引言:本文利用OpenVPN搭建VPN服務(wù),,并利用pam_sqlite3插件實(shí)現(xiàn)用戶認(rèn)證,;通過openvpn_web進(jìn)行用戶管理與日志系統(tǒng),。 一,、安裝OpenVPN服務(wù)基礎(chǔ)環(huán)境: 服務(wù)端: CentOS 7.6 客戶端:Windows 7 OpenVPN: openvpn-2.4.7 (https://github.com/OpenVPN/openvpn) easy-rsa:easy-rsa 3.0.6 (https://github.com/OpenVPN/easy-rsa) OpenVPN GUI: openvpn gui (https:///lang13002/openvpn-portable) 1.1 安裝openvpn安裝依賴包 # yum install lz4-devel lzo-devel pam-devel openssl-devel systemd-devel sqlite-devel 從github上下載openvpn源代碼包并解壓 編譯openvpn并安裝 # cd openvpn-2.4.7# ./configure --prefix=/usr/local/openvpn --enable-lzo --enable-lz4 --enable-crypto --enable-server --enable-plugins --enable-port-share --enable-iproute2 --enable-pf --enable-plugin-auth-pam --enable-pam-dlopen --enable-systemd# make && make install 參照sample/sample-config-files/server.conf文件生成配置文件 port 1194proto tcp-server;proto udpdev tuntopology subnetca /etc/openvpn/server/ca.crtcert /etc/openvpn/server/server.crtkey /etc/openvpn/server/server.keydh /etc/openvpn/server/dh.pemtls-auth /etc/openvpn/server/ta.key 0user nobodygroup nobodyserver 10.8.0.0 255.255.255.0;ifconfig-pool-persist ipp.txt;push 'redirect-gateway def1 bypass-dhcp'push 'dhcp-option DNS 114.114.114.114'push 'route 192.168.133.0 255.255.255.0'push 'route-gateway 10.200.227.114';client-to-clientkeepalive 10 120comp-lzocompress 'lz4'persist-keypersist-tuncipher AES-256-CBCstatus /var/log/openvpn-status.loglog /var/log/openvpn.logverb 3 配置系統(tǒng)服務(wù) 1.2 生成證書 下載easy-rsa3并解壓 # wget https://github.com/OpenVPN/easy-rsa/archive/v3.0.6.tar.gz# tar -xvf v3.0.6.tar.gz 根據(jù)easy-rsa-3.0.6/easyrsa3/vars.example文件生成全局配置文件vars 修改vars文件,根據(jù)需要去掉注釋,,并修改對(duì)應(yīng)值 set_var EASYRSA_REQ_COUNTRY 'CN'set_var EASYRSA_REQ_PROVINCE 'HUBEI'set_var EASYRSA_REQ_CITY 'WUHAN'set_var EASYRSA_REQ_ORG 'ZJ'set_var EASYRSA_REQ_EMAIL '[email protected]'set_var EASYRSA_REQ_OU 'ZJ'set_var EASYRSA_KEY_SIZE 2048set_var EASYRSA_ALGO rsa 生成服務(wù)端證書 生成客戶端證書 # ./easy-rsa build-client-full client1 nopass 注:可生成client1, client2, client3或?qū)?yīng)姓名的客戶端證書 整理服務(wù)端證書 # cp pki/ca.crt /etc/openvpn/server/# cp pki/private/server.key /etc/openvpn/server/# cp pki/issued/server.crt /etc/openvpn/server/# cp pki/dh.pem /etc/openvpn/server/ 1.3 開啟路由轉(zhuǎn)發(fā)功能與防火墻 二,、添加SQLite認(rèn)證下載pam_sqlite3并安裝 # git clone https:///lang13002/pam_sqlite3.git# cd pam_sqlite3# make && make install 添加pam認(rèn)證文件 創(chuàng)建sqlite3數(shù)據(jù)庫(kù)文件 # sqlite3 /etc/openvpn/openvpn.dbsqlite> create table t_user ( username text not null, password text not null, active int, expire text);sqlite> .quit 在服務(wù)端配置添加認(rèn)證插件 三、客戶端配置3.1 下載客戶端程序: 從https:///lang13002/openvpn-portable/repository/archive/v1.0下載程序,,并安裝網(wǎng)卡驅(qū)動(dòng),; 3.2 安裝驅(qū)動(dòng): 運(yùn)行openvpn-portable/tap-windows.exe 3.3 設(shè)置客戶端證書 將上面生成的ca.crt, client1.crt, client1.key放到openvpn-portable的data/config下,并修改客戶端配置 ca ca.crtcert client1.crtkey client1.keyremote-cert-tls serverauth-user-passauth-nocache 注:當(dāng)有多個(gè)客戶端時(shí),,有多個(gè)文件(ca.crt, client1.crt, client1.key, client.ovpn)需要分發(fā)給客戶,,勢(shì)必會(huì)很麻煩;可以將證書嵌入到客戶端配置文件中,; 四. 連接VPN啟動(dòng)openvpn服務(wù) # systemctl start openvpn 啟動(dòng)openvpn-porable 五,、OpenVPN用戶管理與日志5.1 安裝依賴 5.2 下載openvpn-web # git clone https:///lang13002/openvpn_web.git 5.3 創(chuàng)建相應(yīng)的數(shù)據(jù)庫(kù)表 5.4 OpenVPN運(yùn)行腳本寫日志 服務(wù)端配置添加運(yùn)行腳本 script-security 2client-connect /etc/openvpn/server/connect.pyclient-disconnect /etc/openvpn/server/disconnect.py connect.py 5.5 啟動(dòng)服務(wù) # python myapp.py 5.6 管理界面 |
|