Move MESSAGE to README. Explain how to configure tun devices with
/etc/hostname.if, and how to run openvpn in /var/empty chroot. ok sthen
This commit is contained in:
parent
ed9070a0e1
commit
0736e0474f
@ -1,9 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.36 2010/11/19 22:31:35 espie Exp $
|
||||
# $OpenBSD: Makefile,v 1.37 2011/11/02 16:45:02 stsp Exp $
|
||||
|
||||
COMMENT= easy-to-use, robust, and highly configurable VPN
|
||||
|
||||
VERSION= 2.1.4
|
||||
DISTNAME= openvpn-${VERSION}
|
||||
REVISION= 0
|
||||
CATEGORIES= net security
|
||||
|
||||
HOMEPAGE= http://openvpn.net/
|
||||
|
@ -1,7 +0,0 @@
|
||||
OpenVPN re-creates the tun(4) interface at startup; compatibility
|
||||
with PF is improved by starting it from hostname.if(5). For example:
|
||||
|
||||
# cat << EOF > /etc/hostname.tun0
|
||||
up
|
||||
!${TRUEPREFIX}/sbin/openvpn --daemon --config ${SYSCONFDIR}/openvpn/server.conf
|
||||
EOF
|
@ -1,8 +1,10 @@
|
||||
@comment $OpenBSD: PLIST,v 1.12 2010/08/30 18:32:20 fkr Exp $
|
||||
@comment $OpenBSD: PLIST,v 1.13 2011/11/02 16:45:02 stsp Exp $
|
||||
@newgroup _openvpn:577
|
||||
@newuser _openvpn:577:_openvpn:daemon:OpenVPN Daemon:/nonexistent:/sbin/nologin
|
||||
@man man/man8/openvpn.8
|
||||
@bin sbin/openvpn
|
||||
@comment share/doc/openvpn/
|
||||
share/doc/pkg-readmes/${FULLPKGNAME}
|
||||
share/examples/openvpn/
|
||||
share/examples/openvpn/easy-rsa/
|
||||
share/examples/openvpn/easy-rsa/1.0/
|
||||
|
79
net/openvpn/pkg/README
Normal file
79
net/openvpn/pkg/README
Normal file
@ -0,0 +1,79 @@
|
||||
$OpenBSD: README,v 1.1 2011/11/02 16:45:02 stsp Exp $
|
||||
|
||||
+-----------------------------------------------------------------------
|
||||
| Running ${FULLPKGNAME} on OpenBSD
|
||||
+-----------------------------------------------------------------------
|
||||
|
||||
Using /etc/hostname.tun0 without persist-tun
|
||||
============================================
|
||||
|
||||
OpenVPN re-creates the tun(4) interface at startup, unless the
|
||||
persist-tun option is given in the configuration file. When not using
|
||||
persist-tun, compatibility with PF is improved by starting OpenVPN from
|
||||
hostname.if(5). For example:
|
||||
|
||||
# cat << EOF > /etc/hostname.tun0
|
||||
up
|
||||
!${TRUEPREFIX}/sbin/openvpn --daemon \
|
||||
--config ${SYSCONFDIR}/openvpn/server.conf
|
||||
EOF
|
||||
|
||||
Using /etc/hostname.tun0 with persist-tun
|
||||
=========================================
|
||||
|
||||
When the persist-tun option is used, the tun(4) interface can be
|
||||
configured before OpenVPN is started, just like any other interface.
|
||||
|
||||
The example below configures a point-to-point link between two sites
|
||||
accross an OpenVPN tunnel. Site-1 has tunnel end point 10.1.1.1 and
|
||||
local network 192.168.0.0/24. Site-2 has tunnel end point 10.1.1.2
|
||||
and local network 192.168.1.1/24. The sites connect their local
|
||||
networks via the tunnel.
|
||||
|
||||
Site-1:
|
||||
# cat << EOF > /etc/hostname.tun0
|
||||
inet 10.1.1.1 255.255.255.255 NONE
|
||||
dest 10.1.1.2
|
||||
!/sbin/route add -host 10.1.1.1 127.0.0.1
|
||||
!/sbin/route add -net 192.168.1.1/24 10.1.1.2
|
||||
EOF
|
||||
|
||||
Site-2:
|
||||
# cat << EOF > /etc/hostname.tun0
|
||||
inet 10.1.1.2 255.255.255.255 NONE
|
||||
dest 10.1.1.1
|
||||
!/sbin/route add -host 10.1.1.2 127.0.0.1
|
||||
!/sbin/route add -net 192.168.0.0/24 10.1.1.1
|
||||
EOF
|
||||
|
||||
In this case, there is no need to configure an IP address on the tun
|
||||
interface from the OpenVPN configuration file. The tun interface will
|
||||
become active when OpenVPN starts using it.
|
||||
|
||||
A suitable OpenVPN configuration file for site-1 might look as follows:
|
||||
|
||||
daemon
|
||||
dev tun0
|
||||
persist-tun
|
||||
proto udp
|
||||
local site-1.example.com
|
||||
remote site-2.example.com
|
||||
secret /etc/openvpn/secret.key
|
||||
ping 10
|
||||
ping-restart 60
|
||||
|
||||
Running OpenVPN in chroot
|
||||
=========================
|
||||
|
||||
OpenVPN can run as an unprivileged user inside chroot when the
|
||||
persist-tun, persist-key, and persist-local-ip options are used.
|
||||
Note that persist-local-ip requires that OpenVPN is listening on an
|
||||
interface with a static IP address. To chroot OpenVPN, use the following
|
||||
as part of your configuration file:
|
||||
|
||||
persist-tun
|
||||
persist-key
|
||||
persist-local-ip
|
||||
user _openvpn
|
||||
group _openvpn
|
||||
chroot /var/empty
|
Loading…
Reference in New Issue
Block a user