vpn.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549
  1. //go:generate go-bindata -pkg bindata -o bindata/bindata.go template/
  2. package ovpm
  3. import (
  4. "bytes"
  5. "fmt"
  6. "math/big"
  7. "net"
  8. "os"
  9. "os/exec"
  10. "strings"
  11. "text/template"
  12. "github.com/Sirupsen/logrus"
  13. "github.com/asaskevich/govalidator"
  14. "github.com/cad/ovpm/bindata"
  15. "github.com/cad/ovpm/pki"
  16. "github.com/cad/ovpm/supervisor"
  17. "github.com/google/uuid"
  18. "github.com/jinzhu/gorm"
  19. )
  20. // DBNetwork is database model for external networks on the VPN server.
  21. type DBNetwork struct {
  22. gorm.Model
  23. ServerID uint
  24. Server DBServer
  25. Name string
  26. NetworkCIDR string
  27. }
  28. // DBServer is database model for storing VPN server related stuff.
  29. type DBServer struct {
  30. gorm.Model
  31. Name string `gorm:"unique_index"` // Server name.
  32. SerialNumber string
  33. Hostname string // Server's ip address or FQDN
  34. Port string // Server's listening port
  35. Cert string // Server RSA certificate.
  36. Key string // Server RSA private key.
  37. CACert string // Root CA RSA certificate.
  38. CAKey string // Root CA RSA key.
  39. Net string // VPN network.
  40. Mask string // VPN network mask.
  41. CRL string // Certificate Revocation List
  42. }
  43. // CheckSerial takes a serial number and checks it against the current server's serial number.
  44. func (s *DBServer) CheckSerial(serial string) bool {
  45. return serial == s.SerialNumber
  46. }
  47. type _VPNServerConfig struct {
  48. CertPath string
  49. KeyPath string
  50. CACertPath string
  51. CAKeyPath string
  52. CCDPath string
  53. CRLPath string
  54. DHParamsPath string
  55. Net string
  56. Mask string
  57. Port string
  58. }
  59. // Init regenerates keys and certs for a Root CA, and saves them in the database.
  60. func Init(hostname string, port string) error {
  61. serverName := "default"
  62. if IsInitialized() {
  63. if err := Deinit(); err != nil {
  64. logrus.Errorf("server can not be deleted: %v", err)
  65. return err
  66. }
  67. }
  68. if !govalidator.IsHost(hostname) {
  69. return fmt.Errorf("validation error: hostname:`%s` should be either an ip address or a FQDN", hostname)
  70. }
  71. ca, err := pki.NewCA()
  72. if err != nil {
  73. return fmt.Errorf("can not create ca creds: %s", err)
  74. }
  75. srv, err := pki.NewServerCertHolder(ca)
  76. if err != nil {
  77. return fmt.Errorf("can not create server cert creds: %s", err)
  78. }
  79. serialNumber := uuid.New().String()
  80. serverInstance := DBServer{
  81. Name: serverName,
  82. SerialNumber: serialNumber,
  83. Hostname: hostname,
  84. Port: port,
  85. Cert: srv.Cert,
  86. Key: srv.Key,
  87. CACert: ca.Cert,
  88. CAKey: ca.Key,
  89. Net: _DefaultServerNetwork,
  90. Mask: _DefaultServerNetMask,
  91. }
  92. db.Create(&serverInstance)
  93. if db.NewRecord(&serverInstance) {
  94. return fmt.Errorf("can not create server instance on database")
  95. }
  96. users, err := GetAllUsers()
  97. if err != nil {
  98. return err
  99. }
  100. // Sign all users in the db with the new server
  101. for _, user := range users {
  102. err := user.Sign()
  103. logrus.Infof("user certificate changed for %s, you should run: $ ovpm user export-config --user %s", user.Username, user.Username)
  104. if err != nil {
  105. logrus.Errorf("can not sign user %s: %v", user.Username, err)
  106. continue
  107. }
  108. }
  109. return nil
  110. }
  111. // Deinit deletes the server with the given serverName from the database and frees the allocated resources.
  112. func Deinit() error {
  113. if !IsInitialized() {
  114. return fmt.Errorf("server not found")
  115. }
  116. db.Unscoped().Delete(&DBServer{})
  117. db.Unscoped().Delete(&DBRevoked{})
  118. return nil
  119. }
  120. // DumpsClientConfig generates .ovpn file for the given vpn user and returns it as a string.
  121. func DumpsClientConfig(username string) (string, error) {
  122. var result bytes.Buffer
  123. user, err := GetUser(username)
  124. if err != nil {
  125. return "", err
  126. }
  127. server, err := GetServerInstance()
  128. if err != nil {
  129. return "", err
  130. }
  131. params := struct {
  132. Hostname string
  133. Port string
  134. CA string
  135. Key string
  136. Cert string
  137. }{
  138. Hostname: server.Hostname,
  139. Port: server.Port,
  140. CA: server.CACert,
  141. Key: user.Key,
  142. Cert: user.Cert,
  143. }
  144. data, err := bindata.Asset("template/client.ovpn.tmpl")
  145. if err != nil {
  146. return "", err
  147. }
  148. t, err := template.New("client.ovpn").Parse(string(data))
  149. if err != nil {
  150. return "", fmt.Errorf("can not parse client.ovpn.tmpl template: %s", err)
  151. }
  152. err = t.Execute(&result, params)
  153. if err != nil {
  154. return "", fmt.Errorf("can not render client.ovpn: %s", err)
  155. }
  156. return result.String(), nil
  157. }
  158. // DumpClientConfig generates .ovpn file for the given vpn user and dumps it to outPath.
  159. func DumpClientConfig(username, path string) error {
  160. result, err := DumpsClientConfig(username)
  161. if err != nil {
  162. return err
  163. }
  164. // Wite rendered content into openvpn server conf.
  165. return emitToFile(path, result, 0)
  166. }
  167. // GetSystemCA returns the system CA from the database if available.
  168. func GetSystemCA() (*pki.CA, error) {
  169. server := DBServer{}
  170. db.First(&server)
  171. if db.NewRecord(&server) {
  172. return nil, fmt.Errorf("server record does not exists in db")
  173. }
  174. return &pki.CA{
  175. CertHolder: pki.CertHolder{
  176. Cert: server.CACert,
  177. Key: server.CAKey,
  178. },
  179. }, nil
  180. }
  181. // vpnProc represents the OpenVPN process that is managed by the ovpm supervisor globally OpenVPN.
  182. var vpnProc *supervisor.Process
  183. // RestartVPNProc restarts the OpenVPN process.
  184. func RestartVPNProc() {
  185. if !IsInitialized() {
  186. logrus.Error("can not launch OpenVPN because system is not initialized")
  187. return
  188. }
  189. if vpnProc == nil {
  190. panic(fmt.Sprintf("vpnProc is not initialized!"))
  191. }
  192. vpnProc.Restart()
  193. }
  194. // Emit generates all needed files for the OpenVPN server and dumps them to their corresponding paths defined in the config.
  195. func Emit() error {
  196. // Check dependencies
  197. if !checkOpenVPNExecutable() {
  198. return fmt.Errorf("openvpn executable can not be found! you should install OpenVPN on this machine")
  199. }
  200. if !checkOpenSSLExecutable() {
  201. return fmt.Errorf("openssl executable can not be found! you should install openssl on this machine")
  202. }
  203. if !checkIptablesExecutable() {
  204. return fmt.Errorf("iptables executable can not be found")
  205. }
  206. if !IsInitialized() {
  207. return fmt.Errorf("you should create a server first. e.g. $ ovpm vpn create-server")
  208. }
  209. if err := emitServerConf(); err != nil {
  210. return fmt.Errorf("can not emit server conf: %s", err)
  211. }
  212. if err := emitServerCert(); err != nil {
  213. return fmt.Errorf("can not emit server cert: %s", err)
  214. }
  215. if err := emitServerKey(); err != nil {
  216. return fmt.Errorf("can not emit server key: %s", err)
  217. }
  218. if err := emitCACert(); err != nil {
  219. return fmt.Errorf("can not emit ca cert : %s", err)
  220. }
  221. if err := emitCAKey(); err != nil {
  222. return fmt.Errorf("can not emit ca key: %s", err)
  223. }
  224. if err := emitDHParams(); err != nil {
  225. return fmt.Errorf("can not emit dhparams: %s", err)
  226. }
  227. if err := emitCCD(); err != nil {
  228. return fmt.Errorf("can not emit ccd: %s", err)
  229. }
  230. if err := emitIptables(); err != nil {
  231. return fmt.Errorf("can not emit iptables conf: %s", err)
  232. }
  233. if err := emitCRL(); err != nil {
  234. return fmt.Errorf("can not emit crl: %s", err)
  235. }
  236. logrus.Info("changes are applied to the filesystem")
  237. RestartVPNProc()
  238. logrus.Info("OpenVPN process is restarted")
  239. return nil
  240. }
  241. func emitToFile(path, content string, mode uint) error {
  242. file, err := os.Create(path)
  243. if err != nil {
  244. return fmt.Errorf("Cannot create file %s: %v", path, err)
  245. }
  246. if mode != 0 {
  247. file.Chmod(os.FileMode(mode))
  248. }
  249. defer file.Close()
  250. fmt.Fprintf(file, content)
  251. return nil
  252. }
  253. func emitServerConf() error {
  254. serverInstance, err := GetServerInstance()
  255. if err != nil {
  256. return fmt.Errorf("can not retrieve server: %v", err)
  257. }
  258. port := DefaultVPNPort
  259. if serverInstance.Port != "" {
  260. port = serverInstance.Port
  261. }
  262. var result bytes.Buffer
  263. server := _VPNServerConfig{
  264. CertPath: _DefaultCertPath,
  265. KeyPath: _DefaultKeyPath,
  266. CACertPath: _DefaultCACertPath,
  267. CAKeyPath: _DefaultCAKeyPath,
  268. CCDPath: _DefaultVPNCCDPath,
  269. CRLPath: _DefaultCRLPath,
  270. DHParamsPath: _DefaultDHParamsPath,
  271. Net: _DefaultServerNetwork,
  272. Mask: _DefaultServerNetMask,
  273. Port: port,
  274. }
  275. data, err := bindata.Asset("template/server.conf.tmpl")
  276. if err != nil {
  277. return err
  278. }
  279. t, err := template.New("server.conf").Parse(string(data))
  280. if err != nil {
  281. return fmt.Errorf("can not parse server.conf.tmpl template: %s", err)
  282. }
  283. err = t.Execute(&result, server)
  284. if err != nil {
  285. return fmt.Errorf("can not render server.conf: %s", err)
  286. }
  287. // Wite rendered content into openvpn server conf.
  288. return emitToFile(_DefaultVPNConfPath, result.String(), 0)
  289. }
  290. // GetServerInstance returns the default server from the database.
  291. func GetServerInstance() (*DBServer, error) {
  292. var server DBServer
  293. db.First(&server)
  294. if db.NewRecord(server) {
  295. return nil, fmt.Errorf("can not retrieve server from db")
  296. }
  297. return &server, nil
  298. }
  299. // IsInitialized checks if there is a default server in the database or not.
  300. func IsInitialized() bool {
  301. var server DBServer
  302. db.First(&server)
  303. if db.NewRecord(server) {
  304. return false
  305. }
  306. return true
  307. }
  308. func emitServerKey() error {
  309. server, err := GetServerInstance()
  310. if err != nil {
  311. return err
  312. }
  313. // Write rendered content into key file.
  314. return emitToFile(_DefaultKeyPath, server.Key, 0600)
  315. }
  316. func emitServerCert() error {
  317. server, err := GetServerInstance()
  318. if err != nil {
  319. return err
  320. }
  321. // Write rendered content into the cert file.
  322. return emitToFile(_DefaultCertPath, server.Cert, 0)
  323. }
  324. func emitCRL() error {
  325. var revokedDBItems []*DBRevoked
  326. db.Find(&revokedDBItems)
  327. var revokedCertSerials []*big.Int
  328. for _, item := range revokedDBItems {
  329. bi := big.NewInt(0)
  330. bi.SetString(item.SerialNumber, 16)
  331. revokedCertSerials = append(revokedCertSerials, bi)
  332. }
  333. systemCA, err := GetSystemCA()
  334. if err != nil {
  335. return fmt.Errorf("can not emit CRL: %v", err)
  336. }
  337. crl, err := pki.NewCRL(revokedCertSerials, systemCA)
  338. if err != nil {
  339. return fmt.Errorf("can not emit crl: %v", err)
  340. }
  341. return emitToFile(_DefaultCRLPath, crl, 0)
  342. }
  343. func emitCACert() error {
  344. server, err := GetServerInstance()
  345. if err != nil {
  346. return err
  347. }
  348. // Write rendered content into the ca cert file.
  349. return emitToFile(_DefaultCACertPath, server.CACert, 0)
  350. }
  351. func emitCAKey() error {
  352. server, err := GetServerInstance()
  353. if err != nil {
  354. return err
  355. }
  356. // Write rendered content into the ca key file.
  357. return emitToFile(_DefaultCAKeyPath, server.CAKey, 0600)
  358. }
  359. func emitCCD() error {
  360. users, err := GetAllUsers()
  361. if err != nil {
  362. return err
  363. }
  364. // Create and write rendered ccd data.
  365. os.Mkdir(_DefaultVPNCCDPath, 0755)
  366. clientsNetMask := net.IPMask(net.ParseIP(_DefaultServerNetMask))
  367. clientsNetPrefix := net.ParseIP(_DefaultServerNetwork)
  368. clientNet := clientsNetPrefix.Mask(clientsNetMask).To4()
  369. counter := 2
  370. for _, user := range users {
  371. var result bytes.Buffer
  372. clientNet[3] = byte(counter)
  373. params := struct {
  374. IP string
  375. NetMask string
  376. }{IP: clientNet.String(), NetMask: _DefaultServerNetMask}
  377. data, err := bindata.Asset("template/ccd.file.tmpl")
  378. if err != nil {
  379. return err
  380. }
  381. t, err := template.New("ccd.file.tmpl").Parse(string(data))
  382. if err != nil {
  383. return fmt.Errorf("can not parse ccd.file.tmpl template: %s", err)
  384. }
  385. err = t.Execute(&result, params)
  386. if err != nil {
  387. return fmt.Errorf("can not render ccd file %s: %s", user.Username, err)
  388. }
  389. err = emitToFile(_DefaultVPNCCDPath+user.Username, result.String(), 0)
  390. if err != nil {
  391. return err
  392. }
  393. counter++
  394. }
  395. return nil
  396. }
  397. func emitDHParams() error {
  398. var result bytes.Buffer
  399. data, err := bindata.Asset("template/dh4096.pem.tmpl")
  400. if err != nil {
  401. return err
  402. }
  403. t, err := template.New("dh4096.pem.tmpl").Parse(string(data))
  404. if err != nil {
  405. return fmt.Errorf("can not parse dh4096.pem template: %s", err)
  406. }
  407. err = t.Execute(&result, nil)
  408. if err != nil {
  409. return fmt.Errorf("can not render dh4096.pem file: %s", err)
  410. }
  411. err = emitToFile(_DefaultDHParamsPath, result.String(), 0)
  412. if err != nil {
  413. return err
  414. }
  415. return nil
  416. }
  417. func emitIptables() error {
  418. return nil
  419. }
  420. func checkOpenVPNExecutable() bool {
  421. executable := getOpenVPNExecutable()
  422. if executable == "" {
  423. logrus.Error("openvpn is not installed ✘")
  424. return false
  425. }
  426. logrus.Infof("openvpn executable detected: %s ✔", executable)
  427. return true
  428. }
  429. func getOpenVPNExecutable() string {
  430. cmd := exec.Command("which", "openvpn")
  431. output, err := cmd.Output()
  432. if err != nil {
  433. logrus.Infof("openvpn is not installed: %s ✘", err)
  434. return ""
  435. }
  436. logrus.Infof("openvpn executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  437. return strings.TrimSpace(string(output[:]))
  438. }
  439. func checkOpenSSLExecutable() bool {
  440. cmd := exec.Command("which", "openssl")
  441. output, err := cmd.Output()
  442. if err != nil {
  443. logrus.Errorf("openssl is not installed: %s ✘", err)
  444. return false
  445. }
  446. logrus.Infof("openssl executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  447. return true
  448. }
  449. func checkIptablesExecutable() bool {
  450. cmd := exec.Command("which", "iptables")
  451. output, err := cmd.Output()
  452. if err != nil {
  453. logrus.Errorf("iptables is not installed: %s ✘", err)
  454. return false
  455. }
  456. logrus.Infof("iptables executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  457. return true
  458. }
  459. func init() {
  460. var err error
  461. vpnProc, err = supervisor.NewProcess(getOpenVPNExecutable(), varBasePath, []string{"--config", _DefaultVPNConfPath})
  462. if err != nil {
  463. logrus.Errorf("can not create process: %v", err)
  464. }
  465. }