Пропускане към основното съдържание

How to Setup Linux VPN Server and Client using OpenVPN for "RHEL" & "Debian"


VPN stands for Virtual Private Network.
A Virtual Private Network enables a computer to send and receive data from one private network to another private network which are connected via public network (Internet).
This is helpful for those who are outside the company’s intranet, and like to connect to office network securely to access the internal servers. VPN is also helpful when you are connecting multiple branch offices together.
Even when you are not connecting multiple branch offices together, you can still use VPN setup to allow your employees to connect remotely from their laptop to the datacenter and access the systems.


Sometimes company will buy leased lines to form WAN ( Wide Area Network ), and communicates with its branches. Though Leased line is secure and reliable, it is expensive.
VPN fills the gap by providing a point-to-point virtual connection via public network. A VPN can grow to accommodate more users across different geographical locations easily.


Types of VPN
On a high-level, the following are two types of VPN:


Remote Access
Site-To-Site


Remote Access is connecting a individual computer to a network via VPN. “Site to Site” is connecting two networks together via VPN.


What is OpenVPN
From OpenVPN man:
 OpenVPN is an open source VPN daemon by James Yonan. OpenVPN is a robust and highly  
 flexible VPN daemon. OpenVPN supports SSL/TLS security, ethernet bridging, TCP or UDP   
 tunnel transport through proxies or NAT, support for dynamic IP addresses and DHCP,   
 scalability to hundreds or thousands of users, and portability to most major OS platforms.  

This tutorial explains process to setup and configure OpenVPN server and client for Remote Access.
I. Configuring OpenVPN – Server Side

1. Install OpenVPN
Install the openvpn package on both the server and the client machine.
 $ sudo apt-get install openvpn  

Use the respective package manager of the distribution that you are working.
If you are using yum, do the following
 $ yum install openvpn  

2. Create Directories and set Env Variables


Create a directory inside /etc/openvpn and copy the easy-rsa contents to it. This is done to make sure that changes done to the scripts will not be lost when the package is upgraded. Change the owner as current user so that current user has permission to create files.
 $ sudo mkdir /etc/openvpn/easy-rsa  
 $ sudo cp /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /etc/openvpn/easy-rsa  
 $ sudo chown -R $USER /etc/openvpn/easy-rsa/  



Next, Edit the /etc/openvpn/easy-rsa/vars to adjust to your environment.
 export KEY_COUNTRY="IN"  
 export KEY_PROVINCE="TN"  
 export KEY_CITY="CHN"  
 export KEY_ORG="tgs"  
 export KEY_EMAIL="admin@thegeekstuff.com"  



3. Creating the CA – Certificate Authority (Root Certificate)
The next step in building openvpn server is to establish a Public Key Infrastructure so that the server and clients can authenticate one another.


 $ cd /etc/openvpn/easy-rsa/  
 $ source vars  
 $ ./clean-all  
 $ ln -s openssl-1.0.0.cnf openssl.cnf  
 $ ./build-ca  
 Generating a 1024 bit RSA private key  
 ........++++++  
 ......++++++  
 unable to write 'random state'  
 writing new private key to 'ca.key'  
 -----  
 You are about to be asked to enter information that will be incorporated  
 into your certificate request.  
 What you are about to enter is what is called a Distinguished Name or a DN.  
 There are quite a few fields but you can leave some blank  
 For some fields there will be a default value,  
 If you enter '.', the field will be left blank.  
 -----  
 Country Name (2 letter code) [IN]:  
 State or Province Name (full name) [TN]:  
 Locality Name (eg, city) [CHN]:  
 Organization Name (eg, company) [tgs]:  
 Organizational Unit Name (eg, section) [changeme]:  
 Common Name (eg, your name or your server's hostname) [changeme]:  
 Name [changeme]:lakshmanan  
 Email Address [mail@host.domain]:admin@thegeekstuff.com  



Once ./build-ca is completed, you will see a file named “ca.key” and “ca.crt” inside /etc/openvpn/easy-rsa/keys/
Remember that the “.key” files has to be kept confidential.


4. Creating certificate for Server


The next step is to create a certificate for our Openvpn server.


 $ /etc/openvpn/easy-rsa/build-key-server vpnserver  
 ...  
 ...  
 Sign the certificate? [y/n]:y  
 1 out of 1 certificate requests certified, commit? [y/n]y  



Note that vpnserver is the HOSTNAME of the server. This command will take input from the user similar to the previous one.
This command will create the certificate and key files for the server.


5. Creating certificate for client


The VPN client will also need certificate to authenticate with server. If you want to configure multiple clients, you need to create certificate for each client separately.


 $ ./build-key vpnclient1  
 ...  
 ...  
 Sign the certificate? [y/n]:y  
 1 out of 1 certificate requests certified, commit? [y/n]y  



vpnclient1 is the hostname of the client. This command will create the certificate and key files for the client.

6. Create Diffie Hellman parameters



 $ ./build-dh  



Once all the above steps are successfully completed, you will have many key and certificate files inside
/etc/openvpn/easy-rsa/keys.

7. Copy the certificates to respective locations



We have created Root Certificate, Server Certificate and Client Certificate. We need to copy those to appropriate locations.
 $ cd /etc/openvpn/easy-rsa/keys/  
 $ sudo cp ca.crt vpnserver.crt vpnserver.key dh1024.pem /etc/openvpn/  
 $ scp ca.crt vpnclient1.key vpnclient1.crt root@vpnclient1:/etc/openvpn  



Now we have copied the client certificate and key to the client machine. Remember to use a secure medium like scp,
while copying the key files.


8. Configuring the Server


OpenVPN provide a default server.conf. You can modify it to suit the needs.
 $ sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/  
 $ sudo gzip -d /etc/openvpn/server.conf.gz  



Edit the “/etc/openvpn/server.conf“.


 ...  
 ca ca.crt  
 cert vpnserver.crt  
 key vpnserver.key  
 dh dh1024.pem  
 ...  



Now start the OpenVPN server:


 $ sudo /etc/init.d/openvpn start  
  * Starting virtual private network daemon(s)...   
  * Autostarting VPN 'server'  
 $ ifconfig tun0  
 tun0   Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00   
      inet addr:10.8.0.1 P-t-P:10.8.0.2 Mask:255.255.255.255  



By default openVPN will log errors in syslog file.
II. Configuring OpenVPN – Client Side


9. Setup Client Config Files

Now we will configure the openVPN to work as client. Remember that we have already installed the openvpn package in
client, and we have “ca.crt”, “vpnclient1.key”, vpnclient1.crt” in /etc/openvpn/

Copy the sample client.conf to /etc/openvpn.
 $ sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn/  



Edit the /etc/openvpn/client.conf.


 ...  
 # Specify that this is openvpn client  
 client  
 remote vpnserver 1194  
 ca ca.crt  
 cert vpnclient1.crt  
 key vpnclient1.key  
 ...  



Now start the OpenVPN in client


 $ /etc/init.d/openvpn start  
  * Starting virtual private network daemon(s)...   
  * Autostarting VPN 'client'  
 $ ifconfig tun0  
 tun0   Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00   
      inet addr:10.8.0.6 P-t-P:10.8.0.5 Mask:255.255.255.255  



10. Test the VPN Setup
Ping the vpnserver from the client machine to see whether VPN is working or not.
 $ ping 10.8.0.1  
 PING 10.8.0.1 (10.8.0.1) 56(84) bytes of data.  
 64 bytes from 10.8.0.1: icmp_req=1 ttl=64 time=2.14 ms  



If you are able to ping, then you have made the right setup.
Please keep the following in mind:


1. Make sure that the client and server use same protocol and port number.
2. Client and server must use same config regarding some parameters like keysize, compression etc…
3. In case of any problem, increase the log verbosity in the configuration and check the syslog file for troubleshooting.

Коментари

Popular Posts

CVE-2021-44228

REPRODUCE OF THE VULNERABILITY =): Collaboration: silentsignal

CVE-2022-21907

Donate if you are not shame!

DVWA - Brute Force (High Level) - Anti-CSRF Tokens

This is the final "how to" guide which brute focuses Damn Vulnerable Web Application (DVWA), this time on the high security level. It is an expansion from the "low" level (which is a straightforward HTTP GET form attack). The main login screen shares similar issues (brute force-able and with anti-CSRF tokens). The only other posting is the "medium" security level post (which deals with timing issues). For the final time, let's pretend we do not know any credentials for DVWA.... Let's play dumb and brute force DVWA... once and for all! TL;DR: Quick copy/paste 1: CSRF=$(curl -s -c dvwa.cookie "192.168.1.44/DVWA/login.php" | awk -F 'value=' '/user_token/ {print $2}' | cut -d "'" -f2) 2: SESSIONID=$(grep PHPSESSID dvwa.cookie | cut -d $'\t' -f7) 3: curl -s -b dvwa.cookie -d "username=admin&password=password&user_token=${CSRF}&Login=Login" "192.168.1...