Simple PPTP, L2TP/IPsec, OpenVPN installers
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
bedefaced eaf01d91ad start dir fix 8 years ago
ipsec pptp adduser proc refactoring 8 years ago
openvpn start dir fix 8 years ago
pptp pptp adduser proc refactoring 8 years ago
LICENSE Initial commit 9 years ago
README.md Update README.md 9 years ago

README.md

vpn-install

Simple PPTP, L2TP/IPsec, OpenVPN installers for fast, user-friendly deployment.

Requirements

Tested only on Ubuntu 16.04. All packages will be installed from Ubuntu repository.

Installation

Download: git clone --depth=1 https://github.com/bedefaced/vpn-install.git

And then some of (under root or using sudo):

  • vpn-install/pptp/install.sh
  • vpn-install/openvpn/install.sh
  • vpn-install/ipsec/install.sh

These "wizards" will install required packages, generate necessary config files, update network configurations (to enable routing), add iptables rules, add cron jobs (for restarting servers, restoring iptables rules after reboot).

You will be answered for login-passwords of VPN users, some network information, preferred DNS-resolvers, client-to-client routing possibility.

PPTP

Only MS-CHAP v2 with MPPE-128 encryption is allowed.

Note that PPTP is NOT recommended for transmission secret data, because all strong PPTP authentication algorithms have been already hacked: see link for more information.

By default (see pptpd.conf.dist and env.sh) it uses 172.16.0.0/24 subnet.

Files

  • adduser.sh - script for user-friendly chap-secrets file editing.
  • autostart.sh - script for adding cron jobs (iptables restoring after boot and server running state checking).
  • checkserver.sh - script for cron job, which check server running state.
  • checkuser.sh - script for user-friendly chap-secrets file existing user checking.
  • deluser.sh - script for user-friendly chap-secrets file existing user removing.
  • dns.sh - script for user-friendly modifiying of DNS-resolver settings which will be pushed to Windows clients.
  • env.sh - common for all scripts config variables (subnet, ip, config files paths).
  • install.sh - main installation script (wizard).
  • iptables-setup.sh - iptables configuration script.
  • options.pptp.dist - PPP options template.
  • pptpd.conf.dist - PPTPD config template.
  • sysctl.sh - script for set up IP forwarding and disabling some packets due to security reasons (using sysctl).

Client

On Linux:

Use default Network Manager (if Ubuntu) VPN-connection creation wizard or set it up manually:

apt-get install pptp

Create a new file (for example) /etc/ppp/peers/pptpserver and add the following lines, replacing name and password with your own values:

pty "pptp [IP of VPN] --nolaunchpppd"
name [LOGIN]
remotename pptp
noauth
require-mppe-128

Add [LOGIN] * [PASSWORD] * line to /etc/ppp/chap-secrets.

then pppd call pptpserver and poff pptpserver to close connection.

On Windows:

Create new VPN-connection using standart 'Set up a new connection or network' wizard, select PPTP VPN and provide host, login and password information. In the 'Security' tab of created connection check only MS-CHAP v2 protocol.

IPsec

IPsec over L2TP VPN server with pre-shared key.

Only MS-CHAP v2 is allowed on L2TP.

IPsec implementation: strongSwan.

L2TP implementation: xl2tpd.

By default (see xl2tpd.conf.dist and env.sh) it uses 172.18.0.0/24 subnet.

IKE encryption algorithms: aes256-sha1, aes128-sha1, 3des-sha1.

See ipsec.conf.dist for more information.

Files

Client

On Linux:

apt-get install strongswan xl2tpd

Download config files from server and follow guide.

On Windows:

Create new VPN-connection using standart 'Set up a new connection or network' wizard, select 'L2TP/IPsec with pre-shared key', provide host, login and password information.

In the 'Security' tab of created connection check only MS-CHAP v2 protocol, then enter to 'Advanced settings' and enter your pre-shared key.

OpenVPN

Server and client certificates and TLS auth are used for authentication (generating using Easy-RSA package, see adduser.sh and install.sh).

Used cipher: AES-256-CBC (see openvpn-server.conf.dist).

By default (see openvpn-server.conf.dist and env.sh) it uses 172.20.0.0/24 subnet. Port 1194 (default).

Files

  • adduser.sh - script for user-friendly client config and key+certificate generating.
  • autostart.sh - script for adding cron jobs (iptables restoring after boot and server running state checking).
  • checkserver.sh - script for cron job, which check server running state.
  • dns.sh - script for user-friendly modifiying of DNS-resolver settings which will be pushed to Windows clients.
  • env.sh - common for all scripts config variables (subnet, ip, config files paths).
  • install.sh - main installation script (wizard).
  • iptables-setup.sh - iptables configuration script.
  • openvpn-server-embedded.ovpn.dist - client config file with embedded keys and certificates template.
  • openvpn-server.conf.dist - OpenVPN server config file template.
  • openvpn-server.ovpn.dist - client config file template.
  • sysctl.sh - script for set up IP forwarding and disabling some packets due to security reasons (using sysctl).

Client

On Linux:

apt-get install openvpn
openvpn --config config.ovpn

On Windows:

Download OpenVPV GUI client: https://openvpn.net/index.php/open-source/downloads.html.

Import config and connect, or run explorer context menu command.

TODO

  • more testing
  • support other OSs
  • PPTP Linux client files autogenerating
  • L2TP/IPsec Linux client files autogenerating