• info@gonard.com.ar

OpenVPN Server y gestión de certificados en MikroTik

OpenVPN Server y gestión de certificados en MikroTik

Configurar OpenVPN Server y generar certificados

Cambia las variables debajo y pega el script

en la ventana de la terminal de MikroTik.

:global CN [/system identity get name]
:global COUNTRY “UA” :global STATE “KV”
:global LOC “Kyiv”
:global ORG “My organization”
:global OU “”
:global KEYSIZE “2048”

funciones

:global waitSec do={:return ($KEYSIZE * 10 / 1024)}

generar un certificado CA

/certificate add name=ca-template country=”$COUNTRY” state=”$STATE” locality=”$LOC” \
organization=”$ORG” unit=”$OU” common-name=”$CN” key-size=”$KEYSIZE” \
days-valid=3650 key-usage=crl-sign,key-cert-sign sign ca-template \
ca-crl-host=127.0.0.1 name=”$CN” :delay [$waitSec]

generar un certificado para el servidor

/certificate add name=server-template country=”$COUNTRY” state=”$STATE” locality=”$LOC” \
organization=”$ORG” unit=”$OU” common-name=”server@$CN” key-size=”$KEYSIZE” days-valid=3650 \
key-usage=digital-signature,key-encipherment,tls-server \
sign server-template ca=”$CN” name=”server@$CN” :delay [$waitSec]

crear cliente template

/certificate add name=client-template country=”$COUNTRY” state=”$STATE” locality=”$LOC” \
organization=”$ORG” unit=”$OU” common-name=”client” \
key-size=”$KEYSIZE” days-valid=3650 key-usage=tls-client

crear un pool IP

/ip pool add name=VPN-POOL ranges=192.168.252.128-192.168.252.224

agregar un perfil VPN

/ppp profile add dns-server=192.168.252.1 local-address=192.168.252.1 name=VPN-PROFILE \
remote-address=VPN-POOL use-encryption=yes

configurar servidor OpenVPN

/interface ovpn-server server set auth=sha1 certificate=”server@$CN” cipher=aes128,aes192,aes256 \
default-profile=VPN-PROFILE enabled=yes require-client-certificate=yes

agregar regla de firewall

/ip firewall filter add chain=input dst-port=1194 protocol=tcp comment=”Allow OpenVPN”

Agregar nuevo usuario

Agregar nuevo usuario y generar/exportar certs

cambiar variables abajo y pegar el script

dentro de la terminal de MikroTik

:global CN [/system identity get name]
:global USERNAME “user”
:global PASSWORD “password”

agregar un usuario

/ppp secret add name=$USERNAME password=$PASSWORD profile=VPN-PROFILE service=ovpn

generar un certificado cliente

/certificate add name=client-template-to-issue copy-from=”client-template” \
common-name=”$USERNAME@$CN” sign client-template-to-issue ca=”$CN” name=”$USERNAME@$CN” :delay 20

exportar el CA, el certificado cliente, y llave privada

/certificate export-certificate “$CN” export-passphrase=”” \
export-certificate “$USERNAME@$CN” export-passphrase=”$PASSWORD”

Configurar Cliente OpenVPN

  1. Copy the exported certificates from the MikroTik
    sftp admin@MikroTik_IP:cert_export_*

Also, you can download the certificates from the web interface. Go to WebFig → Files for this.

  1. Create user.auth file

The file auth.cfg holds your username/password combination.
On the first line must be the username and on the second line your password.

user
password
  1. Create OpenVPN config that named like USERNAME.ovpn: client dev tun proto tcp-client remote MikroTik_IP 1194 nobind persist-key persist-tun cipher AES-256-CBC auth SHA1 pull verb 2 mute 3

Create a file ‘user.auth’ with a username and a password

cat << EOF > user.auth

user

password

EOF

auth-user-pass user.auth

Copy the certificates from MikroTik and change

the filenames below if needed

ca cert_export_MikroTik.crt
cert cert_export_user@MikroTik.crt
key cert_export_user@MikroTik.key

Add routes to networks behind MikroTik

route 192.168.10.0 255.255.255.0

Try to connect

sudo openvpn USERNAME.ovpn

Desencriptar la clave privada para evitar la solicitud de contraseña

openssl rsa -passin pass:password -in cert_export_user@MikroTik.key -out cert_export_user@MikroTik.key

Borrar usuario y revocar el certificado

Borrar usuario y revocar el certificado

Cambia las variables debajo y pega el script

en la ventana de la terminal de MikroTik.

:global CN [/system identity get name] :global USERNAME “user”

borrar un usuario

/ppp secret remove [find name=$USERNAME profile=VPN-PROFILE]

revocar el certificado de un cliente

/certificate issued-revoke [find name=”$USERNAME@$CN”]

Revertir la configuración del servidor OpenVPN en MikroTik

Revertir configuracion OpenVPN

/ip pool remove [find name=VPN-POOL]
/ppp profile remove [find name=VPN-PROFILE]
/ip firewall filter remove [find comment=”Allow OpenVPN”]
/ppp secret remove [find profile=VPN-PROFILE]

/certificate

delete the certificates manually #

Fuente: https://gist.github.com/SmartFinn/8324a55a2020c56b267b#setup-openvpn-server-and-generate-certificates

Avatar
Administrador