2020-10-09 20:11:51 +00:00
|
|
|
#!/bin/bash
|
|
|
|
# Copyright (C) 2020 Private Internet Access, Inc.
|
|
|
|
#
|
|
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
# of this software and associated documentation files (the "Software"), to deal
|
|
|
|
# in the Software without restriction, including without limitation the rights
|
|
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
|
|
# furnished to do so, subject to the following conditions:
|
|
|
|
#
|
|
|
|
# The above copyright notice and this permission notice shall be included in all
|
|
|
|
# copies or substantial portions of the Software.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
# SOFTWARE.
|
|
|
|
|
|
|
|
# This function allows you to check if the required tools have been installed.
|
|
|
|
function check_tool() {
|
|
|
|
cmd=$1
|
|
|
|
if ! command -v $cmd &>/dev/null
|
|
|
|
then
|
|
|
|
echo "$cmd could not be found"
|
|
|
|
echo "Please install $cmd"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
# Now we call the function to make sure we can use wg-quick, curl and jq.
|
|
|
|
check_tool curl
|
|
|
|
check_tool jq
|
|
|
|
check_tool openvpn
|
|
|
|
|
2020-10-12 19:49:40 +00:00
|
|
|
# Check if manual PIA OpenVPN connection is already initialized.
|
2020-10-09 20:11:51 +00:00
|
|
|
# Multi-hop is out of the scope of this repo, but you should be able to
|
|
|
|
# get multi-hop running with both OpenVPN and WireGuard.
|
2020-11-01 12:14:51 +00:00
|
|
|
adapter_check="$( ip a s tun06 2>&1 )"
|
2020-10-09 20:11:51 +00:00
|
|
|
should_read="Device \"tun06\" does not exist"
|
|
|
|
pid_filepath="/opt/piavpn-manual/pia_pid"
|
2020-11-01 12:14:51 +00:00
|
|
|
if [[ "$adapter_check" != *"$should_read"* ]]; then
|
2020-10-12 19:49:40 +00:00
|
|
|
echo The tun06 adapter already exists, that interface is required
|
2020-10-09 20:11:51 +00:00
|
|
|
echo for this configuration.
|
|
|
|
if [ -f "$pid_filepath" ]; then
|
|
|
|
old_pid="$( cat "$pid_filepath" )"
|
|
|
|
old_pid_name="$( ps -p "$old_pid" -o comm= )"
|
|
|
|
if [[ $old_pid_name == 'openvpn' ]]; then
|
|
|
|
echo
|
|
|
|
echo It seems likely that process $old_pid is an OpenVPN connection
|
|
|
|
echo that was established by using this script. Unless it is closed
|
|
|
|
echo you would not be able to get a new connection.
|
|
|
|
echo -n "Do you want to run $ kill $old_pid (Y/n): "
|
|
|
|
read close_connection
|
|
|
|
fi
|
|
|
|
if echo ${close_connection:0:1} | grep -iq n ; then
|
|
|
|
echo Closing script. Resolve tun06 adapter conflict and run the script again.
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
echo Killing the existing OpenVPN process and waiting 5 seconds...
|
|
|
|
kill $old_pid
|
|
|
|
sleep 5
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# PIA currently does not support IPv6. In order to be sure your VPN
|
|
|
|
# connection does not leak, it is best to disabled IPv6 altogether.
|
2020-11-14 21:47:22 +00:00
|
|
|
# IPv6 can also be disabled via kernel commandline param, so we must
|
|
|
|
# first check if this is the case.
|
|
|
|
if [[ -f /proc/net/if_inet6 ]] &&
|
|
|
|
[[ $(sysctl -n net.ipv6.conf.all.disable_ipv6) -ne 1 ||
|
|
|
|
$(sysctl -n net.ipv6.conf.default.disable_ipv6) -ne 1 ]]
|
2020-10-09 20:11:51 +00:00
|
|
|
then
|
|
|
|
echo 'You should consider disabling IPv6 by running:'
|
|
|
|
echo 'sysctl -w net.ipv6.conf.all.disable_ipv6=1'
|
|
|
|
echo 'sysctl -w net.ipv6.conf.default.disable_ipv6=1'
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Check if the mandatory environment variables are set.
|
|
|
|
if [[ ! $OVPN_SERVER_IP ||
|
|
|
|
! $OVPN_HOSTNAME ||
|
|
|
|
! $PIA_TOKEN ||
|
|
|
|
! $CONNECTION_SETTINGS ]]; then
|
2020-10-17 01:09:58 +00:00
|
|
|
echo 'This script requires 4 env vars:'
|
|
|
|
echo 'PIA_TOKEN - the token used for authentication'
|
2020-10-09 20:11:51 +00:00
|
|
|
echo 'OVPN_SERVER_IP - IP that you want to connect to'
|
|
|
|
echo 'OVPN_HOSTNAME - name of the server, required for ssl'
|
|
|
|
echo 'CONNECTION_SETTINGS - the protocol and encryption specification'
|
|
|
|
echo ' - available options for CONNECTION_SETTINGS are:'
|
|
|
|
echo ' * openvpn_udp_standard'
|
|
|
|
echo ' * openvpn_udp_strong'
|
|
|
|
echo ' * openvpn_tcp_standard'
|
|
|
|
echo ' * openvpn_tcp_strong'
|
|
|
|
echo
|
|
|
|
echo You can also specify optional env vars:
|
|
|
|
echo "PIA_PF - enable port forwarding"
|
|
|
|
echo "PAYLOAD_AND_SIGNATURE - In case you already have a port."
|
|
|
|
echo
|
|
|
|
echo An easy solution is to just run get_region_and_token.sh
|
2020-10-12 19:49:40 +00:00
|
|
|
echo as it will guide you through getting the best server and
|
2020-10-09 20:11:51 +00:00
|
|
|
echo also a token. Detailed information can be found here:
|
|
|
|
echo https://github.com/pia-foss/manual-connections
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Create a credentials file with the login token
|
|
|
|
echo "Trying to write /opt/piavpn-manual/pia.ovpn...
|
|
|
|
"
|
|
|
|
mkdir -p /opt/piavpn-manual
|
|
|
|
rm -f /opt/piavpn-manual/credentials /opt/piavpn-manual/route_info
|
|
|
|
echo ${PIA_TOKEN:0:62}"
|
|
|
|
"${PIA_TOKEN:62} > /opt/piavpn-manual/credentials || exit 1
|
2020-11-13 12:37:58 +00:00
|
|
|
chmod 600 /opt/piavpn-manual/credentials
|
2020-10-09 20:11:51 +00:00
|
|
|
|
|
|
|
# Translate connection settings variable
|
|
|
|
IFS='_'
|
|
|
|
read -ra connection_settings <<< "$CONNECTION_SETTINGS"
|
|
|
|
IFS=' '
|
|
|
|
protocol="${connection_settings[1]}"
|
|
|
|
encryption="${connection_settings[2]}"
|
|
|
|
|
|
|
|
prefix_filepath="openvpn_config/standard.ovpn"
|
|
|
|
if [[ $encryption == "strong" ]]; then
|
|
|
|
prefix_filepath="openvpn_config/strong.ovpn"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [[ $protocol == "udp" ]]; then
|
|
|
|
if [[ $encryption == "standard" ]]; then
|
|
|
|
port=1198
|
|
|
|
else
|
|
|
|
port=1197
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
if [[ $encryption == "standard" ]]; then
|
|
|
|
port=502
|
|
|
|
else
|
|
|
|
port=501
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Create the OpenVPN config based on the settings specified
|
|
|
|
cat $prefix_filepath > /opt/piavpn-manual/pia.ovpn || exit 1
|
|
|
|
echo remote $OVPN_SERVER_IP $port $protocol >> /opt/piavpn-manual/pia.ovpn
|
|
|
|
|
2020-10-12 19:49:40 +00:00
|
|
|
# Copy the up/down scripts to /opt/piavpn-manual/
|
2020-10-09 20:11:51 +00:00
|
|
|
# based upon use of PIA DNS
|
|
|
|
if [ "$PIA_DNS" != true ]; then
|
|
|
|
cp openvpn_config/openvpn_up.sh /opt/piavpn-manual/
|
|
|
|
cp openvpn_config/openvpn_down.sh /opt/piavpn-manual/
|
|
|
|
echo This configuration will not use PIA DNS.
|
|
|
|
echo If you want to also enable PIA DNS, please start the script
|
|
|
|
echo with the env var PIA_DNS=true. Example:
|
|
|
|
echo $ OVPN_SERVER_IP=\"$OVPN_SERVER_IP\" OVPN_HOSTNAME=\"$OVPN_HOSTNAME\" \
|
|
|
|
PIA_TOKEN=\"$PIA_TOKEN\" CONNECTION_SETTINGS=\"$CONNECTION_SETTINGS\" \
|
|
|
|
PIA_PF=true PIA_DNS=true ./connect_to_openvpn_with_token.sh
|
|
|
|
else
|
|
|
|
cp openvpn_config/openvpn_up_dnsoverwrite.sh /opt/piavpn-manual/openvpn_up.sh
|
|
|
|
cp openvpn_config/openvpn_down_dnsoverwrite.sh /opt/piavpn-manual/openvpn_down.sh
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Start the OpenVPN interface.
|
|
|
|
# If something failed, stop this script.
|
|
|
|
# If you get DNS errors because you miss some packages,
|
2020-10-12 19:49:40 +00:00
|
|
|
# just hardcode /etc/resolv.conf to "nameserver 10.0.0.242".
|
2020-10-09 20:11:51 +00:00
|
|
|
#rm -f /opt/piavpn-manual/debug_info
|
|
|
|
echo "
|
|
|
|
Trying to start the OpenVPN connection..."
|
|
|
|
openvpn --daemon \
|
|
|
|
--config "/opt/piavpn-manual/pia.ovpn" \
|
|
|
|
--writepid "/opt/piavpn-manual/pia_pid" \
|
|
|
|
--log "/opt/piavpn-manual/debug_info" || exit 1
|
|
|
|
|
|
|
|
echo "
|
|
|
|
The OpenVPN connect command was issued.
|
|
|
|
|
|
|
|
Confirming OpenVPN connection state... "
|
|
|
|
|
2020-10-12 19:49:40 +00:00
|
|
|
# Check if manual PIA OpenVPN connection is initialized.
|
|
|
|
# Manually adjust the connection_wait_time if needed
|
2020-10-09 20:11:51 +00:00
|
|
|
connection_wait_time=10
|
|
|
|
confirmation="Initialization Sequence Complete"
|
|
|
|
for (( timeout=0; timeout <=$connection_wait_time; timeout++ ))
|
|
|
|
do
|
|
|
|
sleep 1
|
|
|
|
if grep -q "$confirmation" /opt/piavpn-manual/debug_info; then
|
|
|
|
connected=true
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
ovpn_pid="$( cat /opt/piavpn-manual/pia_pid )"
|
|
|
|
gateway_ip="$( cat /opt/piavpn-manual/route_info )"
|
|
|
|
|
|
|
|
# Report and exit if connection was not initialized within 10 seconds.
|
|
|
|
if [ "$connected" != true ]; then
|
|
|
|
echo "The VPN connection was not established within 10 seconds."
|
|
|
|
kill $ovpn_pid
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "Initialization Sequence Complete!
|
|
|
|
|
|
|
|
At this point, internet should work via VPN.
|
|
|
|
"
|
|
|
|
|
|
|
|
echo "OpenVPN Process ID: $ovpn_pid
|
|
|
|
VPN route IP: $gateway_ip
|
|
|
|
|
2020-10-12 19:49:40 +00:00
|
|
|
To disconnect the VPN, run:
|
2020-10-09 20:11:51 +00:00
|
|
|
|
|
|
|
--> sudo kill $ovpn_pid <--
|
|
|
|
"
|
|
|
|
|
|
|
|
# This section will stop the script if PIA_PF is not set to "true".
|
|
|
|
if [ "$PIA_PF" != true ]; then
|
|
|
|
echo
|
|
|
|
echo If you want to also enable port forwarding, please start the script
|
|
|
|
echo with the env var PIA_PF=true. Example:
|
|
|
|
echo $ OVPN_SERVER_IP=\"$OVPN_SERVER_IP\" OVPN_HOSTNAME=\"$OVPN_HOSTNAME\" \
|
|
|
|
PIA_TOKEN=\"$PIA_TOKEN\" CONNECTION_SETTINGS=\"$CONNECTION_SETTINGS\" \
|
|
|
|
PIA_PF=true ./connect_to_openvpn_with_token.sh
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "
|
|
|
|
This script got started with PIA_PF=true.
|
|
|
|
Starting procedure to enable port forwarding by running the following command:
|
|
|
|
$ PIA_TOKEN=\"$PIA_TOKEN\" \\
|
|
|
|
PF_GATEWAY=\"$gateway_ip\" \\
|
|
|
|
PF_HOSTNAME=\"$OVPN_HOSTNAME\" \\
|
|
|
|
./port_forwarding.sh
|
|
|
|
"
|
|
|
|
|
|
|
|
PIA_TOKEN=$PIA_TOKEN \
|
|
|
|
PF_GATEWAY="$gateway_ip" \
|
|
|
|
PF_HOSTNAME="$OVPN_HOSTNAME" \
|
|
|
|
./port_forwarding.sh
|