User Tools

Site Tools


vpn-pi

VPN via Raspberry Pi 4

  • Use a Raspberry Pi 4 (B) as WiFi access point
  • Home network (and internet connection) attached via Ethernet cable
  • Pi will run ExpressVPN

Disassociate WiFi

In order to use the WiFi chipset as an access point, we need default Raspberry Pi desktop environment (etc) from using it as a client.

One-off:

sudo wpa_cli terminate

Forever: Disabling the service permanently is tricky, as lots of events can cause it to be started. A better solution is to exclude wlan0 from being managed by it, by adding nohook wpa_supplicant to /etc/network/interfaces.d/wlan0 (created in the next section).

Configure WiFi settings

Create /etc/network/interfaces.d/wlan0 and populate it with:

auto wlan0
iface wlan0 inet static
  address 172.16.0.1/24
  nohook wpa_supplicant  # Conflicts with hostapd (WPA is for clients, not access points)

Note the IP address has to be in the same range as –dhcp-range in the following section on dnsmasq.

sudo ifdown --verbose wlan0  # Take interface offline, so when we bring it back it uses our conf
sudo ifup --verbose wlan0

Check it has the IP you chose by running ip -br addr show wlan0, e.g.:

root@raspberrypi4:~# ip -br addr show wlan0
wlan0            UP             172.16.0.1/24 169.254.114.246/16 fe80::3592:65db:94e0:c992/64

DHCP & DNS Services

Disable the default systemd-resolved service which runs on localhost, as it takes control of /etc/resolv.conf, which in turn prevents the DHCP + DNS server we're about to install from noticing when expressvpn changes the DNS server.

It's important that dnsmasq notices when /etc/resolv.conf changes, or DNS lookups will fail entirely due to ExpressVPN adding firewall rules to drop all DNS queries that don't go via ExpressVPN.

sudo systemctl disable --now systemd-resolved
sudo apt update \
&& sudo apt install dnsmasq

Then test this in the foreground so you can see debug messages, etc

sudo systemctl stop dnsmasq \
&& sudo dnsmasq \
  --no-daemon \
  --dhcp-range=172.16.0.10,172.16.0.20,1h \
  --except-interface=eth0 \
  --dhcp-authoritative \
  --log-queries \
  --clear-on-reload

Later on, we'll want to move these settings into /etc/dnsmasq.conf

WiFi Access Point

sudo apt update \
&& sudo apt install hostapd \
&& sudo vim /etc/default/hostapd

… and set DAEMON_CONF to point at a file we'll make in a moment:

DAEMON_CONF="/etc/hostapd/hostapd.conf"

Now create: /etc/hostapd/hostapd.conf

sudo vim /etc/hostapd/hostapd.conf

Note that the country code has to be set to US for this to work. Something to do with regulatory issues about shipping “open” devices or something. Shrug.

(Taken from https://github.com/raspberrypi/linux/issues/2619#issuecomment-410703338 )

ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
auth_algs=1
beacon_int=100

ssid=raspi-webgui
wpa_passphrase=ChangeMe

country_code=US

interface=wlan0
driver=nl80211

wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP

macaddr_acl=0

logger_syslog=0
logger_syslog_level=4
logger_stdout=-1
logger_stdout_level=0

hw_mode=a
wmm_enabled=1

# N
ieee80211n=1
require_ht=1
ht_capab=[MAX-AMSDU-3839][HT40+][SHORT-GI-20][SHORT-GI-40][DSSS_CCK-40]

# AC
ieee80211ac=1
require_vht=1
ieee80211d=0
ieee80211h=0
vht_capab=[MAX-AMSDU-3839][SHORT-GI-80]
vht_oper_chwidth=1
channel=36
vht_oper_centr_freq_seg0_idx=42

ignore_broadcast_ssid=0

Test using the following command (so its all runs in the foreground and prints stuff you can read in case it doesn't work):

sudo systemctl stop hostapd   # Stop the background service, if it was running
sudo hostapd -dd /etc/hostapd/hostapd.conf

Then try to connect from another device (e.g. mobile phone). The WiFi network should be visible, and when you connect you should get an IP address, but probably an error about no internet connection. That's next.

Network Address Translation

Enable Network Address Translation (NAT) on any traffic that leaves us via ExpressVPN's tun0 interface.

Note that the interface doesn't exist until you run expressvpn connect, but you can add the rule to iptables without issue.

iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE

Note that is this is the only MASQUERADE rule (check with iptables -t nat -nvL) then devices using this access point will experience 100% packet loss when ExpressVPN is not connected. I consider this a feature, but if you don't you can add another rule for eth0:

iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
vpn-pi.txt · Last modified: 2020/04/29 16:54 by robm