Tinc VPN configuration examples: Difference between revisions

From Teltonika Networks Wiki
No edit summary
No edit summary
 
(32 intermediate revisions by one other user not shown)
Line 10: Line 10:
'''Prerequisites''':
'''Prerequisites''':
* Two RUTxxx routers or TRB gateways of any type
* Two RUTxxx routers or TRB gateways of any type
* At least one router must have a Public Static or Public Dynamic IP address
* At least one router must have a '''Public Static''' or '''Public Dynamic''' IP address
* At least one end device (PC, Laptop, Tablet, Smartphone) to configure the routers
* At least one end device (PC, Laptop, Tablet, Smartphone) to configure the routers
* (Optional) A second end device to configure and test remote LAN access
* (Optional) A second end device to configure and test remote LAN access
Line 16: Line 16:
There will be two tinc configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.
There will be two tinc configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.


'''Configuration scheme 1''':
'''Topology 1''':


[[File:TincTopology1.png]]
[[File:Tinctopo1.png|center|border|class=tlt-border|800x600px]]


The figure above depicts two RUTxxx routers (RUT1 and RUT2) connected by an tinc tunnel via the Internet.
The figure above depicts two RUTxxx routers (RUT1 and RUT2) connected by an tinc tunnel via the Internet.
----
----
'''Configuration scheme 2''':
'''Topology 2''':


[[File:TincTopology2.png]]
[[File:Tinctopo2.png|center|border|class=tlt-border|800x600px]]


As mentioned earlier, configuration scheme 2 (figure above) is an extension of configuration scheme 1. While configuration scheme 1 only depicts a connection between two tinc instances, you can see that configuration scheme 2 additionally contains two end devices (END1 and END2), each connected to a separate router's LAN. When this scheme is realized, not only will the two routers be able to communicate with each other, but the end devices will also be reachable to one another and from each router.
As mentioned earlier, configuration scheme 2 (figure above) is an extension of configuration scheme 1. While configuration scheme 1 only depicts a connection between two tinc instances, you can see that configuration scheme 2 includes additional two end devices (END1 and END2), each connected to a separate router's LAN. When this topology is set up, not only will the two routers be able to communicate with each other, but the end devices will also be reachable to one another and from each router.
It should also be noted the connection type used is '''Tunnel''' and not '''Transport'''. The tunnel protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by another set of IP headers.


A tunnel is more widely implemented in site-to-site VPN scenarios and supports NAT traversal.
In addition to traffic encryption, tinc VPN also supports automatic full mesh routing -  VPN traffic is always (if possible) sent directly to the destination, without going through intermediate hops.
 
Furthermore, it is easily expandable – to add a new node, all you have to do is to create an extra configuration file.
 
A tunnel is more widely implemented in site-to-site VPN scenarios and supports NAT traversal.  


==Router configuration==
==Router configuration==
Line 39: Line 42:
First of, lets configure a simple connection between two tinc instances, i.e., '''RUT1''' and '''RUT2''' as described above in '''configuration scheme 1'''.
First of, lets configure a simple connection between two tinc instances, i.e., '''RUT1''' and '''RUT2''' as described above in '''configuration scheme 1'''.


* tinc is not installed on our devices, therefore, it has to be installed via the package manager. '''Services -> Package Manager -> Packages''' and search for '''tinc VPN'''
1. tinc is not installed on our devices, therefore, it has to be installed via the package manager. '''Services -> Package Manager -> Packages''' and search for '''tinc VPN''' and press '''+''' to install.


[[File:TincPackage.png]]
[[File:TincPackage.png|border|class=tlt-border|900x700px]]


* After '''successful''' installation you should see a '''new Firewall zone''' “'''tinc'''” created and a '''new traffic rule added'''.
2. After '''successful''' installation, package status should be changed to '''Installed.'''


[[File:Tincfwzone.png]]
[[File:Tincinstallation2.png|border|class=tlt-border|900x700px]]


[[File:Tinctrafficrule.png]]
* In '''Network -> Firewall -> General''' you should see a '''new Firewall zone''' “'''<span style="color:khaki">tinc</span>'''” created:


* From now all configuration will be made using command line interface.
[[File:Tincfwzone2.png|border|class=tlt-border|900x700px]]
* Make a folder for your tinc daemon where all your configurations will be kept. This procedure is required if you’re going to run more than one tinc daemon on one PC. However, if you only need one instance, then you can keep all configuration in default directory at “'''/etc/tinc/'''”
* Use '''mkdir''' to create a new folder at '''/etc/tinc/'''


[[File:Tincfolder.png]]
* Lastly, in '''Network -> Firewall -> Traffic rules''' a '''new traffic rule added:'''


* Then use your favorite text editor (I’m using vi) and create '''tinc.conf''' (If you skipped making specific folder, then you can create configs as mentioned earlier – in parent folder “'''vi /etc/tinc/tinc.conf'''”
[[File:Tinctraffic2.png|border|class=tlt-border|900x700px]]


[[File:Tincconfigfile.png]]


* And on RUT2 use a different name (ex. rut2) and add the line “ConnectTo = rut1”
* From this point onwards, all configuration will be made using command line interface.
* Make a folder for your tinc daemon where all your configurations will be kept. This procedure is required if you’re going to run more than one tinc daemon on one PC. However, if you only need one instance, then you can keep all configuration in default directory at “'''<span style=color:limegreen>/etc/tinc/</span>'''”
* Use <span style=color:dodgerblue>'''mkdir'''</span> to create a new folder at '''<span style=color:limegreen>/etc/tinc/</span>'''
 
[[File:Tincfolder.png|border|class=tlt-border]]
 
* Then use your favorite text editor (I’m using vi) and create '''tinc.conf''' (If you '''skipped''' making specific folder, then you can create configs as mentioned earlier – in parent folder “'''<span style=color:dodgerblue>vi</span> <span style=color:limegreen>/etc/tinc/tinc.conf</span>'''”, otherwise do it in "'''<span style="color:dodgerblue">vi</span> <span style="color:limegreen">/etc/tinc/example/tinc.conf</span>'''"
[[File:Tincconfigfile.png|border|class=tlt-border]]
 
* And on RUT2 use a different name (ex. <span style=color:limegreen>rut2</span>) and add the line “<span style=color:limegreen>ConnectTo = rut1</span>”
* Name your device, specify address family, and interface. Try not to set the interface to “'''tun0'''” as it is a system reserved interface and may not work with this VPN.
* Name your device, specify address family, and interface. Try not to set the interface to “'''tun0'''” as it is a system reserved interface and may not work with this VPN.
* Then on RUT1 create '''tinc-up''' script, which will turn on your VPN interface.
* Then on RUT1 create '''tinc-up''' script, which will turn on your VPN interface.




“vi /etc/tinc/example/tinc-up”
“'''<span style="color:dodgerblue">vi</span> <span style="color:limegreen">/etc/tinc/example/tinc-up</span>'''”


#!/bin/sh
#!/bin/sh
 
ifconfig $INTERFACE 10.0.0.1 netmask 255.255.255.0
ifconfig $INTERFACE 10.0.0.1 netmask 255.255.255.0




Line 74: Line 82:




#!/bin/sh
#!/bin/sh
 
ifconfig $INTERFACE 10.0.0.2 netmask 255.255.255.0
ifconfig $INTERFACE 10.0.0.2 netmask 255.255.255.0
 


* Accordingly, on both routers create a tinc-down script, which will turn off said VPN interface


* Accordingly, on '''both''' routers create a tinc-down script, which will turn off said VPN interface


“vi /etc/tinc/example/tinc-down”


#!/bin/sh
“'''<span style="color:dodgerblue">vi</span> <span style="color:limegreen">/etc/tinc/example/tinc-down</span>'''”


ip link set $INTERFACE down
#!/bin/sh
ip link set $INTERFACE down




* Set permissions to your scripts using “'''chmod 755 /etc/tinc/example/tinc-*'''”
* Set permissions to your scripts using “'''<span style=color:dodgerblue>chmod 755</span> <span style=color:limegreen>/etc/tinc/example/tinc-*</span>'''”
* Now, create last configuration files. First, create a folder for all the hosts and their info, then create a host file using text editor.
* Now, create last configuration files. First, create a folder for all the hosts and their info, then create a host file using text editor.<br /> "<span style="color:dodgerblue">'''mkdir <span style="color:limegreen">/etc/tinc/example/hosts/</span>'''"


"mkdir /etc/tinc/example/hosts/"


On rut1:
On rut1:


"vi /etc/tinc/example/hosts/rut1"
"<span style="color:dodgerblue">'''vi <span style="color:limegreen">/etc/tinc/example/hosts/rut1</span>'''"


Subnet = 10.0.0.1/32
Subnet = 10.0.0.1/32
Address = 84.84.84.84
Address = 84.84.84.84


On rut2:
On rut2:


"vi /etc/tinc/example/hosts/rut1"
"'''<span style="color:dodgerblue">vi</span> <span style="color:limegreen">/etc/tinc/example/hosts/rut2</span>'''"


Subnet = 10.0.0.2/32
Subnet = 10.0.0.2/32
Address = 80.80.100.100 (Optional)
Address = 80.80.100.100 (Optional)




* After creating host files, generate public/private keypair
* After creating host files, generate public/private keypair
'''tincd -n netname -K''' , in our scenario: “'''tincd -n example -K'''” and simply press enter to accept the default.
'''<span style=color:dodgerblue>tincd -n ''netname'' -K</span>''' , in our scenario: “'''<span style=color:dodgerblue>tincd -n example -K</span>'''” and simply press enter to accept the default.
* After keypairs were generated, you need to copy the device’s host file to the other device. Copy RUT1’s hosts/rut1 file to RUT2 and place it in the same folder hosts/ and do the same with the RUT2 file placing it in the RUT1 hosts folder.
* After keypairs were generated, you need to copy the device’s host file to the other device. Copy RUT1’s <span style=color:limegreen>'''hosts/rut1'''</span> file to RUT2 and place it in the same folder <span style=color:limegreen>'''hosts/'''</span> and do the same with the RUT2 file placing it in the RUT1 hosts folder.
You can do this with '''WinSCP''', or using CLI’s <span style=color:dodgerblue>'''scp'''</span> to transfer files from one device to the other.


You can do this with '''WinSCP''', or using CLI’s scp to transfer files from one device to the other.
[[File:Tincscp1.2.png|border|class=tlt-border|1100x700px]]


[[File:Tincscp1.png]]
[[File:Tincscp2.2.png|border|class=tlt-border|1100x700px]]
[[File:Tincscp2.png]]


Here on CLI, In 1st picture, I used scp to transfer RUT1’s host file directly to my RUT2, because RUT1 has public IP and therefore, I can directly communicate with it, and later, transferred RUT2’s host file to the RUT1 in the 2nd picture.
Here on CLI, In 1st picture, I used scp to transfer RUT1’s host file directly to my RUT2, because RUT1 has public IP and therefore, I can directly communicate with it, and later, transferred RUT2’s host file to the RUT1 in the 2nd picture.


* After  both host files were shared between two devices, we can start our tinc instances. “tincd -n netname”, or in our case “tincd -n example”, additionally, I recommend using debug mode, to check whether there are any connectivity errors “tincd -n example -D -d3” (d3 – debug level 3)
* After  both host files were shared between two devices, we can start our tinc instances. “<span style=color:dodgerblue>'''tincd -n netname'''</span>”, or in our case “<span style=color:dodgerblue>'''tincd -n example'''</span>”, additionally, I recommend using debug mode, to check whether there are any connectivity errors “<span style=color:dodgerblue>'''tincd -n example -D -d3'''</span>” (d3 – debug level 3)


'''RUT1:'''
'''RUT1:'''
[[File:Tinccon1.png]]
 
[[File:Tinccon1.png|border|class=tlt-border]]
 


'''RUT2:'''
'''RUT2:'''
[[File:Tinccon2.png]]
 
[[File:Tinccon2.png|border|class=tlt-border]]


Also, you can ping RUT1’s or 2’s VPN IP, here I ping RUT2 from RUT1, it should work both ways:
Also, you can ping RUT1’s or 2’s VPN IP, here I ping RUT2 from RUT1, it should work both ways:


[[File:Tincping1.png]]
[[File:Tincping1.png|border|class=tlt-border]]


And you can see a new route created on tinc0 interface:
And you can see a new route created on tinc0 interface:


[[File:Tinciface.png]]
[[File:Tinciface.png|border|class=tlt-border]]


===End-client to end-client example===
===End-client to end-client example===
Line 142: Line 149:
We’ll continue with our previous configurations.
We’ll continue with our previous configurations.


* Update your host file in hosts/ by adding your LAN network.
* Update your host file in <span style=color:limegreen>'''hosts/'''</span> by adding your LAN network.


hosts/rut1 file:
<span style=color:limegreen>'''hosts/rut1'''</span> file:


[[File:Tinchosts1.png]]
[[File:Tinchosts1.png|border|class=tlt-border]]


hosts/rut2 file:
<span style=color:limegreen>'''hosts/rut2'''</span> file:


[[File:Tinchosts2.png]]
[[File:Tinchosts2.png|border|class=tlt-border]]


* Add a route to other’s device LAN network through your tinc interface:
* Add a route to other’s device LAN network through your tinc interface:
Add a line to your tinc-up script, so that a route will be added when tinc is started.
Add a line to your tinc-up script, so that a route will be added when tinc is started.
on rut1 example/tinc-up


[[File:Tincup1.png]]
on rut1 <span style="color:limegreen">'''example/tinc-up'''</span>
 
[[File:Tincup1.png|border|class=tlt-border]]


on rut2 example/tinc-up
on rut2 <span style=color:limegreen>'''example/tinc-up'''</span>


[[File:Tincup2.png]]
[[File:Tincup2.png|border|class=tlt-border]]


* However, you’ll only be able to reach each other’s device LAN IP, but not the end devices. Therefore you need to change firewall rules.
* However, you’ll only be able to reach each other’s device LAN IP, but not the end devices. Therefore you need to change firewall rules.


'''FIREWALL'''
'''FIREWALL'''
* To achieve end-to-end client communication you need to configure the tinc zone, that was created at the installation.
* Both routers should have identical zone configurations:


[[File:Tincfw2.png]]
1. To achieve end-to-end client communication you need to configure the tinc zone '''Network->Firewall->General''', that was created at the installation. Press the edit button to configure it.[[File:Tincfirewall1.png|border|class=tlt-border|1100x700px]]
 
[[File:Tincfirewall2.png|border|class=tlt-border|900x700px]]
 
2. Open ''Allow forward to destination zones'' list.
3. Select '''lan''' zone, this will allow us to access LAN network from outside via tinc VPN.
 
[[File:Tincfirewall3.png|border|class=tlt-border|900x700px]]
 
4. Open ''Allow forward from source zones'' list.
5. Select '''lan''' zone, so we can access outside networks via tinc VPN too.
6. Press '''Save & Apply'''


We are going to allow all forwards via this interface, including lan and wan networks into this zone. This way we can communicate from END1 to RUT2’s lan as well as END2 and vice versa.
We are going to allow all forwards via this interface, including '''lan''' and '''wan networks''' into this zone. This way we can communicate from END1 to RUT2’s lan as well as END2 and vice versa.
In short '''LAN1 <-> WAN1 <-''' through tinc tunnel '''-> WAN2 <-> LAN2'''
In short '''LAN1 <-> WAN1 <-''' through tinc tunnel '''-> WAN2 <-> LAN2'''


[[File:TincTopology3.png]]
[[File:TincTopology3.png|center|border|class=tlt-border|800x600px]]
[[Category:VPN]]

Latest revision as of 09:50, 4 August 2023

Main Page > General Information > Configuration Examples > VPN > Tinc VPN configuration examples

Introduction

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others. This article provides an extensive configuration example with details on how to create a tunnel connection between two tinc instances, both of which configured on RUTxxx routers.

Configuration overview and prerequisites

Before we begin, let's overview the configuration that we are attempting to achieve and the prerequisites that make it possible.

Prerequisites:

  • Two RUTxxx routers or TRB gateways of any type
  • At least one router must have a Public Static or Public Dynamic IP address
  • At least one end device (PC, Laptop, Tablet, Smartphone) to configure the routers
  • (Optional) A second end device to configure and test remote LAN access

There will be two tinc configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.

Topology 1:

The figure above depicts two RUTxxx routers (RUT1 and RUT2) connected by an tinc tunnel via the Internet.


Topology 2:

As mentioned earlier, configuration scheme 2 (figure above) is an extension of configuration scheme 1. While configuration scheme 1 only depicts a connection between two tinc instances, you can see that configuration scheme 2 includes additional two end devices (END1 and END2), each connected to a separate router's LAN. When this topology is set up, not only will the two routers be able to communicate with each other, but the end devices will also be reachable to one another and from each router.

In addition to traffic encryption, tinc VPN also supports automatic full mesh routing -  VPN traffic is always (if possible) sent directly to the destination, without going through intermediate hops.

Furthermore, it is easily expandable – to add a new node, all you have to do is to create an extra configuration file.

A tunnel is more widely implemented in site-to-site VPN scenarios and supports NAT traversal.

Router configuration

If you have familiarized yourself with the configuration schemes and have all of the devices in order, we can start configuring the routers using the instructions provided in this section.

Basic tunnel


First of, lets configure a simple connection between two tinc instances, i.e., RUT1 and RUT2 as described above in configuration scheme 1.

1. tinc is not installed on our devices, therefore, it has to be installed via the package manager. Services -> Package Manager -> Packages and search for tinc VPN and press + to install.

2. After successful installation, package status should be changed to Installed.

  • In Network -> Firewall -> General you should see a new Firewall zonetinc” created:

  • Lastly, in Network -> Firewall -> Traffic rules a new traffic rule added:


  • From this point onwards, all configuration will be made using command line interface.
  • Make a folder for your tinc daemon where all your configurations will be kept. This procedure is required if you’re going to run more than one tinc daemon on one PC. However, if you only need one instance, then you can keep all configuration in default directory at “/etc/tinc/
  • Use mkdir to create a new folder at /etc/tinc/

  • Then use your favorite text editor (I’m using vi) and create tinc.conf (If you skipped making specific folder, then you can create configs as mentioned earlier – in parent folder “vi /etc/tinc/tinc.conf”, otherwise do it in "vi /etc/tinc/example/tinc.conf"

  • And on RUT2 use a different name (ex. rut2) and add the line “ConnectTo = rut1
  • Name your device, specify address family, and interface. Try not to set the interface to “tun0” as it is a system reserved interface and may not work with this VPN.
  • Then on RUT1 create tinc-up script, which will turn on your VPN interface.


vi /etc/tinc/example/tinc-up

#!/bin/sh
ifconfig $INTERFACE 10.0.0.1 netmask 255.255.255.0


  • On RUT2 do the same, just change the VPN IP.


#!/bin/sh
ifconfig $INTERFACE 10.0.0.2 netmask 255.255.255.0


  • Accordingly, on both routers create a tinc-down script, which will turn off said VPN interface


vi /etc/tinc/example/tinc-down

#!/bin/sh
ip link set $INTERFACE down


  • Set permissions to your scripts using “chmod 755 /etc/tinc/example/tinc-*
  • Now, create last configuration files. First, create a folder for all the hosts and their info, then create a host file using text editor.
    "mkdir /etc/tinc/example/hosts/"


On rut1:

"vi /etc/tinc/example/hosts/rut1"

Subnet = 10.0.0.1/32
Address = 84.84.84.84

On rut2:

"vi /etc/tinc/example/hosts/rut2"

Subnet = 10.0.0.2/32
Address = 80.80.100.100 (Optional)


  • After creating host files, generate public/private keypair

tincd -n netname -K , in our scenario: “tincd -n example -K” and simply press enter to accept the default.

  • After keypairs were generated, you need to copy the device’s host file to the other device. Copy RUT1’s hosts/rut1 file to RUT2 and place it in the same folder hosts/ and do the same with the RUT2 file placing it in the RUT1 hosts folder.

You can do this with WinSCP, or using CLI’s scp to transfer files from one device to the other.

Here on CLI, In 1st picture, I used scp to transfer RUT1’s host file directly to my RUT2, because RUT1 has public IP and therefore, I can directly communicate with it, and later, transferred RUT2’s host file to the RUT1 in the 2nd picture.

  • After both host files were shared between two devices, we can start our tinc instances. “tincd -n netname”, or in our case “tincd -n example”, additionally, I recommend using debug mode, to check whether there are any connectivity errors “tincd -n example -D -d3” (d3 – debug level 3)

RUT1:


RUT2:

Also, you can ping RUT1’s or 2’s VPN IP, here I ping RUT2 from RUT1, it should work both ways:

And you can see a new route created on tinc0 interface:

End-client to end-client example


We’ll continue with our previous configurations.

  • Update your host file in hosts/ by adding your LAN network.

hosts/rut1 file:

hosts/rut2 file:

  • Add a route to other’s device LAN network through your tinc interface:

Add a line to your tinc-up script, so that a route will be added when tinc is started.

on rut1 example/tinc-up

on rut2 example/tinc-up

  • However, you’ll only be able to reach each other’s device LAN IP, but not the end devices. Therefore you need to change firewall rules.

FIREWALL

1. To achieve end-to-end client communication you need to configure the tinc zone Network->Firewall->General, that was created at the installation. Press the edit button to configure it.

2. Open Allow forward to destination zones list. 3. Select lan zone, this will allow us to access LAN network from outside via tinc VPN.

4. Open Allow forward from source zones list. 5. Select lan zone, so we can access outside networks via tinc VPN too. 6. Press Save & Apply

We are going to allow all forwards via this interface, including lan and wan networks into this zone. This way we can communicate from END1 to RUT2’s lan as well as END2 and vice versa. In short LAN1 <-> WAN1 <- through tinc tunnel -> WAN2 <-> LAN2