[DONE] Let's make the OpenVPN plugin update for OMV 5 happen

    • Offizieller Beitrag

    just openvpn (version 2.2.1-8 on my test vm) is what is in the control file

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • It would take some work but this package is way better. You get 2 licenses with it. So you only have to pay for more licenses if more then 2 ppl need to connect at once. The licenses are not expensive anyways.


    PS- I don't think the openvpn package in the debian repo even has a web interface.

    • Offizieller Beitrag

    I guess I thought the access server was just a web interface for the openvpn daemon but the package you used doesn't even have a dependency of openvpn... So, it either includes it or is something different.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

    • Offizieller Beitrag
    Zitat von "tekkbebe"

    It would take some work but this package is way better. You get 2 licenses with it. So you only have to pay for more licenses if more then 2 ppl need to connect at once. The licenses are not expensive anyways.


    Since it is a self contained package, it won't be any harder to make than half the other plugins that are basically an enable and link to the web interface (exactly like plex).

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • the service that is running the openvpn for it is called openvpnas.


    Dude, it is ez. Just work. I've used OpenVPN a lot but never the Access Server. It is far better. You are right on the plex comparison. I have the weird issues figured out already. Note my post on ssl v2.

    • Offizieller Beitrag

    must be different then...

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • After messing with this I'm stoked. I gotta get something to eat. I ttyl.


    Before I go...
    yes you can configure server settings.
    the admin user is: openvpn
    you need to set password before you try to login web interface
    passwd openvpn (then create pass)


    login to web interface https://ipofyouromv:943/admin


    in "server network setting" under protocol choose udp and use port 1194
    in "server network settings" you need to disable ssl v2 at the bottom.


    again the daemon runs as openvpnas.

  • openvpnAS not openvpnNAS IIRC.


    Greetings
    David

    "Well... lately this forum has become support for everything except omv" [...] "And is like someone is banning Google from their browsers"


    Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.

    Upload Logfile via WebGUI/CLI
    #openmediavault on freenode IRC | German & English | GMT+1
    Absolutely no Support via PM!

  • server certs location:
    /usr/local/openvpn_as/etc/web-ssl


    config location:
    /usr/local/openvpn_as/etc/as.conf



    There are certs for the server on install but I would not trust them. Should create new ones for your server. The client cert automatically created when the client has successfully authenticated against the pam server.


    Also, for the iframe you should use this:

    Code
    var link = 'https://' + location.hostname + ':943/admin';
    
    
    me.html = "<iframe src='" + link + "' width='100%' height='100%' />";
            me.callParent(arguments);



    The webmanagement page automantically binds to ipofyouromv. So it is similar to plex but https


    That ssl v2 issue makes me think that shellinabox by default is allowing ssl v2. Maybe it can be disabled in the config.

  • Zitat von "tekkbebe"

    My first impressions of this script are not good. Can someone that has installed it give me output of this:


    iptables -L



    The output for iptables -L is:


    Code
    Chain INPUT (policy ACCEPT)
    target     prot opt source               destination         
    
    
    Chain FORWARD (policy ACCEPT)
    target     prot opt source               destination         
    
    
    Chain OUTPUT (policy ACCEPT)
    target     prot opt source               destination


    Another test: I have also a OpenVPN server installed like a OpenVZ container into mi PROXMOX VE 3.1 and i havent any problems with licences. I don´t understand the upper posts.

  • We have a new Plugin Developer which probably will enable/enhance the docker support for OpenMediaVault. The Docker implementation allows it to easily manage Linux Containers. Those Containers can hold one service/process each in an encapsulated environment, where this environment can have independet libs (from the Host system) for this services.


    Greetings
    David

    "Well... lately this forum has become support for everything except omv" [...] "And is like someone is banning Google from their browsers"


    Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.

    Upload Logfile via WebGUI/CLI
    #openmediavault on freenode IRC | German & English | GMT+1
    Absolutely no Support via PM!

  • Forgot to mention:


    In the "Server Network Settings" you need to put in your wan ip of your OpenVPN Access server for the hostname. If you are using a dyndns server because of dynamic ip put the dyndns hostname here:



    Shows users connected, similar to status page on old plugin:




    Also ports 1194 and 943 need to be forwarded from your router to your omv.


    It's best Sub.... ;)


    PS- If you downloaded the client software (which includes the profile and certs) with the user's web-ui @ https://wanipofyouromv:943 before all settings are correct you will have to uninstall the client on your client machine. The wan ip to which the client connects is contained in a profile file that is downloaded with the client software. This client file has some sort of security on it now and you cannot edit it even with admin privileges on say wordpad. So any setting needed to be edited in the client profile can no longer be edited by the client users on the client machine. Must be added security feature.


    PPS- if you forget to turn off the multi daemon mode on the protocol section of the Server Network Settings above it will take out your https for the OMV web-gui as it is port 443 by default too. Also, almost all of us do not need the multi-daemon mode. This is for heavy vpn use by many users.

  • Zitat von "tekkbebe"

    My first impressions of this script are not good. Can someone that has installed it give me output of this:


    iptables -L


    See, the problem with this is that you're not saying what's wrong. It doesn't really help saying that something is not good without saying what parts and why. So, what's the problem with iptables and the script so we can rectify it?

  • The iptables was just to see the forwarding rules. There are a lot of reasons the Access Server is better.


    You can specify certain users to allow in seconds
    You can deny users if they are not in the list
    You can allow by group(s)
    Some people may need to change ports on certain items. Much faster in the admin interface
    You can change between routed and bridged vpn in 2 clicks
    You can revoke certs
    You can changer authentication methods
    etc., etc., etc......


    All this would be a pain in the ass with the script setup.

    • Offizieller Beitrag

    Try the plugin (plugin is beta). The groups and bridged vpn is the only things I think you can't do with the plugin. Maybe auth method too. Adding and removing users is very fast.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • I looked at the repo a day ago....


    I make it clear. You used the wrong package. The Access Server with the web interface is superior. That is the part that is wrong. A lot of code in the plugin can be elimated by this package.

  • Zitat von "ryecoaaron"

    Try the plugin (plugin is beta). The groups and bridged vpn is the only things I think you can't do with the plugin. Maybe auth method too. Adding and removing users is very fast.


    I do the procedure install and.....

    Code
    Reading package lists...
    Building dependency tree...


    forever....................


    Webgui hanged. System up & running. If reboot plugin is´nt into plugin list.


    Thanks for everybody

Jetzt mitmachen!

Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!