Multiple additions and fixes #5
- Multi stage build - Download and checks Unbound Root anchors - Download and build malicious hostnames block list for Unbound - Healthcheck only based on the current IP being different from the initial IP - IPv6 related completely removed - Multiple checks at launch with $? - Launch openvpn as root (can't change user) - Unbound configured with DNS SEC for DNS over TLS
This commit is contained in:
@@ -19,14 +19,30 @@ do
|
||||
done
|
||||
printf "\nTUN device is opened"
|
||||
|
||||
############################################
|
||||
# BLOCKING MALICIOUS HOSTS WITH UNBOUND
|
||||
############################################
|
||||
touch /etc/unbound/blocks-malicious.conf
|
||||
printf "\nUnbound malicious hosts blocking is $BLOCK_MALICIOUS"
|
||||
if [[ "$BLOCK_MALICIOUS" == "on" ]]; then
|
||||
printf "\nExtracting blocks-malicious.conf.bz2..."
|
||||
tar -xjf /etc/unbound/blocks-malicious.conf.bz2 -C /etc/unbound/
|
||||
rm /etc/unbound/blocks-malicious.conf.bz2
|
||||
printf "DONE"
|
||||
fi
|
||||
|
||||
############################################
|
||||
# SETTING DNS OVER TLS TO 1.1.1.1 / 1.0.0.1
|
||||
############################################
|
||||
printf "\nLaunching Unbound daemon to connect to Cloudflare DNS 1.1.1.1 at its TLS endpoint..."
|
||||
unbound
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "DONE"
|
||||
printf "\nChanging DNS to localhost..."
|
||||
echo "nameserver 127.0.0.1" > /etc/resolv.conf
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
echo "options ndots:0" >> /etc/resolv.conf
|
||||
printf "DONE"
|
||||
|
||||
@@ -35,6 +51,8 @@ printf "DONE"
|
||||
############################################
|
||||
printf "\nGetting non VPN public IP address..."
|
||||
export INITIAL_IP=$(wget -qqO- 'https://duckduckgo.com/?q=what+is+my+ip' | grep -ow 'Your IP address is [0-9.]*[0-9]' | grep -ow '[0-9][0-9.]*')
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "$INITIAL_IP"
|
||||
|
||||
############################################
|
||||
@@ -43,15 +61,23 @@ printf "$INITIAL_IP"
|
||||
printf "\nSetting firewall for killswitch purposes..."
|
||||
printf "\n * Detecting local subnet..."
|
||||
SUBNET=$(ip route show default | tail -n 1 | awk '// {print $1}')
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "$SUBNET"
|
||||
printf "\n * Reading parameters to be used for region $REGION, protocol $PROTOCOL and encryption $ENCRYPTION..."
|
||||
CONNECTIONSTRING=$(grep -i "/openvpn-$PROTOCOL-$ENCRYPTION/$REGION.ovpn" -e 'privateinternetaccess.com')
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
PORT=$(echo $CONNECTIONSTRING | cut -d' ' -f3)
|
||||
if [[ "$PORT" == "" ]]; then printf "Port could not be extracted from configuration file\n"; exit 1; fi
|
||||
PIADOMAIN=$(echo $CONNECTIONSTRING | cut -d' ' -f2)
|
||||
if [[ "$PIADOMAIN" == "" ]]; then printf "Port could not be extracted from configuration file\n"; exit 1; fi
|
||||
printf "\n * Port: $PORT"
|
||||
printf "\n * Domain: $PIADOMAIN"
|
||||
printf "\n * Detecting IP addresses corresponding to $PIADOMAIN..."
|
||||
VPNIPS=$(nslookup $PIADOMAIN localhost | tail -n +5 | grep -o '[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}')
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
VPNIPSLENGTH=0
|
||||
for ip in $VPNIPS
|
||||
do
|
||||
@@ -60,47 +86,39 @@ do
|
||||
done
|
||||
printf "\n * Deleting all iptables rules..."
|
||||
iptables --flush
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
iptables --delete-chain
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
iptables -t nat --flush
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
iptables -t nat --delete-chain
|
||||
ip6tables --flush
|
||||
ip6tables --delete-chain
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "DONE"
|
||||
iptables -F OUTPUT
|
||||
iptables -P OUTPUT DROP
|
||||
ip6tables -F OUTPUT 2>/dev/null
|
||||
ip6tables -P OUTPUT DROP 2>/dev/null
|
||||
printf "\n * Adding rules to accept local loopback traffic..."
|
||||
iptables -A OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
|
||||
iptables -A OUTPUT -o lo -j ACCEPT
|
||||
ip6tables -A OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT 2>/dev/null
|
||||
ip6tables -A OUTPUT -o lo -j ACCEPT 2>/dev/null
|
||||
printf "DONE"
|
||||
printf "\n * Adding rules to accept traffic of subnet $SUBNET..."
|
||||
iptables -A OUTPUT -d $SUBNET -j ACCEPT
|
||||
ip6tables -A OUTPUT -d $SUBNET -j ACCEPT 2>/dev/null
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "DONE"
|
||||
for ip in $VPNIPS
|
||||
do
|
||||
printf "\n * Adding rules to accept traffic with $ip on port $PROTOCOL $PORT..."
|
||||
iptables -A OUTPUT -j ACCEPT -d $ip -o eth0 -p $PROTOCOL -m $PROTOCOL --dport $PORT
|
||||
ip6tables -A OUTPUT -j ACCEPT -d $ip -o eth0 -p $PROTOCOL -m $PROTOCOL --dport $PORT 2>/dev/null
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
printf "DONE"
|
||||
done
|
||||
printf "\n * Adding rules to accept traffic going through the tun device..."
|
||||
iptables -A OUTPUT -o tun0 -j ACCEPT
|
||||
ip6tables -A OUTPUT -o tun0 -j ACCEPT 2>/dev/null
|
||||
printf "DONE"
|
||||
#printf "\n * Allowing outgoing DNS queries on port 53 UDP..."
|
||||
#iptables -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
|
||||
#ip6tables -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT 2>/dev/null
|
||||
#printf "DONE"
|
||||
|
||||
############################################
|
||||
# USE NON-ROOT USER
|
||||
############################################
|
||||
printf "\nSwitching from root to nonrootuser..."
|
||||
su -l nonrootuser
|
||||
printf "DONE"
|
||||
|
||||
############################################
|
||||
@@ -112,7 +130,10 @@ PREVIOUSIP=$PIADOMAIN
|
||||
while [ $failed != 0 ]
|
||||
do
|
||||
VPNIP=$(echo $VPNIPS | cut -d' ' -f$i)
|
||||
printf "\nChanging server VPN address $PREVIOUSIP to $VPNIP..."
|
||||
sed -i "s/$PREVIOUSIP/$VPNIP/g" $REGION.ovpn
|
||||
status=$?
|
||||
if [[ "$status" != 0 ]]; then printf "ERROR with status code $status\nSleeping for 10 seconds before exit...\n"; sleep 10; exit $status; fi
|
||||
PREVIOUSIP=$VPNIP
|
||||
printf "\nStarting OpenVPN using the following parameters:"
|
||||
printf "\n * Region: $REGION"
|
||||
@@ -122,12 +143,12 @@ do
|
||||
openvpn --config "$REGION.ovpn" --auth-user-pass /auth.conf
|
||||
failed=$?
|
||||
if [[ $failed != 0 ]]; then
|
||||
echo "==> Openvpn failed with error code: $failed"
|
||||
printf "\n==> Openvpn failed with status code: $failed"
|
||||
i=$((i+1))
|
||||
if [[ $i -gt $VPNIPSLENGTH ]]; then
|
||||
i=0
|
||||
fi
|
||||
else
|
||||
echo "==> Openvpn stopped cleanly"
|
||||
printf "\n==> Openvpn stopped gracefully"
|
||||
fi
|
||||
done
|
||||
|
||||
Reference in New Issue
Block a user