mirror of
https://github.com/opnsense/docs
synced 2024-11-05 06:00:36 +00:00
207 lines
7.6 KiB
ReStructuredText
207 lines
7.6 KiB
ReStructuredText
================
|
|
Stunnel
|
|
================
|
|
|
|
Stunnel in OPNsense can be used to forward tcp connections securely using TLS mutual authentication.
|
|
Although the application itself supports authentication based on pre-shared keys, our plugin only supports certificate based
|
|
authentication, which is more secure but comes with more (connect) overhead (https://www.stunnel.org/perf.html).
|
|
|
|
|
|
.. blockdiag::
|
|
:scale: 100%
|
|
|
|
blockdiag {
|
|
default_fontsize = 9;
|
|
node_width = 200;
|
|
node_height = 80;
|
|
default_group_color = "#def7ff";
|
|
client [shape = box, label="client\nlistens @ port 3128"];
|
|
stunnel_client [shape = beginpoint, label="stunnel\nclient"];
|
|
stunnel_server [shape = endpoint, label="stunnel\nserver"];
|
|
proxy [shape = box, label = "proxy server\n listening @3128"];
|
|
|
|
client -> stunnel_client;
|
|
stunnel_client -> stunnel_server [label = "tunnel"];
|
|
stunnel_server -> proxy;
|
|
|
|
group {
|
|
orientation = portrait
|
|
stunnel_client;
|
|
stunnel_server;
|
|
}
|
|
}
|
|
|
|
The above diagram shows the basic functionality as provided by this plugin, the client part (not delivered by this plugin) connects to
|
|
to the server at a predefined port and starts forwarding local received packets to the other end of the tunnel.
|
|
|
|
Securing http proxy traffic is one of the more common use-cases of stunnel.
|
|
|
|
|
|
Prerequisites
|
|
------------------------
|
|
|
|
Before setting up our new secured tunnel, we need to make sure we have a Certificate Authority available together
|
|
with certificates which can be used for both ends of the tunnel.
|
|
|
|
The simplest way to create a CA is to use an internal self signed one, which you can do in :menuselection:`System -> Trust -> Authorities`
|
|
, choose "Create an internal Certificate Authority" as method and fill in all the details.
|
|
|
|
When you have a CA available, you can create a certificate for the server (this machine) and the client.
|
|
Just go to :menuselection:`System -> Trust -> Certificates` and create an internal certificate, choose the right type
|
|
(server for this end of the tunnel) and select the created CA from the previous step.
|
|
The common name identifies both ends of the tunnel, you can choose a fully qualified domain name here for the server and
|
|
a username for the client (for example).
|
|
|
|
|
|
.. Note::
|
|
|
|
The example setup assumes a proxy server is already configured and functional.
|
|
|
|
.. Note::
|
|
|
|
The plugin itself can be installed using the :menuselection:`System --> Firmware --> Plugins` menu (search for :code:`stunnel`).
|
|
|
|
|
|
Configure the server
|
|
------------------------
|
|
|
|
To add a new tunnel, go to :menuselection:`VPN -> Stunnel -> Configuration` and click the [+] to add a new record.
|
|
|
|
:Listen address:
|
|
|
|
The address to listen on, we generally advice to use a loopback interface here and forward traffic to it using a :doc:`port forward <../nat>`.
|
|
Leave this default (127.0.0.1) for our example.
|
|
|
|
.. Note::
|
|
|
|
When choosing a non loopback interface, make sure to use a static one.
|
|
|
|
:Listen port:
|
|
|
|
The portnumber to listen on (where the stunnel client connects to).
|
|
For our example we choose :code:`31280` here.
|
|
|
|
:Target hostname:
|
|
|
|
The hostname or ip number of the service to connect to, for this example the internal ip address of the proxy server.
|
|
|
|
:Target port:
|
|
|
|
Port the service uses, in this case it would be :code:`3128` (the default squid proxy port)
|
|
|
|
:Certificate:
|
|
|
|
This servers certificate, select the one created for the server in the prerequisites.
|
|
|
|
:CA to validate connections to:
|
|
|
|
Certificate authority to use, this stunnel will only accept connections which use a certificate issued by the same CA.
|
|
|
|
:enable CRL:
|
|
|
|
Enable certificate revocation lists, when selected a CRL with the format XXXXXXXX.r0 is required in the (:code:`/var/run/stunnel/certs/`) directory.
|
|
If certificates are managed from this machine, all attached CRLs will be generated automatically.
|
|
For more information about this option, see CRLpath in stunnels manual.
|
|
|
|
|
|
.. Warning::
|
|
|
|
If configured and a valid CRL is not available, all connections will be denied.
|
|
Additions may need a restart of stunnel (when the certificate was already used).
|
|
|
|
|
|
:Description:
|
|
|
|
Enter a user friendly description here to identify this tunnel, something like "corporate proxy"
|
|
|
|
|
|
.. Tip::
|
|
|
|
To forward traffic to the loopback address from your :code:`wan` interface, go to :menuselection:`Firewall -> NAT -> Port Forward`
|
|
and add a new rule with the following settings: Interface :code:`WAN`, Protocol :code:`TCP`, Destination :code:`WAN address`,
|
|
Destination port range :code:`31280`, Redirect target IP :code:`127.0.0.1` and Redirect target port :code:`31280`
|
|
|
|
|
|
.. Note::
|
|
|
|
For additional security you can enable :code:`chroot` mode in :menuselection:`VPN -> Stunnel -> General`, there is
|
|
however a downside in using this feature. If for some reason the system logging facility (syslog) is restarted, stunnel
|
|
will loose connection to that facility, causing a lack of visibilty afterwards.
|
|
|
|
|
|
Configure the client
|
|
------------------------
|
|
|
|
Before configuring the client, make sure to install `stunnel <https://www.stunnel.org/>`__ for your platform, download
|
|
the public key of your CA and the certificate created for this client.
|
|
|
|
|
|
::
|
|
|
|
[proxy]
|
|
client = yes
|
|
accept = 127.0.0.1:3128
|
|
connect = our.opnsense.address:31280
|
|
requireCert = yes
|
|
verifyChain = yes
|
|
cert = /path/to/client.pem
|
|
CAfile = /path/to/ca.pem
|
|
|
|
|
|
.. Note::
|
|
|
|
client.pem contains both the public and private key part of this clients certificate.
|
|
|
|
|
|
Test
|
|
-------------
|
|
|
|
When the tunnel connection is established, you should be able to connect to :code:`127.0.0.1:3128` on the connecting machine
|
|
using your browsers proxy settings.
|
|
|
|
|
|
|
|
Enable Identd
|
|
----------------------
|
|
|
|
Our stunnel plugin is packed with an additional service providing an `ident <https://en.wikipedia.org/wiki/Ident_protocol>`__ (RFC 1413) protocol
|
|
service.
|
|
This service depends on a custom `patch <https://github.com/opnsense/ports/commit/1b9d7b1416046357cd9b2187c038787b19f2a813>`__ we ship in stunnel, making sure authenticated TLS sessions are logged properly, so our
|
|
ident service can filter them to track a user that belongs to an stunnel session.
|
|
|
|
When a TLS session is authenticated, a log record like the one below will be send to syslog.
|
|
|
|
::
|
|
|
|
stunnel: LOG5[xxxxx]: IDENT Service [xx-xx-xx-xx-xx] from 127.0.0.2:11446 --> C=NL, ST=Zuid-Holland, L=Middelharnis, O=OPNsense, emailAddress=contact_at_domain, CN=test_client.opnsense.local
|
|
|
|
|
|
Our ident service interprets this as :code:`127.0.0.2` connected using source port :code:`11446` as :code:`test_client.opnsense.local` (only the CN part is returned)
|
|
|
|
|
|
.. Note::
|
|
|
|
Since our indent services binds to :code:`0.0.0.0:113` it's not compatible with other ident services likely using the same port,
|
|
it also highly advisable to deny access to this services from other hosts than the consumers of this service (which is usually the firewall itself).
|
|
|
|
|
|
This functionality can easily be validated using two telnet sessions, one from the stunnel client keeping a session open, the other connecting
|
|
to the same host using ident. The example log line above would result in the following request/response scenario:
|
|
|
|
|
|
::
|
|
|
|
# telnet 127.0.0.2 113
|
|
Trying 127.0.0.2...
|
|
Connected to OPNsense.localdomain.
|
|
Escape character is '^]'.
|
|
11446,3128
|
|
11446, 3128 : USERID : OTHER : test_client.opnsense.local
|
|
Connection closed by foreign host.
|
|
|
|
|
|
.. Note::
|
|
|
|
Please note the :code:`127.0.0.2` host is the same as the service connecting to was running on, using a different address
|
|
attached to the same firewall would result in a :code:`NO-USER` error.
|