X-Git-Url: https://iankelling.org/git/?a=blobdiff_plain;f=vpn-mk-client-cert;h=ec68484274dfe85bef00136fc6bbada7220180c4;hb=2da6add81afb25c139de43264815ee6c8018e88c;hp=baecdf1cf30b5ee5539b8829db9e4cd4aa7e9705;hpb=dacf50e689875098352985acadc8210d845b358d;p=vpn-setup diff --git a/vpn-mk-client-cert b/vpn-mk-client-cert index baecdf1..ec68484 100755 --- a/vpn-mk-client-cert +++ b/vpn-mk-client-cert @@ -36,9 +36,13 @@ usage: ${0##*/} VPN_SERVER_HOST can't generate. -c CLIENT_HOST Default is localhost. Else we ssh to root@CLIENT_HOST. +-f Force. Proceed even if cert already exists. -n CONFIG_NAME default is client --s SCRIPT_PATH Use custom up/down script at SCRIPT_PATH. copied to same path - on client, if client is not localhost. +-o SERVER_CONFIG_NAME Default is CONFIG_NAME +-s SCRIPT_PATH Use custom up/down script at SCRIPT_PATH. If client host is + not localhost, the script is copied to it. The default + script used to be /etc/openvpn/update-resolv-conf, but now + that systemd-resolved is becoming popular, there is no default. Generate a client cert and config and install it on locally or on CLIENT_HOST if given. Uses default config options, and expects be able @@ -63,24 +67,29 @@ EOF shell="bash -c" name=client -custom_script=false -script=/etc/openvpn/update-resolv-conf client_host=$CLIENT_HOST +force=false -temp=$(getopt -l help hb:c:n:s: "$@") || usage 1 +temp=$(getopt -l help hb:c:fn:o:s: "$@") || usage 1 eval set -- "$temp" while true; do case $1 in -b) common_name="$2"; shift 2 ;; -c) client_host=$2; shell="ssh root@$client_host"; shift 2 ;; + -f) force=true; shift ;; -n) name="$2"; shift 2 ;; - -s) custom_script=true; script="$2"; shift 2 ;; + -o) server_name="$2"; shift 2 ;; + -s) script="$2"; shift 2 ;; -h|--help) usage ;; --) shift; break ;; *) echo "$0: Internal error! unexpected args: $*" ; exit 1 ;; esac done +if [[ ! $server_name ]]; then + server_name="$name" +fi + if [[ ! $common_name ]]; then if [[ $client_host ]]; then common_name=$client_host @@ -94,19 +103,33 @@ host=$1 ####### end command line parsing and checking ############## + +f=/etc/openvpn/client/$name.crt + +cert_to_test=$f +if [[ $client_host ]]; then + cert_to_test=$(mktemp) + ssh root@$client_host cat $f 2>/dev/null >$cert_to_test ||: +fi +if ! $force && openssl x509 -checkend $(( 60 * 60 * 24 * 30 )) -noout -in $cert_to_test &>/dev/null; then + echo "$0: cert already exists. exiting early" + exit 0 +fi + + # bash or else we get motd spam. note sleep 2, sleep 1 failed. $shell '[[ -e /etc/openvpn ]] || apt install openvpn' -if ! ssh root@$host bash -s -- $name $common_name < client-cert-helper \ +if ! ssh root@$host bash -s -- $server_name $common_name < client-cert-helper \ | $shell 'id -u | grep -xF 0 || s=sudo; $s tar xzv -C /etc/openvpn/client'; then echo ssh root@$host cat /tmp/vpn-mk-client-cert.log: ssh root@$host cat /tmp/vpn-mk-client-cert.log + echo EOF for root@$host:/tmp/vpn-mk-client-cert.log exit 1 fi port=$(echo '/^port/ {print $2}' | ssh root@$host awk -f - /etc/openvpn/server/$name.conf | tail -n1) -f=/etc/openvpn/client/$name.crt if ! $shell "test -s $f"; then # if common name is not unique, you get empty file. and if we didn't silence # build-key, you'd see an error "TXT_DB error number 2" @@ -123,7 +146,10 @@ remote $host $port resolv-retry infinite nobind persist-key -persist-tun +# persist-tun was here, but if the vpn goes down this makes +# the whole thing get stuck if the vpn is our default route +# unless we set a special route out just for the vpn. +# todo: investigate. ca ca-$name.crt cert $name.crt key $name.key @@ -151,14 +177,12 @@ EOF if [[ $script ]]; then $shell "tee -a /etc/openvpn/client/$name.conf" <