ b/extras/vpnupgrade_amzn.sh @@ -19,88 +19,71 @@ SWAN_VER=4.4 ### DO NOT edit below this line ### export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" +[ -n "$VPN_UPDATE_SWAN_VER" ] && SWAN_VER="$VPN_UPDATE_SWAN_VER" exiterr() { echo "Error: $1" >&2; exit 1; } exiterr2() { exiterr "'yum install' failed."; } bigecho() { echo "## $1"; } -vpnupgrade() { +check_root() { + if [ "$(id -u)" != 0 ]; then + exiterr "Script must be run as root. Try 'sudo sh $0'" + fi +} -[ -n "$VPN_UPDATE_SWAN_VER" ] && SWAN_VER="$VPN_UPDATE_SWAN_VER" +check_os() { + os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') + if ! grep -qs "Amazon Linux release 2" /etc/system-release; then + exiterr "This script only supports Amazon Linux 2." + fi +} -os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') -if ! grep -qs "Amazon Linux release 2" /etc/system-release; then - exiterr "This script only supports Amazon Linux 2." -fi - -if [ "$(id -u)" != 0 ]; then - exiterr "Script must be run as root. Try 'sudo sh $0'" -fi - -case $SWAN_VER in - 3.32|4.[1234]) - true - ;; - *) +check_libreswan() { + case $SWAN_VER in + 3.32|4.[1234]) + true + ;; + *) cat 1>&2 </dev/null) -swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') -if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then + ipsec_ver=$(/usr/local/sbin/ipsec --version 2>/dev/null) + swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') + if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then cat 1>&2 <<'EOF' Error: This script requires Libreswan already installed. See: https://github.com/hwdsl2/setup-ipsec-vpn EOF - exit 1 -fi + exit 1 + fi -swan_ver_cur=4.4 -swan_ver_url="https://dl.ls20.com/v1/amzn/2/swanverupg?arch=$os_arch&ver1=$swan_ver_old&ver2=$SWAN_VER" -swan_ver_latest=$(wget -t 3 -T 15 -qO- "$swan_ver_url") -if printf '%s' "$swan_ver_latest" | grep -Eq '^([3-9]|[1-9][0-9]{1,2})(\.([0-9]|[1-9][0-9]{1,2})){1,2}$' \ - && [ "$swan_ver_cur" != "$swan_ver_latest" ] \ - && printf '%s\n%s' "$swan_ver_cur" "$swan_ver_latest" | sort -C -V; then - echo "Note: A newer version of Libreswan ($swan_ver_latest) is available." - echo " To update to the new version, exit this script and run:" - echo " wget https://git.io/vpnupgrade -O vpnup.sh && sudo sh vpnup.sh" - echo - printf "Do you want to continue anyway? [y/N] " - read -r response - case $response in - [yY][eE][sS]|[yY]) - echo - ;; - *) - echo "Abort. No changes were made." - exit 1 - ;; - esac -fi + if [ "$swan_ver_old" = "$SWAN_VER" ]; then +cat </dev/null + trap 'finish $? $((dlo+1))' EXIT + mkdir -p /opt/src + cd /opt/src || exit 1 +} -bigecho "Installing required packages..." +install_pkgs() { + bigecho "Installing required packages..." + ( + set -x + yum -y -q install nss-devel nspr-devel pkgconfig pam-devel \ + libcap-ng-devel libselinux-devel curl-devel nss-tools \ + flex bison gcc make wget sed tar \ + systemd-devel libevent-devel fipscheck-devel >/dev/null + ) || exiterr2 +} -( - set -x - yum -y -q install nss-devel nspr-devel pkgconfig pam-devel \ - libcap-ng-devel libselinux-devel curl-devel nss-tools \ - flex bison gcc make wget sed tar \ - systemd-devel libevent-devel fipscheck-devel >/dev/null -) || exiterr2 +get_libreswan() { + bigecho "Downloading Libreswan..." + swan_file="libreswan-$SWAN_VER.tar.gz" + swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" + swan_url2="https://download.libreswan.org/$swan_file" + ( + set -x + wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" + ) || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + tar xzf "$swan_file" && /bin/rm -f "$swan_file" +} -bigecho "Downloading Libreswan..." - -swan_file="libreswan-$SWAN_VER.tar.gz" -swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" -swan_url2="https://download.libreswan.org/$swan_file" -( - set -x - wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" -) || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -tar xzf "$swan_file" && /bin/rm -f "$swan_file" - -bigecho "Compiling and installing Libreswan, please wait..." - -cd "libreswan-$SWAN_VER" || exit 1 -[ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in +install_libreswan() { + bigecho "Compiling and installing Libreswan, please wait..." + cd "libreswan-$SWAN_VER" || exit 1 + [ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in cat > Makefile.inc.local <<'EOF' WERROR_CFLAGS=-w -s USE_DNSSEC=false EOF -echo "USE_DH2=true" >> Makefile.inc.local -if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then - echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local -fi -if [ "$SWAN_VER" != "3.32" ]; then - echo "USE_NSS_KDF=false" >> Makefile.inc.local - echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local -fi -NPROCS=$(grep -c ^processor /proc/cpuinfo) -[ -z "$NPROCS" ] && NPROCS=1 -( - set -x - make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null -) + echo "USE_DH2=true" >> Makefile.inc.local + if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then + echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local + fi + if [ "$SWAN_VER" != "3.32" ]; then + echo "USE_NSS_KDF=false" >> Makefile.inc.local + echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local + fi + NPROCS=$(grep -c ^processor /proc/cpuinfo) + [ -z "$NPROCS" ] && NPROCS=1 + ( + set -x + make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null + ) -cd /opt/src || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then - exiterr "Libreswan $SWAN_VER failed to build." -fi + cd /opt/src || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then + exiterr "Libreswan $SWAN_VER failed to build." + fi +} -# Restore SELinux contexts -restorecon /etc/ipsec.d/*db 2>/dev/null -restorecon /usr/local/sbin -Rv 2>/dev/null -restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null +restore_selinux() { + restorecon /etc/ipsec.d/*db 2>/dev/null + restorecon /usr/local/sbin -Rv 2>/dev/null + restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null +} -bigecho "Updating VPN configuration..." +update_config() { + bigecho "Updating VPN configuration..." + IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" + PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" -IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" -PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" + dns_state=0 + DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + [ -n "$DNS_SRV1" ] && dns_state=2 + [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 + [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 -dns_state=0 -DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -[ -n "$DNS_SRV1" ] && dns_state=2 -[ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 -[ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 + sed -i".old-$(date +%F-%T)" \ + -e "s/^[[:space:]]\+auth=/ phase2=/" \ + -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ + -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ + -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ + -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ + -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ + -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf -sed -i".old-$(date +%F-%T)" \ - -e "s/^[[:space:]]\+auth=/ phase2=/" \ - -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ - -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ - -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ - -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ - -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ - -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf + if [ "$dns_state" = "1" ]; then + sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ + -e "/modecfgdns2=/d" /etc/ipsec.conf + elif [ "$dns_state" = "2" ]; then + sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf + fi -if [ "$dns_state" = "1" ]; then - sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ - -e "/modecfgdns2=/d" /etc/ipsec.conf -elif [ "$dns_state" = "2" ]; then - sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf -fi + sed -i "/ikev2=never/d" /etc/ipsec.conf + sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf -sed -i "/ikev2=never/d" /etc/ipsec.conf -sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf + if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then + sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf + fi +} -if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then - sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf -fi - -bigecho "Restarting IPsec service..." - -mkdir -p /run/pluto -service ipsec restart 2>/dev/null +restart_ipsec() { + bigecho "Restarting IPsec service..." + mkdir -p /run/pluto + service ipsec restart 2>/dev/null +} +show_setup_complete() { cat <&2; exit 1; } exiterr2() { exiterr "'yum install' failed."; } bigecho() { echo "## $1"; } -vpnupgrade() { +check_root() { + if [ "$(id -u)" != 0 ]; then + exiterr "Script must be run as root. Try 'sudo sh $0'" + fi +} -[ -n "$VPN_UPDATE_SWAN_VER" ] && SWAN_VER="$VPN_UPDATE_SWAN_VER" +check_vz() { + if [ -f /proc/user_beancounters ]; then + exiterr "OpenVZ VPS is not supported." + fi +} -os_type=centos -os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') -rh_file="/etc/redhat-release" -if grep -qs "Red Hat" "$rh_file"; then - os_type=rhel -fi -if grep -qs "release 7" "$rh_file"; then - os_ver=7 -elif grep -qs "release 8" "$rh_file"; then - os_ver=8 - grep -qi stream "$rh_file" && os_ver=8s - grep -qi rocky "$rh_file" && os_type=rocky - grep -qi alma "$rh_file" && os_type=alma -else - exiterr "This script only supports CentOS/RHEL 7 and 8." -fi +check_os() { + os_type=centos + os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') + rh_file="/etc/redhat-release" + if grep -qs "Red Hat" "$rh_file"; then + os_type=rhel + fi + if grep -qs "release 7" "$rh_file"; then + os_ver=7 + elif grep -qs "release 8" "$rh_file"; then + os_ver=8 + grep -qi stream "$rh_file" && os_ver=8s + grep -qi rocky "$rh_file" && os_type=rocky + grep -qi alma "$rh_file" && os_type=alma + else + exiterr "This script only supports CentOS/RHEL 7 and 8." + fi +} -if [ -f /proc/user_beancounters ]; then - exiterr "OpenVZ VPS is not supported." -fi - -if [ "$(id -u)" != 0 ]; then - exiterr "Script must be run as root. Try 'sudo sh $0'" -fi - -case $SWAN_VER in - 3.32|4.[1234]) - true - ;; - *) +check_libreswan() { + case $SWAN_VER in + 3.32|4.[1234]) + true + ;; + *) cat 1>&2 </dev/null) -swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') -if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then + ipsec_ver=$(/usr/local/sbin/ipsec --version 2>/dev/null) + swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') + if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then cat 1>&2 <<'EOF' Error: This script requires Libreswan already installed. See: https://github.com/hwdsl2/setup-ipsec-vpn EOF - exit 1 -fi + exit 1 + fi -swan_ver_cur=4.4 -swan_ver_url="https://dl.ls20.com/v1/$os_type/$os_ver/swanverupg?arch=$os_arch&ver1=$swan_ver_old&ver2=$SWAN_VER" -swan_ver_latest=$(wget -t 3 -T 15 -qO- "$swan_ver_url") -if printf '%s' "$swan_ver_latest" | grep -Eq '^([3-9]|[1-9][0-9]{1,2})(\.([0-9]|[1-9][0-9]{1,2})){1,2}$' \ - && [ "$swan_ver_cur" != "$swan_ver_latest" ] \ - && printf '%s\n%s' "$swan_ver_cur" "$swan_ver_latest" | sort -C -V; then - echo "Note: A newer version of Libreswan ($swan_ver_latest) is available." - echo " To update to the new version, exit this script and run:" - echo " wget https://git.io/vpnupgrade -O vpnup.sh && sudo sh vpnup.sh" - echo - printf "Do you want to continue anyway? [y/N] " - read -r response - case $response in - [yY][eE][sS]|[yY]) - echo - ;; - *) - echo "Abort. No changes were made." - exit 1 - ;; - esac -fi + if [ "$swan_ver_old" = "$SWAN_VER" ]; then +cat </dev/null + trap 'finish $? $((dlo+1))' EXIT + mkdir -p /opt/src + cd /opt/src || exit 1 +} -bigecho "Installing required packages..." - -( - set -x - yum -y -q install nss-devel nspr-devel pkgconfig pam-devel \ - libcap-ng-devel libselinux-devel curl-devel nss-tools \ - flex bison gcc make wget sed tar >/dev/null -) || exiterr2 - -erp="--enablerepo" -rp1="$erp=*server-*optional*" -rp2="$erp=*releases-optional*" -rp3="$erp=[Pp]ower[Tt]ools" -[ "$os_type" = "rhel" ] && rp3="$erp=codeready-builder-for-rhel-8-*" - -if [ "$os_ver" = "7" ]; then +install_pkgs_1() { + bigecho "Installing required packages..." ( set -x - yum "$rp1" "$rp2" -y -q install systemd-devel libevent-devel fipscheck-devel >/dev/null + yum -y -q install nss-devel nspr-devel pkgconfig pam-devel \ + libcap-ng-devel libselinux-devel curl-devel nss-tools \ + flex bison gcc make wget sed tar >/dev/null ) || exiterr2 -else +} + +install_pkgs_2() { + erp="--enablerepo" + rp1="$erp=*server-*optional*" + rp2="$erp=*releases-optional*" + rp3="$erp=[Pp]ower[Tt]ools" + [ "$os_type" = "rhel" ] && rp3="$erp=codeready-builder-for-rhel-8-*" + if [ "$os_ver" = "7" ]; then + ( + set -x + yum "$rp1" "$rp2" -y -q install systemd-devel libevent-devel fipscheck-devel >/dev/null + ) || exiterr2 + else + ( + set -x + yum "$rp3" -y -q install systemd-devel libevent-devel fipscheck-devel >/dev/null + ) || exiterr2 + fi +} + +get_libreswan() { + bigecho "Downloading Libreswan..." + swan_file="libreswan-$SWAN_VER.tar.gz" + swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" + swan_url2="https://download.libreswan.org/$swan_file" ( set -x - yum "$rp3" -y -q install systemd-devel libevent-devel fipscheck-devel >/dev/null - ) || exiterr2 -fi + wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" + ) || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + tar xzf "$swan_file" && /bin/rm -f "$swan_file" +} -bigecho "Downloading Libreswan..." - -swan_file="libreswan-$SWAN_VER.tar.gz" -swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" -swan_url2="https://download.libreswan.org/$swan_file" -( - set -x - wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" -) || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -tar xzf "$swan_file" && /bin/rm -f "$swan_file" - -bigecho "Compiling and installing Libreswan, please wait..." - -cd "libreswan-$SWAN_VER" || exit 1 -[ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in +install_libreswan() { + bigecho "Compiling and installing Libreswan, please wait..." + cd "libreswan-$SWAN_VER" || exit 1 + [ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in cat > Makefile.inc.local <<'EOF' WERROR_CFLAGS=-w -s USE_DNSSEC=false EOF -echo "USE_DH2=true" >> Makefile.inc.local -if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then - echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local -fi -if [ "$SWAN_VER" != "3.32" ]; then - echo "USE_NSS_KDF=false" >> Makefile.inc.local - echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local -fi -NPROCS=$(grep -c ^processor /proc/cpuinfo) -[ -z "$NPROCS" ] && NPROCS=1 -( - set -x - make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null -) + echo "USE_DH2=true" >> Makefile.inc.local + if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then + echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local + fi + if [ "$SWAN_VER" != "3.32" ]; then + echo "USE_NSS_KDF=false" >> Makefile.inc.local + echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local + fi + NPROCS=$(grep -c ^processor /proc/cpuinfo) + [ -z "$NPROCS" ] && NPROCS=1 + ( + set -x + make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null + ) -cd /opt/src || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then - exiterr "Libreswan $SWAN_VER failed to build." -fi + cd /opt/src || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then + exiterr "Libreswan $SWAN_VER failed to build." + fi +} -# Restore SELinux contexts -restorecon /etc/ipsec.d/*db 2>/dev/null -restorecon /usr/local/sbin -Rv 2>/dev/null -restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null +restore_selinux() { + restorecon /etc/ipsec.d/*db 2>/dev/null + restorecon /usr/local/sbin -Rv 2>/dev/null + restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null +} -bigecho "Updating VPN configuration..." +update_config() { + bigecho "Updating VPN configuration..." + IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" + PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" -IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" -PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" + dns_state=0 + DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + [ -n "$DNS_SRV1" ] && dns_state=2 + [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 + [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 -dns_state=0 -DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -[ -n "$DNS_SRV1" ] && dns_state=2 -[ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 -[ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 + sed -i".old-$(date +%F-%T)" \ + -e "s/^[[:space:]]\+auth=/ phase2=/" \ + -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ + -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ + -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ + -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ + -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ + -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf -sed -i".old-$(date +%F-%T)" \ - -e "s/^[[:space:]]\+auth=/ phase2=/" \ - -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ - -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ - -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ - -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ - -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ - -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf + if [ "$dns_state" = "1" ]; then + sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ + -e "/modecfgdns2=/d" /etc/ipsec.conf + elif [ "$dns_state" = "2" ]; then + sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf + fi -if [ "$dns_state" = "1" ]; then - sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ - -e "/modecfgdns2=/d" /etc/ipsec.conf -elif [ "$dns_state" = "2" ]; then - sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf -fi + sed -i "/ikev2=never/d" /etc/ipsec.conf + sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf -sed -i "/ikev2=never/d" /etc/ipsec.conf -sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf + if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then + sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf + fi +} -if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then - sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf -fi - -bigecho "Restarting IPsec service..." - -mkdir -p /run/pluto -service ipsec restart 2>/dev/null +restart_ipsec() { + bigecho "Restarting IPsec service..." + mkdir -p /run/pluto + service ipsec restart 2>/dev/null +} +show_setup_complete() { cat <&2; exit 1; } exiterr2() { exiterr "'apt-get install' failed."; } bigecho() { echo "## $1"; } -vpnupgrade() { +check_root() { + if [ "$(id -u)" != 0 ]; then + exiterr "Script must be run as root. Try 'sudo sh $0'" + fi +} -[ -n "$VPN_UPDATE_SWAN_VER" ] && SWAN_VER="$VPN_UPDATE_SWAN_VER" +check_vz() { + if [ -f /proc/user_beancounters ]; then + exiterr "OpenVZ VPS is not supported." + fi +} -os_type=$(lsb_release -si 2>/dev/null) -os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') -[ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID") -case $os_type in - [Uu]buntu) - os_type=ubuntu - ;; - [Dd]ebian) - os_type=debian - ;; - [Rr]aspbian) - os_type=raspbian - ;; - *) - exiterr "This script only supports Ubuntu and Debian." - ;; -esac +check_os() { + os_type=$(lsb_release -si 2>/dev/null) + os_arch=$(uname -m | tr -dc 'A-Za-z0-9_-') + [ -z "$os_type" ] && [ -f /etc/os-release ] && os_type=$(. /etc/os-release && printf '%s' "$ID") + case $os_type in + [Uu]buntu) + os_type=ubuntu + ;; + [Dd]ebian) + os_type=debian + ;; + [Rr]aspbian) + os_type=raspbian + ;; + *) + exiterr "This script only supports Ubuntu and Debian." + ;; + esac + os_ver=$(sed 's/\..*//' /etc/debian_version | tr -dc 'A-Za-z0-9') + if [ "$os_ver" = "8" ] || [ "$os_ver" = "jessiesid" ]; then + exiterr "Debian 8 or Ubuntu < 16.04 is not supported." + fi +} -os_ver=$(sed 's/\..*//' /etc/debian_version | tr -dc 'A-Za-z0-9') -if [ "$os_ver" = "8" ] || [ "$os_ver" = "jessiesid" ]; then - exiterr "Debian 8 or Ubuntu < 16.04 is not supported." -fi - -if [ -f /proc/user_beancounters ]; then - exiterr "OpenVZ VPS is not supported." -fi - -if [ "$(id -u)" != 0 ]; then - exiterr "Script must be run as root. Try 'sudo sh $0'" -fi - -case $SWAN_VER in - 3.32|4.[1234]) - true - ;; - *) +check_libreswan() { + case $SWAN_VER in + 3.32|4.[1234]) + true + ;; + *) cat 1>&2 </dev/null) -swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') -if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then + ipsec_ver=$(/usr/local/sbin/ipsec --version 2>/dev/null) + swan_ver_old=$(printf '%s' "$ipsec_ver" | sed -e 's/.*Libreswan U\?//' -e 's/\( (\|\/K\).*//') + if ! printf '%s' "$ipsec_ver" | grep -q "Libreswan"; then cat 1>&2 <<'EOF' Error: This script requires Libreswan already installed. See: https://github.com/hwdsl2/setup-ipsec-vpn EOF - exit 1 -fi + exit 1 + fi -swan_ver_cur=4.4 -swan_ver_url="https://dl.ls20.com/v1/$os_type/$os_ver/swanverupg?arch=$os_arch&ver1=$swan_ver_old&ver2=$SWAN_VER" -swan_ver_latest=$(wget -t 3 -T 15 -qO- "$swan_ver_url") -if printf '%s' "$swan_ver_latest" | grep -Eq '^([3-9]|[1-9][0-9]{1,2})(\.([0-9]|[1-9][0-9]{1,2})){1,2}$' \ - && [ "$swan_ver_cur" != "$swan_ver_latest" ] \ - && printf '%s\n%s' "$swan_ver_cur" "$swan_ver_latest" | sort -C -V; then - echo "Note: A newer version of Libreswan ($swan_ver_latest) is available." - echo " To update to the new version, exit this script and run:" - echo " wget https://git.io/vpnupgrade -O vpnup.sh && sudo sh vpnup.sh" - echo - printf "Do you want to continue anyway? [y/N] " - read -r response - case $response in - [yY][eE][sS]|[yY]) - echo - ;; - *) - echo "Abort. No changes were made." - exit 1 - ;; - esac -fi + if [ "$swan_ver_old" = "$SWAN_VER" ]; then +cat </dev/null + trap 'finish $? $((dlo+1))' EXIT + mkdir -p /opt/src + cd /opt/src || exit 1 +} -bigecho "Installing required packages..." +install_pkgs_1() { + bigecho "Installing required packages..." + export DEBIAN_FRONTEND=noninteractive + ( + set -x + apt-get -yqq update + ) || exiterr "'apt-get update' failed." +} -export DEBIAN_FRONTEND=noninteractive -( - set -x - apt-get -yqq update -) || exiterr "'apt-get update' failed." -( - set -x - apt-get -yqq install libnss3-dev libnspr4-dev pkg-config \ - libpam0g-dev libcap-ng-dev libcap-ng-utils libselinux1-dev \ - libcurl4-nss-dev libnss3-tools libevent-dev libsystemd-dev \ - flex bison gcc make wget sed >/dev/null -) || exiterr2 +install_pkgs_2() { + ( + set -x + apt-get -yqq install libnss3-dev libnspr4-dev pkg-config \ + libpam0g-dev libcap-ng-dev libcap-ng-utils libselinux1-dev \ + libcurl4-nss-dev libnss3-tools libevent-dev libsystemd-dev \ + flex bison gcc make wget sed >/dev/null + ) || exiterr2 +} -bigecho "Downloading Libreswan..." +get_libreswan() { + bigecho "Downloading Libreswan..." + swan_file="libreswan-$SWAN_VER.tar.gz" + swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" + swan_url2="https://download.libreswan.org/$swan_file" + ( + set -x + wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" + ) || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + tar xzf "$swan_file" && /bin/rm -f "$swan_file" +} -swan_file="libreswan-$SWAN_VER.tar.gz" -swan_url1="https://github.com/libreswan/libreswan/archive/v$SWAN_VER.tar.gz" -swan_url2="https://download.libreswan.org/$swan_file" -( - set -x - wget -t 3 -T 30 -q -O "$swan_file" "$swan_url1" || wget -t 3 -T 30 -q -O "$swan_file" "$swan_url2" -) || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -tar xzf "$swan_file" && /bin/rm -f "$swan_file" - -bigecho "Compiling and installing Libreswan, please wait..." - -cd "libreswan-$SWAN_VER" || exit 1 -[ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in +install_libreswan() { + bigecho "Compiling and installing Libreswan, please wait..." + cd "libreswan-$SWAN_VER" || exit 1 + [ "$SWAN_VER" = "4.1" ] && sed -i 's/ sysv )/ sysvinit )/' programs/setup/setup.in cat > Makefile.inc.local <<'EOF' WERROR_CFLAGS=-w -s USE_DNSSEC=false EOF -if [ "$SWAN_VER" = "3.32" ] || ! grep -qs 'VERSION_CODENAME=' /etc/os-release; then + if [ "$SWAN_VER" = "3.32" ] || ! grep -qs 'VERSION_CODENAME=' /etc/os-release; then cat >> Makefile.inc.local <<'EOF' USE_DH31=false USE_NSS_AVA_COPY=true USE_NSS_IPSEC_PROFILE=false USE_GLIBC_KERN_FLIP_HEADERS=true EOF -fi -echo "USE_DH2=true" >> Makefile.inc.local -if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then - echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local -fi -if [ "$SWAN_VER" != "3.32" ]; then - echo "USE_NSS_KDF=false" >> Makefile.inc.local - echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local -fi -NPROCS=$(grep -c ^processor /proc/cpuinfo) -[ -z "$NPROCS" ] && NPROCS=1 -( - set -x - make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null -) - -cd /opt/src || exit 1 -/bin/rm -rf "/opt/src/libreswan-$SWAN_VER" -if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then - exiterr "Libreswan $SWAN_VER failed to build." -fi - -bigecho "Updating VPN configuration..." - -IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" -PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" - -if uname -m | grep -qi '^arm'; then - if ! modprobe -q sha512; then - PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes128-sha2,aes256-sha2" fi -fi + echo "USE_DH2=true" >> Makefile.inc.local + if ! grep -qs IFLA_XFRM_LINK /usr/include/linux/if_link.h; then + echo "USE_XFRM_INTERFACE_IFLA_HEADER=true" >> Makefile.inc.local + fi + if [ "$SWAN_VER" != "3.32" ]; then + echo "USE_NSS_KDF=false" >> Makefile.inc.local + echo "FINALNSSDIR=/etc/ipsec.d" >> Makefile.inc.local + fi + NPROCS=$(grep -c ^processor /proc/cpuinfo) + [ -z "$NPROCS" ] && NPROCS=1 + ( + set -x + make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null + ) -dns_state=0 -DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) -[ -n "$DNS_SRV1" ] && dns_state=2 -[ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 -[ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 + cd /opt/src || exit 1 + /bin/rm -rf "/opt/src/libreswan-$SWAN_VER" + if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then + exiterr "Libreswan $SWAN_VER failed to build." + fi +} -sed -i".old-$(date +%F-%T)" \ - -e "s/^[[:space:]]\+auth=/ phase2=/" \ - -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ - -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ - -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ - -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ - -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ - -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf +update_config() { + bigecho "Updating VPN configuration..." + IKE_NEW=" ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024" + PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2" -if [ "$dns_state" = "1" ]; then - sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ - -e "/modecfgdns2=/d" /etc/ipsec.conf -elif [ "$dns_state" = "2" ]; then - sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf -fi + if uname -m | grep -qi '^arm'; then + if ! modprobe -q sha512; then + PHASE2_NEW=" phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes128-sha2,aes256-sha2" + fi + fi -sed -i "/ikev2=never/d" /etc/ipsec.conf -sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf + dns_state=0 + DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2) + [ -n "$DNS_SRV1" ] && dns_state=2 + [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1 + [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3 -if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then - sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf -fi + sed -i".old-$(date +%F-%T)" \ + -e "s/^[[:space:]]\+auth=/ phase2=/" \ + -e "s/^[[:space:]]\+forceencaps=/ encapsulation=/" \ + -e "s/^[[:space:]]\+ike-frag=/ fragmentation=/" \ + -e "s/^[[:space:]]\+sha2_truncbug=/ sha2-truncbug=/" \ + -e "s/^[[:space:]]\+sha2-truncbug=yes/ sha2-truncbug=no/" \ + -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \ + -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf -bigecho "Restarting IPsec service..." + if [ "$dns_state" = "1" ]; then + sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \ + -e "/modecfgdns2=/d" /etc/ipsec.conf + elif [ "$dns_state" = "2" ]; then + sed -i "s/^[[:space:]]\+modecfgdns1=.\+/ modecfgdns=$DNS_SRV1/" /etc/ipsec.conf + fi -mkdir -p /run/pluto -service ipsec restart 2>/dev/null + sed -i "/ikev2=never/d" /etc/ipsec.conf + sed -i "/conn shared/a \ ikev2=never" /etc/ipsec.conf + if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then + sed -i 's/^[[:space:]]\+ike-frag=/ fragmentation=/' /etc/ipsec.d/ikev2.conf + fi +} + +restart_ipsec() { + bigecho "Restarting IPsec service..." + mkdir -p /run/pluto + service ipsec restart 2>/dev/null +} + +show_setup_complete() { cat <