This is a replacement for the
vpnc-script
used by OpenConnect or
VPNC.
Instead of trying to copy the behavior of standard corporate VPN clients, which normally reroute all your network traffic through the VPN, this one tries to minimize your contact with an intrusive VPN. This is also known as a split-tunnel VPN, since it splits your traffic between the VPN tunnel and your normal network interfaces.
vpn-slice
makes it easy to set up a split-tunnel VPN:
/etc/hosts
(which it cleans up
after VPN disconnection), however it does not otherwise alter your
/etc/resolv.conf
at all.--route-splits
to additionally route traffic for specific
subnets requested by the server). Run vpn-slice --help
to see
them all.If you are using a VPN to route all your traffic for privacy reasons (or to avoid censorship in repressive countries), then you do not want to use this.
The purpose of this tool is almost the opposite; it makes it easy to connect to a VPN while minimizing the traffic that passes over the VPN.
This is for people who have to connect to the high-security VPNs of corporations or other bureaucracies (which monitor and filter and otherwise impede network traffic), and thus wish to route as little traffic as possible through those VPNs.
dnspython
module (preferred, tested with v1.16.0)dig
command-line DNS lookup tool (tested with v9.9.5 and v9.10.3)iproute2
and
iptables
utilities
(used for all routing setup)
Furthermore, resolveconf
or systemd-resolved
is needed for split DNS. SystemD's resolvconf is preferred over resolvconf, if both are present on a system.route
route
if procfs
is mountedYou can install the latest build from PyPI
with pip
(make sure you are using the Python 3.x version, usually invoked
with pip3
).
You should install as root
(e.g. using sudo
), because
openconnect
or vpnc
will need to be able to invoke vpn-slice
while running as root:
```sh
$ sudo pip3 install "vpn-slice[dnspython,setproctitle]"
$ sudo pip3 install "https://github.com/dlenski/vpn-slice/archive/master.zip#egg=vpn-slice[dnspython,setproctitle]" ```
(If your system doesn't support dnspython
or setproctitle
, for some reason, then omit those.)
You can use the bdist_rpm
target to package vpn-slice as an RPM, and thereby install it with your distribution's
packaging system, allowing it to keep track of installed files.
See the documention for important
details about the portability and reusability of RPM packages built in this way:
sh
$ python3 setup.py bdist_rpm --requires=python3-dns,python3-setproctitle
$ sudo dnf install dist/vpn-slice-*.noarch.rpm
On macOS, you can also install from the Homebrew repository:
sh
$ brew install vpn-slice
Before trying to use vpn-slice
with openconnect
or vpnc
,
check that it works properly on your platform, and can verify that it has all of
the access and dependencies that it needs (to modify /etc/hosts
, alter
routing table, etc.):
```sh $ sudo vpn-slice --self-test
Self-test passed. Try using vpn-slice with openconnect or vpnc now.
```
If you run the self-test as a non-root
user, it will tell you what required
access it is unable to obtain:
```sh $ vpn-slice --self-test WARNING: Couldn't configure hosts provider: Cannot read/write /etc/hosts
Self-test did not pass. Double-check that you are running as root (e.g. with sudo)
Aborting because providers for hosts are required; use --help for more information ```
When you start trying to use vpn-slice
for real, you should use the
diagnostic options (e.g openconnect -s 'vpn-slice
--verbose --dump'
) to troubleshoot and understand its behavior.
You should specify vpn-slice
as your connection script with
openconnect
or vpnc
. It has been tested with vpnc v0.5.3, OpenConnect
v7.06+ (Cisco AnyConnect and Juniper protocols) and v8.0+ (PAN GlobalProtect
protocol).
For example:
sh
$ sudo openconnect gateway.bigcorp.com -u user1234 \
-s 'vpn-slice 192.168.1.0/24 hostname1 alias2=alias2.bigcorp.com=192.168.1.43'
$ cat /etc/hosts
...
192.168.1.1 dns0.tun0 # vpn-slice-tun0 AUTOCREATED
192.168.1.2 dns1.tun0 # vpn-slice-tun0 AUTOCREATED
192.168.1.57 hostname1 hostname1.bigcorp.com # vpn-slice-tun0 AUTOCREATED
192.168.1.43 alias2 alias2.bigcorp.com # vpn-slice-tun0 AUTOCREATED
or
```sh
$ sudo vpnc config_file \ --script '/path/to/vpn-slice 192.168.1.0/24 hostname1 alias2=alias2.bigcorp.com=192.168.1.43' ```
Notice that vpn-slice
accepts several different kinds of routes and hostnames on the command line:
hostname1
) as well as host-to-IP aliases (alias2=alias2.bigcorp.com=192.168.1.43
).
The former are first looked up using the VPN's DNS servers. Both are also added to the routing table, as
well as to /etc/hosts
(unless --no-host-names
is specified). As in this example, multiple aliases can
be specified for a single IP address.10.0.0.0/8
) in the VPN routes as well as subnets to explicitly exclude (%10.123.0.0/24
).There are many command-line options to alter the behavior of
vpn-slice
; try vpn-slice --help
to show them all.
Running with --verbose
makes it explain what it is doing, while running with
--dump
shows the environment variables passed in by the caller.
vpnc-script
.--auto-hosts
and --seed-hosts
options. These inspired the
automatic host lookup feature.dig
.GPLv3 or later.
I want prevent any writes into /etc/hosts and I use --no-host-names --no-short-names --no-ns-hosts
options. But I always get a message WARNING: Couldn't configure hosts provider: Cannot read/write /etc/hosts
. I think when this options was added this configuration doesn't need.
What I want? I want to use vpn-slice without any hidden sudo privileges on my MacOS. Only add %admin ALL=(ALL) NOPASSWD: /opt/homebrew/bin/vpn-slice
to sudoers file.
In ubuntu 22.10 /etc/resolv.conf resolves to ../run/systemd/resolve/stub-resolv.conf so it does not match the regex.
So, it is better to use the absolute path.
Using the repository
name=Copr repo for vpn-slice owned by janbaudisch
baseurl=https://download.copr.fedorainfracloud.org/results/janbaudisch/vpn-slice/fedora-$releasever-$basearch/
type=rpm-md
skip_if_unavailable=True
gpgcheck=1
gpgkey=https://download.copr.fedorainfracloud.org/results/janbaudisch/vpn-slice/pubkey.gpg
repo_gpgcheck=0
enabled=1
enabled_metadata=1
the package fails to install due to missing dependencies which no longer exist. On Fedora 37, it looks like the dependency package names have changed to a prefixed format (python-setproctitle
, python-dns
, etc).
Sample error:
[[email protected] ~]# dnf install vpn-slice
Repository copr:copr.fedorainfracloud.org:janbaudisch:vpn-slice is listed more than once in the configuration
Last metadata expiration check: 0:15:52 ago on Wed 07 Dec 2022 11:17:28 AM MST.
Error:
Problem: conflicting requests
- nothing provides python3.9dist(dnspython) needed by vpn-slice-0.15-1.fc35.x86_64
- nothing provides python3.9dist(setproctitle) needed by vpn-slice-0.15-1.fc35.x86_64
- nothing provides python3.9dist(setuptools) needed by vpn-slice-0.15-1.fc35.x86_64
- nothing provides python(abi) = 3.9 needed by vpn-slice-0.15-1.fc35.x86_64
(try to add '--skip-broken' to skip uninstallable packages)
Using vpn-slice
from current master
in a Docker container on macOS fails with "Invalid argument":
```
(22, 'Invalid argument') ```
It even fails in the same way without any arguments:
```
(22, 'Invalid argument') ```
Using revision fde18b767df20bcea842084f2e03eb0723f9b4ea still works as expected.
You can find a complete strace
here: strace-vpn-slice.log
add check if /etc/resolv.conf is symlink to ResolvedSplitDNSProvider.inuse() before resolving the link, this prevents EINVAL
from os.readlink()
self test would fail with "invalid argument" error since os.readlink
would fail with EINVAL
if the argument is not a link
python_requires
instead.https://packaging.python.org/en/latest/guides/dropping-older-python-versions/
Physics PhD, marathoner, former Intel semiconductor engineer. I'm a long-time FLOSS user, like to code in Python and C, and enjoy Π―ΖΖΠIβ ΠΖing.
GitHub Repositoryvpnc openconnect vpn-client iproute2 split-tunnel vpn-slice