全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 22861|回复: 46

[翻译] 私藏小福利,pptp+l2tp 一键安装包 首发

[复制链接]
发表于 2012-3-19 08:48:10 | 显示全部楼层 |阅读模式
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2012-3-19 08:48:59 | 显示全部楼层
求VPN系统
发表于 2012-3-19 08:50:18 | 显示全部楼层
  1. #!/bin/bash
  2. clear
  3. if [ $(id -u) != "0" ]; then
  4.     printf "Error: You must be root to run this tool!\n"
  5.     exit 1
  6. fi

  7. host_ip=`ifconfig eth0 | awk '/inet addr/ {print $2}' | awk -F ':' '{print $2}'`
  8. cur_dir=`pwd`
  9. read -p "(Please input PSK: )" psk
  10. if [ "$psk" = "" ]; then
  11.         psk="fuck高墙"
  12. fi

  13. read -p "Enter vpn username: " username
  14. if [ "$username" = "" ];then
  15.         username="vpn"
  16. fi

  17. read -p "Enter vpn password: " userpsw
  18. if [ "$userpsw" = "" ];then
  19.         userpsw="vpn"
  20. fi

  21. clear
  22. get_char()
  23. {
  24. SAVEDSTTY=`stty -g`
  25. stty -echo
  26. stty cbreak
  27. dd if=/dev/tty bs=1 count=1 2> /dev/null
  28. stty -raw
  29. stty echo
  30. stty $SAVEDSTTY
  31. }
  32. echo ""
  33. echo "ServerIP:"
  34. echo "$host_ip"
  35. echo ""
  36. echo "PSK:"
  37. echo "$psk"
  38. echo ""
  39. echo "VPN Account:"
  40. echo "$username"
  41. echo ""
  42. echo "Account Password:"
  43. echo "$userpsw"
  44. echo ""
  45. echo "Press any key to start..."
  46. char=`get_char`
  47. clear

  48. yum -y update
  49. yum remove  -y pptpd ppp
  50. yum install -y make gcc gmp-devel bison flex libpcap-devel ppp lsof perl iptables
  51. yum install -y libpcap gcc-c++ logrotate tar cpio pam tcp_wrappers

  52. wget http://fastlnmp.googlecode.com/files/dkms-2.0.17.5-1.noarch.rpm
  53. wget http://fastlnmp.googlecode.com/files/kernel_ppp_mppe-1.0.2-3dkms.noarch.rpm
  54. wget http://fastlnmp.googlecode.com/files/pptpd-1.3.4-1.rhel5.1.i386.rpm

  55. rpm -ivh dkms-2.0.17.5-1.noarch.rpm
  56. rpm -ivh kernel_ppp_mppe-1.0.2-3dkms.noarch.rpm
  57. rpm -qa kernel_ppp_mppe
  58. rpm -ivh pptpd-1.3.4-1.rhel5.1.i386.rpm


  59. wget http://www.openswan.org/download/openswan-2.6.34.tar.gz
  60. tar zxvf openswan-2.6.34.tar.gz
  61. cd openswan-2.6.34/
  62. make programs install
  63. cd ../

  64. cat > /etc/ipsec.conf <<EOF
  65. version 2.0
  66. config setup
  67.     nat_traversal=yes
  68.     virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
  69.     oe=off
  70.     protostack=netkey

  71. conn L2TP-PSK-NAT
  72.     rightsubnet=vhost:%priv
  73.     also=L2TP-PSK-noNAT

  74. conn L2TP-PSK-noNAT
  75.     authby=secret
  76.     pfs=no
  77.     auto=add
  78.     keyingtries=3
  79.     rekey=no
  80.     ikelifetime=8h
  81.     keylife=1h
  82.     type=transport
  83.     left=$host_ip
  84.     leftprotoport=17/1701
  85.     right=%any
  86.     rightprotoport=17/%any
  87. EOF

  88. cat > /etc/ipsec.secrets <<EOF
  89. $host_ip %any: PSK "$psk"
  90. EOF

  91. for each in /proc/sys/net/ipv4/conf/*
  92. do
  93. echo 0 > $each/accept_redirects
  94. echo 0 > $each/send_redirects
  95. done
  96. echo 1 > /proc/sys/net/core/xfrm_larval_drop
  97. iptables --table nat --append POSTROUTING -o eth0 --jump MASQUERADE

  98. service iptables save
  99. service iptables restart
  100. chkconfig iptables on

  101. sed -i 's/net.ipv4.ip_forward = 0/net.ipv4.ip_forward = 1/g' /etc/sysctl.conf
  102. sysctl -p

  103. /etc/init.d/ipsec restart
  104. ipsec verify

  105. cd $cur_dir
  106. wget http://downloads.sourceforge.net/project/rp-l2tp/rp-l2tp/0.4/rp-l2tp-0.4.tar.gz
  107. tar zxvf rp-l2tp-0.4.tar.gz
  108. cd rp-l2tp-0.4
  109. ./configure
  110. make
  111. cp handlers/l2tp-control /usr/local/sbin/
  112. mkdir /var/run/xl2tpd/
  113. ln -s /usr/local/sbin/l2tp-control /var/run/xl2tpd/l2tp-control

  114. cd $cur_dir
  115. wget  http://fastlnmp.googlecode.com/files/xl2tpd-1.2.8.tar
  116. tar zxvf xl2tpd-1.2.8.tar
  117. cd xl2tpd-1.2.8
  118. make install
  119. cd ..

  120. mkdir -p /etc/xl2tpd
  121. touch /etc/xl2tpd/xl2tpd.conf
  122. cat >> /etc/xl2tpd/xl2tpd.conf <<EOF
  123. [global]
  124. ipsec saref = yes

  125. [lns default]
  126. ip range = 10.85.91.10-10.85.91.254
  127. local ip = 10.85.91.1
  128. refuse chap = yes
  129. refuse pap = yes
  130. require authentication = yes
  131. ppp debug = yes
  132. pppoptfile = /etc/ppp/options.xl2tpd
  133. length bit = yes
  134. EOF

  135. touch /etc/ppp/options.xl2tpd
  136. cat >> /etc/ppp/options.xl2tpd <<EOF
  137. require-mschap-v2
  138. ms-dns 8.8.8.8
  139. ms-dns 8.8.4.4
  140. asyncmap 0
  141. auth
  142. crtscts
  143. lock
  144. hide-password
  145. modem
  146. debug
  147. name l2tpd
  148. proxyarp
  149. lcp-echo-interval 30
  150. lcp-echo-failure 4
  151. EOF

  152. mknod /dev/ppp c 108 0
  153. echo "localip 10.85.92.1" >> /etc/pptpd.conf
  154. echo "remoteip 10.85.92.10-254" >> /etc/pptpd.conf
  155. echo "ms-dns 8.8.8.8" >> /etc/ppp/options.pptpd
  156. echo "ms-dns 8.8.4.4" >> /etc/ppp/options.pptpd

  157. chkconfig pptpd on
  158. service pptpd restart

  159. echo "$username l2tpd $userpsw *" >> /etc/ppp/chap-secrets
  160. echo "$username pptpd $userpsw *" >> /etc/ppp/chap-secrets
  161. /usr/local/sbin/xl2tpd

  162. cat >> /etc/rc.local <<EOF
  163. mknod /dev/ppp c 108 0
  164. for each in /proc/sys/net/ipv4/conf/*
  165. do
  166.         echo 0 > \$each/accept_redirects
  167.         echo 0 > \$each/send_redirects
  168. done
  169. echo 1 > /proc/sys/net/core/xfrm_larval_drop
  170. /etc/init.d/ipsec restart
  171. /usr/local/sbin/xl2tpd
  172. EOF

  173. clear

  174. ipsec verify

  175. printf "
  176. if there are no [FAILED] above, then you can
  177. connect to your L2TP&PPTP VPN Server with the default
  178. user/pass below:

  179. ServerIP:$host_ip
  180. username:$username
  181. password:$userpsw
  182. PSK:$psk (for L2TP VPN)
  183. "
复制代码
 楼主| 发表于 2012-3-19 08:50:52 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2012-3-19 08:53:57 | 显示全部楼层
cdm 发表于 2012-3-19 08:50
亲~

亲,求VPN系统
发表于 2012-3-19 08:54:49 | 显示全部楼层
好东西  辛苦了
 楼主| 发表于 2012-3-19 08:58:23 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2012-3-19 08:59:07 | 显示全部楼层
cdm 发表于 2012-3-19 08:58
论坛上有发whmcs接口了 亲

可以限制流量?
 楼主| 发表于 2012-3-19 08:59:54 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2012-3-19 09:00:31 | 显示全部楼层
支持一下.
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2024-4-20 17:56 , Processed in 0.173044 second(s), 11 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表