#!/bin/bash -e # github.com/jawj/IKEv2-setup # Copyright (c) 2015 – 2024 George MacKerron # Released under the MIT licence: http://opensource.org/licenses/mit-license echo echo "=== https://github.com/jawj/IKEv2-setup ===" echo function exit_badly { echo "$1" exit 1 } UBUNTUVERSION=$(lsb_release -rs) [[ "${UBUNTUVERSION}" == "18.04" ]] \ || [[ "${UBUNTUVERSION}" == "20.04" ]] \ || [[ "${UBUNTUVERSION}" == "22.04" ]] \ || exit_badly "This script is for Ubuntu 18.04/20.04/22.04 only: aborting (if you know what you're doing, try deleting this check)" [[ $(id -u) -eq 0 ]] || exit_badly "Please run this script as root (e.g. sudo ./path/to/this/script)" echo "--- Adding repositories and installing utilities ---" echo export DEBIAN_FRONTEND=noninteractive # see https://github.com/jawj/IKEv2-setup/issues/66 and https://bugs.launchpad.net/subiquity/+bug/1783129 # note: software-properties-common is required for add-apt-repository apt-get -o Acquire::ForceIPv4=true update apt-get -o Acquire::ForceIPv4=true install -y software-properties-common add-apt-repository -y universe add-apt-repository -y restricted add-apt-repository -y multiverse apt-get -o Acquire::ForceIPv4=true install -y moreutils dnsutils echo echo "--- Configuration: VPN settings ---" echo ETH0ORSIMILAR=$(ip route get 1.1.1.1 | grep -oP ' dev \K\S+') IP=$(dig -4 +short myip.opendns.com @resolver1.opendns.com) echo "Network interface: ${ETH0ORSIMILAR}" echo "External IP: ${IP}" echo echo "** Note: this hostname must already resolve to this machine, to enable Let's Encrypt certificate setup **" read -r -p "Hostname for VPN: " VPNHOST VPNHOSTIP=$(dig -4 +short "${VPNHOST}") [[ -n "$VPNHOSTIP" ]] || exit_badly "Cannot resolve VPN hostname: aborting" if [[ "${IP}" != "${VPNHOSTIP}" ]]; then echo "Warning: ${VPNHOST} resolves to ${VPNHOSTIP}, not ${IP}" echo "Either you're behind NAT, or something is wrong (e.g. hostname points to wrong IP, CloudFlare proxying shenanigans, ...)" read -r -p "Press [Return] to continue anyway, or Ctrl-C to abort" fi read -r -p "VPN username: " VPNUSERNAME while true; do read -r -s -p "VPN password (no quotes, please): " VPNPASSWORD echo read -r -s -p "Confirm VPN password: " VPNPASSWORD2 echo [[ "${VPNPASSWORD}" = "${VPNPASSWORD2}" ]] && break echo "Passwords didn't match -- please try again" done echo ' Public DNS servers include: 176.103.130.130,176.103.130.131 AdGuard https://adguard.com/en/adguard-dns/overview.html 176.103.130.132,176.103.130.134 AdGuard Family https://adguard.com/en/adguard-dns/overview.html 1.1.1.1,1.0.0.1 Cloudflare/APNIC https://1.1.1.1 84.200.69.80,84.200.70.40 DNS.WATCH https://dns.watch 8.8.8.8,8.8.4.4 Google https://developers.google.com/speed/public-dns/ 208.67.222.222,208.67.220.220 OpenDNS https://www.opendns.com 208.67.222.123,208.67.220.123 OpenDNS FamilyShield https://www.opendns.com 9.9.9.9,149.112.112.112 Quad9 https://quad9.net 77.88.8.8,77.88.8.1 Yandex https://dns.yandex.com 77.88.8.88,77.88.8.2 Yandex Safe https://dns.yandex.com 77.88.8.7,77.88.8.3 Yandex Family https://dns.yandex.com ' read -r -p "DNS servers for VPN users (default: 1.1.1.1,1.0.0.1): " VPNDNS VPNDNS=${VPNDNS:-'1.1.1.1,1.0.0.1'} echo echo "--- Configuration: general server settings ---" echo read -r -p "Timezone (default: Europe/London): " TZONE TZONE=${TZONE:-'Europe/London'} read -r -p "Email address for sysadmin (e.g. j.bloggs@example.com): " EMAILADDR read -r -p "Desired SSH log-in port (default: 22): " SSHPORT SSHPORT=${SSHPORT:-22} read -r -p "New SSH log-in user name: " LOGINUSERNAME CERTLOGIN="n" if [[ -s /root/.ssh/authorized_keys ]]; then while true; do read -r -p "Copy /root/.ssh/authorized_keys to new user and disable SSH password log-in [Y/n]? " CERTLOGIN [[ ${CERTLOGIN,,} =~ ^(y(es)?)?$ ]] && CERTLOGIN=y [[ ${CERTLOGIN,,} =~ ^no?$ ]] && CERTLOGIN=n [[ $CERTLOGIN =~ ^(y|n)$ ]] && break done fi while true; do [[ ${CERTLOGIN} = "y" ]] && read -r -s -p "New SSH user's password (e.g. for sudo): " LOGINPASSWORD [[ ${CERTLOGIN} != "y" ]] && read -r -s -p "New SSH user's log-in password (must be REALLY STRONG): " LOGINPASSWORD echo read -r -s -p "Confirm new SSH user's password: " LOGINPASSWORD2 echo [[ "${LOGINPASSWORD}" = "${LOGINPASSWORD2}" ]] && break echo "Passwords didn't match -- please try again" done VPNIPPOOL="10.101.0.0/16" echo echo "--- Upgrading and installing packages ---" echo apt-get -o Acquire::ForceIPv4=true --with-new-pkgs upgrade -y apt autoremove -y debconf-set-selections <<< "postfix postfix/mailname string ${VPNHOST}" debconf-set-selections <<< "postfix postfix/main_mailer_type string 'Internet Site'" apt-get -o Acquire::ForceIPv4=true install -y \ language-pack-en iptables-persistent postfix mutt unattended-upgrades certbot uuid-runtime \ strongswan libstrongswan-standard-plugins strongswan-libcharon libcharon-extra-plugins # in 22.04 libcharon-standard-plugins is replaced with libcharon-extauth-plugins apt-get -o Acquire::ForceIPv4=true install -y libcharon-standard-plugins \ || apt-get -o Acquire::ForceIPv4=true install -y libcharon-extauth-plugins echo echo "--- Configuring firewall ---" echo # firewall # https://www.strongswan.org/docs/LinuxKongress2009-strongswan.pdf # https://wiki.strongswan.org/projects/strongswan/wiki/ForwardingAndSplitTunneling # https://www.zeitgeist.se/2013/11/26/mtu-woes-in-ipsec-tunnels-how-to-fix/ iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT iptables -F iptables -t nat -F iptables -t mangle -F # INPUT # accept anything already accepted iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # accept anything on the loopback interface iptables -A INPUT -i lo -j ACCEPT # drop invalid packets iptables -A INPUT -m state --state INVALID -j DROP # rate-limit repeated new requests from same IP to any ports iptables -I INPUT -i "${ETH0ORSIMILAR}" -m state --state NEW -m recent --set iptables -I INPUT -i "${ETH0ORSIMILAR}" -m state --state NEW -m recent --update --seconds 300 --hitcount 60 -j DROP # accept (non-standard) SSH iptables -A INPUT -p tcp --dport "${SSHPORT}" -j ACCEPT # VPN # accept IPSec/NAT-T for VPN (ESP not needed with forceencaps, as ESP goes inside UDP) iptables -A INPUT -p udp --dport 500 -j ACCEPT iptables -A INPUT -p udp --dport 4500 -j ACCEPT # forward VPN traffic anywhere iptables -A FORWARD --match policy --pol ipsec --dir in --proto esp -s "${VPNIPPOOL}" -j ACCEPT iptables -A FORWARD --match policy --pol ipsec --dir out --proto esp -d "${VPNIPPOOL}" -j ACCEPT # reduce MTU/MSS values for dumb VPN clients iptables -t mangle -A FORWARD --match policy --pol ipsec --dir in -s "${VPNIPPOOL}" -o "${ETH0ORSIMILAR}" -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360 # masquerade VPN traffic over eth0 etc. iptables -t nat -A POSTROUTING -s "${VPNIPPOOL}" -o "${ETH0ORSIMILAR}" -m policy --pol ipsec --dir out -j ACCEPT # exempt IPsec traffic from masquerading iptables -t nat -A POSTROUTING -s "${VPNIPPOOL}" -o "${ETH0ORSIMILAR}" -j MASQUERADE # fall through to drop any other input and forward traffic iptables -A INPUT -j DROP iptables -A FORWARD -j DROP iptables -L netfilter-persistent save echo echo "--- Configuring RSA certificates ---" echo mkdir -p /etc/letsencrypt # note: currently we stick to RSA because iOS/macOS may have trouble with ECDSA # (see https://github.com/jawj/IKEv2-setup/issues/159) echo " standalone = true agree-tos = true non-interactive = true preferred-challenges = http rsa-key-size = 4096 email = ${EMAILADDR} pre-hook = /sbin/iptables -I INPUT -p tcp --dport 80 -j ACCEPT post-hook = /sbin/iptables -D INPUT -p tcp --dport 80 -j ACCEPT renew-hook = /usr/sbin/ipsec reload && /usr/sbin/ipsec secrets " > /etc/letsencrypt/cli.ini # certbot on older Ubuntu doesn't recognise the --key-type switch, so try without if it errors with certbot certonly --key-type rsa -d "${VPNHOST}" || certbot certonly -d "${VPNHOST}" ln -f -s "/etc/letsencrypt/live/${VPNHOST}/cert.pem" /etc/ipsec.d/certs/cert.pem ln -f -s "/etc/letsencrypt/live/${VPNHOST}/privkey.pem" /etc/ipsec.d/private/privkey.pem ln -f -s "/etc/letsencrypt/live/${VPNHOST}/chain.pem" /etc/ipsec.d/cacerts/chain.pem grep -Fq 'jawj/IKEv2-setup' /etc/apparmor.d/local/usr.lib.ipsec.charon || echo " # https://github.com/jawj/IKEv2-setup /etc/letsencrypt/archive/${VPNHOST}/* r, " >> /etc/apparmor.d/local/usr.lib.ipsec.charon aa-status --enabled && invoke-rc.d apparmor reload echo echo "--- Configuring VPN ---" echo # ip_forward is for VPN # ip_no_pmtu_disc is for UDP fragmentation # others are for security grep -Fq 'jawj/IKEv2-setup' /etc/sysctl.conf || echo " # https://github.com/jawj/IKEv2-setup net.ipv4.ip_forward = 1 net.ipv4.ip_no_pmtu_disc = 1 net.ipv4.conf.all.rp_filter = 1 net.ipv4.conf.all.accept_redirects = 0 net.ipv4.conf.all.send_redirects = 0 net.ipv6.conf.all.disable_ipv6 = 1 net.ipv6.conf.default.disable_ipv6 = 1 net.ipv6.conf.lo.disable_ipv6 = 1 net.ipv6.conf.${ETH0ORSIMILAR}.disable_ipv6 = 1 " >> /etc/sysctl.conf sysctl -p echo "config setup strictcrlpolicy=yes uniqueids=never conn roadwarrior auto=add compress=no type=tunnel keyexchange=ikev2 fragmentation=yes forceencaps=yes # https://docs.strongswan.org/docs/5.9/config/IKEv2CipherSuites.html#_commercial_national_security_algorithm_suite # ... but we also allow aes256gcm16-prfsha256-ecp256, because that's sometimes just what macOS proposes ike=aes256gcm16-prfsha384-ecp384,aes256gcm16-prfsha256-ecp256! esp=aes256gcm16-ecp384! dpdaction=clear dpddelay=900s rekey=no left=%any leftid=@${VPNHOST} leftcert=cert.pem leftsendcert=always leftsubnet=0.0.0.0/0 right=%any rightid=%any rightauth=eap-mschapv2 eap_identity=%any rightdns=${VPNDNS} rightsourceip=${VPNIPPOOL} rightsendcert=never " > /etc/ipsec.conf echo "${VPNHOST} : RSA \"privkey.pem\" ${VPNUSERNAME} : EAP \"${VPNPASSWORD}\" " > /etc/ipsec.secrets ipsec restart echo echo "--- User ---" echo # user + SSH id -u "${LOGINUSERNAME}" &>/dev/null || adduser --disabled-password --gecos "" "${LOGINUSERNAME}" echo "${LOGINUSERNAME}:${LOGINPASSWORD}" | chpasswd adduser "${LOGINUSERNAME}" sudo sed -r \ -e "s/^#?Port 22$/Port ${SSHPORT}/" \ -e 's/^#?LoginGraceTime (120|2m)$/LoginGraceTime 30/' \ -e 's/^#?PermitRootLogin yes$/PermitRootLogin no/' \ -e 's/^#?X11Forwarding yes$/X11Forwarding no/' \ -e 's/^#?UsePAM yes$/UsePAM no/' \ -i.original /etc/ssh/sshd_config if [[ $CERTLOGIN = "y" ]]; then mkdir -p "/home/${LOGINUSERNAME}/.ssh" chown "${LOGINUSERNAME}" "/home/${LOGINUSERNAME}/.ssh" chmod 700 "/home/${LOGINUSERNAME}/.ssh" cp "/root/.ssh/authorized_keys" "/home/${LOGINUSERNAME}/.ssh/authorized_keys" chown "${LOGINUSERNAME}" "/home/${LOGINUSERNAME}/.ssh/authorized_keys" chmod 600 "/home/${LOGINUSERNAME}/.ssh/authorized_keys" sed -r \ -e "s/^#?PasswordAuthentication yes$/PasswordAuthentication no/" \ -i.allows_pwd /etc/ssh/sshd_config fi service ssh restart echo echo "--- Timezone, mail, unattended upgrades ---" echo timedatectl set-timezone "${TZONE}" /usr/sbin/update-locale LANG=en_GB.UTF-8 sed -r \ -e "s/^myhostname =.*$/myhostname = ${VPNHOST}/" \ -e 's/^inet_interfaces =.*$/inet_interfaces = loopback-only/' \ -i.original /etc/postfix/main.cf grep -Fq 'jawj/IKEv2-setup' /etc/aliases || echo " # https://github.com/jawj/IKEv2-setup root: ${EMAILADDR} ${LOGINUSERNAME}: ${EMAILADDR} " >> /etc/aliases newaliases service postfix restart sed -r \ -e 's|^//Unattended-Upgrade::MinimalSteps "true";$|Unattended-Upgrade::MinimalSteps "true";|' \ -e 's|^//Unattended-Upgrade::Mail "root";$|Unattended-Upgrade::Mail "root";|' \ -e 's|^//Unattended-Upgrade::Automatic-Reboot "false";$|Unattended-Upgrade::Automatic-Reboot "true";|' \ -e 's|^//Unattended-Upgrade::Remove-Unused-Dependencies "false";|Unattended-Upgrade::Remove-Unused-Dependencies "true";|' \ -e 's|^//Unattended-Upgrade::Automatic-Reboot-Time "02:00";$|Unattended-Upgrade::Automatic-Reboot-Time "03:00";|' \ -i /etc/apt/apt.conf.d/50unattended-upgrades echo 'APT::Periodic::Update-Package-Lists "1"; APT::Periodic::Download-Upgradeable-Packages "1"; APT::Periodic::AutocleanInterval "7"; APT::Periodic::Unattended-Upgrade "1"; ' > /etc/apt/apt.conf.d/10periodic service unattended-upgrades restart echo echo "--- Creating configuration files ---" echo cd "/home/${LOGINUSERNAME}" cat << EOF > vpn-ios.mobileconfig PayloadContent IKEv2 AuthenticationMethod None ChildSecurityAssociationParameters EncryptionAlgorithm AES-256-GCM IntegrityAlgorithm SHA2-384 DiffieHellmanGroup 20 LifeTimeInMinutes 1440 DeadPeerDetectionRate Medium DisableMOBIKE 0 DisableRedirect 0 EnableCertificateRevocationCheck 0 EnablePFS ExtendedAuthEnabled IKESecurityAssociationParameters EncryptionAlgorithm AES-256-GCM IntegrityAlgorithm SHA2-384 DiffieHellmanGroup 20 LifeTimeInMinutes 1440 OnDemandEnabled 1 OnDemandRules Action Connect RemoteAddress ${VPNHOST} RemoteIdentifier ${VPNHOST} UseConfigurationAttributeInternalIPSubnet 0 IPv4 OverridePrimary 1 PayloadDescription Configures VPN settings PayloadDisplayName VPN PayloadIdentifier com.apple.vpn.managed.$(uuidgen) PayloadType com.apple.vpn.managed PayloadUUID $(uuidgen) PayloadVersion 1 Proxies HTTPEnable 0 HTTPSEnable 0 UserDefinedName ${VPNHOST} VPNType IKEv2 PayloadDisplayName IKEv2 VPN configuration (${VPNHOST}) PayloadIdentifier com.mackerron.vpn.$(uuidgen) PayloadRemovalDisallowed PayloadType Configuration PayloadUUID $(uuidgen) PayloadVersion 1 EOF cat << EOF > vpn-mac.applescript set vpnuser to text returned of (display dialog "Please enter your VPN username" default answer "") set vpnpass to text returned of (display dialog "Please enter your VPN password" default answer "" with hidden answer) set plist to " PayloadContent IKEv2 AuthenticationMethod None ChildSecurityAssociationParameters EncryptionAlgorithm AES-256-GCM IntegrityAlgorithm SHA2-384 DiffieHellmanGroup 20 LifeTimeInMinutes 1440 DeadPeerDetectionRate Medium DisableMOBIKE 0 DisableRedirect 0 EnableCertificateRevocationCheck 0 EnablePFS ExtendedAuthEnabled AuthName " & vpnuser & " AuthPassword " & vpnpass & " IKESecurityAssociationParameters EncryptionAlgorithm AES-256-GCM IntegrityAlgorithm SHA2-384 DiffieHellmanGroup 20 LifeTimeInMinutes 1440 OnDemandEnabled 1 OnDemandRules Action Connect RemoteAddress ${VPNHOST} RemoteIdentifier ${VPNHOST} UseConfigurationAttributeInternalIPSubnet 0 IPv4 OverridePrimary 1 PayloadDescription Configures VPN settings PayloadDisplayName VPN PayloadIdentifier com.apple.vpn.managed.$(uuidgen) PayloadType com.apple.vpn.managed PayloadUUID $(uuidgen) PayloadVersion 1 Proxies HTTPEnable 0 HTTPSEnable 0 UserDefinedName ${VPNHOST} VPNType IKEv2 PayloadDisplayName IKEv2 VPN configuration (${VPNHOST}) PayloadIdentifier com.mackerron.vpn.$(uuidgen) PayloadRemovalDisallowed PayloadType Configuration PayloadUUID $(uuidgen) PayloadVersion 1 " set tmpdir to do shell script "mktemp -d" set tmpfile to tmpdir & "/vpn.mobileconfig" do shell script "touch " & tmpfile write plist to tmpfile do shell script "open /System/Library/PreferencePanes/Profiles.prefPane " & tmpfile delay 5 do shell script "rm " & tmpfile EOF grep -Fq 'jawj/IKEv2-setup' /etc/mime.types || echo " # https://github.com/jawj/IKEv2-setup application/vnd.strongswan.profile sswan " >> /etc/mime.types cat << EOF > vpn-android.sswan { "uuid": "$(uuidgen)", "name": "${VPNHOST}", "type": "ikev2-eap", "remote": { "addr": "${VPNHOST}" } } EOF cat << EOF > vpn-ubuntu-client.sh #!/bin/bash -e if [[ \$(id -u) -ne 0 ]]; then echo "Please run as root (e.g. sudo ./path/to/this/script)"; exit 1; fi read -p "VPN username (same as entered on server): " VPNUSERNAME while true; do read -s -p "VPN password (same as entered on server): " VPNPASSWORD echo read -s -p "Confirm VPN password: " VPNPASSWORD2 echo [ "\$VPNPASSWORD" = "\$VPNPASSWORD2" ] && break echo "Passwords didn't match -- please try again" done apt-get install -y strongswan libstrongswan-standard-plugins libcharon-extra-plugins apt-get install -y libcharon-standard-plugins || true # 17.04+ only ln -f -s /etc/ssl/certs/ISRG_Root_X1.pem /etc/ipsec.d/cacerts/ grep -Fq 'jawj/IKEv2-setup' /etc/ipsec.conf || echo " # https://github.com/jawj/IKEv2-setup conn ikev2vpn ikelifetime=60m keylife=20m rekeymargin=3m keyingtries=1 keyexchange=ikev2 ike=aes256gcm16-prfsha384-ecp384! esp=aes256gcm16-ecp384! leftsourceip=%config leftauth=eap-mschapv2 eap_identity=\${VPNUSERNAME} right=${VPNHOST} rightauth=pubkey rightid=@${VPNHOST} rightsubnet=0.0.0.0/0 auto=add # or auto=start to bring up automatically " >> /etc/ipsec.conf grep -Fq 'jawj/IKEv2-setup' /etc/ipsec.secrets || echo " # https://github.com/jawj/IKEv2-setup \${VPNUSERNAME} : EAP \"\${VPNPASSWORD}\" " >> /etc/ipsec.secrets ipsec restart sleep 5 # is there a better way? echo "Bringing up VPN ..." ipsec up ikev2vpn ipsec statusall echo echo -n "Testing IP address ... " VPNIP=\$(dig -4 +short ${VPNHOST}) ACTUALIP=\$(dig -4 +short myip.opendns.com @resolver1.opendns.com) if [[ "\$VPNIP" == "\$ACTUALIP" ]]; then echo "PASSED (IP: \${VPNIP})"; else echo "FAILED (IP: \${ACTUALIP}, VPN IP: \${VPNIP})"; fi echo echo "To disconnect: ipsec down ikev2vpn" echo "To reconnect: ipsec up ikev2vpn" echo "To connect automatically: change auto=add to auto=start in /etc/ipsec.conf" EOF cat << EOF > vpn-instructions.txt == iOS == A configuration profile is attached as vpn-ios.mobileconfig. Open this attachment. Then go to Settings > General > VPN & Device Management, and find the profile under 'DOWNLOADED PROFILE'. You will be asked for your device PIN or password, and then your VPN username and password. These instructions apply to iOS 15. Earlier (and probably later) versions of iOS will also work, but the exact setup steps may differ. == macOS == In macOS Monterey, your VPN username and password must be embedded in the profile file. However, your password cannot be included in a profile sent by email for security reasons. So: open vpn-mac.applescript and run it from Script Editor. You'll be prompted for your VPN username and password. System Preferences will then open. Select the profile listed as 'Downloaded' on the left, and click 'Install...' in the main panel. == Windows == You will need Windows 10 Pro or above. Please run the following commands in PowerShell: \$Response = Invoke-WebRequest -UseBasicParsing -Uri https://valid-isrgrootx1.letsencrypt.org # ^ this line fixes a certificate lazy-loading bug: see https://github.com/jawj/IKEv2-setup/issues/126 Add-VpnConnection -Name "${VPNHOST}" \` -ServerAddress "${VPNHOST}" \` -TunnelType IKEv2 \` -EncryptionLevel Maximum \` -AuthenticationMethod EAP \` -RememberCredential Set-VpnConnectionIPsecConfiguration -ConnectionName "${VPNHOST}" \` -AuthenticationTransformConstants GCMAES256 \` -CipherTransformConstants GCMAES256 \` -EncryptionMethod GCMAES256 \` -IntegrityCheckMethod SHA384 \` -DHGroup ECP384 \` -PfsGroup ECP384 \` -Force # Run the following command to retain access to the local network (e.g. printers, file servers) while the VPN is connected. # On a home network, you probably want this. On a public network, you probably don't. Set-VpnConnection -Name "${VPNHOST}" -SplitTunneling \$True You will need to enter your chosen VPN username and password in order to connect. == Android == Download the strongSwan app from the Play Store: https://play.google.com/store/apps/details?id=org.strongswan.android Then open the attached .sswan file, or select it after choosing 'Import VPN profile' from the strongSwan app menu. You will need to enter your chosen VPN username and password in order to connect. For a persistent connection, go to your device's Settings app and choose Network & Internet > Advanced > VPN > strongSwan VPN Client, tap the gear icon and toggle on 'Always-on VPN' (these options may differ by Android version and provider). == Ubuntu == A bash script to set up strongSwan as a VPN client is attached as vpn-ubuntu-client.sh. You will need to chmod +x and then run the script as root. EOF EMAIL=$USER@$VPNHOST mutt -s "VPN configuration" -a vpn-ios.mobileconfig vpn-mac.applescript vpn-android.sswan vpn-ubuntu-client.sh -- "${EMAILADDR}" < vpn-instructions.txt echo echo "--- How to connect ---" echo echo "Connection instructions have been emailed to you, and can also be found in your home directory, /home/${LOGINUSERNAME}" # necessary for IKEv2? # Windows: https://support.microsoft.com/en-us/kb/926179 # HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent += AssumeUDPEncapsulationContextOnSendRule, DWORD = 2