Minor changes in wording and some optimizations
This commit is contained in:
parent
be5e6557bc
commit
acb2000e40
63
vpnsetup.sh
63
vpnsetup.sh
@ -2,11 +2,11 @@
|
|||||||
#
|
#
|
||||||
# Amazon EC2 user-data file for automatic configuration of IPsec/L2TP VPN server
|
# Amazon EC2 user-data file for automatic configuration of IPsec/L2TP VPN server
|
||||||
# on a Ubuntu or Debian instance. Tested with Ubuntu 14.04 & 12.04 and Debian 8.
|
# on a Ubuntu or Debian instance. Tested with Ubuntu 14.04 & 12.04 and Debian 8.
|
||||||
# With minor modifications, this script *can also be used* on dedicated servers
|
# Besides EC2, this script *can also be used* on dedicated servers or any KVM-
|
||||||
# or any KVM- or XEN-based Virtual Private Server (VPS) from other providers.
|
# or Xen-based Virtual Private Server (VPS) from other providers.
|
||||||
#
|
#
|
||||||
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! THIS IS MEANT TO BE RUN WHEN
|
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! THIS IS MEANT TO BE RUN
|
||||||
# YOUR AMAZON EC2 INSTANCE STARTS!
|
# ON YOUR DEDICATED SERVER OR VPS!
|
||||||
#
|
#
|
||||||
# Copyright (C) 2014 Lin Song
|
# Copyright (C) 2014 Lin Song
|
||||||
# Based on the work of Thomas Sarlandie (Copyright 2012)
|
# Based on the work of Thomas Sarlandie (Copyright 2012)
|
||||||
@ -19,12 +19,12 @@
|
|||||||
|
|
||||||
if [ "$(uname)" = "Darwin" ]; then
|
if [ "$(uname)" = "Darwin" ]; then
|
||||||
echo 'DO NOT run this script on your Mac! It should only be run on a newly-created EC2 instance'
|
echo 'DO NOT run this script on your Mac! It should only be run on a newly-created EC2 instance'
|
||||||
echo 'or other Dedicated Server / VPS, after you have modified it to set the variables below.'
|
echo 'or other dedicated server / VPS, after you have modified it to set the variables below.'
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Please define your own values for these variables
|
# Please define your own values for these variables
|
||||||
# Escape *all* non-alphanumeric characters with a backslash (or 3 backslashes for \ and ").
|
# Escape *all* non-alphanumeric characters with a backslash (3 backslashes for \ and ").
|
||||||
# Examples: \ --> \\\\, " --> \\\", ' --> \', $ --> \$, ` --> \`, [space] --> \[space]
|
# Examples: \ --> \\\\, " --> \\\", ' --> \', $ --> \$, ` --> \`, [space] --> \[space]
|
||||||
IPSEC_PSK=your_very_secure_key
|
IPSEC_PSK=your_very_secure_key
|
||||||
VPN_USER=your_username
|
VPN_USER=your_username
|
||||||
@ -40,7 +40,7 @@ fi
|
|||||||
|
|
||||||
if [ -f "/proc/user_beancounters" ]; then
|
if [ -f "/proc/user_beancounters" ]; then
|
||||||
echo "This script does NOT support OpenVZ VPS."
|
echo "This script does NOT support OpenVZ VPS."
|
||||||
echo "Try Nyr's OpenVPN script instead: https://github.com/Nyr/openvpn-install"
|
echo "Try Nyr's OpenVPN script: https://github.com/Nyr/openvpn-install"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -49,15 +49,13 @@ if [ "$(id -u)" != 0 ]; then
|
|||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Make sure "eth0" is available
|
|
||||||
if [ ! -f /sys/class/net/eth0/operstate ]; then
|
if [ ! -f /sys/class/net/eth0/operstate ]; then
|
||||||
echo "Network interface 'eth0' is not available. Aborting."
|
echo "Network interface 'eth0' is not available. Aborting."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Check for empty VPN variables
|
|
||||||
if [ -z "$IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
|
if [ -z "$IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
|
||||||
echo "The VPN credentials cannot be empty. Please re-edit the VPN script."
|
echo "VPN credentials cannot be empty, please edit the VPN script."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -95,11 +93,11 @@ PRIVATE_IP=$(wget --retry-connrefused -t 3 -T 15 -qO- 'http://169.254.169.254/la
|
|||||||
# Check IPs for correct format
|
# Check IPs for correct format
|
||||||
IP_REGEX="^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
|
IP_REGEX="^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
|
||||||
if printf %s "$PUBLIC_IP" | grep -vEq "$IP_REGEX"; then
|
if printf %s "$PUBLIC_IP" | grep -vEq "$IP_REGEX"; then
|
||||||
echo "Could not find valid Public IP, please edit the VPN script manually."
|
echo "Cannot find valid Public IP, please edit the VPN script manually."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
if printf %s "$PRIVATE_IP" | grep -vEq "$IP_REGEX"; then
|
if printf %s "$PRIVATE_IP" | grep -vEq "$IP_REGEX"; then
|
||||||
echo "Could not find valid Private IP, please edit the VPN script manually."
|
echo "Cannot find valid Private IP, please edit the VPN script manually."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -114,20 +112,21 @@ apt-get -y install xl2tpd
|
|||||||
# Install Fail2Ban to protect SSH server
|
# Install Fail2Ban to protect SSH server
|
||||||
apt-get -y install fail2ban
|
apt-get -y install fail2ban
|
||||||
|
|
||||||
# Compile and install Libreswan (https://libreswan.org/)
|
# Compile and install Libreswan
|
||||||
SWAN_VER=3.16
|
SWAN_VER=3.16
|
||||||
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
||||||
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
||||||
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
||||||
[ ! -f "$SWAN_FILE" ] && { echo "Could not retrieve Libreswan source file. Aborting."; exit 1; }
|
[ ! -f "$SWAN_FILE" ] && { echo "Cannot retrieve Libreswan source file. Aborting."; exit 1; }
|
||||||
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
||||||
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
||||||
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source directory. Aborting."; exit 1; }
|
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source dir. Aborting."; exit 1; }
|
||||||
make programs && make install
|
make programs && make install
|
||||||
|
|
||||||
# Prepare various config files
|
# Prepare various config files
|
||||||
# Create Libreswan configuration
|
# Create IPsec (Libreswan) configuration
|
||||||
/bin/cp -f /etc/ipsec.conf "/etc/ipsec.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
SYS_DT="$(/bin/date +%Y-%m-%d-%H:%M:%S)"
|
||||||
|
/bin/cp -f /etc/ipsec.conf "/etc/ipsec.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ipsec.conf <<EOF
|
cat > /etc/ipsec.conf <<EOF
|
||||||
version 2.0
|
version 2.0
|
||||||
|
|
||||||
@ -166,13 +165,13 @@ conn vpnpsk
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Specify IPsec PSK
|
# Specify IPsec PSK
|
||||||
/bin/cp -f /etc/ipsec.secrets "/etc/ipsec.secrets.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ipsec.secrets "/etc/ipsec.secrets.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ipsec.secrets <<EOF
|
cat > /etc/ipsec.secrets <<EOF
|
||||||
$PUBLIC_IP %any : PSK "$IPSEC_PSK"
|
$PUBLIC_IP %any : PSK "$IPSEC_PSK"
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Create xl2tpd config
|
# Create xl2tpd config
|
||||||
/bin/cp -f /etc/xl2tpd/xl2tpd.conf "/etc/xl2tpd/xl2tpd.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/xl2tpd/xl2tpd.conf "/etc/xl2tpd/xl2tpd.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/xl2tpd/xl2tpd.conf <<EOF
|
cat > /etc/xl2tpd/xl2tpd.conf <<EOF
|
||||||
[global]
|
[global]
|
||||||
port = 1701
|
port = 1701
|
||||||
@ -195,7 +194,7 @@ length bit = yes
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Specify xl2tpd options
|
# Specify xl2tpd options
|
||||||
/bin/cp -f /etc/ppp/options.xl2tpd "/etc/ppp/options.xl2tpd.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ppp/options.xl2tpd "/etc/ppp/options.xl2tpd.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ppp/options.xl2tpd <<EOF
|
cat > /etc/ppp/options.xl2tpd <<EOF
|
||||||
ipcp-accept-local
|
ipcp-accept-local
|
||||||
ipcp-accept-remote
|
ipcp-accept-remote
|
||||||
@ -214,16 +213,16 @@ connect-delay 5000
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Create VPN credentials
|
# Create VPN credentials
|
||||||
/bin/cp -f /etc/ppp/chap-secrets "/etc/ppp/chap-secrets.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ppp/chap-secrets "/etc/ppp/chap-secrets.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ppp/chap-secrets <<EOF
|
cat > /etc/ppp/chap-secrets <<EOF
|
||||||
# Secrets for authentication using CHAP
|
# Secrets for authentication using CHAP
|
||||||
# client server secret IP addresses
|
# client server secret IP addresses
|
||||||
"$VPN_USER" l2tpd "$VPN_PASSWORD" *
|
"$VPN_USER" l2tpd "$VPN_PASSWORD" *
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Update sysctl settings for VPN and better performance
|
# Update sysctl settings for VPN and performance
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then
|
||||||
/bin/cp -f /etc/sysctl.conf "/etc/sysctl.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/sysctl.conf "/etc/sysctl.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat >> /etc/sysctl.conf <<EOF
|
cat >> /etc/sysctl.conf <<EOF
|
||||||
|
|
||||||
# Added by hwdsl2 VPN script
|
# Added by hwdsl2 VPN script
|
||||||
@ -261,11 +260,11 @@ net.ipv4.tcp_wmem = 10240 87380 12582912
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create basic IPTables rules. First, check if there are existing IPTables rules loaded.
|
# Create basic IPTables rules. First check if there are existing IPTables rules loaded.
|
||||||
# 1. If IPTables is "empty", write out the new set of rules below.
|
# 1. If IPTables is "empty", write out the new set of rules below.
|
||||||
# 2. If *not* empty, insert new rules and save them together with existing ones.
|
# 2. If *not* empty, insert new rules and save them together with existing ones.
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/iptables.rules; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/iptables.rules; then
|
||||||
/bin/cp -f /etc/iptables.rules "/etc/iptables.rules.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/iptables.rules "/etc/iptables.rules.old-${SYS_DT}" 2>/dev/null
|
||||||
/usr/sbin/service fail2ban stop >/dev/null 2>&1
|
/usr/sbin/service fail2ban stop >/dev/null 2>&1
|
||||||
if [ "$(/sbin/iptables-save | grep -c '^\-')" = "0" ]; then
|
if [ "$(/sbin/iptables-save | grep -c '^\-')" = "0" ]; then
|
||||||
cat > /etc/iptables.rules <<EOF
|
cat > /etc/iptables.rules <<EOF
|
||||||
@ -326,9 +325,9 @@ echo "# Modified by hwdsl2 VPN script" > /etc/iptables.rules
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create basic IP6Tables rules
|
# Create basic IP6Tables (IPv6) rules
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/ip6tables.rules; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/ip6tables.rules; then
|
||||||
/bin/cp -f /etc/ip6tables.rules "/etc/ip6tables.rules.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ip6tables.rules "/etc/ip6tables.rules.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ip6tables.rules <<EOF
|
cat > /etc/ip6tables.rules <<EOF
|
||||||
# Added by hwdsl2 VPN script
|
# Added by hwdsl2 VPN script
|
||||||
*filter
|
*filter
|
||||||
@ -358,9 +357,9 @@ cat > /etc/network/if-pre-up.d/ip6tablesload <<EOF
|
|||||||
exit 0
|
exit 0
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Update rc.local to start services at system boot
|
# Update rc.local to start services at boot
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
|
||||||
/bin/cp -f /etc/rc.local "/etc/rc.local.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/rc.local "/etc/rc.local.old-${SYS_DT}" 2>/dev/null
|
||||||
/bin/sed --follow-symlinks -i -e '/^exit 0/d' /etc/rc.local
|
/bin/sed --follow-symlinks -i -e '/^exit 0/d' /etc/rc.local
|
||||||
cat >> /etc/rc.local <<EOF
|
cat >> /etc/rc.local <<EOF
|
||||||
|
|
||||||
@ -373,17 +372,17 @@ exit 0
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Initialize Libreswan database
|
# Initialize Libreswan DB
|
||||||
if [ ! -f /etc/ipsec.d/cert8.db ] ; then
|
if [ ! -f /etc/ipsec.d/cert8.db ] ; then
|
||||||
echo > /var/tmp/libreswan-nss-pwd
|
echo > /var/tmp/libreswan-nss-pwd
|
||||||
/usr/bin/certutil -N -f /var/tmp/libreswan-nss-pwd -d /etc/ipsec.d
|
/usr/bin/certutil -N -f /var/tmp/libreswan-nss-pwd -d /etc/ipsec.d
|
||||||
/bin/rm -f /var/tmp/libreswan-nss-pwd
|
/bin/rm -f /var/tmp/libreswan-nss-pwd
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Reload sysctl.conf settings
|
# Reload sysctl.conf
|
||||||
/sbin/sysctl -p
|
/sbin/sysctl -p
|
||||||
|
|
||||||
# Update attributes of various files
|
# Update file attributes
|
||||||
/bin/chmod +x /etc/rc.local
|
/bin/chmod +x /etc/rc.local
|
||||||
/bin/chmod +x /etc/network/if-pre-up.d/iptablesload
|
/bin/chmod +x /etc/network/if-pre-up.d/iptablesload
|
||||||
/bin/chmod +x /etc/network/if-pre-up.d/ip6tablesload
|
/bin/chmod +x /etc/network/if-pre-up.d/ip6tablesload
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
#
|
#
|
||||||
# Script for automatic configuration of IPsec/L2TP VPN server on 64-bit CentOS/RHEL 6 & 7.
|
# Script for automatic configuration of IPsec/L2TP VPN server on 64-bit CentOS/RHEL 6 & 7.
|
||||||
# Works on dedicated servers or any KVM- or XEN-based Virtual Private Server (VPS).
|
# Works on dedicated servers or any KVM- or Xen-based Virtual Private Server (VPS).
|
||||||
# It can also be used as the Amazon EC2 "user-data" with the official CentOS 6 and 7 AMIs.
|
# It can also be used as Amazon EC2 "user-data" with the official CentOS 6 & 7 AMIs.
|
||||||
#
|
#
|
||||||
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! THIS IS MEANT TO BE RUN
|
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! THIS IS MEANT TO BE RUN
|
||||||
# ON YOUR DEDICATED SERVER OR VPS!
|
# ON YOUR DEDICATED SERVER OR VPS!
|
||||||
@ -17,13 +17,13 @@
|
|||||||
# know how you have improved it!
|
# know how you have improved it!
|
||||||
|
|
||||||
if [ "$(uname)" = "Darwin" ]; then
|
if [ "$(uname)" = "Darwin" ]; then
|
||||||
echo 'DO NOT run this script on your Mac! It should only be run on a Dedicated Server / VPS'
|
echo 'DO NOT run this script on your Mac! It should only be run on a dedicated server / VPS'
|
||||||
echo 'or a newly-created EC2 instance, after you have modified it to set the variables below.'
|
echo 'or a newly-created EC2 instance, after you have modified it to set the variables below.'
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Please define your own values for these variables
|
# Please define your own values for these variables
|
||||||
# Escape *all* non-alphanumeric characters with a backslash (or 3 backslashes for \ and ").
|
# Escape *all* non-alphanumeric characters with a backslash (3 backslashes for \ and ").
|
||||||
# Examples: \ --> \\\\, " --> \\\", ' --> \', $ --> \$, ` --> \`, [space] --> \[space]
|
# Examples: \ --> \\\\, " --> \\\", ' --> \', $ --> \$, ` --> \`, [space] --> \[space]
|
||||||
IPSEC_PSK=your_very_secure_key
|
IPSEC_PSK=your_very_secure_key
|
||||||
VPN_USER=your_username
|
VPN_USER=your_username
|
||||||
@ -49,7 +49,7 @@ fi
|
|||||||
|
|
||||||
if [ -f "/proc/user_beancounters" ]; then
|
if [ -f "/proc/user_beancounters" ]; then
|
||||||
echo "This script does NOT support OpenVZ VPS."
|
echo "This script does NOT support OpenVZ VPS."
|
||||||
echo "Try Nyr's OpenVPN script instead: https://github.com/Nyr/openvpn-install"
|
echo "Try Nyr's OpenVPN script: https://github.com/Nyr/openvpn-install"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -58,18 +58,16 @@ if [ "$(id -u)" != 0 ]; then
|
|||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Make sure "eth0" is available
|
|
||||||
if [ ! -f /sys/class/net/eth0/operstate ]; then
|
if [ ! -f /sys/class/net/eth0/operstate ]; then
|
||||||
echo "Network interface 'eth0' is not available. Aborting."
|
echo "Network interface 'eth0' is not available. Aborting."
|
||||||
echo
|
echo
|
||||||
echo "CentOS 7 users should change interfaces to use the old naming convention"
|
echo "CentOS 7 users should change interfaces to use old naming convention"
|
||||||
echo "before running this script. See: https://wiki.centos.org/FAQ/CentOS7"
|
echo "before running this script. See: https://wiki.centos.org/FAQ/CentOS7"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Check for empty VPN variables
|
|
||||||
if [ -z "$IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
|
if [ -z "$IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
|
||||||
echo "The VPN credentials cannot be empty. Please re-edit the VPN script."
|
echo "VPN credentials cannot be empty, please edit the VPN script."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -105,11 +103,11 @@ PRIVATE_IP=$(wget --retry-connrefused -t 3 -T 15 -qO- 'http://169.254.169.254/la
|
|||||||
# Check IPs for correct format
|
# Check IPs for correct format
|
||||||
IP_REGEX="^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
|
IP_REGEX="^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
|
||||||
if printf %s "$PUBLIC_IP" | grep -vEq "$IP_REGEX"; then
|
if printf %s "$PUBLIC_IP" | grep -vEq "$IP_REGEX"; then
|
||||||
echo "Could not find valid Public IP, please edit the VPN script manually."
|
echo "Cannot find valid Public IP, please edit the VPN script manually."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
if printf %s "$PRIVATE_IP" | grep -vEq "$IP_REGEX"; then
|
if printf %s "$PRIVATE_IP" | grep -vEq "$IP_REGEX"; then
|
||||||
echo "Could not find valid Private IP, please edit the VPN script manually."
|
echo "Cannot find valid Private IP, please edit the VPN script manually."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -120,12 +118,9 @@ if grep -qs "release 6" /etc/redhat-release; then
|
|||||||
elif grep -qs "release 7" /etc/redhat-release; then
|
elif grep -qs "release 7" /etc/redhat-release; then
|
||||||
EPEL_RPM="epel-release-7-5.noarch.rpm"
|
EPEL_RPM="epel-release-7-5.noarch.rpm"
|
||||||
EPEL_URL="http://download.fedoraproject.org/pub/epel/7/x86_64/e/$EPEL_RPM"
|
EPEL_URL="http://download.fedoraproject.org/pub/epel/7/x86_64/e/$EPEL_RPM"
|
||||||
else
|
|
||||||
echo "Sorry, this script only supports versions 6 and 7 of CentOS/RHEL."
|
|
||||||
exit 1
|
|
||||||
fi
|
fi
|
||||||
wget -t 3 -T 30 -nv -O "$EPEL_RPM" "$EPEL_URL"
|
wget -t 3 -T 30 -nv -O "$EPEL_RPM" "$EPEL_URL"
|
||||||
[ ! -f "$EPEL_RPM" ] && { echo "Could not retrieve EPEL repository RPM file. Aborting."; exit 1; }
|
[ ! -f "$EPEL_RPM" ] && { echo "Cannot retrieve EPEL repo RPM file. Aborting."; exit 1; }
|
||||||
rpm -ivh --force "$EPEL_RPM" && /bin/rm -f "$EPEL_RPM"
|
rpm -ivh --force "$EPEL_RPM" && /bin/rm -f "$EPEL_RPM"
|
||||||
|
|
||||||
# Install necessary packages
|
# Install necessary packages
|
||||||
@ -150,26 +145,27 @@ if grep -qs "release 6" /etc/redhat-release; then
|
|||||||
RPM2="libevent2-devel-2.0.22-1.el6.x86_64.rpm"
|
RPM2="libevent2-devel-2.0.22-1.el6.x86_64.rpm"
|
||||||
wget -t 3 -T 30 -nv -O "$RPM1" "$LE2_URL/$RPM1"
|
wget -t 3 -T 30 -nv -O "$RPM1" "$LE2_URL/$RPM1"
|
||||||
wget -t 3 -T 30 -nv -O "$RPM2" "$LE2_URL/$RPM2"
|
wget -t 3 -T 30 -nv -O "$RPM2" "$LE2_URL/$RPM2"
|
||||||
[ ! -f "$RPM1" ] || [ ! -f "$RPM2" ] && { echo "Could not retrieve Libevent2 RPM file(s). Aborting."; exit 1; }
|
[ ! -f "$RPM1" ] || [ ! -f "$RPM2" ] && { echo "Cannot retrieve Libevent2 RPM file(s). Aborting."; exit 1; }
|
||||||
rpm -ivh --force "$RPM1" "$RPM2" && /bin/rm -f "$RPM1" "$RPM2"
|
rpm -ivh --force "$RPM1" "$RPM2" && /bin/rm -f "$RPM1" "$RPM2"
|
||||||
elif grep -qs "release 7" /etc/redhat-release; then
|
elif grep -qs "release 7" /etc/redhat-release; then
|
||||||
yum -y install libevent-devel
|
yum -y install libevent-devel
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Compile and install Libreswan (https://libreswan.org/)
|
# Compile and install Libreswan
|
||||||
SWAN_VER=3.16
|
SWAN_VER=3.16
|
||||||
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
||||||
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
||||||
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
||||||
[ ! -f "$SWAN_FILE" ] && { echo "Could not retrieve Libreswan source file. Aborting."; exit 1; }
|
[ ! -f "$SWAN_FILE" ] && { echo "Cannot retrieve Libreswan source file. Aborting."; exit 1; }
|
||||||
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
||||||
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
||||||
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source directory. Aborting."; exit 1; }
|
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source dir. Aborting."; exit 1; }
|
||||||
make programs && make install
|
make programs && make install
|
||||||
|
|
||||||
# Prepare various config files
|
# Prepare various config files
|
||||||
# Create Libreswan configuration
|
# Create IPsec (Libreswan) configuration
|
||||||
/bin/cp -f /etc/ipsec.conf "/etc/ipsec.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
SYS_DT="$(/bin/date +%Y-%m-%d-%H:%M:%S)"
|
||||||
|
/bin/cp -f /etc/ipsec.conf "/etc/ipsec.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ipsec.conf <<EOF
|
cat > /etc/ipsec.conf <<EOF
|
||||||
version 2.0
|
version 2.0
|
||||||
|
|
||||||
@ -208,13 +204,13 @@ conn vpnpsk
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Specify IPsec PSK
|
# Specify IPsec PSK
|
||||||
/bin/cp -f /etc/ipsec.secrets "/etc/ipsec.secrets.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ipsec.secrets "/etc/ipsec.secrets.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ipsec.secrets <<EOF
|
cat > /etc/ipsec.secrets <<EOF
|
||||||
$PUBLIC_IP %any : PSK "$IPSEC_PSK"
|
$PUBLIC_IP %any : PSK "$IPSEC_PSK"
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Create xl2tpd config
|
# Create xl2tpd config
|
||||||
/bin/cp -f /etc/xl2tpd/xl2tpd.conf "/etc/xl2tpd/xl2tpd.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/xl2tpd/xl2tpd.conf "/etc/xl2tpd/xl2tpd.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/xl2tpd/xl2tpd.conf <<EOF
|
cat > /etc/xl2tpd/xl2tpd.conf <<EOF
|
||||||
[global]
|
[global]
|
||||||
port = 1701
|
port = 1701
|
||||||
@ -237,7 +233,7 @@ length bit = yes
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Specify xl2tpd options
|
# Specify xl2tpd options
|
||||||
/bin/cp -f /etc/ppp/options.xl2tpd "/etc/ppp/options.xl2tpd.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ppp/options.xl2tpd "/etc/ppp/options.xl2tpd.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ppp/options.xl2tpd <<EOF
|
cat > /etc/ppp/options.xl2tpd <<EOF
|
||||||
ipcp-accept-local
|
ipcp-accept-local
|
||||||
ipcp-accept-remote
|
ipcp-accept-remote
|
||||||
@ -256,16 +252,16 @@ connect-delay 5000
|
|||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Create VPN credentials
|
# Create VPN credentials
|
||||||
/bin/cp -f /etc/ppp/chap-secrets "/etc/ppp/chap-secrets.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/ppp/chap-secrets "/etc/ppp/chap-secrets.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/ppp/chap-secrets <<EOF
|
cat > /etc/ppp/chap-secrets <<EOF
|
||||||
# Secrets for authentication using CHAP
|
# Secrets for authentication using CHAP
|
||||||
# client server secret IP addresses
|
# client server secret IP addresses
|
||||||
"$VPN_USER" l2tpd "$VPN_PASSWORD" *
|
"$VPN_USER" l2tpd "$VPN_PASSWORD" *
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
# Update sysctl settings for VPN and better performance
|
# Update sysctl settings for VPN and performance
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf; then
|
||||||
/bin/cp -f /etc/sysctl.conf "/etc/sysctl.conf.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/sysctl.conf "/etc/sysctl.conf.old-${SYS_DT}" 2>/dev/null
|
||||||
cat >> /etc/sysctl.conf <<EOF
|
cat >> /etc/sysctl.conf <<EOF
|
||||||
|
|
||||||
# Added by hwdsl2 VPN script
|
# Added by hwdsl2 VPN script
|
||||||
@ -303,11 +299,11 @@ net.ipv4.tcp_wmem = 10240 87380 12582912
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create basic IPTables rules. First, check if there are existing IPTables rules loaded.
|
# Create basic IPTables rules. First check if there are existing IPTables rules loaded.
|
||||||
# 1. If IPTables is "empty", write out the new set of rules below.
|
# 1. If IPTables is "empty", write out the new set of rules below.
|
||||||
# 2. If *not* empty, insert new rules and save them together with existing ones.
|
# 2. If *not* empty, insert new rules and save them together with existing ones.
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/sysconfig/iptables; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/sysconfig/iptables; then
|
||||||
/bin/cp -f /etc/sysconfig/iptables "/etc/sysconfig/iptables.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/sysconfig/iptables "/etc/sysconfig/iptables.old-${SYS_DT}" 2>/dev/null
|
||||||
/sbin/service fail2ban stop >/dev/null 2>&1
|
/sbin/service fail2ban stop >/dev/null 2>&1
|
||||||
if [ "$(/sbin/iptables-save | grep -c '^\-')" = "0" ]; then
|
if [ "$(/sbin/iptables-save | grep -c '^\-')" = "0" ]; then
|
||||||
cat > /etc/sysconfig/iptables <<EOF
|
cat > /etc/sysconfig/iptables <<EOF
|
||||||
@ -367,9 +363,9 @@ echo "# Modified by hwdsl2 VPN script" > /etc/sysconfig/iptables
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create basic IP6Tables rules
|
# Create basic IP6Tables (IPv6) rules
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/sysconfig/ip6tables; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/sysconfig/ip6tables; then
|
||||||
/bin/cp -f /etc/sysconfig/ip6tables "/etc/sysconfig/ip6tables.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/sysconfig/ip6tables "/etc/sysconfig/ip6tables.old-${SYS_DT}" 2>/dev/null
|
||||||
cat > /etc/sysconfig/ip6tables <<EOF
|
cat > /etc/sysconfig/ip6tables <<EOF
|
||||||
# Added by hwdsl2 VPN script
|
# Added by hwdsl2 VPN script
|
||||||
*filter
|
*filter
|
||||||
@ -404,9 +400,9 @@ logpath = /var/log/secure
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Update rc.local to start services at system boot
|
# Update rc.local to start services at boot
|
||||||
if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
|
if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
|
||||||
/bin/cp -f /etc/rc.local "/etc/rc.local.old-$(date +%Y-%m-%d-%H:%M:%S)" 2>/dev/null
|
/bin/cp -f /etc/rc.local "/etc/rc.local.old-${SYS_DT}" 2>/dev/null
|
||||||
cat >> /etc/rc.local <<EOF
|
cat >> /etc/rc.local <<EOF
|
||||||
|
|
||||||
# Added by hwdsl2 VPN script
|
# Added by hwdsl2 VPN script
|
||||||
@ -419,7 +415,7 @@ echo 1 > /proc/sys/net/ipv4/ip_forward
|
|||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Initialize Libreswan database
|
# Initialize Libreswan DB
|
||||||
if [ ! -f /etc/ipsec.d/cert8.db ] ; then
|
if [ ! -f /etc/ipsec.d/cert8.db ] ; then
|
||||||
echo > /var/tmp/libreswan-nss-pwd
|
echo > /var/tmp/libreswan-nss-pwd
|
||||||
/usr/bin/certutil -N -f /var/tmp/libreswan-nss-pwd -d /etc/ipsec.d
|
/usr/bin/certutil -N -f /var/tmp/libreswan-nss-pwd -d /etc/ipsec.d
|
||||||
@ -431,10 +427,10 @@ restorecon /etc/ipsec.d/*db 2>/dev/null
|
|||||||
restorecon /usr/local/sbin -Rv 2>/dev/null
|
restorecon /usr/local/sbin -Rv 2>/dev/null
|
||||||
restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null
|
restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null
|
||||||
|
|
||||||
# Reload sysctl.conf settings
|
# Reload sysctl.conf
|
||||||
/sbin/sysctl -p
|
/sbin/sysctl -p
|
||||||
|
|
||||||
# Update attributes of various files
|
# Update file attributes
|
||||||
/bin/chmod +x /etc/rc.local
|
/bin/chmod +x /etc/rc.local
|
||||||
/bin/chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets*
|
/bin/chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets*
|
||||||
|
|
||||||
|
@ -97,14 +97,14 @@ apt-get -y install libnss3-dev libnspr4-dev pkg-config libpam0g-dev \
|
|||||||
apt-get -y --no-install-recommends install xmlto
|
apt-get -y --no-install-recommends install xmlto
|
||||||
apt-get -y install xl2tpd
|
apt-get -y install xl2tpd
|
||||||
|
|
||||||
# Compile and install Libreswan (https://libreswan.org/)
|
# Compile and install Libreswan
|
||||||
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
||||||
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
||||||
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
||||||
[ ! -f "$SWAN_FILE" ] && { echo "Could not retrieve Libreswan source file. Aborting."; exit 1; }
|
[ ! -f "$SWAN_FILE" ] && { echo "Cannot retrieve Libreswan source file. Aborting."; exit 1; }
|
||||||
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
||||||
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
||||||
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source directory. Aborting."; exit 1; }
|
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source dir. Aborting."; exit 1; }
|
||||||
make programs && make install
|
make programs && make install
|
||||||
|
|
||||||
# Restart services
|
# Restart services
|
||||||
|
@ -97,12 +97,9 @@ if grep -qs "release 6" /etc/redhat-release; then
|
|||||||
elif grep -qs "release 7" /etc/redhat-release; then
|
elif grep -qs "release 7" /etc/redhat-release; then
|
||||||
EPEL_RPM="epel-release-7-5.noarch.rpm"
|
EPEL_RPM="epel-release-7-5.noarch.rpm"
|
||||||
EPEL_URL="http://download.fedoraproject.org/pub/epel/7/x86_64/e/$EPEL_RPM"
|
EPEL_URL="http://download.fedoraproject.org/pub/epel/7/x86_64/e/$EPEL_RPM"
|
||||||
else
|
|
||||||
echo "Sorry, this script only supports versions 6 and 7 of CentOS/RHEL."
|
|
||||||
exit 1
|
|
||||||
fi
|
fi
|
||||||
wget -t 3 -T 30 -nv -O "$EPEL_RPM" "$EPEL_URL"
|
wget -t 3 -T 30 -nv -O "$EPEL_RPM" "$EPEL_URL"
|
||||||
[ ! -f "$EPEL_RPM" ] && { echo "Could not retrieve EPEL repository RPM file. Aborting."; exit 1; }
|
[ ! -f "$EPEL_RPM" ] && { echo "Cannot retrieve EPEL repo RPM file. Aborting."; exit 1; }
|
||||||
rpm -ivh --force "$EPEL_RPM" && /bin/rm -f "$EPEL_RPM"
|
rpm -ivh --force "$EPEL_RPM" && /bin/rm -f "$EPEL_RPM"
|
||||||
|
|
||||||
# Install necessary packages
|
# Install necessary packages
|
||||||
@ -119,20 +116,20 @@ if grep -qs "release 6" /etc/redhat-release; then
|
|||||||
RPM2="libevent2-devel-2.0.22-1.el6.x86_64.rpm"
|
RPM2="libevent2-devel-2.0.22-1.el6.x86_64.rpm"
|
||||||
wget -t 3 -T 30 -nv -O "$RPM1" "$LE2_URL/$RPM1"
|
wget -t 3 -T 30 -nv -O "$RPM1" "$LE2_URL/$RPM1"
|
||||||
wget -t 3 -T 30 -nv -O "$RPM2" "$LE2_URL/$RPM2"
|
wget -t 3 -T 30 -nv -O "$RPM2" "$LE2_URL/$RPM2"
|
||||||
[ ! -f "$RPM1" ] || [ ! -f "$RPM2" ] && { echo "Could not retrieve Libevent2 RPM file(s). Aborting."; exit 1; }
|
[ ! -f "$RPM1" ] || [ ! -f "$RPM2" ] && { echo "Cannot retrieve Libevent2 RPM file(s). Aborting."; exit 1; }
|
||||||
rpm -ivh --force "$RPM1" "$RPM2" && /bin/rm -f "$RPM1" "$RPM2"
|
rpm -ivh --force "$RPM1" "$RPM2" && /bin/rm -f "$RPM1" "$RPM2"
|
||||||
elif grep -qs "release 7" /etc/redhat-release; then
|
elif grep -qs "release 7" /etc/redhat-release; then
|
||||||
yum -y install libevent-devel
|
yum -y install libevent-devel
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Compile and install Libreswan (https://libreswan.org/)
|
# Compile and install Libreswan
|
||||||
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
SWAN_FILE="libreswan-${SWAN_VER}.tar.gz"
|
||||||
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
SWAN_URL="https://download.libreswan.org/${SWAN_FILE}"
|
||||||
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
wget -t 3 -T 30 -nv -O "$SWAN_FILE" "$SWAN_URL"
|
||||||
[ ! -f "$SWAN_FILE" ] && { echo "Could not retrieve Libreswan source file. Aborting."; exit 1; }
|
[ ! -f "$SWAN_FILE" ] && { echo "Cannot retrieve Libreswan source file. Aborting."; exit 1; }
|
||||||
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
/bin/rm -rf "/opt/src/libreswan-${SWAN_VER}"
|
||||||
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
tar xvzf "$SWAN_FILE" && rm -f "$SWAN_FILE"
|
||||||
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source directory. Aborting."; exit 1; }
|
cd "libreswan-${SWAN_VER}" || { echo "Failed to enter Libreswan source dir. Aborting."; exit 1; }
|
||||||
make programs && make install
|
make programs && make install
|
||||||
|
|
||||||
# Restore SELinux contexts
|
# Restore SELinux contexts
|
||||||
|
Loading…
x
Reference in New Issue
Block a user