diff --git a/README.md b/README.md index bd50f7b..828d5e7 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,8 @@ # IPsec/L2TP VPN Server Auto Setup Scripts Note: This repository was created from (and replaces) these GitHub Gists: -- gist.github.com/hwdsl2/9030462 (224 Stars, 87 Forks as of 01/08/2016) -- gist.github.com/hwdsl2/e9a78a50e300d12ae195 (9 Stars, 5 Forks) +- gist.github.com/hwdsl2/9030462 (225 Stars, 88 Forks as of 01/18/2016) +- gist.github.com/hwdsl2/e9a78a50e300d12ae195 (10 Stars, 6 Forks) ## Overview @@ -33,10 +33,10 @@ A newly created Amazon EC2 instance, using these AMIs: (See the link above for u **-OR-** A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with these Linux OS: -(It is recommended that you use the VPN scripts on a **freshly installed** system) +(Using the VPN scripts on a **freshly installed** system is recommended) - Ubuntu 14.04 (Trusty) or 12.04 (Precise) - Debian 8 (Jessie) -- Debian 7 (Wheezy) - Not recommended. A workaround is required, see below. +- Debian 7 (Wheezy) - NOT recommended. Requires this workaround to work. - CentOS / Red Hat Enterprise Linux (RHEL) 6 or 7 OpenVZ VPS users should instead use Nyr's OpenVPN script. @@ -49,7 +49,7 @@ OpenVZ VPS users should instead use edit a few lines in the scripts. For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). -**Android 6.0 users**: Edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to the end of both `ike=` and `phase2alg=`, then add a new line `sha2-truncbug=yes`. Must start lines with two spaces. Finally, run `service ipsec restart`. (Ref) +**Android 6 (Marshmallow) users**: Edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to both `ike=` and `phase2alg=`. Also add a new line `sha2-truncbug=yes`. Must start lines with two spaces. Finally, run `service ipsec restart`. (Ref) -**iPhone/iOS users**: In iOS settings, choose `L2TP` (instead of `IPSec`) for the VPN type. In case you're unable to connect, try replacing this line in /etc/ipsec.conf: `rightprotoport=17/%any` with `rightprotoport=17/0`. Then restart `ipsec` service. +**iPhone/iPad users**: In iOS settings, choose `L2TP` (instead of `IPSec`) for the VPN type. In case you're unable to connect, edit `ipsec.conf` and replace `rightprotoport=17/%any` with `rightprotoport=17/0`. Then restart `ipsec` service. -Clients are configured to use Google Public DNS when the VPN connection is active. This setting is controlled by `ms-dns` in `/etc/ppp/options.xl2tpd`. +Clients are configured to use Google Public DNS when the VPN is active. To change, set `ms-dns` in `options.xl2tpd`. -If using Amazon EC2, these ports must be open in the instance's security group: **UDP ports 500 & 4500** (for the VPN), and **TCP port 22** (optional, for SSH). +If you configured a custom SSH port or wish to allow other services, edit the IPTables rules in the scripts before using. -If your server uses a custom SSH port (not 22), or if you wish to allow other services through IPTables, be sure to edit the IPTables rules in the scripts before using. - -The scripts will backup your existing configuration files before overwriting them. Backups can be found in the same folder as the original, with `.old-date/time` suffix. +The scripts will backup your existing config files before making changes, to the same folder with `.old-date-time` suffix. ## Upgrading Libreswan @@ -101,7 +94,7 @@ You may use `vpnupgrade_Libreswan.sh` (for Ubuntu/Debian) and `vpnupgrade_Libres ## Bugs & Questions -- Have a question? Please read other people's comments in this Gist and on my blog before posting. +- Have a question? Please first read other people's comments in this Gist and on my blog. - For Libreswan related questions, you may ask on the mailing list, or check out the official wiki. - If you found a reproducible bug, open a GitHub Issue to submit a bug report.