algo/docs/deploy-from-ansible.md
TC1977 45aa0065cd Documentation updates (#1607)
* update variable name to store_pki

* Document BetweenClients_DROP

* Update README.md

* Update faq.md

* VPN On Demand is for Apple IPSEC clients only

* How to update users from cloud-init

* How to monitor user activity

* Fix typo

* Update FAQ about WireGuard, fix typos

* Correct locations of install log and user configs

* Update-users from cloud-init

* Update features list

* More "IPsec" and "WireGuard" changes

* fixed broken link/absent link in FAQ

* Python version README fix for #1622

* road warrior instructions

* Update index.md

* Reorganize config.cfg

As per @davidemyers suggestions

* Further config changes

As per feedback, also better explanation of keys_clean_all

* Add road warrior instructions to FAQ

* Remove specific ports from RW instructions
2019-12-10 19:23:18 +01:00

9.9 KiB

Deployment from Ansible

Before you begin, make sure you have installed all the dependencies necessary for your operating system as described in the README.

You can deploy Algo non-interactively by running the Ansible playbooks directly with ansible-playbook.

ansible-playbook accepts variables via the -e or --extra-vars option. You can pass variables as space separated key=value pairs. Algo requires certain variables that are listed below. You can also use the --skip-tags option to skip certain parts of the install, such as iptables (overwrite iptables rules), ipsec (install strongSwan), wireguard (install Wireguard). We don't recommend using the -t option as it will only include the tagged portions of the deployment, and skip certain necessary roles (such as common).

Here is a full example for DigitalOcean:

ansible-playbook main.yml -e "provider=digitalocean
                                server_name=algo
                                ondemand_cellular=false
                                ondemand_wifi=false
                                dns_adblocking=true
                                ssh_tunneling=true
                                store_pki=true
                                region=ams3
                                do_token=token"

See below for more information about variables and roles.

Variables

  • provider - (Required) The provider to use. See possible values below
  • server_name - (Required) Server name. Default: algo
  • ondemand_cellular (Optional) Enables VPN On Demand when connected to cellular networks for iOS/macOS clients using IPsec. Default: false
  • ondemand_wifi - (Optional. See ondemand_wifi_exclude) Enables VPN On Demand when connected to WiFi networks for iOS/macOS clients using IPsec. Default: false
  • ondemand_wifi_exclude (Required if ondemand_wifi set) - WiFi networks to exclude from using the VPN. Comma-separated values
  • dns_adblocking - (Optional) Enables dnscrypt-proxy adblocking. Default: false
  • ssh_tunneling - (Optional) Enable SSH tunneling for each user. Default: false
  • store_pki - (Optional) Whether or not keep the CA key (required to add users in the future, but less secure). Default: false

If any of the above variables are unspecified, ansible will ask the user to input them.

Ansible roles

Cloud roles can be activated by specifying an extra variable provider.

Cloud roles:

Server roles:

  • role: strongswan
    • Installs strongSwan
    • Enables AppArmor, limits CPU and memory access, and drops user privileges
    • Builds a Certificate Authority (CA) with easy-rsa-ipsec and creates one client certificate per user
    • Bundles the appropriate certificates into Apple mobileconfig profiles for each user
  • role: dns_adblocking
    • Installs DNS encryption through dnscrypt-proxy with blacklists to be updated daily from adblock_lists in config.cfg - note this will occur even if dns_encryption in config.cfg is set to false
    • Constrains dnscrypt-proxy with AppArmor and cgroups CPU and memory limitations
  • role: ssh_tunneling
    • Adds a restricted algo group with no shell access and limited SSH forwarding options
    • Creates one limited, local account and an SSH public key for each user
  • role: wireguard
    • Installs a Wireguard server, with a startup script, and automatic checks for upgrades
    • Creates wireguard.conf files for Linux clients as well as QR codes for Apple/Android clients

Note: The strongswan role generates Apple profiles with On-Demand Wifi and Cellular if you pass the following variables:

  • ondemand_wifi: true
  • ondemand_wifi_exclude: HomeNet,OfficeWifi
  • ondemand_cellular: true

Local Installation

  • role: local, provider: local

This role is intended to be run for local install onto an Ubuntu server, or onto an unsupported cloud provider's Ubuntu instance. Required variables:

  • server - IP address of your server (or "localhost" if deploying to the local machine)
  • endpoint - public IP address of the server you're installing on
  • ssh_user - name of the SSH user you will use to install on the machine (passwordless login required). If server=localhost, this isn't required.
  • ca_password - Password for the private CA key

Note that by default, the iptables rules on your existing server will be overwritten. If you don't want to overwrite the iptables rules, you can use the --skip-tags iptables flag.

Digital Ocean

Required variables:

  • do_token
  • region

Possible options can be gathered calling to https://api.digitalocean.com/v2/regions

Amazon EC2

Required variables:

  • aws_access_key: AKIA...
  • aws_secret_key
  • region: e.g. us-east-1

Possible options can be gathered via cli aws ec2 describe-regions

Additional variables:

  • encrypted - Encrypted EBS boot volume. Boolean (Default: false)

Minimum required IAM permissions for deployment:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "PreDeployment",
            "Effect": "Allow",
            "Action": [
                "ec2:DescribeImages",
                "ec2:DescribeKeyPairs",
                "ec2:DescribeRegions",
                "ec2:ImportKeyPair",
                "ec2:CopyImage"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "DeployCloudFormationStack",
            "Effect": "Allow",
            "Action": [
                "cloudformation:CreateStack",
                "cloudformation:UpdateStack",
                "cloudformation:DescribeStacks",
                "cloudformation:DescribeStackEvents",
                "cloudformation:ListStackResources"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "CloudFormationEC2Access",
            "Effect": "Allow",
            "Action": [
                "ec2:CreateInternetGateway",
                "ec2:DescribeVpcs",
                "ec2:CreateVpc",
                "ec2:DescribeInternetGateways",
                "ec2:ModifyVpcAttribute",
                "ec2:createTags",
                "ec2:CreateSubnet",
                "ec2:Associate*",
                "ec2:CreateRouteTable",
                "ec2:AttachInternetGateway",
                "ec2:DescribeRouteTables",
                "ec2:DescribeSubnets",
                "ec2:ModifySubnetAttribute",
                "ec2:CreateRoute",
                "ec2:CreateSecurityGroup",
                "ec2:DescribeSecurityGroups",
                "ec2:AuthorizeSecurityGroupIngress",
                "ec2:RunInstances",
                "ec2:DescribeInstances",
                "ec2:AllocateAddress",
                "ec2:DescribeAddresses"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

Google Compute Engine

Required variables:

  • gce_credentials_file: e.g. /configs/gce.json if you use the GCE docs - can also be defined in environment as GCE_CREDENTIALS_FILE_PATH
  • region: e.g. useast-1

Vultr

Required variables:

Azure

Required variables:

  • azure_secret
  • azure_tenant
  • azure_client_id
  • azure_subscription_id
  • region

Lightsail

Required variables:

  • aws_access_key: AKIA...
  • aws_secret_key
  • region: e.g. us-east-1

Possible options can be gathered via cli aws lightsail get-regions

Minimum required IAM permissions for deployment:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "LightsailDeployment",
            "Effect": "Allow",
            "Action": [
                "lightsail:GetRegions",
                "lightsail:GetInstance",
                "lightsail:CreateInstances",
                "lightsail:OpenInstancePublicPorts"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

Scaleway

Required variables:

OpenStack

You need to source the rc file prior to run Algo. Download it from the OpenStack dashboard->Compute->API Access and source it in the shell (eg: source /tmp/dhc-openrc.sh)

CloudStack

Required variables:

  • cs_config: /path/to/.cloudstack.ini
  • cs_region: e.g. exoscale
  • cs_zones: e.g. ch-gva2

The first two can also be defined in your environment, using the variables CLOUDSTACK_CONFIG and CLOUDSTACK_REGION.

Hetzner

Required variables:

  • hcloud_token: Your API token - can also be defined in the environment as HCLOUD_TOKEN
  • region: e.g. nbg1

Update users

Playbook:

users.yml

Required variables:

  • server - IP or hostname to access the server via SSH
  • ca_password - Password to access the CA key

Tags required:

  • update-users