You are not logged in.
Pages: 1
I'm using OpenVPN to connect to the company LAN. I have a device /dev/net/tun that is used by OpenVPN. For that, you need to load the module "tun", which I do in rc.conf. I wanted udev to set permissions to that device so that I don't need to be root to set up the connection. I changed /etc/udev/permisions.d/udev.permissions:
# VPN tunnels
net/tun:root:storage:0660
However, this device still has the group "root" instead of storage. Who knows how to accomplish that?
Offline
udev.permissions is no longer used. You need to amend the rule, or add a new one, so that the required group is set when the device is created.
The relevant rule in the default set (/etc/udev/rules.d/udev.rules) is:
# Network devices
KERNEL=="tun", NAME="net/%k"
You can add GROUP="users" (not storage) to this rule, although that will be overwritten if the default rules are changed in the future. Better to create a local ruleset called 00-udev.rules in /etc/udev/rules.d and put the complete rule in there.
Offline
Thanks, that works so far, but now the connection precedure fails somewhere else: ifconfig
Fri Apr 28 18:25:52 2006 /sbin/ifconfig tun0 10.8.0.6 pointopoint 10.8.0.5 mtu 1500
SIOCSIFADDR: Permission denied
SIOCSIFFLAGS: Permission denied
SIOCSIFDSTADDR: Permission denied
SIOCSIFFLAGS: Permission denied
SIOCSIFMTU: Operation not permitted
Is there a clean solution to let a user use ifconfig? Or should I just abandon the idea of using openvpn as non-root?
Offline
You could use sudo, I suppose. Personally, I don't see anything wrong with configuring your tun interface as root. Network interfaces are always set up as root, but that doesn't stop users using them. For example, I use openswan for my VPN, and the ipsec0 virtual interface is set up by a daemon at boot time, immediately after the network comes up.
Offline
Pages: 1