vpn.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624
  1. //go:generate go-bindata -pkg bindata -o bindata/bindata.go template/
  2. //go:generate protoc -I pb/ pb/user.proto pb/vpn.proto --go_out=plugins=grpc:pb
  3. package ovpm
  4. import (
  5. "bytes"
  6. "fmt"
  7. "math/big"
  8. "os"
  9. "os/exec"
  10. "strings"
  11. "text/template"
  12. "time"
  13. "github.com/Sirupsen/logrus"
  14. "github.com/asaskevich/govalidator"
  15. "github.com/cad/ovpm/bindata"
  16. "github.com/cad/ovpm/pki"
  17. "github.com/cad/ovpm/supervisor"
  18. "github.com/google/uuid"
  19. "github.com/jinzhu/gorm"
  20. )
  21. // DBNetwork is database model for external networks on the VPN server.
  22. type DBNetwork struct {
  23. gorm.Model
  24. ServerID uint
  25. Server DBServer
  26. Name string
  27. NetworkCIDR string
  28. }
  29. // DBServer is database model for storing VPN server related stuff.
  30. type DBServer struct {
  31. gorm.Model
  32. Name string `gorm:"unique_index"` // Server name.
  33. SerialNumber string
  34. Hostname string // Server's ip address or FQDN
  35. Port string // Server's listening port
  36. Cert string // Server RSA certificate.
  37. Key string // Server RSA private key.
  38. CACert string // Root CA RSA certificate.
  39. CAKey string // Root CA RSA key.
  40. Net string // VPN network.
  41. Mask string // VPN network mask.
  42. CRL string // Certificate Revocation List
  43. }
  44. // CheckSerial takes a serial number and checks it against the current server's serial number.
  45. func (s *DBServer) CheckSerial(serial string) bool {
  46. return serial == s.SerialNumber
  47. }
  48. type _VPNServerConfig struct {
  49. CertPath string
  50. KeyPath string
  51. CACertPath string
  52. CAKeyPath string
  53. CCDPath string
  54. CRLPath string
  55. DHParamsPath string
  56. Net string
  57. Mask string
  58. Port string
  59. }
  60. // Init regenerates keys and certs for a Root CA, and saves them in the database.
  61. func Init(hostname string, port string) error {
  62. if port == "" {
  63. port = DefaultVPNPort
  64. }
  65. if !govalidator.IsNumeric(port) {
  66. return fmt.Errorf("validation error: port:`%s` should be numeric", port)
  67. }
  68. serverName := "default"
  69. if IsInitialized() {
  70. if err := Deinit(); err != nil {
  71. logrus.Errorf("server can not be deleted: %v", err)
  72. return err
  73. }
  74. }
  75. if !govalidator.IsHost(hostname) {
  76. return fmt.Errorf("validation error: hostname:`%s` should be either an ip address or a FQDN", hostname)
  77. }
  78. ca, err := pki.NewCA()
  79. if err != nil {
  80. return fmt.Errorf("can not create ca creds: %s", err)
  81. }
  82. srv, err := pki.NewServerCertHolder(ca)
  83. if err != nil {
  84. return fmt.Errorf("can not create server cert creds: %s", err)
  85. }
  86. serialNumber := uuid.New().String()
  87. serverInstance := DBServer{
  88. Name: serverName,
  89. SerialNumber: serialNumber,
  90. Hostname: hostname,
  91. Port: port,
  92. Cert: srv.Cert,
  93. Key: srv.Key,
  94. CACert: ca.Cert,
  95. CAKey: ca.Key,
  96. Net: _DefaultServerNetwork,
  97. Mask: _DefaultServerNetMask,
  98. }
  99. db.Create(&serverInstance)
  100. if db.NewRecord(&serverInstance) {
  101. return fmt.Errorf("can not create server instance on database")
  102. }
  103. users, err := GetAllUsers()
  104. if err != nil {
  105. return err
  106. }
  107. // Sign all users in the db with the new server
  108. for _, user := range users {
  109. err := user.Renew()
  110. logrus.Infof("user certificate changed for %s, you should run: $ ovpm user export-config --user %s", user.Username, user.Username)
  111. if err != nil {
  112. logrus.Errorf("can not sign user %s: %v", user.Username, err)
  113. continue
  114. }
  115. }
  116. Emit()
  117. logrus.Infof("server initialized")
  118. return nil
  119. }
  120. // Deinit deletes the server with the given serverName from the database and frees the allocated resources.
  121. func Deinit() error {
  122. if !IsInitialized() {
  123. return fmt.Errorf("server not found")
  124. }
  125. db.Unscoped().Delete(&DBServer{})
  126. db.Unscoped().Delete(&DBRevoked{})
  127. Emit()
  128. return nil
  129. }
  130. // DumpsClientConfig generates .ovpn file for the given vpn user and returns it as a string.
  131. func DumpsClientConfig(username string) (string, error) {
  132. var result bytes.Buffer
  133. user, err := GetUser(username)
  134. if err != nil {
  135. return "", err
  136. }
  137. server, err := GetServerInstance()
  138. if err != nil {
  139. return "", err
  140. }
  141. params := struct {
  142. Hostname string
  143. Port string
  144. CA string
  145. Key string
  146. Cert string
  147. NoGW bool
  148. }{
  149. Hostname: server.Hostname,
  150. Port: server.Port,
  151. CA: server.CACert,
  152. Key: user.Key,
  153. Cert: user.Cert,
  154. NoGW: user.NoGW,
  155. }
  156. data, err := bindata.Asset("template/client.ovpn.tmpl")
  157. if err != nil {
  158. return "", err
  159. }
  160. t, err := template.New("client.ovpn").Parse(string(data))
  161. if err != nil {
  162. return "", fmt.Errorf("can not parse client.ovpn.tmpl template: %s", err)
  163. }
  164. err = t.Execute(&result, params)
  165. if err != nil {
  166. return "", fmt.Errorf("can not render client.ovpn: %s", err)
  167. }
  168. return result.String(), nil
  169. }
  170. // DumpClientConfig generates .ovpn file for the given vpn user and dumps it to outPath.
  171. func DumpClientConfig(username, path string) error {
  172. result, err := DumpsClientConfig(username)
  173. if err != nil {
  174. return err
  175. }
  176. // Wite rendered content into openvpn server conf.
  177. return emitToFile(path, result, 0)
  178. }
  179. // GetSystemCA returns the system CA from the database if available.
  180. func GetSystemCA() (*pki.CA, error) {
  181. server := DBServer{}
  182. db.First(&server)
  183. if db.NewRecord(&server) {
  184. return nil, fmt.Errorf("server record does not exists in db")
  185. }
  186. return &pki.CA{
  187. CertHolder: pki.CertHolder{
  188. Cert: server.CACert,
  189. Key: server.CAKey,
  190. },
  191. }, nil
  192. }
  193. // vpnProc represents the OpenVPN process that is managed by the ovpm supervisor globally OpenVPN.
  194. var vpnProc supervisor.Supervisable
  195. // StartVPNProc starts the OpenVPN process.
  196. func StartVPNProc() {
  197. if !IsInitialized() {
  198. logrus.Error("can not launch OpenVPN because system is not initialized")
  199. return
  200. }
  201. if vpnProc == nil {
  202. panic(fmt.Sprintf("vpnProc is not initialized!"))
  203. }
  204. if vpnProc.Status() == supervisor.RUNNING {
  205. logrus.Error("OpenVPN is already started")
  206. return
  207. }
  208. vpnProc.Start()
  209. ensureNatEnabled()
  210. }
  211. // RestartVPNProc restarts the OpenVPN process.
  212. func RestartVPNProc() {
  213. if !IsInitialized() {
  214. logrus.Error("can not launch OpenVPN because system is not initialized")
  215. return
  216. }
  217. if vpnProc == nil {
  218. panic(fmt.Sprintf("vpnProc is not initialized!"))
  219. }
  220. vpnProc.Restart()
  221. }
  222. // StopVPNProc stops the OpenVPN process.
  223. func StopVPNProc() {
  224. if vpnProc == nil {
  225. panic(fmt.Sprintf("vpnProc is not initialized!"))
  226. }
  227. if vpnProc.Status() != supervisor.RUNNING {
  228. logrus.Error("OpenVPN is already not running")
  229. return
  230. }
  231. vpnProc.Stop()
  232. }
  233. // Emit generates all needed files for the OpenVPN server and dumps them to their corresponding paths defined in the config.
  234. func Emit() error {
  235. // Check dependencies
  236. if !checkOpenVPNExecutable() {
  237. return fmt.Errorf("openvpn executable can not be found! you should install OpenVPN on this machine")
  238. }
  239. if !checkOpenSSLExecutable() {
  240. return fmt.Errorf("openssl executable can not be found! you should install openssl on this machine")
  241. }
  242. if !checkIptablesExecutable() {
  243. return fmt.Errorf("iptables executable can not be found")
  244. }
  245. if !IsInitialized() {
  246. return fmt.Errorf("you should create a server first. e.g. $ ovpm vpn create-server")
  247. }
  248. if err := emitServerConf(); err != nil {
  249. return fmt.Errorf("can not emit server conf: %s", err)
  250. }
  251. if err := emitServerCert(); err != nil {
  252. return fmt.Errorf("can not emit server cert: %s", err)
  253. }
  254. if err := emitServerKey(); err != nil {
  255. return fmt.Errorf("can not emit server key: %s", err)
  256. }
  257. if err := emitCACert(); err != nil {
  258. return fmt.Errorf("can not emit ca cert : %s", err)
  259. }
  260. if err := emitCAKey(); err != nil {
  261. return fmt.Errorf("can not emit ca key: %s", err)
  262. }
  263. if err := emitDHParams(); err != nil {
  264. return fmt.Errorf("can not emit dhparams: %s", err)
  265. }
  266. if err := emitCCD(); err != nil {
  267. return fmt.Errorf("can not emit ccd: %s", err)
  268. }
  269. if err := emitIptables(); err != nil {
  270. return fmt.Errorf("can not emit iptables conf: %s", err)
  271. }
  272. if err := emitCRL(); err != nil {
  273. return fmt.Errorf("can not emit crl: %s", err)
  274. }
  275. logrus.Info("configurations emitted to the filesystem")
  276. if IsInitialized() {
  277. for {
  278. if vpnProc.Status() == supervisor.RUNNING || vpnProc.Status() == supervisor.STOPPED {
  279. logrus.Info("OpenVPN process is restarting")
  280. RestartVPNProc()
  281. break
  282. }
  283. time.Sleep(1 * time.Second)
  284. }
  285. }
  286. return nil
  287. }
  288. func emitToFile(path, content string, mode uint) error {
  289. // When testing don't emit files to the filesystem. Just pretend you did.
  290. if Testing {
  291. return nil
  292. }
  293. file, err := os.Create(path)
  294. if err != nil {
  295. return fmt.Errorf("Cannot create file %s: %v", path, err)
  296. }
  297. if mode != 0 {
  298. file.Chmod(os.FileMode(mode))
  299. }
  300. defer file.Close()
  301. fmt.Fprintf(file, content)
  302. return nil
  303. }
  304. func emitServerConf() error {
  305. serverInstance, err := GetServerInstance()
  306. if err != nil {
  307. return fmt.Errorf("can not retrieve server: %v", err)
  308. }
  309. port := DefaultVPNPort
  310. if serverInstance.Port != "" {
  311. port = serverInstance.Port
  312. }
  313. var result bytes.Buffer
  314. server := _VPNServerConfig{
  315. CertPath: _DefaultCertPath,
  316. KeyPath: _DefaultKeyPath,
  317. CACertPath: _DefaultCACertPath,
  318. CAKeyPath: _DefaultCAKeyPath,
  319. CCDPath: _DefaultVPNCCDPath,
  320. CRLPath: _DefaultCRLPath,
  321. DHParamsPath: _DefaultDHParamsPath,
  322. Net: _DefaultServerNetwork,
  323. Mask: _DefaultServerNetMask,
  324. Port: port,
  325. }
  326. data, err := bindata.Asset("template/server.conf.tmpl")
  327. if err != nil {
  328. return err
  329. }
  330. t, err := template.New("server.conf").Parse(string(data))
  331. if err != nil {
  332. return fmt.Errorf("can not parse server.conf.tmpl template: %s", err)
  333. }
  334. err = t.Execute(&result, server)
  335. if err != nil {
  336. return fmt.Errorf("can not render server.conf: %s", err)
  337. }
  338. // Wite rendered content into openvpn server conf.
  339. return emitToFile(_DefaultVPNConfPath, result.String(), 0)
  340. }
  341. // GetServerInstance returns the default server from the database.
  342. func GetServerInstance() (*DBServer, error) {
  343. var server DBServer
  344. db.First(&server)
  345. if db.NewRecord(server) {
  346. return nil, fmt.Errorf("can not retrieve server from db")
  347. }
  348. return &server, nil
  349. }
  350. // IsInitialized checks if there is a default server in the database or not.
  351. func IsInitialized() bool {
  352. var server DBServer
  353. db.First(&server)
  354. if db.NewRecord(server) {
  355. return false
  356. }
  357. return true
  358. }
  359. func emitServerKey() error {
  360. server, err := GetServerInstance()
  361. if err != nil {
  362. return err
  363. }
  364. // Write rendered content into key file.
  365. return emitToFile(_DefaultKeyPath, server.Key, 0600)
  366. }
  367. func emitServerCert() error {
  368. server, err := GetServerInstance()
  369. if err != nil {
  370. return err
  371. }
  372. // Write rendered content into the cert file.
  373. return emitToFile(_DefaultCertPath, server.Cert, 0)
  374. }
  375. func emitCRL() error {
  376. var revokedDBItems []*DBRevoked
  377. db.Find(&revokedDBItems)
  378. var revokedCertSerials []*big.Int
  379. for _, item := range revokedDBItems {
  380. bi := big.NewInt(0)
  381. bi.SetString(item.SerialNumber, 16)
  382. revokedCertSerials = append(revokedCertSerials, bi)
  383. }
  384. systemCA, err := GetSystemCA()
  385. if err != nil {
  386. return fmt.Errorf("can not emit CRL: %v", err)
  387. }
  388. crl, err := pki.NewCRL(systemCA, revokedCertSerials...)
  389. if err != nil {
  390. return fmt.Errorf("can not emit crl: %v", err)
  391. }
  392. return emitToFile(_DefaultCRLPath, crl, 0)
  393. }
  394. func emitCACert() error {
  395. server, err := GetServerInstance()
  396. if err != nil {
  397. return err
  398. }
  399. // Write rendered content into the ca cert file.
  400. return emitToFile(_DefaultCACertPath, server.CACert, 0)
  401. }
  402. func emitCAKey() error {
  403. server, err := GetServerInstance()
  404. if err != nil {
  405. return err
  406. }
  407. // Write rendered content into the ca key file.
  408. return emitToFile(_DefaultCAKeyPath, server.CAKey, 0600)
  409. }
  410. func emitCCD() error {
  411. users, err := GetAllUsers()
  412. if err != nil {
  413. return err
  414. }
  415. if !Testing {
  416. // Clean and then create and write rendered ccd data.
  417. err = os.RemoveAll(_DefaultVPNCCDPath)
  418. if err != nil {
  419. if os.IsNotExist(err) {
  420. } else {
  421. return err
  422. }
  423. }
  424. if _, err := os.Stat(_DefaultVPNCCDPath); err != nil {
  425. }
  426. err = os.Mkdir(_DefaultVPNCCDPath, 0755)
  427. if err != nil {
  428. if !os.IsExist(err) {
  429. return err
  430. }
  431. }
  432. }
  433. for _, user := range users {
  434. var result bytes.Buffer
  435. params := struct {
  436. IP string
  437. NetMask string
  438. }{IP: user.getIP().String(), NetMask: _DefaultServerNetMask}
  439. data, err := bindata.Asset("template/ccd.file.tmpl")
  440. if err != nil {
  441. return err
  442. }
  443. t, err := template.New("ccd.file.tmpl").Parse(string(data))
  444. if err != nil {
  445. return fmt.Errorf("can not parse ccd.file.tmpl template: %s", err)
  446. }
  447. err = t.Execute(&result, params)
  448. if err != nil {
  449. return fmt.Errorf("can not render ccd file %s: %s", user.Username, err)
  450. }
  451. err = emitToFile(_DefaultVPNCCDPath+user.Username, result.String(), 0)
  452. if err != nil {
  453. return err
  454. }
  455. }
  456. return nil
  457. }
  458. func emitDHParams() error {
  459. var result bytes.Buffer
  460. data, err := bindata.Asset("template/dh4096.pem.tmpl")
  461. if err != nil {
  462. return err
  463. }
  464. t, err := template.New("dh4096.pem.tmpl").Parse(string(data))
  465. if err != nil {
  466. return fmt.Errorf("can not parse dh4096.pem template: %s", err)
  467. }
  468. err = t.Execute(&result, nil)
  469. if err != nil {
  470. return fmt.Errorf("can not render dh4096.pem file: %s", err)
  471. }
  472. err = emitToFile(_DefaultDHParamsPath, result.String(), 0)
  473. if err != nil {
  474. return err
  475. }
  476. return nil
  477. }
  478. func emitIptables() error {
  479. return nil
  480. }
  481. func checkOpenVPNExecutable() bool {
  482. executable := getOpenVPNExecutable()
  483. if executable == "" {
  484. logrus.Error("openvpn is not installed ✘")
  485. return false
  486. }
  487. logrus.Debugf("openvpn executable detected: %s ✔", executable)
  488. return true
  489. }
  490. func getOpenVPNExecutable() string {
  491. cmd := exec.Command("which", "openvpn")
  492. output, err := cmd.Output()
  493. if err != nil {
  494. logrus.Errorf("openvpn is not installed: %s ✘", err)
  495. return ""
  496. }
  497. logrus.Debugf("openvpn executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  498. return strings.TrimSpace(string(output[:]))
  499. }
  500. func checkOpenSSLExecutable() bool {
  501. cmd := exec.Command("which", "openssl")
  502. output, err := cmd.Output()
  503. if err != nil {
  504. logrus.Errorf("openssl is not installed: %s ✘", err)
  505. return false
  506. }
  507. logrus.Debugf("openssl executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  508. return true
  509. }
  510. func checkIptablesExecutable() bool {
  511. cmd := exec.Command("which", "iptables")
  512. output, err := cmd.Output()
  513. if err != nil {
  514. logrus.Errorf("iptables is not installed: %s ✘", err)
  515. return false
  516. }
  517. logrus.Debugf("iptables executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  518. return true
  519. }
  520. func ensureBaseDir() {
  521. if Testing {
  522. return
  523. }
  524. os.Mkdir(varBasePath, 0755)
  525. }
  526. func init() {
  527. ensureBaseDir()
  528. var err error
  529. vpnProc, err = supervisor.NewProcess(getOpenVPNExecutable(), varBasePath, []string{"--config", _DefaultVPNConfPath})
  530. if err != nil {
  531. logrus.Errorf("can not create process: %v", err)
  532. }
  533. }