Created
November 7, 2010 17:02
-
-
Save yinhm/666241 to your computer and use it in GitHub Desktop.
Automaticlly install pptpd on Amazon EC2 Amazon Linux
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Automaticlly install pptpd on Amazon EC2 Amazon Linux | |
# | |
# Ripped from http://blog.diahosting.com/linux-tutorial/pptpd/ | |
# pptpd source rpm packing by it's authors | |
# | |
# WARNING: | |
# first ms-dns setting to 172.16.0.23, 172.16.0.23 was showing on my | |
# /etc/resolv.conf, I'm not sure this is the same on all Amazon AWS zones. | |
# | |
# You need to adjust your "Security Groups" which you are using too. | |
# The security rules which I'm using looks like: | |
# ================================= | |
# ALL tcp 0 65535 0.0.0.0/0 | |
# ALL udp 0 65535 0.0.0.0/0 | |
# ================================= | |
# | |
# Authors: yinhm | |
# Version: 0.1.0 | |
# URL: http://yinhm.appspot.com/ | |
yum remove -y pptpd ppp | |
iptables --flush POSTROUTING --table nat | |
iptables --flush FORWARD | |
rm -rf /etc/pptpd.conf | |
rm -rf /etc/ppp | |
yum -y install rpm-build gcc | |
yum -y install ppp | |
mkdir ~/src | |
cd ~/src | |
wget http://yinhm.github.com/downloads/pptpd-1.3.4-1.amzn1.src.rpm | |
rpmbuild --rebuild pptpd-1.3.4-1.amzn1.src.rpm | |
rpm -i ../rpmbuild/RPMS/i386/pptpd-1.3.4-1.*.i386.rpm | |
sed -i 's/^logwtmp/#logwtmp/g' /etc/pptpd.conf | |
sed -i 's/^net.ipv4.ip_forward = 0/net.ipv4.ip_forward = 1/g' /etc/sysctl.conf | |
sysctl -p | |
echo "localip 192.168.240.1" >> /etc/pptpd.conf | |
echo "remoteip 192.168.240.2-100" >> /etc/pptpd.conf | |
echo "ms-dns 172.16.0.23" >> /etc/ppp/options.pptpd | |
echo "ms-dns 8.8.8.8" >> /etc/ppp/options.pptpd | |
pass=`openssl rand 8 -base64` | |
if [ "$1" != "" ] | |
then pass=$1 | |
fi | |
echo "vpn pptpd ${pass} *" >> /etc/ppp/chap-secrets | |
iptables -t nat -A POSTROUTING -s 192.168.240.0/24 -j SNAT --to-source `ifconfig | grep 'inet addr:'| grep -v '127.0.0.1' | cut -d: -f2 | awk 'NR==1 { print $1}'` | |
iptables -A FORWARD -p tcp --syn -s 192.168.240.0/24 -j TCPMSS --set-mss 1356 | |
service iptables save | |
chkconfig iptables on | |
chkconfig pptpd on | |
service iptables start | |
service pptpd start | |
echo -e "VPN service is installed, your VPN username is \033[1mvpn\033[0m, VPN password is \033[1m${pass}\033[1m" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
刚试了一下,无法穿墙啊,只有普通网站可以通过这个vpn访问,难道是因为连接没有加密?如果选加密的话就连不上服务器。