vpn.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562
  1. //go:generate go-bindata -pkg bindata -o bindata/bindata.go template/
  2. package ovpm
  3. import (
  4. "bytes"
  5. "fmt"
  6. "math/big"
  7. "net"
  8. "os"
  9. "os/exec"
  10. "strings"
  11. "text/template"
  12. "github.com/Sirupsen/logrus"
  13. "github.com/asaskevich/govalidator"
  14. "github.com/cad/ovpm/bindata"
  15. "github.com/cad/ovpm/pki"
  16. "github.com/cad/ovpm/supervisor"
  17. "github.com/google/uuid"
  18. "github.com/jinzhu/gorm"
  19. )
  20. // DBNetwork is database model for external networks on the VPN server.
  21. type DBNetwork struct {
  22. gorm.Model
  23. ServerID uint
  24. Server DBServer
  25. Name string
  26. NetworkCIDR string
  27. }
  28. // DBServer is database model for storing VPN server related stuff.
  29. type DBServer struct {
  30. gorm.Model
  31. Name string `gorm:"unique_index"` // Server name.
  32. SerialNumber string
  33. Hostname string // Server's ip address or FQDN
  34. Port string // Server's listening port
  35. Cert string // Server RSA certificate.
  36. Key string // Server RSA private key.
  37. CACert string // Root CA RSA certificate.
  38. CAKey string // Root CA RSA key.
  39. Net string // VPN network.
  40. Mask string // VPN network mask.
  41. CRL string // Certificate Revocation List
  42. }
  43. // CheckSerial takes a serial number and checks it against the current server's serial number.
  44. func (s *DBServer) CheckSerial(serial string) bool {
  45. return serial == s.SerialNumber
  46. }
  47. type _VPNServerConfig struct {
  48. CertPath string
  49. KeyPath string
  50. CACertPath string
  51. CAKeyPath string
  52. CCDPath string
  53. CRLPath string
  54. DHParamsPath string
  55. Net string
  56. Mask string
  57. Port string
  58. }
  59. // Init regenerates keys and certs for a Root CA, and saves them in the database.
  60. func Init(hostname string, port string) error {
  61. serverName := "default"
  62. if IsInitialized() {
  63. if err := Deinit(); err != nil {
  64. logrus.Errorf("server can not be deleted: %v", err)
  65. return err
  66. }
  67. }
  68. if !govalidator.IsHost(hostname) {
  69. return fmt.Errorf("validation error: hostname:`%s` should be either an ip address or a FQDN", hostname)
  70. }
  71. ca, err := pki.NewCA()
  72. if err != nil {
  73. return fmt.Errorf("can not create ca creds: %s", err)
  74. }
  75. srv, err := pki.NewServerCertHolder(ca)
  76. if err != nil {
  77. return fmt.Errorf("can not create server cert creds: %s", err)
  78. }
  79. serialNumber := uuid.New().String()
  80. serverInstance := DBServer{
  81. Name: serverName,
  82. SerialNumber: serialNumber,
  83. Hostname: hostname,
  84. Port: port,
  85. Cert: srv.Cert,
  86. Key: srv.Key,
  87. CACert: ca.Cert,
  88. CAKey: ca.Key,
  89. Net: _DefaultServerNetwork,
  90. Mask: _DefaultServerNetMask,
  91. }
  92. db.Create(&serverInstance)
  93. if db.NewRecord(&serverInstance) {
  94. return fmt.Errorf("can not create server instance on database")
  95. }
  96. users, err := GetAllUsers()
  97. if err != nil {
  98. return err
  99. }
  100. // Sign all users in the db with the new server
  101. for _, user := range users {
  102. err := user.Sign()
  103. logrus.Infof("user certificate changed for %s, you should run: $ ovpm user export-config --user %s", user.Username, user.Username)
  104. if err != nil {
  105. logrus.Errorf("can not sign user %s: %v", user.Username, err)
  106. continue
  107. }
  108. }
  109. logrus.Infof("server initialized")
  110. return nil
  111. }
  112. // Deinit deletes the server with the given serverName from the database and frees the allocated resources.
  113. func Deinit() error {
  114. if !IsInitialized() {
  115. return fmt.Errorf("server not found")
  116. }
  117. db.Unscoped().Delete(&DBServer{})
  118. db.Unscoped().Delete(&DBRevoked{})
  119. return nil
  120. }
  121. // DumpsClientConfig generates .ovpn file for the given vpn user and returns it as a string.
  122. func DumpsClientConfig(username string) (string, error) {
  123. var result bytes.Buffer
  124. user, err := GetUser(username)
  125. if err != nil {
  126. return "", err
  127. }
  128. server, err := GetServerInstance()
  129. if err != nil {
  130. return "", err
  131. }
  132. params := struct {
  133. Hostname string
  134. Port string
  135. CA string
  136. Key string
  137. Cert string
  138. }{
  139. Hostname: server.Hostname,
  140. Port: server.Port,
  141. CA: server.CACert,
  142. Key: user.Key,
  143. Cert: user.Cert,
  144. }
  145. data, err := bindata.Asset("template/client.ovpn.tmpl")
  146. if err != nil {
  147. return "", err
  148. }
  149. t, err := template.New("client.ovpn").Parse(string(data))
  150. if err != nil {
  151. return "", fmt.Errorf("can not parse client.ovpn.tmpl template: %s", err)
  152. }
  153. err = t.Execute(&result, params)
  154. if err != nil {
  155. return "", fmt.Errorf("can not render client.ovpn: %s", err)
  156. }
  157. return result.String(), nil
  158. }
  159. // DumpClientConfig generates .ovpn file for the given vpn user and dumps it to outPath.
  160. func DumpClientConfig(username, path string) error {
  161. result, err := DumpsClientConfig(username)
  162. if err != nil {
  163. return err
  164. }
  165. // Wite rendered content into openvpn server conf.
  166. return emitToFile(path, result, 0)
  167. }
  168. // GetSystemCA returns the system CA from the database if available.
  169. func GetSystemCA() (*pki.CA, error) {
  170. server := DBServer{}
  171. db.First(&server)
  172. if db.NewRecord(&server) {
  173. return nil, fmt.Errorf("server record does not exists in db")
  174. }
  175. return &pki.CA{
  176. CertHolder: pki.CertHolder{
  177. Cert: server.CACert,
  178. Key: server.CAKey,
  179. },
  180. }, nil
  181. }
  182. // vpnProc represents the OpenVPN process that is managed by the ovpm supervisor globally OpenVPN.
  183. var vpnProc *supervisor.Process
  184. // RestartVPNProc restarts the OpenVPN process.
  185. func RestartVPNProc() {
  186. if !IsInitialized() {
  187. logrus.Error("can not launch OpenVPN because system is not initialized")
  188. return
  189. }
  190. if vpnProc == nil {
  191. panic(fmt.Sprintf("vpnProc is not initialized!"))
  192. }
  193. vpnProc.Restart()
  194. }
  195. // StopVPNProc stops the OpenVPN process.
  196. func StopVPNProc() {
  197. if !vpnProc.IsRunning() {
  198. logrus.Error("OpenVPN is already stopped")
  199. return
  200. }
  201. if vpnProc == nil {
  202. panic(fmt.Sprintf("vpnProc is not initialized!"))
  203. }
  204. vpnProc.Stop()
  205. }
  206. // Emit generates all needed files for the OpenVPN server and dumps them to their corresponding paths defined in the config.
  207. func Emit() error {
  208. // Check dependencies
  209. if !checkOpenVPNExecutable() {
  210. return fmt.Errorf("openvpn executable can not be found! you should install OpenVPN on this machine")
  211. }
  212. if !checkOpenSSLExecutable() {
  213. return fmt.Errorf("openssl executable can not be found! you should install openssl on this machine")
  214. }
  215. if !checkIptablesExecutable() {
  216. return fmt.Errorf("iptables executable can not be found")
  217. }
  218. if !IsInitialized() {
  219. return fmt.Errorf("you should create a server first. e.g. $ ovpm vpn create-server")
  220. }
  221. if err := emitServerConf(); err != nil {
  222. return fmt.Errorf("can not emit server conf: %s", err)
  223. }
  224. if err := emitServerCert(); err != nil {
  225. return fmt.Errorf("can not emit server cert: %s", err)
  226. }
  227. if err := emitServerKey(); err != nil {
  228. return fmt.Errorf("can not emit server key: %s", err)
  229. }
  230. if err := emitCACert(); err != nil {
  231. return fmt.Errorf("can not emit ca cert : %s", err)
  232. }
  233. if err := emitCAKey(); err != nil {
  234. return fmt.Errorf("can not emit ca key: %s", err)
  235. }
  236. if err := emitDHParams(); err != nil {
  237. return fmt.Errorf("can not emit dhparams: %s", err)
  238. }
  239. if err := emitCCD(); err != nil {
  240. return fmt.Errorf("can not emit ccd: %s", err)
  241. }
  242. if err := emitIptables(); err != nil {
  243. return fmt.Errorf("can not emit iptables conf: %s", err)
  244. }
  245. if err := emitCRL(); err != nil {
  246. return fmt.Errorf("can not emit crl: %s", err)
  247. }
  248. logrus.Info("configurations emitted to the filesystem")
  249. RestartVPNProc()
  250. logrus.Info("OpenVPN process is restarting")
  251. return nil
  252. }
  253. func emitToFile(path, content string, mode uint) error {
  254. file, err := os.Create(path)
  255. if err != nil {
  256. return fmt.Errorf("Cannot create file %s: %v", path, err)
  257. }
  258. if mode != 0 {
  259. file.Chmod(os.FileMode(mode))
  260. }
  261. defer file.Close()
  262. fmt.Fprintf(file, content)
  263. return nil
  264. }
  265. func emitServerConf() error {
  266. serverInstance, err := GetServerInstance()
  267. if err != nil {
  268. return fmt.Errorf("can not retrieve server: %v", err)
  269. }
  270. port := DefaultVPNPort
  271. if serverInstance.Port != "" {
  272. port = serverInstance.Port
  273. }
  274. var result bytes.Buffer
  275. server := _VPNServerConfig{
  276. CertPath: _DefaultCertPath,
  277. KeyPath: _DefaultKeyPath,
  278. CACertPath: _DefaultCACertPath,
  279. CAKeyPath: _DefaultCAKeyPath,
  280. CCDPath: _DefaultVPNCCDPath,
  281. CRLPath: _DefaultCRLPath,
  282. DHParamsPath: _DefaultDHParamsPath,
  283. Net: _DefaultServerNetwork,
  284. Mask: _DefaultServerNetMask,
  285. Port: port,
  286. }
  287. data, err := bindata.Asset("template/server.conf.tmpl")
  288. if err != nil {
  289. return err
  290. }
  291. t, err := template.New("server.conf").Parse(string(data))
  292. if err != nil {
  293. return fmt.Errorf("can not parse server.conf.tmpl template: %s", err)
  294. }
  295. err = t.Execute(&result, server)
  296. if err != nil {
  297. return fmt.Errorf("can not render server.conf: %s", err)
  298. }
  299. // Wite rendered content into openvpn server conf.
  300. return emitToFile(_DefaultVPNConfPath, result.String(), 0)
  301. }
  302. // GetServerInstance returns the default server from the database.
  303. func GetServerInstance() (*DBServer, error) {
  304. var server DBServer
  305. db.First(&server)
  306. if db.NewRecord(server) {
  307. return nil, fmt.Errorf("can not retrieve server from db")
  308. }
  309. return &server, nil
  310. }
  311. // IsInitialized checks if there is a default server in the database or not.
  312. func IsInitialized() bool {
  313. var server DBServer
  314. db.First(&server)
  315. if db.NewRecord(server) {
  316. return false
  317. }
  318. return true
  319. }
  320. func emitServerKey() error {
  321. server, err := GetServerInstance()
  322. if err != nil {
  323. return err
  324. }
  325. // Write rendered content into key file.
  326. return emitToFile(_DefaultKeyPath, server.Key, 0600)
  327. }
  328. func emitServerCert() error {
  329. server, err := GetServerInstance()
  330. if err != nil {
  331. return err
  332. }
  333. // Write rendered content into the cert file.
  334. return emitToFile(_DefaultCertPath, server.Cert, 0)
  335. }
  336. func emitCRL() error {
  337. var revokedDBItems []*DBRevoked
  338. db.Find(&revokedDBItems)
  339. var revokedCertSerials []*big.Int
  340. for _, item := range revokedDBItems {
  341. bi := big.NewInt(0)
  342. bi.SetString(item.SerialNumber, 16)
  343. revokedCertSerials = append(revokedCertSerials, bi)
  344. }
  345. systemCA, err := GetSystemCA()
  346. if err != nil {
  347. return fmt.Errorf("can not emit CRL: %v", err)
  348. }
  349. crl, err := pki.NewCRL(revokedCertSerials, systemCA)
  350. if err != nil {
  351. return fmt.Errorf("can not emit crl: %v", err)
  352. }
  353. return emitToFile(_DefaultCRLPath, crl, 0)
  354. }
  355. func emitCACert() error {
  356. server, err := GetServerInstance()
  357. if err != nil {
  358. return err
  359. }
  360. // Write rendered content into the ca cert file.
  361. return emitToFile(_DefaultCACertPath, server.CACert, 0)
  362. }
  363. func emitCAKey() error {
  364. server, err := GetServerInstance()
  365. if err != nil {
  366. return err
  367. }
  368. // Write rendered content into the ca key file.
  369. return emitToFile(_DefaultCAKeyPath, server.CAKey, 0600)
  370. }
  371. func emitCCD() error {
  372. users, err := GetAllUsers()
  373. if err != nil {
  374. return err
  375. }
  376. // Create and write rendered ccd data.
  377. os.Mkdir(_DefaultVPNCCDPath, 0755)
  378. clientsNetMask := net.IPMask(net.ParseIP(_DefaultServerNetMask))
  379. clientsNetPrefix := net.ParseIP(_DefaultServerNetwork)
  380. clientNet := clientsNetPrefix.Mask(clientsNetMask).To4()
  381. counter := 2
  382. for _, user := range users {
  383. var result bytes.Buffer
  384. clientNet[3] = byte(counter)
  385. params := struct {
  386. IP string
  387. NetMask string
  388. }{IP: clientNet.String(), NetMask: _DefaultServerNetMask}
  389. data, err := bindata.Asset("template/ccd.file.tmpl")
  390. if err != nil {
  391. return err
  392. }
  393. t, err := template.New("ccd.file.tmpl").Parse(string(data))
  394. if err != nil {
  395. return fmt.Errorf("can not parse ccd.file.tmpl template: %s", err)
  396. }
  397. err = t.Execute(&result, params)
  398. if err != nil {
  399. return fmt.Errorf("can not render ccd file %s: %s", user.Username, err)
  400. }
  401. err = emitToFile(_DefaultVPNCCDPath+user.Username, result.String(), 0)
  402. if err != nil {
  403. return err
  404. }
  405. counter++
  406. }
  407. return nil
  408. }
  409. func emitDHParams() error {
  410. var result bytes.Buffer
  411. data, err := bindata.Asset("template/dh4096.pem.tmpl")
  412. if err != nil {
  413. return err
  414. }
  415. t, err := template.New("dh4096.pem.tmpl").Parse(string(data))
  416. if err != nil {
  417. return fmt.Errorf("can not parse dh4096.pem template: %s", err)
  418. }
  419. err = t.Execute(&result, nil)
  420. if err != nil {
  421. return fmt.Errorf("can not render dh4096.pem file: %s", err)
  422. }
  423. err = emitToFile(_DefaultDHParamsPath, result.String(), 0)
  424. if err != nil {
  425. return err
  426. }
  427. return nil
  428. }
  429. func emitIptables() error {
  430. return nil
  431. }
  432. func checkOpenVPNExecutable() bool {
  433. executable := getOpenVPNExecutable()
  434. if executable == "" {
  435. logrus.Error("openvpn is not installed ✘")
  436. return false
  437. }
  438. logrus.Debugf("openvpn executable detected: %s ✔", executable)
  439. return true
  440. }
  441. func getOpenVPNExecutable() string {
  442. cmd := exec.Command("which", "openvpn")
  443. output, err := cmd.Output()
  444. if err != nil {
  445. logrus.Errorf("openvpn is not installed: %s ✘", err)
  446. return ""
  447. }
  448. logrus.Debugf("openvpn executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  449. return strings.TrimSpace(string(output[:]))
  450. }
  451. func checkOpenSSLExecutable() bool {
  452. cmd := exec.Command("which", "openssl")
  453. output, err := cmd.Output()
  454. if err != nil {
  455. logrus.Errorf("openssl is not installed: %s ✘", err)
  456. return false
  457. }
  458. logrus.Debugf("openssl executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  459. return true
  460. }
  461. func checkIptablesExecutable() bool {
  462. cmd := exec.Command("which", "iptables")
  463. output, err := cmd.Output()
  464. if err != nil {
  465. logrus.Errorf("iptables is not installed: %s ✘", err)
  466. return false
  467. }
  468. logrus.Debugf("iptables executable detected: %s ✔", strings.TrimSpace(string(output[:])))
  469. return true
  470. }
  471. func init() {
  472. var err error
  473. vpnProc, err = supervisor.NewProcess(getOpenVPNExecutable(), varBasePath, []string{"--config", _DefaultVPNConfPath})
  474. if err != nil {
  475. logrus.Errorf("can not create process: %v", err)
  476. }
  477. }