diff options
author | Dante Catalfamo | 2020-08-16 16:08:44 -0400 |
---|---|---|
committer | Dante Catalfamo | 2020-08-16 16:08:44 -0400 |
commit | 239b1435ee593f887e913e96cef731bb5cb9846f (patch) | |
tree | 7093fe5b1bc60ebb6bc277de9b330b3c31273cbb /content/posts | |
parent | c93a61e79164c112d8df7e22c4145182ea46b794 (diff) | |
download | blog-239b1435ee593f887e913e96cef731bb5cb9846f.tar.gz blog-239b1435ee593f887e913e96cef731bb5cb9846f.tar.bz2 blog-239b1435ee593f887e913e96cef731bb5cb9846f.zip |
vpn-gateway: add sysctl section
Diffstat (limited to 'content/posts')
-rw-r--r-- | content/posts/openbsd-vpn-gateway/index.org | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/content/posts/openbsd-vpn-gateway/index.org b/content/posts/openbsd-vpn-gateway/index.org index e1aadd0..59082a1 100644 --- a/content/posts/openbsd-vpn-gateway/index.org +++ b/content/posts/openbsd-vpn-gateway/index.org @@ -199,3 +199,31 @@ This should output your current external IP address, which should belong to your VPN provider. + +** sysctl + OpenVPN should have already reconfigured the our routing table to + send all of our traffic over the VPN connection, but how do we pass + incoming traffic through it? + + The first step is to allow the kernel to forward IP packets + destined for other hosts. To set this option in the kernel we use + the [[https://man.openbsd.org/man8/sysctl.8][=sysctl(8)=]] command. + + #+BEGIN_SRC shell + doas sysctl net.inet.ip.forwarding=1 + #+END_SRC + + We're also going to want to make this option persistent, so it + remains even after rebooting. To do this we add the option to our + [[https://man.openbsd.org/man5/sysctl.conf.5][=sysctl.conf(5)=]], which re-applies =sysctl= options on boot. + + #+BEGIN_SRC shell + doas sh -c 'echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf' + #+END_SRC + + This can of course also be done with a text editor like =vi= or + =mg=. + + Setting =net.inet.ip.forwarding= to =1= tells the kernel to + forward any packets it receives that aren't destined for any of its + interfaces according to its routing table and firewall rules. |