Skip to content

Latest commit

 

History

History
158 lines (103 loc) · 4.5 KB

DEPLOY_FEDORA.md

File metadata and controls

158 lines (103 loc) · 4.5 KB
title description category
Deploying on Fedora
Install and Maintain eduVPN/Let's Connect! on Fedora
howto

For simple one server deployments and tests, we have a deploy script available you can run on a fresh Fedora installation. It will configure all components and will be ready for use after running!

Additional scripts are available after deployment:

  • Use Let's Encrypt for automatic web server certificate management;

Requirements

  • Clean Fedora installation with all updates installed;
  • SELinux MUST be enabled;
  • Have a STATIC IPv4 and IPv6 address configured on your external interface;
  • Network equipment/VM platform allows access to the very least tcp/80, tcp/443, udp/1194 and tcp/1194 for basic functionality, the deploy script will take care of the host firewall;
  • Working DNS entry for your VPN server, e.g. vpn.example.org.

We test only with the official Fedora Cloud Base Images.

If you have a more complicated setup, we recommend to manually walk through the deploy script and follow the steps.

Base Deploy

NOTE: make sure you have tar installed, the Fedora "minimal" image does not have tar:

$ sudo dnf -y install tar

Perform these steps on the host where you want to deploy:

$ curl -L -O https://github.com/eduvpn/documentation/archive/v2.tar.gz
$ tar -xzf v2.tar.gz
$ cd documentation-2

Run the script (as root):

$ sudo -s
# ./deploy_fedora.sh

Specify the hostname you want to use for your VPN server. The recommended hostname SHOULD already be the one you want to use... If not, set the hostname correctly first.

NOTE: you can NOT use localhost as a hostname, nor an IP address!

NOTE: by default there is NO firewall for the traffic between VPN client and VPN server. So if you have SSH running on your server, the clients will be able to connect to it when you don't take additional steps! Look here.

NOTE: if you want to use the development repository, use:

# VPN_DEV_REPO=1 ./deploy_fedora.sh

Update

Periodically install updates! Run the following command periodically, e.g. every week during the maintenance window. Reboot your server as required for kernel / system library updates.

$ sudo vpn-maint-update-system

If the command is not available, install the vpn-maint-scripts package first.

Configuration

VPN

See PROFILE_CONFIG on how to update the VPN server settings.

Authentication

Username & Password

By default there is a user demo and admin with a generated password for portal access. Those are printed at the end of the deploy script.

If you want to update/add users you can use the vpn-user-portal-add-user. Provide an existing account to update the password:

$ sudo vpn-user-portal-add-user
User ID: foo
Setting password for user "foo"
Password: 
Password (repeat): 

You can configure which user(s) is/are an administrator by setting the adminUserIdList option in /etc/vpn-user-portal/config.php, e.g.:

'adminUserIdList' => ['admin'],

LDAP

It is easy to enable LDAP authentication. This is documented separately. See LDAP.

RADIUS

It is easy to enable RADIUS authentication. This is documented separately. See RADIUS.

SAML

It is easy to enable SAML authentication for identity federations, this is documented separately. See SAML.

2FA

It is possible to enable 2FA with TOTP.

ACLs

If you want to restrict the use of the VPN a bit more than on whether someone has an account or not, e.g. to limit certain profiles to certain (groups of) users, see ACL.

Optional

Web Server Certificates

By default a self-signed certificate is used for the web server. You can install your own certificates, and tweak /etc/httpd/conf.d/vpn.example.org.conf to point to them, or use Let's Encrypt using the script mentioned below.

Let's Encrypt

Run the script (as root) from the documentation folder:

$ sudo -s
# ./lets_encrypt_centos.sh

Make sure you use the exact same DNS name you used when running deploy_fedora.sh!

After completing the script, the certificate will be installed and the system will automatically replace the certificate before it expires.

Let's Connect! Branding

See BRANDING.

Port Sharing

If you also want to allow clients to connect with the VPN over tcp/443, see Port Sharing.