This tutorial is written for novice level Linux users and DevOps folks who need to add encryption to their internet traffic. A virtual private network (an encrypted network over the public internet) to access specific networks or services from the outside is the way to go.
The key benefit of a VPN is to access resources that are otherwise inaccessible from external networks while maintaining a minimum level of network security at the time.
Generally adding an encrypted virtual private network connection to your infrastructure is a good idea if:
My personal use case is to access my home security system (MotionEye) while traveling on my laptop or on my mobile device so that I can keep an eye on my cats, dogs and fend off porch pirates.
We recommend:
Connect to your VPS via SSH
Upgrade your repositories to make sure they are up to date. We are installing git because this is about 500% faster if we use the fantastic script from Angristan.
$ sudo apt-get update && sudo apt-get upgrade
$ sudo apt-get install git
Do you know your public IP address and your private IP address if you are behind a NAT device (like a router?)
Get the IP from your server
—
$ ifconfig eth0: flags=4163 mtu 1500 inet 192.168.1.166 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::216:3cff:fe43:ba41 prefixlen 64 scopeid 0x20 ether 00:16:3c:43:ba:41 txqueuelen 1000 (Ethernet) RX packets 11672693 bytes 1049010192 (1.0 GB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 347581 bytes 57193541 (57.1 MB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 --
If you are behind a device like a firewall or router I visit http://www.whatismyip.com to find my public IP since it is easier than logging into the router directly.
Make a note of these IP addresses on your scratch pad. You might need them later
The process with the openvpn-install.sh script is dead simple. We are going to clone the script from github. Then, change into the directory that was created and make sure the script is executable and then bang, run that baby as root or with sudo! That will kick off the installation dialogues and away you go.
$ cd ~ $ git clone https://github.com/angristan/openvpn-install openvpn-install $ cd openvpn-install/ $ ls -l $ chmod +x openvpn-install.sh $ sudo ./openvpn-install.sh Welcome to the OpenVPN installer! The git repository is available at: https://github.com/angristan/openvpn-install I need to ask you a few questions before starting the setup. You can leave the default options and just press enter if you are ok with them. I need to know the IPv4 address of the network interface you want OpenVPN listening to. Unless your server is behind NAT, it should be your public IPv4 address. IP address: 192.168.1.111 Checking for IPv6 connectivity... Your host does not appear to have IPv6 connectivity. Do you want to enable IPv6 support (NAT)? [y/n]: n What port do you want OpenVPN to listen to? 1) Default: 1194 2) Custom 3) Random [49152-65535] Port choice [1-3]: 2 Custom port [1-65535]: 7777 #YOU MIGHT WANT 80 or 443 if your local network is filtering things What protocol do you want OpenVPN to use? UDP is faster. Unless it is not available, you shouldn't use TCP. 1) UDP 2) TCP Protocol [1-2]: 1 What DNS resolvers do you want to use with the VPN? 1) Current system resolvers (from /etc/resolv.conf) 2) Self-hosted DNS Resolver (Unbound) 3) Cloudflare (Anycast: worldwide) 4) Quad9 (Anycast: worldwide) 5) Quad9 uncensored (Anycast: worldwide) 6) FDN (France) 7) DNS.WATCH (Germany) 8) OpenDNS (Anycast: worldwide) 9) Google (Anycast: worldwide) 10) Yandex Basic (Russia) 11) AdGuard DNS (Russia) DNS [1-10]: 9 Do you want to use compression? It is not recommended since the VORACLE attack make use of it. Enable compression? [y/n]: n Do you want to customize encryption settings? Unless you know what you're doing, you should stick with the default parameters provided by the script. Note that whatever you choose, all the choices presented in the script are safe. (Unlike OpenVPN's defaults) See https://github.com/angristan/openvpn-install#security-and-encryption to learn more. Customize encryption settings? [y/n]: n Okay, that was all I needed. We are ready to setup your OpenVPN server now. You will be able to generate a client at the end of the installation. Press any key to continue... Tell me a name for the client. Use one word only, no special characters. Client name: chad Do you want to protect the configuration file with a password? (e.g. encrypt the private key with a password) 1) Add a passwordless client 2) Use a password for the client Select an option [1-2]: 2 ⚠ You will be asked for the client password below ⚠ Note: using Easy-RSA configuration from: ./vars Using SSL: openssl OpenSSL 1.1.0g 2 Nov 2017 Generating an EC private key writing new private key to '/etc/openvpn/easy-rsa/pki/private/chad.key.hYBMPyHfHV' Enter PEM pass phrase: Verifying - Enter PEM pass phrase: ----- Using configuration from /etc/openvpn/easy-rsa/pki/safessl-easyrsa.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'chad' Certificate is to be certified until Apr 9 03:48:48 2022 GMT (1080 days) Write out database with 1 new entries Data Base Updated Client chad added, the configuration file is available at /root/chad.ovpn.
—
Download the .ovpn file and import it in your OpenVPN client.
I like to hit https://www.whatismyip.com while I’m connected and make sure that I see the remote network in the returned page rather than the external IP of my local network.
Then I like to visit https://speedtest.net and see what kind of throughput I get out of the system. I got 28.75Mbps down and 73.31 Mbps. Not bad at all!
To manage OpenVPN users on the system we just re-visit the installer and it will detect that OpenVPN has already been installed and proceed to give us 4 management options.
-- $ ./openvpn-install.sh Looks like OpenVPN is already installed. What do you want to do? 1) Add a new user 2) Revoke an existing user 3) Remove OpenVPN 4) Exit Select an option [1-4]: 1 Tell me a name for the client certificate. Please, use one word only, no special characters. Client name: chad Using SSL: openssl OpenSSL 1.1.0g 2 Nov 2017 Generating a 2048 bit RSA private key ............+++ .........................+++ writing new private key to '/etc/openvpn/easy-rsa/pki/private/chad.key.YjDIHqlesv' ----- Using configuration from /etc/openvpn/easy-rsa/pki/safessl-easyrsa.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'chad' Certificate is to be certified until Apr 22 02:45:13 2029 GMT (3650 days) Write out database with 1 new entries Data Base Updated Client chad added, configuration is available at: /root/chad.ovpn root@ubuntu:~/openvpn-install# --
Grab your SFTP client and download the username.ovpn certificate file to the workstation that is going to run the OpenVPN client.
On the workstation download the appropriate client from OpenVPN at https://openvpn.net/community-downloads/
Assuming Windows 10 download and run the installer and then in your system tray right click the little monitor with a lock on it and Import your chad.ovpn file! Then Chad > Connect and you should be good to go. I like to hit https://whatismyip.com while connected and verify that I’m showing the IP address of the OpenVPN server that I’m connected to and not the public IP address of my local network.
https://itunes.apple.com/us/app/openvpn-connect/id590379981 grab that thing from the App Store and then use a cloud file utility like google drive to get the chad.ovpn file or do something really insecure and email it to yourself…
Sean Richards, CISSP, is a 20 year linux enthusiast and security practitioner. He loves family, animals, BBQ, and bicycles.
https://www.linkedin.com/in/seangrichards/
https://github.com/seangrichards/
https://twitter.com/seangrichards
The post How to setup OpenVPN on your VPS: Ubuntu 18.04 appeared first on Low End Box.
In this article, we will see how to Install Google Cloud BigQuery Python client library…
Nov 15,2024 Wallpaper Contest for Xfce 4.20 open for voting The submission phase for the…
MicroCloud 2.1.0 LTS is now available, expanding the number of Canonical infrastructure solutions with a…
Canonical is thrilled to be joining forces with Dell Technologies at the upcoming Dell Technologies…
In today’s massive private mobile network (PMN) market, one of the most common approaches to…
Welcome to the Ubuntu Weekly Newsletter, Issue 865 for the week of November 3 –…