Connection and VPN Bonding Objective Ideas Custom Linux
Total Page:16
File Type:pdf, Size:1020Kb
Connection and VPN Bonding From Hack Sphere Labs Wiki Contents 1 Objective 2 Ideas 2.1 Notes 3 Custom Linux 3.1 Server Configuration 3.1.1 OpenVPN 3.1.2 Bonding Script 3.1.3 Cleanup Script 3.2 Client Configuration 3.2.1 USB Drive/Modem CD Rom Eject 3.2.2 Testing Modem with wvdial 3.2.3 ppd and chat scripts 3.2.4 OpenVPN on the Client 3.2.5 Bonding Script 3.2.6 Cleanup Script 3.3 NAT Forwarding as Internet Gateway 4 Notes 5 pfSense 5.1 Notes 6 ZeroShell 6.1 Notes 7 udev/cdcontrol Creation Objective Perferablly bond multiple 3G modems together to create a stable faster connection. I am trying to aggregate 3 unstable connections into one. Ideas Bond 2-3 OpenVPN tun interfaces. LAGG Kernel Bonding LACP (Stable connections, same BW) Linux Advanced Routing & Traffic Control - http://lartc.org/ Notes http://serverfault.com/questions/171333/how-exactly-specifically-does-layer-3-lacp-destination-address-hashing-work It should have been easy: http://evilprojects.org/2009/09/howto-setup-openvpn-channel-bonding-on-multiple-umts-uplinks.html Route VPNs through interfaces using port numbers. Custom Linux I tested with debian. Once it get greater then two modems I will post some real results. I was able to get what I wanted working but it did not seem that much faster over the 2x 3g modems. I do not know if it was the latent speed or whatnot but we will see. I would like to try 3 to 4 of them and really see what happends. Server Configuration I used a Debian VPS because I wanted to route all my traffic out to the internet through the bond. OpenVPN su - aptitude update aptitude upgrade aptitude install openvpn tap configuration is a bit different then tun configuration. Since it works via layer two you do not need to worry about layer 3 stuff like IPs in the config file. Setup a CA, Certs, ta.key: http://wiki.hackspherelabs.com/index.php?title=OpenVPN#Setup but here are some commands for reference: mkdir /etc/openvpn/easy-rsa cp /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /etc/openvpn/easy-rsa cd /etc/openvpn/easy-rsa/ source ./vars ./clean-all ./build-ca ./build-key-server servername ./build-dh cd keys openvpn --genkey --secret ta.key cd .. ./build-key-pkcs12 clientx You need some openvpn config files in /etc/openvpn/ and here is an example of a tap server openvpn config file: openvpntapserver.conf proto udp dev tap1 port 36214 ca /etc/openvpn/easy-rsa/keys/ca.crt cert /etc/openvpn/easy-rsa/keys/server.crt key /etc/openvpn/easy-rsa/keys/server.key dh /etc/openvpn/easy-rsa/keys/dh1024.pem tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0 keepalive 2 10 server 10.123.148.0 255.255.255.0 tls-server client-to-client max-clients 10 tun-mtu 1500 #daemon verb 3 cipher AES-256-CBC comp-lzo #status /var/log/openvpn-status35214.log persist-key persist-tun log-append openvpn.36214.log You need a vpn server for each modem that you want to bond. You will need to configure a different port and ip for each one while also a different tap interface. You need to stop and disable openvpn from starting because the bonding.sh script will call openvpn. /etc/init.d/openvpn stop update-rc.d openvpn disable Bonding Script You also need the utilities that this script calls aptitude install uml-utilities ifenslave bonding.sh #!/bin/bash modprobe bonding mode=0 miimon=100 modprobe tun ifconfig tap0 down ifconfig tap1 down tunctl -u root -g root -t tap0 tunctl -u root -g root -t tap1 ifconfig tap0 up ifconfig tap1 up openvpn /etc/openvpn/server1.conf & openvpn /etc/openvpn/server2.conf & sleep 10 ifconfig bond0 hw ether 00:11:22:33:44:55 ifconfig bond0 10.10.0.1 netmask 255.255.255.252 broadcast 10.10.0.3 up ifenslave bond0 tap0 tap1 ip addr add 10.10.10.1/24 dev tap0 scope link ip addr add 10.10.11.1/24 dev tap1 scope link Take note of the 'modprobe bonding mode=0 miimon=100' line. I use zero because I would like to try and combine the BW of both modems. The bonding mode is important depending on what you would like to do: Possible values are: balance-rr or 0 - Round-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance. active-backup or 1 - Active-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond's MAC address is externally visible on only one port (network adapter) to avoid confusing the switch. balance-xor or 2 - XOR policy: Transmit based on the selected transmit hash policy. The default policy is a simple ( {source} \oplus {destination} ) % n_{slaves} - Alternate transmit policies may be selected via the xmit_hash_policy option. This mode provides load balancing and fault tolerance. broadcast or 3 - Broadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance. 802.3ad or 4 - IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification. (Need Switch Support) balance-tlb or 5 - Adaptive transmit load balancing: channel bonding that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave. Incoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave. Need Switch Support) balance-alb or 6 - Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. More info here: http://www.linuxfoundation.org/collaborate/workgroups/networking/bonding Cleanup Script You will also want to cleanup the bonding script after exit or when you need to: cleanup.sh #!/bin/bash ip addr del 10.10.0.1/32 dev lo ip addr del 10.10.10.1/24 dev tap1 ip addr del 10.10.11.1/24 dev tap0 killall -9 openvpn rmmod bonding rmmod tap Client Configuration Configuring the modems, vpns, bonding, forwarding, to connect adn route to the vpn server. USB Drive/Modem CD Rom Eject I have some novatel wireless usb modems. They have built in mini sd card holders and emulated cdrom drives on them for drivers. To get them to work in linux or bsd you need to eject the drive. The first step is to disble some settings for the usb devices in windows. You cannot get around it. I had to disable "Enable Removable Disk" and Enable CD- ROM Disk in my software card manager that I installed in windows. (VZAccess Manager) You would think that disabling the drive would disable it all the way. It does not. You have to make the OS eject it on plugin. The next step is to get the OS to eject the CD drive: After you plug the device in edit /etc/udev/70-persistent-cd.rules find your device (Novatel_Mass_Storage) and add: , RUN+="/usr/bin/eject %k" You will have to do this for each of these type of modems. Testing Modem with wvdial I used wvdial to test the modem. It looks like pppd accepts .chat scripts too. Here is my wvdial conf script: /etc/wvdial.conf [Dialer Defaults] Init1 = ATZ #Init2 = ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 Init2 = ATQ V1 E1 S0=0 &C1 &D2 +FCLASS=0 Init3 - ATQ V1 E1 S0=0 &C1 &D2 +FCLASS=0 #? - Init5 = AT+CGDCONT=1,"IP","" Carrier Check = yes Dial Command = ATX1DT Modem Type = Analog Modem Baud = 460800 New PPPD = yes Modem = /dev/ttyUSB0 ISDN = 0 Phone = #777 Password = JustAnyOldPW Username = [email protected] Replace 5555555555 with your devices phone number. I cant remember what the no auth option is. It was actually working with any number...so... ppd and chat scripts We are going to use pppd to manage and connect to the modems. I used the commands: pppd updetach defaultroute usepeerdns noipdefault debug noauth asyncmap 0 ipcp-accept-local ipcp-accept-remote modem crtscts noauth connect '/usr/sbin/chat -t5 -v -e -E -f /etc/ppp/peers/vzw_chat' 100 460800 /dev/ttyUSB0 pppd updetach defaultroute usepeerdns noipdefault debug noauth asyncmap 0 ipcp-accept-local ipcp-accept-remote modem crtscts noauth connect '/usr/sbin/chat -t5 -v -e -E -f /etc/ppp/peers/vzw_chat' 100 460800 /dev/ttyUSB4 I put the command in a pppup.sh file along with an & char and they would not finish running. I have to look into it. This is the chat script I use for verizon: /etc/ppp/peers/vzw_chat ABORT BUSY ABORT 'NO CARRIER' ABORT ERROR REPORT CONNECT TIMEOUT 10 "" "ATZ" OK 'ATQ V1 E1 S0=0 &C1 &D2 +FCLASS=0' OK 'ATQ V1 E1 S0=0 &C1 &D2 +FCLASS=0' SAY "Dialing" TIMEOUT 30 OK "ATX1DT#777" CONNECT ' ' OpenVPN on the Client Install openvpn: aptitude install openvpn Disable automatic startup: /etc/init.d/openvpn stop update-rc.d openvpn disable You need your ta.key and client.p12 file from the server. Get them to the client. You need a client config for each modem: openvpnexampleclient.conf remote so.me.ip.add 55555 client dev tap1 proto udp ping 2 ping-restart 10 resolv-retry infinite cipher AES-256-CBC tls-client persist-key #persist-tun tun-mtu 1500 pkcs12 /etc/openvpn/thenameofyourcert.p12 tls-auth /etc/openvpn/ta.key 1 ns-cert-type server #comp-lzo verb 3 txqueuelen 10 no-replay Once again you will have to change the tap interface number and remote server port.