Install
apt install openvpn
Enable ip forwarding
echo 1 > /proc/sys/net/ipv4/ip_forward
This simple setup with static key is really only usable with single client and server, unless you want to run separate openvpn instances on different server ports with different server configurations.
cd /etc/openvpn/ openvpn --genkey --secret static.key
Set up the server.conf, here's a minimum konfiguration
dev tun ifconfig 10.8.0.1 10.8.0.2 secret /etc/openvpn/static.key cipher AES-256-CBC
And client.conf
remote 1.2.3.4 dev tun ifconfig 10.8.0.2 10.8.0.1 secret static.key #route 4.5.6.7 255.255.255.255 vpn_gateway
redirect-gateway def1 cipher AES-256-CBC
Note the static key
and redirect-gateway
options. Redirect gateway will route all client's traffic to go through VPN. For visiting public sites you will need to setup SNAT/MASQUERADING on firewall. See below.
Uncomment route
and comment out redirect-gateway
if you only want to route traffic to specific IP e.g. 4.5.6.7
Start the openvpn on both server and client. Server:
/etc/openvpn# openvpn server/server.conf
and client
sudo openvpn client.ovpn
Both commands should show at the end something like:
... 2024-04-09 10:25:08 Peer Connection Initiated with [AF_INET]1.2.3.4:port 2024-04-09 10:25:08 Initialization Sequence Completed
To verify that the VPN is running, you should be able to ping 10.8.0.2 from the server and 10.8.0.1 from the client.
This is the “proper” way to do it when there are multiple clients involved.
Download the easy-rsa:
wget https://github.com/OpenVPN/easy-rsa/releases/download/v3.1.7/EasyRSA-3.1.7.tgz tar xf EasyRSA-3.1.7.tgz cd EasyRSA-3.1.7
Copy vars.example to vars and change variables accordingly. vars will be automatically sourced by easy-rsa script.
cp vars.example vars
Also add the keyEncipherment
option in x509-types/client file otherwise you will get an error like
Client failed: unsupported certificate purpose
eg.
etc/openvpn/EasyRSA-3.1.7# cat x509-types/client # X509 extensions for a client basicConstraints = CA:FALSE subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer:always extendedKeyUsage = clientAuth keyUsage = digitalSignature, keyEncipherment
1. Initialize the PKI directories
./easyrsa init-pki
2. Create the CA. Used in client and server configuration:
./easyrsa build-ca
3. Generate Diffie-Hellman (DH) params.
./easyrsa gen-dh
4. Create the vpn server's sign request and then certificate. This should be used in server.conf cert
along with key
which will also be generated with these commands. Here you need to provide the password of the CA.key in step 2:
./easyrsa gen-req server nopass ./easyrsa sign-req server server
5. Create client signing request and certificate. Change EntityName, nopass
if you don't want private key to be encrypted
./easyrsa gen-req EntityName nopass ./easyrsa sign-req client EntityName
For each new client just repeat last step.
You can copy the example file and adapt the fields to your config
cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf server.conf
Edit the ca, cert, key, and dh parameters to point to the files you generated and any other configuration you need. Also create the ta.key
openvpn --genkey tls-auth ta.key
Also create the openvpn user
adduser --no-create-home --disabled-login openvpn
and uncomment this in server.conf
... ;user openvpn ;group openvpn ...
cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf client.conf.example
remote
directive to point to the hostname/IP address and port number of the OpenVPN serverYou can now try running the openvpn on client and server like mentioned in Simple setup above.
In server.conf add
push "redirect-gateway def1 bypass-dhcp"
In client.conf add:
redirect-gateway def1
In server.conf add:
push "route 192.168.10.0 255.255.255.0" push "route 192.168.20.0 255.255.255.0" ...
Remove the redirect-gateway lines from conf.
Ubuntu Network Manager doesn't seem to need above settings, so you can just uncheck the “Use this connection only for resources on its network” to redirect all traffic over VPN.
First uninstall any other DNS server/resolver like systemd-resolved
. Now install dnsmasq
apt install dnsmasq
Now make the /etc/resolv.conf look like this
nameserver ::1 nameserver 127.0.0.1 options trust-ad
You might need to write protect this file because some other programs might overwrite this.
In /etc/dnsmasq.conf add one or more upstream servers that dnsmasq will use for name resolution i.e.
listen-address=::1,127.0.0.1,10.8.0.1 interface=tun0 # Google's nameservers, for example server=8.8.8.8 server=8.8.4.4
Adapt the listen-address IP to your VPN interface IP and interface as well and uncomment no-resolv
.
In /etc/openvpn/server/server.conf make sure you push DNS and redirect gateway:
... push "redirect-gateway def1 bypass-dhcp" push "dhcp-option DNS 10.13.13.1" ...
If you run into problems with DNS not going through VPN in Windows installed as a VM in Virtualbox for example, you will need to disable automatic metric on VPN interface and set it to lower then the default Ethernet or wifi. To check open the powershell and type nslookup example.org
and you should get a response from VPN IP e.g. 10.8.0.1.
Say you need to always resolve example.org to 1.2.3.4 address, you have two options.
1. Add the resolution to /etc/hosts i.e.
... 1.2.3.4 www.example.org example.org
2. Remove the above from /etc/hosts and in /etc/dnsmasq.conf add following
address=/example.org/1.2.3.4
Also there are other stuff you can do.
Example configuration.
/etc/shorewall/interfaces
############################################################################### #ZONE INTERFACE BROADCAST OPTIONS net eth0 detect tcpflags,logmartians,nosmurfs,dhcp vpn tun0 detect
/etc/shorewall/zones
############################################################################### #ZONE TYPE OPTIONS IN OUT # OPTIONS OPTIONS fw firewall net ipv4 vpn ipv4
/etc/shorewall/snat - this will masq all traffic to appear to be coming from the IP of the server running Openvpn.
MASQUERADE 10.8.0.0/24 eth0
/etc/shorewall/policy
############################################################################### #SOURCE DEST POLICY LOG LEVEL LIMIT:BURST $FW net ACCEPT $FW vpn ACCEPT vpn $FW ACCEPT vpn net ACCEPT net all DROP info # The FOLLOWING POLICY MUST BE LAST all all REJECT info
/etc/shorewall/rules - connect to openvpn service at this port
... ACCEPT net $FW udp 1194 ...
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
Debian 12 ships with systemd units for this. The way to run it is to first make sure the server configuration file is located in /etc/openvpn/server directory. The file must end with .conf. So if you have a configuration file called myvpnserver.conf
you need to run it as
systemctl enable --now openvpn-server@myvpnserver
Check logs with
journalctl -xefu openvpn-server@server.service