docker-vpn is an alternative to installing VPN software on your host system and routing all your traffic through a VPN. This is useful if you want to have control over which traffic is sent through the VPN. Sending all your traffic through a VPN is a privacy concern and limits your internet connection to the speed of your VPN.
The ethack/vpn
Docker image and accompanying shell script provide the following:
- OpenVPN client
- Cisco AnyConnect or Juniper Pulse client
- SSH server (default port 2222) with public key authentication enabled and configured
- SOCKS 5 server (default port 1080)
- HTTP Proxy server (default port 1088)
- SSH config file entry created for each VPN connection
- Install Docker using the instructions or use
curl -fsSL https://get.docker.com -o get-docker.sh | sh
if you have a supported linux distro and like to live dangerously. - Source
vpn.sh
in your.bashrc
file or current shell. E.g.source vpn.sh
# openvpn NAME [OpenVPN args...]
# e.g.
openvpn foo https://vpn.example.com
# openconnect NAME [OpenConnect args...]
# e.g.
openconnect bar https://vpn.example.com
The first argument is an arbitrary name that you give your VPN connection. This is used in the Docker container names and the SSH config file. The rest of the arguments are passed to the VPN client. Each example above will connect to a VPN located at vpn.example.com.
Once connected, you will see a message telling you which ports are available and the name of the ssh config profile.
============================================
SSH Port: 2222
SOCKS Proxy Port: 1080
HTTP Proxy Port: 1088
Use: ssh foo
============================================
I recommend using a proxy switcher browser extension like one of the following. This allows you to quickly switch proxies on/off or tunnel certain websites through a proxy while letting all other traffic go through your default gateway.
openvpn foo
To connect to the foo
VPN put your config file at ~/.vpn/foo.ovpn
and then you can run openvpn foo
to automatically use the corresponding config file.
You can optionally put your credentials in ~/.vpn/foo.creds
. The username goes on the first line and the password on the second line. This gives up some security for the convenience of not having to enter your username and password. You will still be prompted for your 2FA code if your VPN endpoint requires it. You can run chmod 600 ~/.vpn/foo.creds
to ensure only the file owner can read it.
OpenConnect offers an additional interactive command openconnect_new_profile
which will guide you through a creation of a configuration profile. Once created, the profile is saved in ~/.vpn/NAME.profile
and ~/.vpn/NAME.secret
. To connect using a profile you can simply use openconnect NAME
and the VPN connection will be established without any interaction. Currently, the following options are supported:
- Hostname & optional port
- Username authentication
- with password
- without password
- with password & external 2-factor authentication
- Connection group
If you need custom configs for the openconnect client, you can create a file called ~/.vpn/foo.config
where you can
use the wide range of configuration available at the openconnect documentation.
The file would be mounted inside the container and passed to the CLI with --config
option.
You can customize options by setting the following environment variables. The defaults are shown below.
BIND_INTERFACE
: 127.0.0.1SSH_PORT
: 2222SOCKS_PORT
: 1080HTTP_PROXY_PORT
: 1088AUTHORIZED_KEYS
: Any keys allowed to SSH as the current user to the current machine, any keys configured inssh-agent
, and any keys found in~/.ssh/*.pub
.
In order to have custom hostname resolution done inside the container, you can add a ~/.vpn/NAME.hosts
, NAME
being
the profile config for either openconnect or openvpn. The format of the files follows the same standard as your
/etc/hosts file:
my-custom-hostname 1.1.1.1
The hosts will then be added one by one to the docker command args, which would then edit the /etc/hosts
file inside
the container. See docker --add-host option for
more information.
You can add a custom env that is then passed to the docker cli using the file ~/.vpn/NAME.env
, NAME
being
the profile config for either openconnect or openvpn. See
--env-file option
for more information.
To mount custom files or folders on the container, add a file ~/.vpn/NAME.mounts
, NAME
being the profile for either
openconnect or openvpn. The file follows the same format as the hosts file, where the first element is the local file,
and the second is the remote file:
/local/file/to/be/mounted /container/mount/point
Please note that neither of the file paths can contain spaces.
docker-vpn provides all the power of an OpenSSH server. For example:
- Dynamic port forwarding (SOCKS proxy)
ssh -D 1080 foo
- Starts a socks5 proxy on port 1080. Connections using this proxy will be tunneled through SSH into the container and then tunneled to thefoo
network through the VPN client. - Local port forwarding
ssh -L 8080:private.foo.com:80 foo
- Forwards port 80 on private.foo.com so that you can access it from localhost:8080. - Jump hosts
ssh -J foo [email protected]
- Allows connecting via SSH to a remote server private.foo.com that is not directly accessible but is accessible by using the docker-vpnfoo
as a jump host. (Requires OpenSSH 7.3) - TUN/TAP support - SSH has builtin tunneling support. This is similar to just connecting directly with OpenVPN or OpenConnect software, but gives you the power (and responsibility) to configure your own routing.
- If you have multiple VPNs you want to connect to at once, you have to choose ports that do not conflict.
- VPN configurations can be wildly different. I created these to make my specific use case easier. Other configurations may require passing in your own command line options and adding your own volume mounts.