Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/sh
- aptitude install ddclient
- aptitude install openvpn
- ln -s /usr/share/doc/openvpn/examples/sample-keys /etc/openvpn/amazon
- tee /etc/openvpn/amazon.conf <<EOF
- dev tun0
- proto tcp-server
- port 5555
- ifconfig 10.1.0.1 10.1.0.2
- tls-server
- dh amazon/dh1024.pem
- ca amazon/ca.crt
- cert amazon/server.crt
- key amazon/server.key
- persist-tun
- persist-key
- comp-lzo
- EOF
- echo -n '#!/bin/sh\n/usr/sbin/openvpn --mktun --dev tun0' > /etc/network/if-pre-up.d/openvpn
- chmod +x /etc/network/if-pre-up.d/openvpn
- /etc/network/if-pre-up.d/openvpn
- echo -n '#!/bin/sh\n/usr/sbin/openvpn --rmtun --dev tun0' > /etc/network/if-post-down.d/openvpn
- chmod +x /etc/network/if-post-down.d/openvpn
- tee /etc/network/if-up.d/nat <<EOF
- #!/bin/sh
- iptables -t nat -F
- iptables -t nat -Z
- iptables -t filter -F
- iptables -t filter -Z
- iptables -P FORWARD ACCEPT
- iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
- EOF
- chmod +x /etc/network/if-up.d/nat
- /etc/network/if-up.d/nat
- sysctl net.ipv4.ip_forward=1
- sed -i s/#net.ipv4.ip_forward/net.ipv4.ip_forward/ /etc/sysctl.conf
- service openvpn start
- myhost=`cat /etc/ddclient.conf | tail -n 1`
- cat <<EOF
- ====YOUR CLIENT CONFIG====
- dev tun
- daemon
- tls-client
- remote $myhost
- proto tcp-client
- port 5555
- comp-lzo
- ifconfig 10.1.0.2 10.1.0.1
- route 64.95.61.0 255.255.255.0
- route 64.94.123.0 255.255.255.0
- route 208.85.40.0 255.255.255.0
- route 208.85.41.0 255.255.255.0
- route 67.225.0.0 255.255.0.0
- dh /usr/share/doc/openvpn/examples/sample-keys/dh1024.pem
- ca /usr/share/doc/openvpn/examples/sample-keys/ca.crt
- cert /usr/share/doc/openvpn/examples/sample-keys/client.crt
- key /usr/share/doc/openvpn/examples/sample-keys/client.key
- EOF
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement