Tinc extras

  • This how-to describes the most common Tinc tuning scenarios adapted for OpenWrt.
  • Follow Tinc server for server setup and Tinc client for client setup.
  • Follow DDNS client to use own server with dynamic IP address.
  • Follow Random generator to overcome low entropy issues.

Implement plain routing between server side LAN and client side LAN assuming that:

  • - server side LAN
  • - client side LAN

Configure subnets on VPN server and client.

uci add_list tinc.server.Subnet=""
uci add_list tinc.client.Subnet=""
uci commit tinc
service tinc restart

Consider VPN network as private and assign VPN interface to LAN zone on VPN client.

uci del_list firewall.wan.network="vpn"
uci add_list firewall.lan.network="vpn"
uci commit firewall
service firewall restart

If you do not need to route all traffic to VPN. Disable gateway redirection on VPN client.

for IPV in 4 6
uci -q delete network.lan.ip${IPV}table
uci -q delete network.vpn.ip${IPV}table
uci -q delete network.vpn_rt${IPV%4}
uci -q delete network.lan_vpn${IPV%4}
uci del_list tinc.server.Subnet=""
uci del_list tinc.server.Subnet="::/0"
uci commit network
service network restart

If VPN gateway is separate from your LAN gateway. Implement plain routing between LAN and VPN networks assuming that:

  • - LAN network
  • - VPN gateway
  • - VPN network

Add port forwarding for VPN server on LAN gateway.

uci -q delete firewall.tinc
uci set firewall.tinc="redirect"
uci set firewall.tinc.name="Redirect-Tinc"
uci set firewall.tinc.src="wan"
uci set firewall.tinc.src_dport="655"
uci set firewall.tinc.dest="lan"
uci set firewall.tinc.dest_ip=""
uci set firewall.tinc.family="ipv4"
uci set firewall.tinc.proto="tcp"
uci set firewall.tinc.target="DNAT"
uci commit firewall
service firewall restart

Add route to VPN network via VPN gateway on LAN gateway.

uci -q delete network.vpn
uci set network.vpn="route"
uci set network.vpn.interface="lan"
uci set network.vpn.target=""
uci set network.vpn.gateway=""
uci commit network
service network restart

Serve DNS for VPN clients on OpenWrt server when using point-to-point topology.

Route DNS over VPN to prevent DNS leaks on VPN client.

Replace peer DNS with public or VPN-specific DNS provider on OpenWrt client.

Modify the VPN connection using NetworkManager on Linux desktop client.

nmcli connection modify id VPN_CON \
ipv4.dns-search ~. ipv4.dns-priority -50 \
ipv6.dns-search ~. ipv6.dns-priority -50

Prevent traffic leaks on OpenWrt client isolating VPN interface in a separate firewall zone.

uci -q delete firewall.vpn
uci set firewall.vpn="zone"
uci set firewall.vpn.name="vpn"
uci set firewall.vpn.input="REJECT"
uci set firewall.vpn.output="ACCEPT"
uci set firewall.vpn.forward="REJECT"
uci set firewall.vpn.masq="1"
uci set firewall.vpn.mtu_fix="1"
uci add_list firewall.vpn.network="vpn"
uci del_list firewall.wan.network="vpn"
uci -q delete firewall.@forwarding[0]
uci set firewall.lan_vpn="forwarding"
uci set firewall.lan_vpn.src="lan"
uci set firewall.lan_vpn.dest="vpn"
uci commit firewall
service firewall restart

Automated VPN server installation.

cat << EOF > tinc-server.sh
$(wget -U "" -O - "${URL}?codeblock=0")
$(wget -U "" -O - "${URL}?codeblock=1")
$(wget -U "" -O - "${URL}?codeblock=2")
$(wget -U "" -O - "${URL}?codeblock=3")
$(wget -U "" -O - "${URL}?codeblock=4")
sh tinc-server.sh
This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
  • Last modified: 2023/11/17 08:54
  • by vgaetera