twitchyliquid64 / subnet
- пятница, 6 октября 2017 г. в 03:13:43
Simple VPN.
Simple VPN server/client for the rest of us.
subnet establishes a TLS connection to the server. A TUN interface is created, and setup with the given network parameters (local IP, subnet). All traffic that matches the localIP + subnet gets routed to the VPN server.
On the server, all traffic which is received is checked against all client's localIPs. If it matches, it goes down there. If it doesn't, it gets routed to the servers TUN device (to its network). If the server's kernel is configured correctly, packets coming back into the TUN device will be NATed, and hence can be routed correctly. They then get routed back to the correct client.
Setup the server:
git clone https://github.com/twitchyliquid64/subnet
cd subnet
export GOPATH=`pwd`
go build -o subnet *.go
sysctl net.ipv4.ip_forward=1
iptables -t nat -A POSTROUTING -j MASQUERADE
./subnet --mode init-server-certs --cert server.certPEM --key server.keyPEM --ca ca.certPEM --ca_key ca.keyPEM
./subnet --mode server --key server.keyPEM --cert server.certPEM --ca ca.certPEM --network 192.168.69.1/24 0.0.0.0
Setup the client:
First, generate a certificate/key pair for each client, by running this on the server:
./subnet --mode make-client-cert --ca ca.certPEM --ca_key ca.keyPEM client.certPEM client.keyPEM
Then, transfer client.certPEM
, client.keyPEM
and ca.certPEM
to your client.
Now, run this on the client:
cd subnet
export GOPATH=`pwd`
go build -o subnet *.go
sudo ./subnet -gw 192.168.69.1 -network 192.168.69.4/24 -cert client.certPEM -key client.keyPEM -ca ca.certPEM <server address>
#If you are on Mac OSX (replace 'Wi-Fi' with your interface):
networksetup -setdnsservers Wi-Fi 8.8.8.8
Explanation:
192.168.69.1
, managing traffic for 192.168.69.1
- 192.168.69.255
.192.168.69.4
.192.168.69.1
, forcing all non-LAN traffic through the VPN server.Setup the server (linux only):
git clone https://github.com/twitchyliquid64/subnet
cd subnet
export GOPATH=`pwd`
go build -o subnet *.go
sysctl net.ipv4.ip_forward=1
iptables -t nat -A POSTROUTING -j MASQUERADE
./subnet --mode init-server-certs --cert server.certPEM --key server.keyPEM --ca ca.certPEM --ca_key ca.keyPEM
./subnet --mode server --key server.keyPEM --cert server.certPEM --ca ca.certPEM --network 192.168.69.1/24 0.0.0.0
Setup the client:
First, generate a certificate/key pair for each client, by running this on the server:
./subnet --mode make-client-cert --ca ca.certPEM --ca_key ca.keyPEM client.certPEM client.keyPEM
Then, transfer client.certPEM
, client.keyPEM
and ca.certPEM
to your client.
Now, run this on the client:
cd subnet
export GOPATH=`pwd`
go build -o subnet *.go
sudo ./subnet -network 192.168.69.4/24 -cert client.certPEM -key client.keyPEM -ca ca.certPEM <server address>
Explanation:
192.168.69.1
, managing traffic for 192.168.69.1
- 192.168.69.255
.192.168.69.4
. The /24
subnet mask means traffic for addresses 192.168.69.1
to 192.168.69.255
will be routed through the VPN.192.168.69.1
will go to the VPN server. Any traffic to 192.168.69.1
to 192.168.69.255
will go to clients connected to the same server with that address. All other traffic is routed outside of subnet.Usage of ./subnet:
./subnet <server address>
-blockProfile
Enable block profiling
-ca string
Path to PEM-encoded cert to validate client/serv
-ca_key string
Path to PEM-encoded key to use generating certificates
-cert string
Path to PEM-encoded cert for our side of the connection
-cpuProfile
Enable CPU profiling
-gw string
(Client only) Set the default gateway to this value
-i string
TUN interface, one is picked if not specified
-key string
Path to PEM-encoded key for our cert
-mode string
Whether the process starts a server or as a client (default "client")
-network string
Address for this interface with netmask (default "192.168.69.1/24")
-port string
Port for the VPN connection (default "3234")