vpn.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595
  1. //go:generate go-bindata -pkg bindata -o bindata/bindata.go template/
  2. package ovpm
  3. import (
  4. "bytes"
  5. "fmt"
  6. "math/big"
  7. "net"
  8. "os"
  9. "os/exec"
  10. "strings"
  11. "text/template"
  12. "github.com/Sirupsen/logrus"
  13. "github.com/asaskevich/govalidator"
  14. "github.com/cad/ovpm/bindata"
  15. "github.com/cad/ovpm/pki"
  16. "github.com/cad/ovpm/supervisor"
  17. "github.com/google/uuid"
  18. "github.com/jinzhu/gorm"
  19. )
  20. // DBNetwork is database model for external networks on the VPN server.
  21. type DBNetwork struct {
  22. gorm.Model
  23. ServerID uint
  24. Server DBServer
  25. Name string
  26. NetworkCIDR string
  27. }
  28. // DBServer is database model for storing VPN server related stuff.
  29. type DBServer struct {
  30. gorm.Model
  31. Name string `gorm:"unique_index"` // Server name.
  32. SerialNumber string
  33. Hostname string // Server's ip address or FQDN
  34. Port string // Server's listening port
  35. Cert string // Server RSA certificate.
  36. Key string // Server RSA private key.
  37. CACert string // Root CA RSA certificate.
  38. CAKey string // Root CA RSA key.
  39. Net string // VPN network.
  40. Mask string // VPN network mask.
  41. CRL string // Certificate Revocation List
  42. }
  43. // CheckSerial takes a serial number and checks it against the current server's serial number.
  44. func (s *DBServer) CheckSerial(serial string) bool {
  45. return serial == s.SerialNumber
  46. }
  47. type _VPNServerConfig struct {
  48. CertPath string
  49. KeyPath string
  50. CACertPath string
  51. CAKeyPath string
  52. CCDPath string
  53. CRLPath string
  54. DHParamsPath string
  55. Net string
  56. Mask string
  57. Port string
  58. }
  59. // Init regenerates keys and certs for a Root CA, and saves them in the database.
  60. func Init(hostname string, port string) error {
  61. if port == "" {
  62. port = DefaultVPNPort
  63. }
  64. if !govalidator.IsNumeric(port) {
  65. return fmt.Errorf("validation error: port:`%s` should be numeric", hostname)
  66. }
  67. serverName := "default"
  68. if IsInitialized() {
  69. if err := Deinit(); err != nil {
  70. logrus.Errorf("server can not be deleted: %v", err)
  71. return err
  72. }
  73. }
  74. if !govalidator.IsHost(hostname) {
  75. return fmt.Errorf("validation error: hostname:`%s` should be either an ip address or a FQDN", hostname)
  76. }
  77. ca, err := pki.NewCA()
  78. if err != nil {
  79. return fmt.Errorf("can not create ca creds: %s", err)
  80. }
  81. srv, err := pki.NewServerCertHolder(ca)
  82. if err != nil {
  83. return fmt.Errorf("can not create server cert creds: %s", err)
  84. }
  85. serialNumber := uuid.New().String()
  86. serverInstance := DBServer{
  87. Name: serverName,
  88. SerialNumber: serialNumber,
  89. Hostname: hostname,
  90. Port: port,
  91. Cert: srv.Cert,
  92. Key: srv.Key,
  93. CACert: ca.Cert,
  94. CAKey: ca.Key,
  95. Net: _DefaultServerNetwork,
  96. Mask: _DefaultServerNetMask,
  97. }
  98. db.Create(&serverInstance)
  99. if db.NewRecord(&serverInstance) {
  100. return fmt.Errorf("can not create server instance on database")
  101. }
  102. users, err := GetAllUsers()
  103. if err != nil {
  104. return err
  105. }
  106. // Sign all users in the db with the new server
  107. for _, user := range users {
  108. err := user.Renew()
  109. logrus.Infof("user certificate changed for %s, you should run: $ ovpm user export-config --user %s", user.Username, user.Username)
  110. if err != nil {
  111. logrus.Errorf("can not sign user %s: %v", user.Username, err)
  112. continue
  113. }
  114. }
  115. logrus.Infof("server initialized")
  116. return nil
  117. }
  118. // Deinit deletes the server with the given serverName from the database and frees the allocated resources.
  119. func Deinit() error {
  120. if !IsInitialized() {
  121. return fmt.Errorf("server not found")
  122. }
  123. db.Unscoped().Delete(&DBServer{})
  124. db.Unscoped().Delete(&DBRevoked{})
  125. return nil
  126. }
  127. // DumpsClientConfig generates .ovpn file for the given vpn user and returns it as a string.
  128. func DumpsClientConfig(username string) (string, error) {
  129. var result bytes.Buffer
  130. user, err := GetUser(username)
  131. if err != nil {
  132. return "", err
  133. }
  134. server, err := GetServerInstance()
  135. if err != nil {
  136. return "", err
  137. }
  138. params := struct {
  139. Hostname string
  140. Port string
  141. CA string
  142. Key string
  143. Cert string
  144. }{
  145. Hostname: server.Hostname,
  146. Port: server.Port,
  147. CA: server.CACert,
  148. Key: user.Key,
  149. Cert: user.Cert,
  150. }
  151. data, err := bindata.Asset("template/client.ovpn.tmpl")
  152. if err != nil {
  153. return "", err
  154. }
  155. t, err := template.New("client.ovpn").Parse(string(data))
  156. if err != nil {
  157. return "", fmt.Errorf("can not parse client.ovpn.tmpl template: %s", err)
  158. }
  159. err = t.Execute(&result, params)
  160. if err != nil {
  161. return "", fmt.Errorf("can not render client.ovpn: %s", err)
  162. }
  163. return result.String(), nil
  164. }
  165. // DumpClientConfig generates .ovpn file for the given vpn user and dumps it to outPath.
  166. func DumpClientConfig(username, path string) error {
  167. result, err := DumpsClientConfig(username)
  168. if err != nil {
  169. return err
  170. }
  171. // Wite rendered content into openvpn server conf.
  172. return emitToFile(path, result, 0)
  173. }
  174. // GetSystemCA returns the system CA from the database if available.
  175. func GetSystemCA() (*pki.CA, error) {
  176. server := DBServer{}
  177. db.First(&server)
  178. if db.NewRecord(&server) {
  179. return nil, fmt.Errorf("server record does not exists in db")
  180. }
  181. return &pki.CA{
  182. CertHolder: pki.CertHolder{
  183. Cert: server.CACert,
  184. Key: server.CAKey,
  185. },
  186. }, nil
  187. }
  188. // vpnProc represents the OpenVPN process that is managed by the ovpm supervisor globally OpenVPN.
  189. var vpnProc supervisor.Supervisable
  190. // StartVPNProc starts the OpenVPN process.
  191. func StartVPNProc() {
  192. if !IsInitialized() {
  193. logrus.Error("can not launch OpenVPN because system is not initialized")
  194. return
  195. }
  196. if vpnProc == nil {
  197. panic(fmt.Sprintf("vpnProc is not initialized!"))
  198. }
  199. if vpnProc.Status() == supervisor.RUNNING {
  200. logrus.Error("OpenVPN is already started")
  201. return
  202. }
  203. vpnProc.Start()
  204. }
  205. // RestartVPNProc restarts the OpenVPN process.
  206. func RestartVPNProc() {
  207. if !IsInitialized() {
  208. logrus.Error("can not launch OpenVPN because system is not initialized")
  209. return
  210. }
  211. if vpnProc == nil {
  212. panic(fmt.Sprintf("vpnProc is not initialized!"))
  213. }
  214. vpnProc.Restart()
  215. }
  216. // StopVPNProc stops the OpenVPN process.
  217. func StopVPNProc() {
  218. if vpnProc == nil {
  219. panic(fmt.Sprintf("vpnProc is not initialized!"))
  220. }
  221. if vpnProc.Status() != supervisor.RUNNING {
  222. logrus.Error("OpenVPN is already not running")
  223. return
  224. }
  225. vpnProc.Stop()
  226. }
  227. // Emit generates all needed files for the OpenVPN server and dumps them to their corresponding paths defined in the config.
  228. func Emit() error {
  229. // Check dependencies
  230. if !checkOpenVPNExecutable() {
  231. return fmt.Errorf("openvpn executable can not be found! you should install OpenVPN on this machine")
  232. }
  233. if !checkOpenSSLExecutable() {
  234. return fmt.Errorf("openssl executable can not be found! you should install openssl on this machine")
  235. }
  236. if !checkIptablesExecutable() {
  237. return fmt.Errorf("iptables executable can not be found")
  238. }
  239. if !IsInitialized() {
  240. return fmt.Errorf("you should create a server first. e.g. $ ovpm vpn create-server")
  241. }
  242. if err := emitServerConf(); err != nil {
  243. return fmt.Errorf("can not emit server conf: %s", err)
  244. }
  245. if err := emitServerCert(); err != nil {
  246. return fmt.Errorf("can not emit server cert: %s", err)
  247. }
  248. if err := emitServerKey(); err != nil {
  249. return fmt.Errorf("can not emit server key: %s", err)
  250. }
  251. if err := emitCACert(); err != nil {
  252. return fmt.Errorf("can not emit ca cert : %s", err)
  253. }
  254. if err := emitCAKey(); err != nil {
  255. return fmt.Errorf("can not emit ca key: %s", err)
  256. }
  257. if err := emitDHParams(); err != nil {
  258. return fmt.Errorf("can not emit dhparams: %s", err)
  259. }
  260. if err := emitCCD(); err != nil {
  261. return fmt.Errorf("can not emit ccd: %s", err)
  262. }
  263. if err := emitIptables(); err != nil {
  264. return fmt.Errorf("can not emit iptables conf: %s", err)
  265. }
  266. if err := emitCRL(); err != nil {
  267. return fmt.Errorf("can not emit crl: %s", err)
  268. }
  269. logrus.Info("configurations emitted to the filesystem")
  270. // If the OpenVPN is already running, restart it.
  271. if vpnProc.Status() == supervisor.RUNNING {
  272. logrus.Info("OpenVPN process is restarting")
  273. RestartVPNProc()
  274. }
  275. return nil
  276. }
  277. func emitToFile(path, content string, mode uint) error {
  278. // When testing don't emit files to the filesystem. Just pretend you did.
  279. if Testing {
  280. return nil
  281. }
  282. file, err := os.Create(path)
  283. if err != nil {
  284. return fmt.Errorf("Cannot create file %s: %v", path, err)
  285. }
  286. if mode != 0 {
  287. file.Chmod(os.FileMode(mode))
  288. }
  289. defer file.Close()
  290. fmt.Fprintf(file, content)
  291. return nil
  292. }
  293. func emitServerConf() error {
  294. serverInstance, err := GetServerInstance()
  295. if err != nil {
  296. return fmt.Errorf("can not retrieve server: %v", err)
  297. }
  298. port := DefaultVPNPort
  299. if serverInstance.Port != "" {
  300. port = serverInstance.Port
  301. }
  302. var result bytes.Buffer
  303. server := _VPNServerConfig{
  304. CertPath: _DefaultCertPath,
  305. KeyPath: _DefaultKeyPath,
  306. CACertPath: _DefaultCACertPath,
  307. CAKeyPath: _DefaultCAKeyPath,
  308. CCDPath: _DefaultVPNCCDPath,
  309. CRLPath: _DefaultCRLPath,
  310. DHParamsPath: _DefaultDHParamsPath,
  311. Net: _DefaultServerNetwork,
  312. Mask: _DefaultServerNetMask,
  313. Port: port,
  314. }
  315. data, err := bindata.Asset("template/server.conf.tmpl")
  316. if err != nil {
  317. return err
  318. }
  319. t, err := template.New("server.conf").Parse(string(data))
  320. if err != nil {
  321. return fmt.Errorf("can not parse server.conf.tmpl template: %s", err)
  322. }
  323. err = t.Execute(&result, server)
  324. if err != nil {
  325. return fmt.Errorf("can not render server.conf: %s", err)
  326. }
  327. // Wite rendered content into openvpn server conf.
  328. return emitToFile(_DefaultVPNConfPath, result.String(), 0)
  329. }
  330. // GetServerInstance returns the default server from the database.
  331. func GetServerInstance() (*DBServer, error) {
  332. var server DBServer
  333. db.First(&server)
  334. if db.NewRecord(server) {
  335. return nil, fmt.Errorf("can not retrieve server from db")
  336. }
  337. return &server, nil
  338. }
  339. // IsInitialized checks if there is a default server in the database or not.
  340. func IsInitialized() bool {
  341. var server DBServer
  342. db.First(&server)
  343. if db.NewRecord(server) {
  344. return false
  345. }
  346. return true
  347. }
  348. func emitServerKey() error {
  349. server, err := GetServerInstance()
  350. if err != nil {
  351. return err
  352. }
  353. // Write rendered content into key file.
  354. return emitToFile(_DefaultKeyPath, server.Key, 0600)
  355. }
  356. func emitServerCert() error {
  357. server, err := GetServerInstance()
  358. if err != nil {
  359. return err
  360. }
  361. // Write rendered content into the cert file.
  362. return emitToFile(_DefaultCertPath, server.Cert, 0)
  363. }
  364. func emitCRL() error {
  365. var revokedDBItems []*DBRevoked
  366. db.Find(&revokedDBItems)
  367. var revokedCertSerials []*big.Int
  368. for _, item := range revokedDBItems {
  369. bi := big.NewInt(0)
  370. bi.SetString(item.SerialNumber, 16)
  371. revokedCertSerials = append(revokedCertSerials, bi)
  372. }
  373. systemCA, err := GetSystemCA()
  374. if err != nil {
  375. return fmt.Errorf("can not emit CRL: %v", err)
  376. }
  377. crl, err := pki.NewCRL(systemCA, revokedCertSerials...)
  378. if err != nil {
  379. return fmt.Errorf("can not emit crl: %v", err)
  380. }
  381. return emitToFile(_DefaultCRLPath, crl, 0)
  382. }
  383. func emitCACert() error {
  384. server, err := GetServerInstance()
  385. if err != nil {
  386. return err
  387. }
  388. // Write rendered content into the ca cert file.
  389. return emitToFile(_DefaultCACertPath, server.CACert, 0)
  390. }
  391. func emitCAKey() error {
  392. server, err := GetServerInstance()
  393. if err != nil {
  394. return err
  395. }
  396. // Write rendered content into the ca key file.
  397. return emitToFile(_DefaultCAKeyPath, server.CAKey, 0600)
  398. }
  399. func emitCCD() error {
  400. users, err := GetAllUsers()
  401. if err != nil {
  402. return err
  403. }
  404. // Create and write rendered ccd data.
  405. os.Mkdir(_DefaultVPNCCDPath, 0755)
  406. clientsNetMask := net.IPMask(net.ParseIP(_DefaultServerNetMask))
  407. clientsNetPrefix := net.ParseIP(_DefaultServerNetwork)
  408. clientNet := clientsNetPrefix.Mask(clientsNetMask).To4()
  409. counter := 2
  410. for _, user := range users {
  411. var result bytes.Buffer
  412. clientNet[3] = byte(counter)
  413. params := struct {
  414. IP string
  415. NetMask string
  416. }{IP: clientNet.String(), NetMask: _DefaultServerNetMask}
  417. data, err := bindata.Asset("template/ccd.file.tmpl")
  418. if err != nil {
  419. return err
  420. }
  421. t, err := template.New("ccd.file.tmpl").Parse(string(data))
  422. if err != nil {
  423. return fmt.Errorf("can not parse ccd.file.tmpl template: %s", err)
  424. }
  425. err = t.Execute(&result, params)
  426. if err != nil {
  427. return fmt.Errorf("can not render ccd file %s: %s", user.Username, err)
  428. }
  429. err = emitToFile(_DefaultVPNCCDPath+user.Username, result.String(), 0)
  430. if err != nil {
  431. return err
  432. }
  433. counter++
  434. }
  435. return nil
  436. }
  437. func emitDHParams() error {
  438. var result bytes.Buffer
  439. data, err := bindata.Asset("template/dh4096.pem.tmpl")
  440. if err != nil {
  441. return err
  442. }
  443. t, err := template.New("dh4096.pem.tmpl").Parse(string(data))
  444. if err != nil {
  445. return fmt.Errorf("can not parse dh4096.pem template: %s", err)
  446. }
  447. err = t.Execute(&result, nil)
  448. if err != nil {
  449. return fmt.Errorf("can not render dh4096.pem file: %s", err)
  450. }
  451. err = emitToFile(_DefaultDHParamsPath, result.String(), 0)
  452. if err != nil {
  453. return err
  454. }
  455. return nil
  456. }
  457. func emitIptables() error {
  458. return nil
  459. }
  460. func checkOpenVPNExecutable() bool {
  461. executable := getOpenVPNExecutable()
  462. if executable == "" {
  463. logrus.Error("openvpn is not installed ✘")
  464. return false
  465. }
  466. logrus.Debugf("openvpn executable detected: %s ✔", executable)
  467. return true
  468. }
  469. func getOpenVPNExecutable() string {
  470. cmd := exec.Command("which", "openvpn")
  471. output, err := cmd.Output()
  472. if err != nil {
  473. logrus.Errorf("openvpn is not installed: %s ✘", err)
  474. return ""
  475. }
  476. logrus.Debugf("openvpn executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  477. return strings.TrimSpace(string(output[:]))
  478. }
  479. func checkOpenSSLExecutable() bool {
  480. cmd := exec.Command("which", "openssl")
  481. output, err := cmd.Output()
  482. if err != nil {
  483. logrus.Errorf("openssl is not installed: %s ✘", err)
  484. return false
  485. }
  486. logrus.Debugf("openssl executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  487. return true
  488. }
  489. func checkIptablesExecutable() bool {
  490. cmd := exec.Command("which", "iptables")
  491. output, err := cmd.Output()
  492. if err != nil {
  493. logrus.Errorf("iptables is not installed: %s ✘", err)
  494. return false
  495. }
  496. logrus.Debugf("iptables executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  497. return true
  498. }
  499. func init() {
  500. var err error
  501. vpnProc, err = supervisor.NewProcess(getOpenVPNExecutable(), varBasePath, []string{"--config", _DefaultVPNConfPath})
  502. if err != nil {
  503. logrus.Errorf("can not create process: %v", err)
  504. }
  505. }