You will need to open an SSH connection on your cloud server as the root user or an SSH connection to a user with sudo access. This guide assumes a user with sudo access. However you can set things up using root just by stripping the ‘sudo’ from the start of each command. If your system is running on Linux or Mac, you can use SSH with the Terminal program. If you are using Windows, you can use SSH with PuTTY. Once you have the Terminal opened, assuming you’re using a Linux/Mac system, you can login by typing the following command:
Enter the password when you’re asked to, and you’re ready to start setting up OpenVPN.
Install OpenVPN and generate necessary files
Before we start installing OpenVPN and its prerequisites, we should make sure all of the packages on our system are up to date. We can do that with the following command:
sudo apt-get update
This should have apt, Debian’s package manager. Download all the updates for any packages that have them.
sudo apt-get upgrade
After our system has downloaded all its updates, we can finally install OpenVPN.
sudo apt-get install openvpn udev
Once the installation is done, you are ready to begin configuring OpenVPN. To begin, you should copy all the files for encryption from their default directory into the directory they should be in for the cloud server to read them.
sudo cp -r /usr/share/doc/openvpn/examples/easy-rsa /etc/openvpn
Now that you’ve done that, you can begin generating the RSA algorithm files for your VPN. これらのキーを生成するときに、さまざまな値を指定するように求められます。 You can set these to whatever you would like to, but bear in mind that they will be included in the certificates you generate.
To begin, access into the following directory:
Then generate the RSA files:
After the certificate is generated, you can make the private key for the server. これを行うには、次のコマンドを入力し、「server」をOpenVPNサーバーの名前に変更します。 This script will also ask you for information.
sudo . /etc/openvpn/easy-rsa/2.0/build-key-server server
Generate the Diffie Hellman key exchange parameters.
sudo . /etc/openvpn/easy-rsa/2.0/build-dh
Now generate the keys for each client this installation of OpenVPN will host. You should do this step for each client this installation will host, making sure each client’s key identifier is unique.
sudo . /etc/openvpn/easy-rsa/2.0/build-key client
Move the files for the server certificates and keys to the /etc/openvpn directory now. Replace server.crt and server.key with the file names that you used.
sudo cp /etc/openvpn/easy-rsa/2.0/keys/ca.crt /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/ca.key /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/server.crt /etc/openvpn
sudo cp /etc/openvpn/easy-rsa/2.0/keys/server.key /etc/openvpn
If you need to remove someone’s access to the VPN, just send the following two commands. Replacing ‘client’ with the name of the client to be removed.
sudo . /etc/openvpn/easy-rsa/2.0/vars sudo . /etc/openvpn/easy-rsa/2.0/revoke-full client1
Now that you have generated the files for our configuration, you can go ahead and configure your OpenVPN server and client. To retrieve the files, execute the following commands:
sudo gunzip -d /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf /etc/openvpn
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf ~/
You should modify the client configuration file to match what you’d like it to do. 次のファイルのいくつかの値を変更して、必要な値に一致させることもできます。 これを行うには、最初に「リモート」オプションを変更して、OpenVPNを実行するように構成したポートのクラウドサーバーのIPアドレスに接続できるようにします。 次に、「cert」と「key」の値を変更して、独自の証明書とキーの名前を反映させます。 After these values have been edited you can save the file by typing in Ctrl+X, type ‘y’, then hit Enter.
Now copy the client configuration file, along with the client keys and certificates located in /etc/openvpn/easy-rsa/2.0/keys to the local machines of the clients.
After you’ve done this, you just need to make a few changes to your server configuration file before we finalize. Change the files that the ‘cert’ and ‘key’ options point to in the following file to match the certificate and key that your server is using.
sudo nano /etc/openvpn/server.conf
After that’s finished, you’re ready to go! Just restart OpenVPN and you’ve got a working OpenVPN installation on Debian 6!
sudo /etc/init.d/openvpn restart