NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
arpanj2
Nov 14, 2014Tutor
Installing and running OpenVPN @ boot - PrivateInternetAcces
Hi All,
I have been trying to install OpenVPN and use PrivateInternetAccess (PIA) as my VPN Server on my ReadyNAS for a while now - my prime usecase was that I wanted all the connection to be encrypted while exposing it to external world (like sharing files right out of my NAS or torrent). The following are the steps which worked for me and my NAS is always on VPN now.
1. Enable SSH by going into System -> Settings in your WebView
PS: This may cause problem with Netgear support - so do @ your own risk. However, I am not modifying anything with system and it looks safe to me.
2. Download Putty from link below
3. Go to command prompt, navigate to the directory where you placed putty. Once in the directory, execute the following command
4. You will see a terminal window open up asking for your login. enter your login info that you use to access your NAS from webbrowser
5. Now enter the following command on the terminal prompt
6. This will install OpenVPN. Now, you need to get the VPN config files from PIA. Use the following commands below to navigate the OpenVPN directory and get the files
7. Extract the files using unzip command. If you dont have the program, use apt-get command as above (replace openvpn with unzip)
8. Now, create a file - say userpass.file and type username on first line and password on the second line and save it. To save a file, press Esc and type :wq (including the colon) and press enter
9. Chose one of the .ovpn file - for this eg, I chose France.ovpn and edit it. When you open it using the vi command, there will be a line auth-user-pass. Change it to auth-user-pass userpass.file and save the file as mentioned above.
10. at this time, you are all set to create a VPN connection. However, the issue is that now you need to always activate it manually. So, now we will create a startup file which runs automatically everytime you boot your NAS. Use the following commands to create a new file called startvpn.sh - you can name whatever you want
11. Now type the following lines and save the file
12. Once saved, you need to make the script executable. Use the command below for the same
13. Now, you need to add this script to run at everyboot. To do so, you need to add the following command in crontab file. Open the crontab file using command
13a. You can also use the following command to add this command to startup
14. Now you need to see if the VPN has started. To do so, type ifconfig on the command line and you will see a new connection starting with a config similar to below
This means your vpn is running perfectly and you added another layer of security.
Please let me know if this worked for you - i am not a Linux expert but will try to answer any questions you may have
Linux experts - comment/add anything to make it better.
Thanks,
Arpan
I have been trying to install OpenVPN and use PrivateInternetAccess (PIA) as my VPN Server on my ReadyNAS for a while now - my prime usecase was that I wanted all the connection to be encrypted while exposing it to external world (like sharing files right out of my NAS or torrent). The following are the steps which worked for me and my NAS is always on VPN now.
1. Enable SSH by going into System -> Settings in your WebView
PS: This may cause problem with Netgear support - so do @ your own risk. However, I am not modifying anything with system and it looks safe to me.
2. Download Putty from link below
http://the.earth.li/~sgtatham/putty/0.63/x86/putty.exe
3. Go to command prompt, navigate to the directory where you placed putty. Once in the directory, execute the following command
putty <NAS Address>
4. You will see a terminal window open up asking for your login. enter your login info that you use to access your NAS from webbrowser
5. Now enter the following command on the terminal prompt
apt-get install openvpn
6. This will install OpenVPN. Now, you need to get the VPN config files from PIA. Use the following commands below to navigate the OpenVPN directory and get the files
cd /etc/openvpn
wget https://www.privateinternetaccess.com/openvpn/openvpn.zip
7. Extract the files using unzip command. If you dont have the program, use apt-get command as above (replace openvpn with unzip)
unzip openvpn.zip
8. Now, create a file - say userpass.file and type username on first line and password on the second line and save it. To save a file, press Esc and type :wq (including the colon) and press enter
vi userpass.file
9. Chose one of the .ovpn file - for this eg, I chose France.ovpn and edit it. When you open it using the vi command, there will be a line auth-user-pass. Change it to auth-user-pass userpass.file and save the file as mentioned above.
vi France.ovpn
10. at this time, you are all set to create a VPN connection. However, the issue is that now you need to always activate it manually. So, now we will create a startup file which runs automatically everytime you boot your NAS. Use the following commands to create a new file called startvpn.sh - you can name whatever you want
cd /etc/init.d
vi startvpn.sh
11. Now type the following lines and save the file
#!/bin/bash
cd /etc/openvpn
openvpn France.ovpn
12. Once saved, you need to make the script executable. Use the command below for the same
chmod +x startvpn.sh
13. Now, you need to add this script to run at everyboot. To do so, you need to add the following command in crontab file. Open the crontab file using command
crontab -eand then add the following line anywhere in the file
@reboot ./etc/init.d/startvpn.sh &. Save it using the Esc -> :wq!
13a. You can also use the following command to add this command to startup
update-rc.d startvpn.sh defaults
14. Now you need to see if the VPN has started. To do so, type ifconfig on the command line and you will see a new connection starting with a config similar to below
tun0-00 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
This means your vpn is running perfectly and you added another layer of security.
Please let me know if this worked for you - i am not a Linux expert but will try to answer any questions you may have
Linux experts - comment/add anything to make it better.
Thanks,
Arpan
Thanks to arpanj2 for starting the thread. I've found there are better and easier ways to do a few things which may have saved people some frustration. I hope this helps! If anyone wants to merge my suggestions with the original to create a definitive post, they're most welcome. Here are my changes:
Step 5: It's probably a good idea to retrieve new lists of packages so that you fetch the latest version of openvpn:
# apt-get update
... # apt-get install openvpnIf you want an easier to use text editor, now is a good time to install nano:
# apt-get install nano
Step 8: If you installed nano, you probably want to use it:
# nano userpass.file
...Step 9 is where I depart a bit; I prefer to keep the unzipped PIA .ovpn files unmodified. Instead, I create a copy of my preferred PIA site then edit it as directed:
# cp France.ovpn My.ovpn
...Or, if you like one-liners:
# sed s/"auth-user-pass"/"auth-user-pass userpass.file"/ France.ovpn > My.ovpn
Steps 10 through 13a: There is no need to create a script or a cron job!!!
New Step 10: Let's now test our config file by running OpenVPN in the background:
# openvpn My.ovpn &
You'll see console output which looks something like this:
[1] 6938
root@hostname:/etc/openvpn# Sun Nov 1 01:26:49 2015 OpenVPN 2.2.1 arm-linux-gnueabi [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Sun Nov 1 01:26:49 2015 WARNING: file 'userpass.file' is group or others accessible
Sun Nov 1 01:26:49 2015 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sun Nov 1 01:26:49 2015 LZO compression initialized
Sun Nov 1 01:26:49 2015 RESOLVE: NOTE: france.privateinternetaccess.com resolves to 13 addresses
Sun Nov 1 01:26:49 2015 UDPv4 link local: [undef]
Sun Nov 1 01:26:49 2015 UDPv4 link remote: [AF_INET]108.61.122.156:1194
Sun Nov 1 01:26:49 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Nov 1 01:26:51 2015 [Private_Internet_Access] Peer Connection Initiated with [AF_INET]108.61.122.156:1194
Sun Nov 1 01:26:53 2015 TUN/TAP device tun0 opened
Sun Nov 1 01:26:53 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
...
Sun Nov 1 01:26:53 2015 Initialization Sequence CompletedIt might look as though you don't have a prompt, but you do. Just hit enter a to get a fresh one.
New Step 11: Check the vpn is running with ifconfig:
# ifconfig
...and do whatever testing you need with your applications.
New Step 12: Find the job you created earlier and send it a TERM signal with the kill command:
root@hostname:/etc/openvpn# jobs [1]+ Running openvpn My.ovpn & root@hostname:/etc/openvpn# kill -term %1 Sun Nov 1 02:23:54 2015 event_wait : Interrupted system call (code=4) root@hostname:/etc/openvpn# Sun Nov 1 02:23:54 2015 /sbin/ifconfig tun0 0.0.0.0 Sun Nov 1 02:23:54 2015 SIGTERM[hard,] received, process exiting [1]+ Done openvpn My.ovpn root@hostname:/etc/openvpn#
New Step 13: Once you're happy with your configuration file, rename it to something ending in '.conf':
# mv My.ovpn client.conf
New Step 14: Start the OpenVPN init script:
# /etc/init.d/openvpn start
[ ok ] Starting openvpn (via systemctl): openvpn.service.That's it, you're done! As installed by default on my RN104, the OpenVPN init script looks for .conf files in the default /etc/openvpn directory where we unzipped the PIA files and did everything else. The OpenVPN init script is also set by default to start with the other services at runlevels 2-5. This means the init script will start a connection using your .conf file when the system reboots.
If you're like me, and prefer to access your ReadyNAS from the outside world using port forwarding configured on a router, you'll notice that turning on OpenVPN breaks remote access. I'll write another reply soon with directions on how to configure IP rules and routes on your ReadyNAS so that your port forwarding setup will function properly.
Until then, TTFN!
36 Replies
Replies have been turned off for this discussion
- nasischijfAspirantI may try this one day, thanks for the effort!
- dsm1212ApprenticeFor an even more advanced config there are a nice couple of blog articles at the link below about how to set things up so that the vpn is only used for selected services. The article describes how to set up utorrent. These instructions worked fine for me under OS6 but you really should be familiar with what is being done because you could bollix your network on boot. You can use the same approach to set up other services that support bind. For example, I set up a http proxy server that uses only the vpn link. This allows me to create a tunnel via ssh/putty to the nas and use the vpn connection from firefox on another system.
http://blog.darkgreenmeme.com/2014/05/b ... art-1.html
steve - I've been looking for this for a long time. Couple questions before I jump on PIA
How's your speed Externally?
How's your internal speed? Any issues accessing it locally? By doing this, how does it change the way you access the RN locally? - FilthyAmatuerAspirantHi apanj2, thanks for the info. However I am still having problems getting OpenVPN to work, when I try to start the service I get:
root@NAShome:/etc/init.d# service startvpn.sh start
Fri Jan 9 13:09:03 2015 OpenVPN 2.2.1 arm-linux-gnueabi [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jan 9 13:09:03 2015 WARNING: file 'pass.txt' is group or others accessible
Fri Jan 9 13:09:03 2015 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Fri Jan 9 13:09:03 2015 LZO compression initialized
Fri Jan 9 13:09:03 2015 RESOLVE: NOTE: nl.privateinternetaccess.com resolves to 4 addresses
Fri Jan 9 13:09:03 2015 UDPv4 link local: [undef]
Fri Jan 9 13:09:03 2015 UDPv4 link remote: [AF_INET]109.201.135.220:1194
Fri Jan 9 13:09:08 2015 [Private_Internet_Access] Peer Connection Initiated with [AF_INET]109.201.135.220:1194
Fri Jan 9 13:09:10 2015 AUTH: Received AUTH_FAILED control message
Fri Jan 9 13:09:10 2015 SIGTERM[soft,auth-failure] received, process exiting
root@NAShome:/etc/init.d# AUTH: Received AUTH_FAILED control message
-bash: AUTH:: command not found
root@NAShome:/etc/init.d# Fri Jan 9 13:09:10 2015 SIGTERM[soft,auth-failure] received, process exiting
Any advice would be much appreciated. Thanks in advance? - arpanj2Tutor
dannieboiz wrote: I've been looking for this for a long time. Couple questions before I jump on PIA
How's your speed Externally?
How's your internal speed? Any issues accessing it locally? By doing this, how does it change the way you access the RN locally?
The speed has been fine for me but again I am on 105Mbps connection, so I don't feel the pinch. I have seen torrents go as high as earlier (maybe slight downside maybe because I am using a French server while in US?)
As for local access, nothing changes - I am getting the same speed and able to access the server over LAN without any extra config. Infact, readycloud works without a glitch too over internet (when I am outside home)FilthyAmatuer wrote: Hi apanj2, thanks for the info. However I am still having problems getting OpenVPN to work, when I try to start the service I get:
root@NAShome:/etc/init.d# service startvpn.sh start
Fri Jan 9 13:09:03 2015 OpenVPN 2.2.1 arm-linux-gnueabi [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jan 9 13:09:03 2015 WARNING: file 'pass.txt' is group or others accessible
Fri Jan 9 13:09:03 2015 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Fri Jan 9 13:09:03 2015 LZO compression initialized
Fri Jan 9 13:09:03 2015 RESOLVE: NOTE: nl.privateinternetaccess.com resolves to 4 addresses
Fri Jan 9 13:09:03 2015 UDPv4 link local: [undef]
Fri Jan 9 13:09:03 2015 UDPv4 link remote: [AF_INET]109.201.135.220:1194
Fri Jan 9 13:09:08 2015 [Private_Internet_Access] Peer Connection Initiated with [AF_INET]109.201.135.220:1194
Fri Jan 9 13:09:10 2015 AUTH: Received AUTH_FAILED control message
Fri Jan 9 13:09:10 2015 SIGTERM[soft,auth-failure] received, process exiting
root@NAShome:/etc/init.d# AUTH: Received AUTH_FAILED control message
-bash: AUTH:: command not found
root@NAShome:/etc/init.d# Fri Jan 9 13:09:10 2015 SIGTERM[soft,auth-failure] received, process exiting
Any advice would be much appreciated. Thanks in advance?
From what I am seeing, your username and/or password looks wrong. I am not a Linux Guru, so if that doesnt help, would be better to ask help in the forum.
The format for userpass file is username on first line and password on the second line. Just to check if the server is running, just type the following command in command prompt - I would strongly suggest creating a file in Linux and not on windows and then transfer.
Navigate to the directorycd /etc/openvpn
and then type (my file is France.ovpn)openvpn France.ovpn - FilthyAmatuerAspirantThanks for the feedback, I originally setup my passfile as you instructed using putty, but saw someone else had success with a .txt file. I picked the netherlands connection over france because it looked to be faster on PIA website bandwidth speed. Normally in windows I connect to California USA, because I am in Australia, USA and Asia are much faster than Europe. I will let you know how I go tomorrow.
Once again thanks for your help. - FilthyAmatuerAspirantomfg... the time I have wasted on this... I fked up big time... I changed my password, but ahh, was using the default password in the userpass.file. I litterally spent like a whole day on this. Thanks for your help.
- arpanj2Tutor
FilthyAmatuer wrote: omfg... the time I have wasted on this... I fked up big time... I changed my password, but ahh, was using the default password in the userpass.file. I litterally spent like a whole day on this. Thanks for your help.
hah! Sh*t happens - Glad it worked out well for you! Have fun! - FilthyAmatuerAspirantOnly problem now is getting openvpn to boot when the NAS starts. I can get it to run, by using the command
service startvpn.sh start
But it doesnt seem to begin when the NAS boots. Any ideas? - FilthyAmatuerAspirantmy startvpn.sh reads
### BEGIN INIT INFO
# Provides: Openvpn
# Required-Start: $network
# Required-Stop: $network
# Default-Start: 3 5
# Default-Stop: 0 1 2 6
#Short-Description: This shell script takes care of starting and stopping OpenV$
#Description: OpenVPN is a robush highly flexible tunneling application that us$
### END INIT INFO
#!/bin/bash
cd /etc/openvpn
openvpn Japan.ovpn
When I typeupdate-rc.d startvpn.sh defaults
I get errors saying the start and stop values dont match up.update-rc.d: warning: default start runlevel arguments (2 3 4 5) do not match startvpn.sh Default-Start values (3 5)
update-rc.d: warning: default stop runlevel arguments (0 1 6) do not match startvpn.sh Default-Stop values (0 1 2 6)
Any help would again be appreciated. My crontab file reads exactly the same as yours. Cheers.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!