openwrt-packages/net/openconnect
Rosen Penev 6dbbc17b1f openconnect: Fix DTLS with OpenSSL
Backported upstream patches that fix this.

Removed local patch that fixes libp11 with version 0.4.7, which is not
used anymore. Upstream has a different solution.

License fixes and Makefile cleanups.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-06-24 10:58:20 -07:00
..
files openconnect: support reading password from script 2017-12-04 16:00:46 +08:00
patches openconnect: Fix DTLS with OpenSSL 2019-06-24 10:58:20 -07:00
Config.in openconnect: add an option to support stoken 2014-12-07 21:18:52 -08:00
Makefile openconnect: Fix DTLS with OpenSSL 2019-06-24 10:58:20 -07:00
README openconnect: unify indentation in README 2017-12-05 09:37:06 +08:00

README

The openconnect client expects to be configured using the uci interface.

To setup a VPN connection, add the following to /etc/config/network:

config interface 'MYVPN'
	option proto 'openconnect'
	option interface 'wan'
	option server 'vpn.example.com'
	option port '4443'
	option username 'test'
	option password 'secret'
	option serverhash 'AE7FF6A0426F0A0CD0A02EB9EC3C5066FAEB0B25'
	option defaultroute '0'
	option authgroup 'DEFAULT'

	# For second factor auth:

	# when a fixed 2FA password can be used
	#option password2 'my-fixed-2fa-password'

	# RSA tokens, must be built with stoken support
	#option token_mode 'rsa'
	#option token_secret 'secret'

	# HOTP/TOTP tokens
	#option token_mode 'hotp'
	#option token_secret '00'

	# tokens from script
	#option token_mode 'script'
	#option token_script '/lib/custom/getocpass.sh'

	# Juniper vpn support
	#option juniper '1'

The additional files are also used:
/etc/openconnect/user-cert-vpn-MYVPN.pem: The user certificate
/etc/openconnect/user-key-vpn-MYVPN.pem: The user private key
/etc/openconnect/ca-vpn-MYVPN.pem: The CA certificate (instead of serverhash)

After these are setup you can initiate the VPN using "ifup MYVPN", and
deinitialize it using ifdown. You may also use the luci web interface
(Network -> Interfaces -> MYVPN Connect).

Note that you need to configure the firewall to allow communication between
the MYVPN interface and lan.

There is a luci plugin to allow configuring an openconnect interface from
the web environment; see the luci-proto-openconnect package.