• Stars
    star
    8,325
  • Rank 4,421 (Top 0.09 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 10 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

πŸ”’ OpenVPN server in a Docker container complete with an EasyRSA PKI CA

OpenVPN for Docker

Build Status Docker Stars Docker Pulls ImageLayers FOSSA Status

OpenVPN server in a Docker container complete with an EasyRSA PKI CA.

Extensively tested on Digital Ocean $5/mo node and has a corresponding Digital Ocean Community Tutorial.

Upstream Links

Quick Start

  • Pick a name for the $OVPN_DATA data volume container. It's recommended to use the ovpn-data- prefix to operate seamlessly with the reference systemd service. Users are encourage to replace example with a descriptive name of their choosing.

    OVPN_DATA="ovpn-data-example"
    
  • Initialize the $OVPN_DATA container that will hold the configuration files and certificates. The container will prompt for a passphrase to protect the private key used by the newly generated certificate authority.

    docker volume create --name $OVPN_DATA
    docker run -v $OVPN_DATA:/etc/openvpn --rm kylemanna/openvpn ovpn_genconfig -u udp://VPN.SERVERNAME.COM
    docker run -v $OVPN_DATA:/etc/openvpn --rm -it kylemanna/openvpn ovpn_initpki
    
  • Start OpenVPN server process

    docker run -v $OVPN_DATA:/etc/openvpn -d -p 1194:1194/udp --cap-add=NET_ADMIN kylemanna/openvpn
    
  • Generate a client certificate without a passphrase

    docker run -v $OVPN_DATA:/etc/openvpn --rm -it kylemanna/openvpn easyrsa build-client-full CLIENTNAME nopass
    
  • Retrieve the client configuration with embedded certificates

    docker run -v $OVPN_DATA:/etc/openvpn --rm kylemanna/openvpn ovpn_getclient CLIENTNAME > CLIENTNAME.ovpn
    

Next Steps

More Reading

Miscellaneous write-ups for advanced configurations are available in the docs folder.

Systemd Init Scripts

A systemd init script is available to manage the OpenVPN container. It will start the container on system boot, restart the container if it exits unexpectedly, and pull updates from Docker Hub to keep itself up to date.

Please refer to the systemd documentation to learn more.

Docker Compose

If you prefer to use docker-compose please refer to the documentation.

Debugging Tips

  • Create an environment variable with the name DEBUG and value of 1 to enable debug output (using "docker -e").

      docker run -v $OVPN_DATA:/etc/openvpn -p 1194:1194/udp --cap-add=NET_ADMIN -e DEBUG=1 kylemanna/openvpn
    
  • Test using a client that has openvpn installed correctly

      $ openvpn --config CLIENTNAME.ovpn
    
  • Run through a barrage of debugging checks on the client if things don't just work

      $ ping 8.8.8.8    # checks connectivity without touching name resolution
      $ dig google.com  # won't use the search directives in resolv.conf
      $ nslookup google.com # will use search
    
  • Consider setting up a systemd service for automatic start-up at boot time and restart in the event the OpenVPN daemon or Docker crashes.

How Does It Work?

Initialize the volume container using the kylemanna/openvpn image with the included scripts to automatically generate:

  • Diffie-Hellman parameters
  • a private key
  • a self-certificate matching the private key for the OpenVPN server
  • an EasyRSA CA key and certificate
  • a TLS auth key from HMAC security

The OpenVPN server is started with the default run cmd of ovpn_run

The configuration is located in /etc/openvpn, and the Dockerfile declares that directory as a volume. It means that you can start another container with the -v argument, and access the configuration. The volume also holds the PKI keys and certs so that it could be backed up.

To generate a client certificate, kylemanna/openvpn uses EasyRSA via the easyrsa command in the container's path. The EASYRSA_* environmental variables place the PKI CA under /etc/openvpn/pki.

Conveniently, kylemanna/openvpn comes with a script called ovpn_getclient, which dumps an inline OpenVPN client configuration file. This single file can then be given to a client for access to the VPN.

To enable Two Factor Authentication for clients (a.k.a. OTP) see this document.

OpenVPN Details

We use tun mode, because it works on the widest range of devices. tap mode, for instance, does not work on Android, except if the device is rooted.

The topology used is net30, because it works on the widest range of OS. p2p, for instance, does not work on Windows.

The UDP server uses192.168.255.0/24 for dynamic clients by default.

The client profile specifies redirect-gateway def1, meaning that after establishing the VPN connection, all traffic will go through the VPN. This might cause problems if you use local DNS recursors which are not directly reachable, since you will try to reach them through the VPN and they might not answer to you. If that happens, use public DNS resolvers like those of Google (8.8.4.4 and 8.8.8.8) or OpenDNS (208.67.222.222 and 208.67.220.220).

Security Discussion

The Docker container runs its own EasyRSA PKI Certificate Authority. This was chosen as a good way to compromise on security and convenience. The container runs under the assumption that the OpenVPN container is running on a secure host, that is to say that an adversary does not have access to the PKI files under /etc/openvpn/pki. This is a fairly reasonable compromise because if an adversary had access to these files, the adversary could manipulate the function of the OpenVPN server itself (sniff packets, create a new PKI CA, MITM packets, etc).

  • The certificate authority key is kept in the container by default for simplicity. It's highly recommended to secure the CA key with some passphrase to protect against a filesystem compromise. A more secure system would put the EasyRSA PKI CA on an offline system (can use the same Docker image and the script ovpn_copy_server_files to accomplish this).
  • It would be impossible for an adversary to sign bad or forged certificates without first cracking the key's passphase should the adversary have root access to the filesystem.
  • The EasyRSA build-client-full command will generate and leave keys on the server, again possible to compromise and steal the keys. The keys generated need to be signed by the CA which the user hopefully configured with a passphrase as described above.
  • Assuming the rest of the Docker container's filesystem is secure, TLS + PKI security should prevent any malicious host from using the VPN.

Benefits of Running Inside a Docker Container

The Entire Daemon and Dependencies are in the Docker Image

This means that it will function correctly (after Docker itself is setup) on all distributions Linux distributions such as: Ubuntu, Arch, Debian, Fedora, etc. Furthermore, an old stable server can run a bleeding edge OpenVPN server without having to install/muck with library dependencies (i.e. run latest OpenVPN with latest OpenSSL on Ubuntu 12.04 LTS).

It Doesn't Stomp All Over the Server's Filesystem

Everything for the Docker container is contained in two images: the ephemeral run time image (kylemanna/openvpn) and the $OVPN_DATA data volume. To remove it, remove the corresponding containers, $OVPN_DATA data volume and Docker image and it's completely removed. This also makes it easier to run multiple servers since each lives in the bubble of the container (of course multiple IPs or separate ports are needed to communicate with the world).

Some (arguable) Security Benefits

At the simplest level compromising the container may prevent additional compromise of the server. There are many arguments surrounding this, but the take away is that it certainly makes it more difficult to break out of the container. People are actively working on Linux containers to make this more of a guarantee in the future.

Differences from jpetazzo/dockvpn

  • No longer uses serveconfig to distribute the configuration via https
  • Proper PKI support integrated into image
  • OpenVPN config files, PKI keys and certs are stored on a storage volume for re-use across containers
  • Addition of tls-auth for HMAC security

Originally Tested On

  • Docker hosts:
    • server a Digital Ocean Droplet with 512 MB RAM running Ubuntu 14.04
  • Clients
    • Android App OpenVPN Connect 1.1.14 (built 56)
      • OpenVPN core 3.0 android armv7a thumb2 32-bit
    • OS X Mavericks with Tunnelblick 3.4beta26 (build 3828) using openvpn-2.3.4
    • ArchLinux OpenVPN pkg 2.3.4-1

License

FOSSA Status

More Repositories

1

docker-bitcoind

πŸ’° Bitcoind Docker image that runs the Bitcoin node in a container for easy deployment
Shell
561
star
2

docker-aosp

πŸ— Minimal Android AOSP build environment with handy automation wrapper scripts
Shell
490
star
3

sniffer

ESP32 Air Quality Sensor with PMSA003 + BME680 and 1.14" LCD
103
star
4

systemd-utils

Random systemd utilities
Python
85
star
5

pydevmem

Python interface to /dev/mem
Python
46
star
6

docker-syncthing-relay

πŸ” Syncthing Relay to help Syncthing clients relay data when they can't communicate directly due to things like NAT routers
Dockerfile
33
star
7

imapfilter-tools

Tools to improve imapfilter for use as a reliable SPAM filtering service.
Lua
20
star
8

nanotest

Unit test framework that runs on limited resource devices like microcontrollers as well as PCs
C
18
star
9

devmem3

Enhanced version of devmem2 for accessing /dev/mem and other embedded resources
C++
16
star
10

fosmc

The Fictiv Open Source Motorcycle
15
star
11

docker-tahoe-lafs

Simple Tahoe LAFS storage node
Shell
11
star
12

opalctl

TCG Opal Control Utilities
C
11
star
13

android-ble-battery

Hacky app to read Bluetooth Low Energy Battery Service
10
star
14

kicad-library

My personal KiCAD library
10
star
15

lua-popen3

Utilties for using Lua with external commands
Lua
10
star
16

fssh

Reverse ssh wrapper for Linux X11/Mac OS X copy-paste buffer
Python
9
star
17

docker-zynq7

Build Tools for Yocto on Xilinx Zynq 7000 Series SOCs with ARM Cortex-A9 CPUs + FPGAs
Dockerfile
8
star
18

solar-power-monitor

Raspberry PI 4 + INA3221 + SY-M150-14.6 + LiFePo4 battery + 25W solar panel
Python
8
star
19

kinetis-sdk1

Unofficial mirror of various Kinetis SDK v1.x.x releases
8
star
20

cleanhawk250

✈ CleanHawk 250 Support Documentation + Design Files
KiCad Layout
7
star
21

dot-files

Public version of my dot-files
Vim Script
7
star
22

vagrant-aosp

Vagrant build for providing a dev and build environemtn for AOSP
Shell
7
star
23

freertos

πŸ”‚ FreeRTOS Mirror on GitHub
C
5
star
24

blog.kylemanna.com

☒ Live Jekyll repository for my blog
SCSS
5
star
25

docker-cleanup

Clean-up old dangling Docker volumes
Shell
5
star
26

kinetis-sdk2

Attempt at a handy SDK for the NXP Kinetis K22F and KV11 processors
C
5
star
27

dell-xps-9550-precision-5510

Notes from a Dell XPS 15 9550 -> Dell Precision 15 M5510 motherboard swap
Shell
5
star
28

docker-am335x

Cross compiler and build tools for Texas Instrument's AM335x chips (i.e. Beagle Bone) with proper Device Tree and PRU compiler
Shell
5
star
29

kicad-utils

Miscellaneous utilities for Kicad. Primarily Kicad XYRS BOM generator
Python
5
star
30

nordic-sdk-nrf5

C
4
star
31

helium-validator-influx

Helium Validator to InfluxDB
Python
4
star
32

android-utils

Various Android Utilities
Shell
3
star
33

social-utils

Random social media utilities I've hacked together
Python
3
star
34

cmocka-init

Wrapper to simplify the use of cmocka by using linker sets (linker sections + function pointers)
C
3
star
35

repo-manifest-utils

Misc utilities for managing git-repo Android manifest files.
Python
3
star
36

vmware-patch

Fork of https://aur.archlinux.org/packages/vmware-patch/ with newer fixes
Shell
3
star
37

kinetis-frdm-expansion

Expansion Board Template for Freescale Kinetis Freedom Dev Boards
KiCad Layout
3
star
38

docker-ci-embedded

Continuous Integration Build Environment for Embedded ARM Devices
3
star
39

android-blueoothle

Java
2
star
40

embedded-handbook

List of Embedded Microcontroller Resources
2
star
41

lxc-oe

Linux Container (LXC) templates for repeatable Open Embedded builds
Shell
2
star
42

kicad-netlist-headache

Example of KiCad project gone wrong
KiCad Layout
2
star
43

scripts

Python
2
star
44

docker-xtreemfs

Docker build for XtreemFS
Shell
2
star
45

redirect-analytics

Simple HTTP redirection app to log data Google Analytics
PHP
1
star
46

kylemanna.github.com

My personal blog
Ruby
1
star
47

teensy-toslink-receiver

Simple TOSLINK to USB + S/PDIF receiver. Someday + HDMI ARC + HDMI CEC.
1
star
48

openocd

C
1
star
49

relay-sr201

Rust SR-201 Relay controller
Rust
1
star
50

aur

My Personal AUR git submodules
Shell
1
star
51

coinbox

Linux LiveUSB distribution for Bitcoin key generation, storage and transaction signing
Shell
1
star
52

nrf52-jlink-uart-portal

UART breakout for nRF52 to debug external boards with UART riding over SWD to taret
KiCad Layout
1
star