vpn.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696
  1. //go:generate go-bindata -pkg bindata -o bindata/bindata.go template/
  2. //go:generate protoc -I pb/ -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis pb/user.proto pb/vpn.proto pb/network.proto --go_out=plugins=grpc:pb
  3. //go:generate protoc -I pb/ -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis pb/user.proto pb/vpn.proto pb/network.proto --grpc-gateway_out=logtostderr=true:pb
  4. //go:generate protoc -I pb/ -I$GOPATH/src/github.com/grpc-ecosystem/grpc-gateway/third_party/googleapis pb/user.proto pb/vpn.proto pb/network.proto --swagger_out=logtostderr=true:pb
  5. package ovpm
  6. import (
  7. "bytes"
  8. "fmt"
  9. "math/big"
  10. "net"
  11. "os"
  12. "os/exec"
  13. "strings"
  14. "text/template"
  15. "time"
  16. "github.com/Sirupsen/logrus"
  17. "github.com/asaskevich/govalidator"
  18. "github.com/cad/ovpm/bindata"
  19. "github.com/cad/ovpm/pki"
  20. "github.com/cad/ovpm/supervisor"
  21. "github.com/coreos/go-iptables/iptables"
  22. "github.com/google/uuid"
  23. "github.com/jinzhu/gorm"
  24. )
  25. // DBServer is database model for storing VPN server related stuff.
  26. type DBServer struct {
  27. gorm.Model
  28. Name string `gorm:"unique_index"` // Server name.
  29. SerialNumber string
  30. Hostname string // Server's ip address or FQDN
  31. Port string // Server's listening port
  32. Cert string // Server RSA certificate.
  33. Key string // Server RSA private key.
  34. CACert string // Root CA RSA certificate.
  35. CAKey string // Root CA RSA key.
  36. Net string // VPN network.
  37. Mask string // VPN network mask.
  38. CRL string // Certificate Revocation List
  39. }
  40. // CheckSerial takes a serial number and checks it against the current server's serial number.
  41. func (s *DBServer) CheckSerial(serial string) bool {
  42. return serial == s.SerialNumber
  43. }
  44. type _VPNServerConfig struct {
  45. CertPath string
  46. KeyPath string
  47. CACertPath string
  48. CAKeyPath string
  49. CCDPath string
  50. CRLPath string
  51. DHParamsPath string
  52. Net string
  53. Mask string
  54. Port string
  55. }
  56. // Init regenerates keys and certs for a Root CA, and saves them in the database.
  57. func Init(hostname string, port string) error {
  58. if port == "" {
  59. port = DefaultVPNPort
  60. }
  61. if !govalidator.IsNumeric(port) {
  62. return fmt.Errorf("validation error: port:`%s` should be numeric", port)
  63. }
  64. serverName := "default"
  65. if IsInitialized() {
  66. if err := Deinit(); err != nil {
  67. logrus.Errorf("server can not be deleted: %v", err)
  68. return err
  69. }
  70. }
  71. if !govalidator.IsHost(hostname) {
  72. return fmt.Errorf("validation error: hostname:`%s` should be either an ip address or a FQDN", hostname)
  73. }
  74. ca, err := pki.NewCA()
  75. if err != nil {
  76. return fmt.Errorf("can not create ca creds: %s", err)
  77. }
  78. srv, err := pki.NewServerCertHolder(ca)
  79. if err != nil {
  80. return fmt.Errorf("can not create server cert creds: %s", err)
  81. }
  82. serialNumber := uuid.New().String()
  83. serverInstance := DBServer{
  84. Name: serverName,
  85. SerialNumber: serialNumber,
  86. Hostname: hostname,
  87. Port: port,
  88. Cert: srv.Cert,
  89. Key: srv.Key,
  90. CACert: ca.Cert,
  91. CAKey: ca.Key,
  92. Net: _DefaultServerNetwork,
  93. Mask: _DefaultServerNetMask,
  94. }
  95. db.Create(&serverInstance)
  96. if db.NewRecord(&serverInstance) {
  97. return fmt.Errorf("can not create server instance on database")
  98. }
  99. users, err := GetAllUsers()
  100. if err != nil {
  101. return err
  102. }
  103. // Sign all users in the db with the new server
  104. for _, user := range users {
  105. err := user.Renew()
  106. logrus.Infof("user certificate changed for %s, you should run: $ ovpm user export-config --user %s", user.Username, user.Username)
  107. if err != nil {
  108. logrus.Errorf("can not sign user %s: %v", user.Username, err)
  109. continue
  110. }
  111. }
  112. Emit()
  113. logrus.Infof("server initialized")
  114. return nil
  115. }
  116. // Deinit deletes the server with the given serverName from the database and frees the allocated resources.
  117. func Deinit() error {
  118. if !IsInitialized() {
  119. return fmt.Errorf("server not found")
  120. }
  121. db.Unscoped().Delete(&DBServer{})
  122. db.Unscoped().Delete(&DBRevoked{})
  123. Emit()
  124. return nil
  125. }
  126. // DumpsClientConfig generates .ovpn file for the given vpn user and returns it as a string.
  127. func DumpsClientConfig(username string) (string, error) {
  128. var result bytes.Buffer
  129. user, err := GetUser(username)
  130. if err != nil {
  131. return "", err
  132. }
  133. server, err := GetServerInstance()
  134. if err != nil {
  135. return "", err
  136. }
  137. params := struct {
  138. Hostname string
  139. Port string
  140. CA string
  141. Key string
  142. Cert string
  143. NoGW bool
  144. }{
  145. Hostname: server.Hostname,
  146. Port: server.Port,
  147. CA: server.CACert,
  148. Key: user.Key,
  149. Cert: user.Cert,
  150. NoGW: user.NoGW,
  151. }
  152. data, err := bindata.Asset("template/client.ovpn.tmpl")
  153. if err != nil {
  154. return "", err
  155. }
  156. t, err := template.New("client.ovpn").Parse(string(data))
  157. if err != nil {
  158. return "", fmt.Errorf("can not parse client.ovpn.tmpl template: %s", err)
  159. }
  160. err = t.Execute(&result, params)
  161. if err != nil {
  162. return "", fmt.Errorf("can not render client.ovpn: %s", err)
  163. }
  164. return result.String(), nil
  165. }
  166. // DumpClientConfig generates .ovpn file for the given vpn user and dumps it to outPath.
  167. func DumpClientConfig(username, path string) error {
  168. result, err := DumpsClientConfig(username)
  169. if err != nil {
  170. return err
  171. }
  172. // Wite rendered content into openvpn server conf.
  173. return emitToFile(path, result, 0)
  174. }
  175. // GetSystemCA returns the system CA from the database if available.
  176. func GetSystemCA() (*pki.CA, error) {
  177. server := DBServer{}
  178. db.First(&server)
  179. if db.NewRecord(&server) {
  180. return nil, fmt.Errorf("server record does not exists in db")
  181. }
  182. return &pki.CA{
  183. CertHolder: pki.CertHolder{
  184. Cert: server.CACert,
  185. Key: server.CAKey,
  186. },
  187. }, nil
  188. }
  189. // vpnProc represents the OpenVPN process that is managed by the ovpm supervisor globally OpenVPN.
  190. var vpnProc supervisor.Supervisable
  191. // StartVPNProc starts the OpenVPN process.
  192. func StartVPNProc() {
  193. if !IsInitialized() {
  194. logrus.Error("can not launch OpenVPN because system is not initialized")
  195. return
  196. }
  197. if vpnProc == nil {
  198. panic(fmt.Sprintf("vpnProc is not initialized!"))
  199. }
  200. if vpnProc.Status() == supervisor.RUNNING {
  201. logrus.Error("OpenVPN is already started")
  202. return
  203. }
  204. vpnProc.Start()
  205. ensureNatEnabled()
  206. }
  207. // RestartVPNProc restarts the OpenVPN process.
  208. func RestartVPNProc() {
  209. if !IsInitialized() {
  210. logrus.Error("can not launch OpenVPN because system is not initialized")
  211. return
  212. }
  213. if vpnProc == nil {
  214. panic(fmt.Sprintf("vpnProc is not initialized!"))
  215. }
  216. vpnProc.Restart()
  217. ensureNatEnabled()
  218. }
  219. // StopVPNProc stops the OpenVPN process.
  220. func StopVPNProc() {
  221. if vpnProc == nil {
  222. panic(fmt.Sprintf("vpnProc is not initialized!"))
  223. }
  224. if vpnProc.Status() != supervisor.RUNNING {
  225. logrus.Error("OpenVPN is already not running")
  226. return
  227. }
  228. vpnProc.Stop()
  229. }
  230. // Emit generates all needed files for the OpenVPN server and dumps them to their corresponding paths defined in the config.
  231. func Emit() error {
  232. // Check dependencies
  233. if !checkOpenVPNExecutable() {
  234. return fmt.Errorf("openvpn executable can not be found! you should install OpenVPN on this machine")
  235. }
  236. if !checkOpenSSLExecutable() {
  237. return fmt.Errorf("openssl executable can not be found! you should install openssl on this machine")
  238. }
  239. if !checkIptablesExecutable() {
  240. return fmt.Errorf("iptables executable can not be found")
  241. }
  242. if !IsInitialized() {
  243. return fmt.Errorf("you should create a server first. e.g. $ ovpm vpn create-server")
  244. }
  245. if err := emitServerConf(); err != nil {
  246. return fmt.Errorf("can not emit server conf: %s", err)
  247. }
  248. if err := emitServerCert(); err != nil {
  249. return fmt.Errorf("can not emit server cert: %s", err)
  250. }
  251. if err := emitServerKey(); err != nil {
  252. return fmt.Errorf("can not emit server key: %s", err)
  253. }
  254. if err := emitCACert(); err != nil {
  255. return fmt.Errorf("can not emit ca cert : %s", err)
  256. }
  257. if err := emitCAKey(); err != nil {
  258. return fmt.Errorf("can not emit ca key: %s", err)
  259. }
  260. if err := emitDHParams(); err != nil {
  261. return fmt.Errorf("can not emit dhparams: %s", err)
  262. }
  263. if err := emitCCD(); err != nil {
  264. return fmt.Errorf("can not emit ccd: %s", err)
  265. }
  266. if err := emitIptables(); err != nil {
  267. return fmt.Errorf("can not emit iptables: %s", err)
  268. }
  269. if err := emitCRL(); err != nil {
  270. return fmt.Errorf("can not emit crl: %s", err)
  271. }
  272. logrus.Info("configurations emitted to the filesystem")
  273. if IsInitialized() {
  274. for {
  275. if vpnProc.Status() == supervisor.RUNNING || vpnProc.Status() == supervisor.STOPPED {
  276. logrus.Info("OpenVPN process is restarting")
  277. RestartVPNProc()
  278. break
  279. }
  280. time.Sleep(1 * time.Second)
  281. }
  282. }
  283. return nil
  284. }
  285. func emitToFile(path, content string, mode uint) error {
  286. // When testing don't emit files to the filesystem. Just pretend you did.
  287. if Testing {
  288. return nil
  289. }
  290. file, err := os.Create(path)
  291. if err != nil {
  292. return fmt.Errorf("Cannot create file %s: %v", path, err)
  293. }
  294. if mode != 0 {
  295. file.Chmod(os.FileMode(mode))
  296. }
  297. defer file.Close()
  298. fmt.Fprintf(file, content)
  299. return nil
  300. }
  301. func emitServerConf() error {
  302. serverInstance, err := GetServerInstance()
  303. if err != nil {
  304. return fmt.Errorf("can not retrieve server: %v", err)
  305. }
  306. port := DefaultVPNPort
  307. if serverInstance.Port != "" {
  308. port = serverInstance.Port
  309. }
  310. var result bytes.Buffer
  311. server := _VPNServerConfig{
  312. CertPath: _DefaultCertPath,
  313. KeyPath: _DefaultKeyPath,
  314. CACertPath: _DefaultCACertPath,
  315. CAKeyPath: _DefaultCAKeyPath,
  316. CCDPath: _DefaultVPNCCDPath,
  317. CRLPath: _DefaultCRLPath,
  318. DHParamsPath: _DefaultDHParamsPath,
  319. Net: _DefaultServerNetwork,
  320. Mask: _DefaultServerNetMask,
  321. Port: port,
  322. }
  323. data, err := bindata.Asset("template/server.conf.tmpl")
  324. if err != nil {
  325. return err
  326. }
  327. t, err := template.New("server.conf").Parse(string(data))
  328. if err != nil {
  329. return fmt.Errorf("can not parse server.conf.tmpl template: %s", err)
  330. }
  331. err = t.Execute(&result, server)
  332. if err != nil {
  333. return fmt.Errorf("can not render server.conf: %s", err)
  334. }
  335. // Wite rendered content into openvpn server conf.
  336. return emitToFile(_DefaultVPNConfPath, result.String(), 0)
  337. }
  338. // GetServerInstance returns the default server from the database.
  339. func GetServerInstance() (*DBServer, error) {
  340. var server DBServer
  341. db.First(&server)
  342. if db.NewRecord(server) {
  343. return nil, fmt.Errorf("can not retrieve server from db")
  344. }
  345. return &server, nil
  346. }
  347. // IsInitialized checks if there is a default server in the database or not.
  348. func IsInitialized() bool {
  349. var server DBServer
  350. db.First(&server)
  351. if db.NewRecord(server) {
  352. return false
  353. }
  354. return true
  355. }
  356. func emitServerKey() error {
  357. server, err := GetServerInstance()
  358. if err != nil {
  359. return err
  360. }
  361. // Write rendered content into key file.
  362. return emitToFile(_DefaultKeyPath, server.Key, 0600)
  363. }
  364. func emitServerCert() error {
  365. server, err := GetServerInstance()
  366. if err != nil {
  367. return err
  368. }
  369. // Write rendered content into the cert file.
  370. return emitToFile(_DefaultCertPath, server.Cert, 0)
  371. }
  372. func emitCRL() error {
  373. var revokedDBItems []*DBRevoked
  374. db.Find(&revokedDBItems)
  375. var revokedCertSerials []*big.Int
  376. for _, item := range revokedDBItems {
  377. bi := big.NewInt(0)
  378. bi.SetString(item.SerialNumber, 16)
  379. revokedCertSerials = append(revokedCertSerials, bi)
  380. }
  381. systemCA, err := GetSystemCA()
  382. if err != nil {
  383. return fmt.Errorf("can not emit CRL: %v", err)
  384. }
  385. crl, err := pki.NewCRL(systemCA, revokedCertSerials...)
  386. if err != nil {
  387. return fmt.Errorf("can not emit crl: %v", err)
  388. }
  389. return emitToFile(_DefaultCRLPath, crl, 0)
  390. }
  391. func emitCACert() error {
  392. server, err := GetServerInstance()
  393. if err != nil {
  394. return err
  395. }
  396. // Write rendered content into the ca cert file.
  397. return emitToFile(_DefaultCACertPath, server.CACert, 0)
  398. }
  399. func emitCAKey() error {
  400. server, err := GetServerInstance()
  401. if err != nil {
  402. return err
  403. }
  404. // Write rendered content into the ca key file.
  405. return emitToFile(_DefaultCAKeyPath, server.CAKey, 0600)
  406. }
  407. func emitCCD() error {
  408. users, err := GetAllUsers()
  409. if err != nil {
  410. return err
  411. }
  412. // Filesystem related stuff. Skipping when testing.
  413. if !Testing {
  414. // Clean and then create and write rendered ccd data.
  415. err = os.RemoveAll(_DefaultVPNCCDPath)
  416. if err != nil {
  417. if os.IsNotExist(err) {
  418. } else {
  419. return err
  420. }
  421. }
  422. if _, err := os.Stat(_DefaultVPNCCDPath); err != nil {
  423. }
  424. err = os.Mkdir(_DefaultVPNCCDPath, 0755)
  425. if err != nil {
  426. if !os.IsExist(err) {
  427. return err
  428. }
  429. }
  430. }
  431. // Render ccd templates for the users.
  432. for _, user := range users {
  433. var associatedRoutes [][3]string
  434. for _, network := range GetAllNetworks() {
  435. switch network.Type {
  436. case ROUTE:
  437. for _, assocUsername := range network.GetAssociatedUsernames() {
  438. if assocUsername == user.Username {
  439. via := network.Via
  440. ip, mask, err := net.ParseCIDR(network.CIDR)
  441. if err != nil {
  442. return err
  443. }
  444. associatedRoutes = append(associatedRoutes, [3]string{ip.To4().String(), net.IP(mask.Mask).To4().String(), via})
  445. }
  446. }
  447. }
  448. }
  449. var result bytes.Buffer
  450. params := struct {
  451. IP string
  452. NetMask string
  453. Routes [][3]string // [0] is IP, [1] is Netmask, [2] is Via
  454. RedirectGW bool
  455. }{IP: user.getIP().String(), NetMask: _DefaultServerNetMask, Routes: associatedRoutes, RedirectGW: !user.NoGW}
  456. data, err := bindata.Asset("template/ccd.file.tmpl")
  457. if err != nil {
  458. return err
  459. }
  460. t, err := template.New("ccd.file.tmpl").Parse(string(data))
  461. if err != nil {
  462. return fmt.Errorf("can not parse ccd.file.tmpl template: %s", err)
  463. }
  464. err = t.Execute(&result, params)
  465. if err != nil {
  466. return fmt.Errorf("can not render ccd file %s: %s", user.Username, err)
  467. }
  468. err = emitToFile(_DefaultVPNCCDPath+user.Username, result.String(), 0)
  469. if err != nil {
  470. return err
  471. }
  472. }
  473. return nil
  474. }
  475. func emitDHParams() error {
  476. var result bytes.Buffer
  477. data, err := bindata.Asset("template/dh4096.pem.tmpl")
  478. if err != nil {
  479. return err
  480. }
  481. t, err := template.New("dh4096.pem.tmpl").Parse(string(data))
  482. if err != nil {
  483. return fmt.Errorf("can not parse dh4096.pem template: %s", err)
  484. }
  485. err = t.Execute(&result, nil)
  486. if err != nil {
  487. return fmt.Errorf("can not render dh4096.pem file: %s", err)
  488. }
  489. err = emitToFile(_DefaultDHParamsPath, result.String(), 0)
  490. if err != nil {
  491. return err
  492. }
  493. return nil
  494. }
  495. func emitIptables() error {
  496. if Testing {
  497. return nil
  498. }
  499. ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv4)
  500. if err != nil {
  501. return fmt.Errorf("can not create new iptables object: %v", err)
  502. }
  503. for _, network := range GetAllNetworks() {
  504. associatedUsernames := network.GetAssociatedUsernames()
  505. switch network.Type {
  506. case SERVERNET:
  507. users, err := GetAllUsers()
  508. if err != nil {
  509. return err
  510. }
  511. for _, user := range users {
  512. var found bool
  513. for _, auser := range associatedUsernames {
  514. if user.Username == auser {
  515. found = true
  516. break
  517. }
  518. }
  519. userIP, _, err := net.ParseCIDR(user.GetIPNet())
  520. if err != nil {
  521. return err
  522. }
  523. _, networkIPNet, err := net.ParseCIDR(network.CIDR)
  524. if err != nil {
  525. return err
  526. }
  527. // get destination network's iface
  528. iface := interfaceOfIP(networkIPNet)
  529. if iface == nil {
  530. logrus.Warnf("network doesn't exist on server %s[SERVERNET]: cant find interface for %s", network.Name, networkIPNet.String())
  531. return nil
  532. }
  533. // enable nat for the user to the destination network n
  534. if found {
  535. err = ipt.AppendUnique("nat", "POSTROUTING", "-s", userIP.String(), "-o", iface.Name, "-j", "MASQUERADE")
  536. if err != nil {
  537. logrus.Error(err)
  538. return err
  539. }
  540. } else {
  541. err = ipt.Delete("nat", "POSTROUTING", "-s", userIP.String(), "-o", iface.Name, "-j", "MASQUERADE")
  542. if err != nil {
  543. logrus.Debug(err)
  544. }
  545. }
  546. }
  547. }
  548. }
  549. return nil
  550. }
  551. func checkOpenVPNExecutable() bool {
  552. executable := getOpenVPNExecutable()
  553. if executable == "" {
  554. logrus.Error("openvpn is not installed ✘")
  555. return false
  556. }
  557. logrus.Debugf("openvpn executable detected: %s ✔", executable)
  558. return true
  559. }
  560. func getOpenVPNExecutable() string {
  561. cmd := exec.Command("which", "openvpn")
  562. output, err := cmd.Output()
  563. if err != nil {
  564. logrus.Errorf("openvpn is not installed: %s ✘", err)
  565. return ""
  566. }
  567. logrus.Debugf("openvpn executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  568. return strings.TrimSpace(string(output[:]))
  569. }
  570. func checkOpenSSLExecutable() bool {
  571. cmd := exec.Command("which", "openssl")
  572. output, err := cmd.Output()
  573. if err != nil {
  574. logrus.Errorf("openssl is not installed: %s ✘", err)
  575. return false
  576. }
  577. logrus.Debugf("openssl executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  578. return true
  579. }
  580. func checkIptablesExecutable() bool {
  581. cmd := exec.Command("which", "iptables")
  582. output, err := cmd.Output()
  583. if err != nil {
  584. logrus.Errorf("iptables is not installed: %s ✘", err)
  585. return false
  586. }
  587. logrus.Debugf("iptables executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  588. return true
  589. }
  590. func ensureBaseDir() {
  591. if Testing {
  592. return
  593. }
  594. os.Mkdir(varBasePath, 0755)
  595. }
  596. func init() {
  597. ensureBaseDir()
  598. var err error
  599. vpnProc, err = supervisor.NewProcess(getOpenVPNExecutable(), varBasePath, []string{"--config", _DefaultVPNConfPath})
  600. if err != nil {
  601. logrus.Errorf("can not create process: %v", err)
  602. }
  603. }