[[ $EUID == 0 ]] || exec sudo -E "$BASH_SOURCE" "$@"
+dns=true
case $1 in
+ -d)
+ dns=false
+ ;;
-h|--help|*)
cat <<'EOF'
-usage: ${0##*/}
+usage: ${0##*/} [-d|-h|--help]
+
+-d Do not push dns
+-h --help print help
Sets up a vpn server which pushes gateway route and dns server
so all traffic goes through the vpn. requires systemd,
and might have some debian specific paths.
EOF
+ exit
;;
esac
-
apt-get update
# suggests get's us openssl & easy rsa
apt-get install --install-suggests -y openvpn
cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/
cp /etc/openvpn/easy-rsa/keys/{ca.crt,server.{crt,key},dh2048.pem} /etc/openvpn
gzip -df /etc/openvpn/server.conf.gz
-sed -i --follow-symlinks 's/^dh dh1024.pem/dh dh2048.pem/' /etc/openvpn/server.conf
+# dh improve security,
+# remove comp-lzo to increase perf
+sed -i --follow-symlinks -f - /etc/openvpn/server.conf <<'EOF'
+s/^dh dh1024.pem/dh dh2048.pem/
+/^comp-lzo.*/d
+EOF
teeu() {
while read -r line; do
done
}
-# Be the default gateway for clients.
teeu /etc/openvpn/server.conf <<'EOF'
+# not in example config, but openvpn outputs a warning about insecure
+# cipher without a setting like this (the default i can understand due
+# to compatibility issues, but not changing the example config... not
+# cool). exact cipher taken from config of vpn provider I trust. This
+# requires the same setting on the client side.
+cipher aes-256-cbc
+# Be the default gateway for clients.
push "redirect-gateway def1"
EOF
-# Be the dns server for clients
-teeu /etc/openvpn/server.conf <<'EOF'
+if $dns; then
+ # Be the dns server for clients
+ teeu /etc/openvpn/server.conf <<'EOF'
push "dhcp-option DNS 10.8.0.1"
EOF
+fi
echo "1" > /proc/sys/net/ipv4/ip_forward
sed -i --follow-symlinks '/^ *net\.ipv4\.ip_forward=.*/d' /etc/sysctl.conf