2 # Copyright (C) 2016 Ian Kelling
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
17 trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
19 [[ $EUID == 0 ]] ||
exec sudo
-E "$BASH_SOURCE" "$@"
21 readonly this_file
="$(readlink -f -- "${BASH_SOURCE[0]}")"; cd "${this_file%/*}"
26 usage: ${0##*/} VPN_SERVER_HOST
28 -b COMMON_NAME By default, use $CLIENT_HOST or if it is not given,
29 $HOSTNAME. If the cert already exists on the server,
30 with the CLIENT_NAME name, we use the existing one. See
31 comment below if we ever want to check existing common
32 names. They must be unique per server, so you can use
33 $(uuidgen) if needed. You used to be able to create
34 multiple with the same name, but not connect at the
35 same time, but now, the generator keeps track, so you
38 -c CLIENT_HOST Default is localhost. Else we ssh to root@CLIENT_HOST.
39 -f Force. Proceed even if cert already exists.
40 -n CONFIG_NAME default is client
41 -o SERVER_CONFIG_NAME Default is CONFIG_NAME
42 -s SCRIPT_PATH Use custom up/down script at SCRIPT_PATH. If client host is
43 not localhost, the script is copied to it. The default
44 script used to be /etc/openvpn/update-resolv-conf, but now
45 that systemd-resolved is becoming popular, there is no default.
47 Generate a client cert and config and install it on locally or on
48 CLIENT_HOST if given. Uses default config options, and expects be able
49 to ssh to VPN_SERVER_HOST and CLIENT_HOST as root, or if CLIENT_HOST is
50 localhost, just to sudo this script as root.
55 Note: Uses GNU getopt options parsing style
60 # to get the common name
61 # cn=$(s openssl x509 -noout -nameopt multiline -subject \
62 # -in /etc/openvpn/client/mail.crt | \
63 # sed -rn 's/^\s*commonName\s*=\s*(.*)/\1/p')
66 ####### begin command line parsing and checking ##############
70 client_host
=$CLIENT_HOST
73 temp
=$
(getopt
-l help hb
:c
:fn
:o
:s
: "$@") || usage
1
77 -b) common_name
="$2"; shift 2 ;;
78 -c) client_host
=$2; shell
="ssh root@$client_host"; shift 2 ;;
79 -f) force
=true
; shift ;;
80 -n) name
="$2"; shift 2 ;;
81 -o) server_name
="$2"; shift 2 ;;
82 -s) script="$2"; shift 2 ;;
85 *) echo "$0: Internal error! unexpected args: $*" ; exit 1 ;;
89 if [[ ! $server_name ]]; then
93 if [[ ! $common_name ]]; then
94 if [[ $client_host ]]; then
95 common_name
=$client_host
102 [[ $host ]] || usage
1
104 ####### end command line parsing and checking ##############
107 f
=/etc
/openvpn
/client
/$name.crt
109 $shell "dd of=/etc/openvpn/client/$name.conf" <<EOF
110 # From example config, from debian stretch to buster
115 resolv-retry infinite
118 # persist-tun was here, but if the vpn goes down this makes
119 # the whole thing get stuck if the vpn is our default route
120 # unless we set a special route out just for the vpn.
125 # disabled for better performance
129 # matching server config
132 # example config has the commented line, but this other thing looks stronger,
133 # and I've seen it in a vpn provider I trust
134 # ns-cert-type server
135 remote-cert-tls server
137 # more resilient when running as nonroot
140 # See comments in server side configuration.
141 # The minimum of the client & server config is what is used by openvpn.
144 tls-auth ta-$name.key 1
147 if [[ $script ]]; then
148 $shell "tee -a /etc/openvpn/client/$name.conf" <<EOF
154 if [[ $client_host && $script ]]; then
155 $shell "dd of=$script" <$script
156 $shell "chmod +x $script"
160 $shell 'cd /etc/openvpn; for f in client/*; do ln -sf $f .; done'
164 if [[ $client_host ]]; then
165 cert_to_test
=$
(mktemp
)
166 ssh root@
$client_host cat $f 2>/dev
/null
>$cert_to_test ||
:
168 if ! $force && openssl x509
-checkend $
(( 60 * 60 * 24 * 30 )) -noout -in $cert_to_test &>/dev
/null
; then
169 echo "$0: cert already exists. exiting early"
174 # bash or else we get motd spam. note sleep 2, sleep 1 failed.
175 $shell '[[ -e /etc/openvpn ]] || apt install openvpn'
176 if ! ssh root@
$host bash
-s -- $server_name $common_name < client-cert-helper \
177 |
$shell 'id -u | grep -xF 0 || s=sudo; $s tar xzv -C /etc/openvpn/client'; then
178 echo ssh root@
$host cat /tmp
/vpn-mk-client-cert.log
:
179 ssh root@
$host cat /tmp
/vpn-mk-client-cert.log
180 echo EOF
for root@
$host:/tmp
/vpn-mk-client-cert.log
184 port
=$
(echo '/^port/ {print $2}' |
ssh root@
$host awk -f - /etc
/openvpn
/server
/$name.conf |
tail -n1)
187 if ! $shell "test -s $f"; then
188 # if common name is not unique, you get empty file. and if we didn't silence
189 # build-key, you'd see an error "TXT_DB error number 2"
190 echo "$0: error: $f is empty or otherwise bad. is this common name unique?"