Windows to Linux VPN

Related documents: Roll out custom Windows OpenVPN clients

On build machine

This may be skipped if you already have a built RPM of OpenVPN or sourced it from yum. From FC3 openvpn is available in the extras repositories.

# yum install lzo lzo-devel openssl-devel pam-devel
# rpmbuild -tb openvpn-2.0.5.tar.gz
# scp /usr/src/redhat/RPMS/i386/openvpn-2.0.5-1.i386.rpm ccc@192.168.1.85:

On the server

# yum install lzo
# rpm -Uvh openvpn-2.0.5-1.i386.rpm

OR

Just do this instead of doing all above steps. This will install openvpn package and its dependencies to ur computer.

# yum install openvpn
# cd /usr/share/openvpn/easy-rsa/2.0
# vi vars

Edit the variables KEY_COUNTRY, KEY_PROVINCE, KEY_CITY, KEY_ORG, KEY_EMAIL to the appropriate value.

# . ./vars

You will need to delete all keys out of the Open VPN database.

# ./clean-all

Generate the Certificate Authority keys

# ./build-ca

It will ask a series of questions. The only field you need to fill in is the Common Name.

# ./build-key-server server

Again, some more questions. Only need to fill in the Common Name and answer 'y' to "Sign the certificate?" and "1 out of 1 certificate requests certified, commit?"

# ./build-dh

This will build the Diffie-Hellman key exchange settings. It will take a while.

     # vi /etc/openvpn/openvpn.conf (create this file)

The config of openvpn.conf will included something similar to the following options:

dev tap
proto udp
port 1194
server 192.168.128.0 255.255.255.0
ifconfig 192.168.128.1 255.255.255.0
tls-server
ca /usr/share/openvpn/easy-rsa/2.0/keys/ca.crt
cert /usr/share/openvpn/easy-rsa/2.0/keys/servername.crt
key /usr/share/openvpn/easy-rsa/2.0/keys/servername.key
dh /usr/share/openvpn/easy-rsa/2.0/keys/dh1024.pem
mute 10
verb 3
ping 10
keepalive 0 0
status /var/log/openvpn/openvpn-status.log
log-append /var/log/openvpn/openvpn.log
ip-win32 ipapi

Note: servername is the name of the computer
      ip-win32 used to be not there. but we have problems with windows 10.  other options
      for it are ip-win32 manual and ip-win32 netsh

If multiple customers are going to be connecting to a single server, like in the situation of an ASP. Multiple keys can be setup, along with multiple configuration files, but a different port must be setup for each customer/configuration.

Do not forget to start openpn service

Building key and crt for client to connect vpn

Server side

On the VPN server, run:

# cd /usr/share/openvpn/easy-rsa/2.0
# source vars
# ./build-key <client>

It will then ask you a series of questions, similar to the ones asked by the ./build-key-server script. You should only need to answer the "Common Name" field, "Sign the certificate?" and "1 out of 1 certificate requests certified, commit?"

In the keys directory under current a configuration file config.ovpn similar to openvpn.conf must be created.

Note: Instead of using openvpn.conf give a meaningful name like name of the computer or person using that vpn. (eg kim.conf)

# Configuration for connecting into Creative computing internal network
tls-client
dev tap
proto udp
remote creativecomputing.com.au 1194
resolv-retry infinite
nobind
ifconfig 192.168.128.x 255.255.255.0                    # This line is client dependent. (x means choose the ip                                                           address to use for client)
ca ca.crt
cert <client>.crt
key <client>.key
verb 3
mute 10

Then zip all these file you just created ( .crt, .key,.opvn and etc may be 6 or so files)

#zip filename.zip  filenames dh1024.pem ca.crt

#scp to our muppets at /var/www/html/companyname (company name is folder you will create before copying to muppet)

On the client, install the latest version ofOpenVPN GUI for Windows, applying all the default options.

Or you can download this openvpn for client from our website

www.creativecomputing.com.au/openvpn ( run it in client machine)

Then

Copy zip folder from our website ( www.creativecomputing.com.au/companyname)

Copy the files /usr/share/openvpn/easy-rsa/2.0/keys/<client>.* /usr/share/openvpn/easy-rsa/2.0/ca.crt and /usr/share/openvpn/easy-rsa/2.0/dh1024.pem from the server to the C:\Program Files\OpenVPN\config folder on the client.

On the lower right hand side two red computer icons should apper, right click and connect to vpn server.

Note: Do not forget to port forward in their router ( port start and port end upd 1194 , portmap 1194)

There should be a script on muppets in /etc/openvpn/easy-rsa/email_keys. It takes two arguments: the client name and the email address. It should automatically create the keys for you and email them to the specified address. If any of the steps above change. The script will also need to be changed.

On a network with NAT, port1194with protocolUDPmust be forwarded to server's local IP address.Roll Your Own OpenVPN Windows Installation Package. Windows clients are known to time out, if OpenVPN is run as a service (non GUI) the following commands from RestartVPN.bat can quickly restart the service.

net stop "openvpn service"
net start "openvpn service"

To have OpenVPN automatically connect at startup, edit the reigstry  KEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\openvpn_gui  to the following value:

C:\Program Files\OpenVPN\bin\openvpn-gui.exe --connect <OVPN file>

Creative Staff Client Configuration

# Configuration for connecting into Creative computing internal network
explicit-exit-notify 2
tls-client
dev tap
proto udp
remote creativecomputing.com.au 1194
resolv-retry infinite
nobind
ifconfig 192.168.128.x 255.255.255.0                    # This line is client dependent.
route 192.168.127.0 255.255.255.0 192.168.128.1
dhcp-option DOMAIN crecom.com.au
dhcp-option DNS 192.168.128.1
ca ca.crt
cert <client>.crt
key <client>.key
tls-auth ta.key 1
verb 3
mute 10

OpenVPN using TUN

Sometimes it's more desirable to use TUN interface instead of TAP because TUN does not need root access, which works well on iOS and Android platforms.

Set up server side:

<need to copy stuff from CentOS 6 install guide as much of it is the same>

server side config file:

########################################
# Sample OpenVPN config file for
# 2.0-style multi-client udp server
#
# Adapted from http://openvpn.sourceforge.net/20notes.html
#
# tun-style tunnel

port 1194
dev tun

# Use "local" to set the source address on multi-homed hosts
#local [IP address]

# TLS parms
tls-server
ca /usr/share/easy-rsa/3.0/pki/ca.crt
cert /usr/share/easy-rsa/3.0/pki/issued/server.crt
key /usr/share/easy-rsa/3.0/pki/private/server.key
dh /usr/share/easy-rsa/3.0/pki/dh4096.pem

crl-verify /usr/share/easy-rsa/3.0/pki/crl.pem
tls-auth /usr/share/easy-rsa/3.0/pki/ta.key 0

# Tell OpenVPN to be a multi-client udp server
mode server
# The server's virtual endpoints
ifconfig 10.8.0.1 10.8.0.2

# Pool of /30 subnets to be allocated to clients.
# When a client connects, an --ifconfig command
# will be automatically generated and pushed back to
# the client.
ifconfig-pool 10.8.0.4 10.8.0.255

# Push route to client to bind it to our local
# virtual endpoint.
push "route 10.8.0.1 255.255.255.255"

# Push any routes the client needs to get in
# to the local network.
#push "route 192.168.0.0 255.255.255.0"

# Push DHCP options to Windows clients.
#push "dhcp-option DOMAIN example.com"
#push "dhcp-option DNS 192.168.0.1"
#push "dhcp-option WINS 192.168.0.1"

# Client should attempt reconnection on link
# failure.
keepalive 10 60

# Delete client instances after some period
# of inactivity.
inactive 600

# Route the --ifconfig pool range into the
# OpenVPN server.
route 10.8.0.0 255.255.255.0

# The server doesn't need privileges
user openvpn
group openvpn

# Keep TUN devices and keys open across restarts.
persist-tun
persist-key

verb 9

status /var/log/openvpn/openvpn-status.log
log-append /var/log/openvpn/openvpn.log

This is very similar to the TAP style config, but does not need root access. It does have limitation that client IP's have to be in a /30 (255.255.255.252) netmask. IP addresses are also sent by the server.

Client config:

#########################################
# Sample client-side OpenVPN config file
# for connecting to multi-client server.
#
# Adapted from http://openvpn.sourceforge.net/20notes.html
#
# The server can be pinged at 10.8.0.1.
#
# This configuration can be used by multiple
# clients, however each client should have
# its own cert and key files.
#
# tun-style tunnel

port 1194
dev tun
remote 192.168.1.94
ifconfig 10.8.0.201 10.8.0.202

# TLS parms

tls-client
<ca>
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
MIIJRAIBADANBgkqhkiG9w0BAQEFAASCCS4wggkqAgEAAoICAQDKabYPOpuEqyNd
kUJytwhQjNSQDBbwXiIcgH+ZO98/itNC0x6XwQGN/PSoBhyrN7HOt2WIvf+0r1Nu
0YbJXkd9wf1AR/KUxzlA+7/i/IW9e69xifvO1l+mlwzQdCl/O0JfNx8As1uTONk3
zvh13FLdJPxfrG6QbuNp24mAO0O6n6TIlDJnWkFcoxavWA0hYG7J/9iw8/QYi57Y
3b4Q+9jsUfDcVSEDVzM7zKqISopq58jzMKcK8nbw0JmgqCQM67KrwsBqGLeDNPzI
P1b2rzG5c+GO29nOdKhPQflxX3UB9kIzYn77U1vw3pf7h/uWHier6sL0meqbo4ul
CoTo3ueyutz60o0GFWm0PXaK0GmxxG7pChahY7CrSENRyEsiKhRDtgRrgOuo3zz5
rn692TLXjMSFBlJtjfgAad1txPchOEMdPHLJvWlfadsgiZiZ73cooptNJONuTlzg
BIx6Eaa9xB2S5susG5v2BZ4YImBwfoNAvrXID1dDgkP5Czq6T/IDcakdyv4btxnI
WAVKgEi4LB7Bc88EZ7kRl8KfO0Yu33af7EnzxRv2u/Sfp8q88PfKbjVTMBKXb3kN
SIRck3Q61sy9hpIs4C9LC3kbrElfBbv67AzT8viMPFRIA8/ias/IA8D5oi1KJGzm
eqaBPv0a1EVrsWv/P89zP7r+DoNkywIDAQABAoICAQCrP+q3Ubd39C7Un+wfD/np
5GyGfqP9szaa9KB/7WbA5Nw+Ik40yCdfkM8RRTKGLXWy1fkCSvWHUfp9vKmTvr8v
h6uS8gwrka4/6356NXmVSYqyvbIcWcTNNeiyiET/jwxlcEY7moN0uFkW3XXaiZBV
50/aRhG5AwhGbGYV5o4z25NX3AIU7Qh1rsmnihB515OENYCIna08AwxeoKSIy/rI
Xb8xOpjWsbT39/2jl6UqM3YRQm1hVqgIsAP6J6dwgw1EQl32pXjFelQPu38A8FJa
e88uxZSuFoa7n67CG6fsBAQYY1HZorobvMfLGE5jwJmB2vocZghWq3SfKpouR0Cw
ti1G6nfy8tUO9DNQ3gN4Vm6wZJdhG7b2GNSHRVPv2Fk8aJ/diVFe4lp90fnCWEdh
YNZLcXXKV70Bus8foy1N+CTQ2ETox7vUAHw26DMEvN5gCTdERYMqLxOerJOxLSdY
rOICVTPKCQNLDnXko8TyRB8bNFv8YLhsGkG3NtzKGl91/P1XeTtHGcOO4e2OGFIv
NwLImjBW5SKcBzpo3fbFyxHvRRSA+0t7OD5wZ/ukC88ZWvz4B3CWP6x5TA8FqIsV
W/wHaERgXaJSkOJOlla7QT9/6EbZ3QpTZfaVu2jqIgiLAdQ3kCd4PRoSCui4XXdF
7tCPjjdLcDxw1PAKjGFQqQKCAQEA5t5N+j9Sbf0D9QFZ0CNI7T005uv2djeDxxUM
lfgII6C+DKeEMSP1hQh8uLHqYq0Wi4qiFkiKwClr7dNTO9giY5ijxIv/oa8Jvd8P
1ph49htqEI2hzCA9K5n/sNyErCg+NoRGtEkMlUPaVN7fl4A7elvW8Gc3MS83oZu+
1feIzcKXld0Gsj/B9p3/dfNR1dxBzA4i5X8/cDkCi3nm8LkOOhqqkuH5CL/Z2/xI
C1DlbRca5tbwh1vTi5VXGjlGEO3yK1frS31qZK6Kl0LQjNeEBG3PII+C+hx7wtNZ
LXe2mp6LdnoSTcUFBLtmE1NIeyfPnMvPnq4yyJnkd9XPShmb/wKCAQEA4HJtl8kv
zChVp4HVHu41fZPgTp+FcjsUTtkDDJa3lsdrTIzeenqNyPFLugjh/Op/uUV29LSR
pLt4/bMw1s1/7NnSdNnOYqR7x33pnA8R3PHYH31mJKl3oJqLClXEJbw6hxAEzHgJ
A/GxbRproaKQqL/CeUBRqFKoX3zQ4vIRX5GefJx2qDkoP3xLUPpwM3NzOb0xCk+s
C+oUJVtp7L6KPhieGMFLoa0Ib8TQMlgg06ZgZINnkwQExaF9ZfM1duGxLirDKy+J
FpOHPSZq/uqWfkL10Xz2+kWFDGh6XkolkRC2y4b45CKR1A99V7YfJ0tzZyExJgzs
FKCLBVWkUI3nNQKCAQEAqnF1IEufj5Q8V6WnqQJj1MJbTCDo1F4n69KeeBml6KfD
p5QFBEKIAK9DZRf08uTWwC6Ze9oSlcv+4pYh3Qy0VtNaFMFG+RdBGeyUxNnMc+XJ
aG8oBIvInWgUXX5wdKlBRP5jNLa5k3mEtyPT7wW845jqFpIdLTKu36EcQtt9JGuF
fh6v0uk/SdNbxrjcsgbqjLvjB4vqSe/M8SwOU6pL1pnZVJeAQ/Vf4glfJvuSZfeo
5MPK0CP7ChI3PCUMlXMWVumRzSnKYop5xzKMxW5XCO4I/QD2sbBVroBaVjcLmRtz
2wREfyX1jojL03ipCkNaA2h037G7zF3RTqeLYimGAQKCAQBCAwWejcpkBjzi7jmL
Rk4vJ+3h0eMCrMOVSRgvfKh0TSSOuCO67A6FWgqGpZQpuaJlEDwjTnRDeevk2e30
Ty5fr9TJD0I3Gt9Y1fx+LKR5UhvZbx06jSkk8C8SlBUDcC/ah2iR5n/oTA594zZi
rJhVOUjuNm+NzPm+U8xv4vgfHon5Zl8zrNPckCbqoy2axErQYYdp2/Li8i6IqjEm
MwgfqUfeSgN/go+np7///pFxDk7tYQR2ZcktgwiJkpVX6Jse0+7g5bMxE6TD5Ge1
n7MxYWpA+br98rJl6tiKoM4Zs0u/4muTVWOEdiXMRUE2YmeHnmiBI23Px0P8Bqs0
Efg9AoIBAQDDvAw4v0xrUWRYNp/BNvejfuJKirMTy9KL+IPoMheUVf2ZzqL9eE5+
cbtTxvYOBEwCVaxMwgRwmqY735nPyNbTRONiIfWnNUnDkMuBsb2acpF/BFy5ZT2l
lh7hq9tUfDbIcTXmswX0b1nLQzUCD2r7RDDQUUquGIrZPPUml7Fg+1I0w5pnpuRO
iHvkGGBFYskE2k2jZz6/ghcRYrIBqqVpFcp2WRb1i72+F4yXFOyFdyoJLsqeyLaT
zGc0mo1n/P+UF9fG4WWIKBeF3CI2Uq5PzUGJcTfhuqKMkKtijW1OsFUTs6IxFJUf
bNy4Mb+yzwvHi81Mw3Ax8fLQMFzHHviL
-----END PRIVATE KEY-----
</key>

# This parm is required for connecting
# to a multi-client server.  It tells
# the client to accept options which
# the server pushes to us.
pull

# Scripts can be used to do various
# things (change nameservers, for
# example.
#up scripts/ifup-post
#down scripts/ifdown-post

verb 4
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
a32f09a1d9bc8d438579da7bcde7d86c
8ba48d8069652f4bbd10d998ebd16dee
486f28fe78abc638220065590c5c166c
b12c0725d48a617d66d79861919a1279
a108d31ac35fc447054f085705f760d4
c825d8d17f4815cdf2d24cfc1ca12af1
b1b847c5ec44979622096ec05b58ec2b
7eb43af1a38bd8accfcc8dae4385dace
e41b46657920c925bf09e9c03bd32266
b4107244c792775be827708153a15174
1331339915fcf563d82d03ec0d91715d
5e53166ad96b4d66f7545af0224e3e1f
30987981db4dae2d7f39696e776d9b29
0ecb3369383a2fc7aadebccd57016e79
bf11f944a4608874bb60d4616a909955
044d1a5071d6f72eb09ffa8d76f70560
-----END OpenVPN Static key V1-----
</tls-auth>
key-direction 1
#tls-auth ta.key 1
tls-version-min 1.2
tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384