Add ocserv role

Create a self-signed CA, set up group configs, add script to allow new
connections through the firewall.

In the base debian role, drop the default nftables forward chain with
drop policy because it clashes with this. If you enable forwarding on
a debian host, make sure to configure the firewall.
This commit is contained in:
Timotej Lazar 2025-04-12 18:09:02 +02:00
parent a1c7be8184
commit cf6b682cf8
9 changed files with 177 additions and 8 deletions

11
roles/ocserv/README.md Normal file
View file

@ -0,0 +1,11 @@
Install and configure ocserv with a script to configure nftables on (dis)connection.
Create a self‐signed CA authority for issuing user certificates. User and group are read from the CN and OU certificate subject fields, respectively. To configure VPN groups, define the variable `vpn` as follows:
"vpn": {
"network": "<VPN network>"
"routes": {
"<group>": [ "<route>", … ]
}
}