trailofbits / algo

Set up a personal VPN in the cloud
https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/
GNU Affero General Public License v3.0
28.98k stars 2.32k forks source link

EC2 volume not encrypted by default #669

Closed benturner closed 7 years ago

benturner commented 7 years ago

OS / Environment

AWS EC2, Ubuntu 16.04

Summary of the problem

I just successfully deployed a new algo instance today using master rev 80097780128f29a295002d67e9a21b11ff5375fc and my EC2 instance is using an unencrypted volume. I expected it to be encrypted because of https://github.com/trailofbits/algo/blame/master/docs/deploy-from-ansible.md#L110

Steps to reproduce the behavior

Install prerequisites and run algo as per README.md

Full log

$ ./algo 

  What provider would you like to use?
    1. DigitalOcean
    2. Amazon EC2
    3. Microsoft Azure
    4. Google Compute Engine
    5. Install to existing Ubuntu 16.04 server

Enter the number of your desired provider
: 2

Enter your aws_access_key (http://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html)
Note: Make sure to use an IAM user with an acceptable policy attached (see https://github.com/trailofbits/algo/blob/master/docs/deploy-from-ansible.md).
[pasted values will not be displayed]
[AKIA...]: 

Enter your aws_secret_key (http://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html)
[pasted values will not be displayed]
[ABCD...]: 

Name the vpn server:
[algo]: 

  What region should the server be located in?
    1.   us-east-1           US East (N. Virginia)
    2.   us-east-2           US East (Ohio)
    3.   us-west-1           US West (N. California)
    4.   us-west-2           US West (Oregon)
    5.   ap-south-1          Asia Pacific (Mumbai)
    6.   ap-northeast-2      Asia Pacific (Seoul)
    7.   ap-southeast-1      Asia Pacific (Singapore)
    8.   ap-southeast-2      Asia Pacific (Sydney)
    9.   ap-northeast-1      Asia Pacific (Tokyo)
    10.  eu-central-1        EU (Frankfurt)
    11.  eu-west-1           EU (Ireland)
    12.  eu-west-2           EU (London)
    13.  ca-central-1        Canada (Central)
    14.  sa-east-1           São Paulo
Enter the number of your desired region:
[1]: 3

Do you want macOS/iOS clients to enable "VPN On Demand" when connected to cellular networks?
[y/N]: y

Do you want macOS/iOS clients to enable "VPN On Demand" when connected to Wi-Fi?
[y/N]: y

List the names of trusted Wi-Fi networks (if any) that macOS/iOS clients exclude from using the VPN (e.g., your home network. Comma-separated value, e.g., HomeNet,OfficeWifi,AlgoWiFi)
: 

Do you want to install a DNS resolver on this VPN server, to block ads while surfing?
[y/N]: y

Do you want each user to have their own account for SSH tunneling?
[y/N]: y

Do you want to apply operating system security enhancements on the server? (warning: replaces your sshd_config)
[y/N]: y

Do you want the VPN to support Windows 10 or Linux Desktop clients? (enables compatible ciphers and key exchange, less secure)
[y/N]: n

Do you want to retain the CA key? (required to add users in the future, but less secure)
[y/N]: n

PLAY [Configure the server] ****************************************************

TASK [setup] *******************************************************************
ok: [localhost]

TASK [Generate the SSH private key] ********************************************
ok: [localhost]

TASK [Generate the SSH public key] *********************************************
ok: [localhost]

TASK [Change mode for the SSH private key] *************************************
ok: [localhost]

TASK [Ensure the dynamic inventory exists] *************************************
ok: [localhost]

TASK [cloud-ec2 : set_fact] ****************************************************
ok: [localhost]

TASK [cloud-ec2 : Locate official AMI for region] ******************************
ok: [localhost]

TASK [cloud-ec2 : set_fact] ****************************************************
ok: [localhost]

TASK [cloud-ec2 : Make a cloudformation template] ******************************
changed: [localhost]

TASK [cloud-ec2 : Deploy the template] *****************************************
changed: [localhost]

TASK [cloud-ec2 : Add new instance to host group] ******************************
changed: [localhost]

TASK [cloud-ec2 : set_fact] ****************************************************
ok: [localhost]

TASK [cloud-ec2 : Get EC2 instances] *******************************************
ok: [localhost]

TASK [cloud-ec2 : Ensure the group ec2 exists in the dynamic inventory file] ***
ok: [localhost]

TASK [cloud-ec2 : Populate the dynamic inventory] ******************************
changed: [localhost] => (item={u'kernel': None, u'instance_profile': None, u'root_device_type': u'ebs', u'private_dns_name': u'ip-172-16-254-111.us-west-1.compute.internal', u'spot_instance_request_id': None, u'source_destination_check': u'true', u'id': u'i-0f10d64fed43f99f7', u'ebs_optimized': False, u'state': u'running', u'client_token': u'algo-EC2Ins-7BMCGM4FAEIG', u'virtualization_type': u'hvm', u'ramdisk': None, u'public_ip_address': u'<redacted>', u'block_device_mapping': [{u'status': u'attached', u'volume_id': u'vol-0940b4a197e42b2bc', u'delete_on_termination': True, u'attach_time': u'2017-09-09T17:59:32.000Z', u'device_name': u'/dev/sda1'}], u'key_name': None, u'interfaces': [{u'id': u'eni-be3caebd', u'mac_address': u'06:fd:e5:02:4d:14'}], u'image_id': u'ami-969ab1f6', u'groups': [{u'id': u'sg-e3104984', u'name': u'algo-InstanceSecurityGroup-1HVOJV7BU2MKR'}], u'public_dns_name': u'ec2-52-52-155-212.us-west-1.compute.amazonaws.com', u'requester_id': None, u'tags': {u'Environment': u'Algo', u'aws:cloudformation:stack-name': u'algo', u'Name': u'Algo', u'aws:cloudformation:stack-id': u'arn:aws:cloudformation:us-west-1:961786036411:stack/algo/81658f30-3090-11e7-baff-500cf8eeb835', u'aws:cloudformation:logical-id': u'EC2Instance'}, u'monitoring_state': u'disabled', u'placement': {u'tenancy': u'default', u'zone': u'us-west-1a'}, u'ami_launch_index': u'0', u'hypervisor': u'xen', u'region': u'us-west-1', u'launch_time': u'2017-09-09T17:59:32.000Z', u'persistent': False, u'architecture': u'x86_64', u'private_ip_address': u'172.16.254.111', u'vpc_id': u'vpc-0991146d'})
ok: [localhost] => (item={u'kernel': None, u'instance_profile': None, u'root_device_type': u'ebs', u'private_dns_name': u'ip-172-16-254-201.us-west-1.compute.internal', u'spot_instance_request_id': None, u'source_destination_check': u'true', u'id': u'i-05f825d710e39b6fe', u'ebs_optimized': False, u'state': u'running', u'client_token': u'algo-EC2Ins-1FJDF2L0M7ZMV', u'virtualization_type': u'hvm', u'ramdisk': None, u'public_ip_address': u'54.183.0.54', u'block_device_mapping': [{u'status': u'attached', u'volume_id': u'vol-0e25b2d0016fcb8cc', u'delete_on_termination': True, u'attach_time': u'2017-05-04T06:12:51.000Z', u'device_name': u'/dev/sda1'}], u'key_name': None, u'interfaces': [{u'id': u'eni-a92f3ba8', u'mac_address': u'06:0a:42:b8:93:cc'}], u'image_id': u'ami-2afbde4a', u'groups': [{u'id': u'sg-e3104984', u'name': u'algo-InstanceSecurityGroup-1HVOJV7BU2MKR'}], u'public_dns_name': u'ec2-54-183-0-54.us-west-1.compute.amazonaws.com', u'requester_id': None, u'tags': {u'Environment': u'Algo', u'aws:cloudformation:stack-name': u'algo', u'aws:cloudformation:stack-id': u'arn:aws:cloudformation:us-west-1:961786036411:stack/algo/81658f30-3090-11e7-baff-500cf8eeb835', u'Name': u'Algo', u'aws:cloudformation:logical-id': u'EC2Instance'}, u'monitoring_state': u'disabled', u'placement': {u'tenancy': u'default', u'zone': u'us-west-1a'}, u'ami_launch_index': u'0', u'hypervisor': u'xen', u'region': u'us-west-1', u'launch_time': u'2017-05-04T06:12:50.000Z', u'persistent': False, u'architecture': u'x86_64', u'private_ip_address': u'172.16.254.201', u'vpc_id': u'vpc-0991146d'})

TASK [Wait until SSH becomes ready...] *****************************************
ok: [localhost]

TASK [A short pause, in order to be sure the instance is ready] ****************
Pausing for 20 seconds
(ctrl+C then 'C' = continue early, ctrl+C then 'A' = abort)
ok: [localhost]

TASK [Ensure the local ssh directory is exist] *********************************
ok: [localhost]

TASK [Copy the algo ssh key to the local ssh directory] ************************
ok: [localhost]

PLAY [Configure the server and install required software] **********************

TASK [Check the system] ********************************************************
changed: [<redacted>]

TASK [Ubuntu | Install prerequisites] ******************************************
changed: [<redacted>]

TASK [Ubuntu | Configure defaults] *********************************************
changed: [<redacted>]

TASK [FreeBSD / HardenedBSD | Install prerequisites] ***************************
skipping: [<redacted>]

TASK [FreeBSD / HardenedBSD | Configure defaults] ******************************
skipping: [<redacted>]

TASK [set_fact] ****************************************************************
skipping: [<redacted>]

TASK [Gather Facts] ************************************************************
ok: [<redacted>]

TASK [Ensure the algo ssh key exist on the server] *****************************
ok: [<redacted>]

TASK [Enable IPv6] *************************************************************
ok: [<redacted>]

TASK [Set facts if the deployment in a cloud] **********************************
ok: [<redacted>]

TASK [Generate password for the CA key] ****************************************
changed: [<redacted> -> localhost]

TASK [Generate p12 export password] ********************************************
changed: [<redacted> -> localhost]

TASK [Define password facts] ***************************************************
ok: [<redacted>]

TASK [Define the commonName] ***************************************************
ok: [<redacted>]

TASK [common : Install software updates] ***************************************
changed: [<redacted>]

TASK [common : Check if reboot is required] ************************************
changed: [<redacted>]

TASK [common : Reboot] *********************************************************
ok: [<redacted>]

TASK [common : Wait until SSH becomes ready...] ********************************
ok: [<redacted> -> localhost]

TASK [common : Disable MOTD on login and SSHD] *********************************
changed: [<redacted>] => (item={u'regexp': u'^session.*optional.*pam_motd.so.*', u'line': u'# MOTD DISABLED', u'file': u'/etc/pam.d/login'})
changed: [<redacted>] => (item={u'regexp': u'^session.*optional.*pam_motd.so.*', u'line': u'# MOTD DISABLED', u'file': u'/etc/pam.d/sshd'})

TASK [common : Loopback for services configured] *******************************
changed: [<redacted>]

TASK [common : Loopback included into the network config] **********************
changed: [<redacted>]

RUNNING HANDLER [common : restart loopback] ************************************
changed: [<redacted>]

TASK [common : Check apparmor support] *****************************************
changed: [<redacted>]

TASK [common : set_fact] *******************************************************
ok: [<redacted>]

TASK [common : set_fact] *******************************************************
ok: [<redacted>]

TASK [common : set_fact] *******************************************************
skipping: [<redacted>]

TASK [common : Loopback included into the rc config] ***************************
skipping: [<redacted>]

TASK [common : Enable the gateway features] ************************************
skipping: [<redacted>] => (item={u'value': u'"YES"', u'param': u'firewall_enable'}) 
skipping: [<redacted>] => (item={u'value': u'"open"', u'param': u'firewall_type'}) 
skipping: [<redacted>] => (item={u'value': u'"YES"', u'param': u'gateway_enable'}) 
skipping: [<redacted>] => (item={u'value': u'"YES"', u'param': u'natd_enable'}) 
skipping: [<redacted>] => (item={u'value': u'""', u'param': u'natd_interface'}) 
skipping: [<redacted>] => (item={u'value': u'"-dynamic -m"', u'param': u'natd_flags'}) 

TASK [common : FreeBSD | Activate IPFW] ****************************************
skipping: [<redacted>]

TASK [common : Install tools] **************************************************
changed: [<redacted>] => (item=[u'git', u'screen', u'apparmor-utils', u'uuid-runtime', u'coreutils', u'sendmail', u'iptables-persistent', u'cgroup-tools', u'openssl'])

TASK [common : Sysctl tuning] **************************************************
changed: [<redacted>] => (item={u'item': u'net.ipv4.ip_forward', u'value': 1})
changed: [<redacted>] => (item={u'item': u'net.ipv4.conf.all.forwarding', u'value': 1})
changed: [<redacted>] => (item={u'item': u'net.ipv6.conf.all.forwarding', u'value': 1})

TASK [security : Install tools] ************************************************
ok: [<redacted>] => (item=[u'unattended-upgrades'])

TASK [security : Configure unattended-upgrades] ********************************
changed: [<redacted>]

TASK [security : Periodic upgrades configured] *********************************
changed: [<redacted>]

TASK [security : Find directories for minimizing access] ***********************
ok: [<redacted>] => (item=/usr/local/sbin)
ok: [<redacted>] => (item=/usr/local/bin)
ok: [<redacted>] => (item=/usr/sbin)
ok: [<redacted>] => (item=/usr/bin)
ok: [<redacted>] => (item=/sbin)
ok: [<redacted>] => (item=/bin)

TASK [security : Minimize access] **********************************************
ok: [<redacted>] => (item=(censored due to no_log))
ok: [<redacted>] => (item=(censored due to no_log))
ok: [<redacted>] => (item=(censored due to no_log))
ok: [<redacted>] => (item=(censored due to no_log))
ok: [<redacted>] => (item=(censored due to no_log))
ok: [<redacted>] => (item=(censored due to no_log))

TASK [security : Change shadow ownership to root and mode to 0600] *************
changed: [<redacted>]

TASK [security : change su-binary to only be accessible to user and group root] 
changed: [<redacted>]

TASK [security : Collect Use of privileged commands] ***************************
changed: [<redacted>]

TASK [security : Restrict core dumps (with PAM)] *******************************
changed: [<redacted>]

TASK [security : Restrict core dumps (with sysctl)] ****************************
changed: [<redacted>]

TASK [security : Disable Source Routed Packet Acceptance] **********************
changed: [<redacted>] => (item=net.ipv4.conf.all.accept_source_route)
changed: [<redacted>] => (item=net.ipv4.conf.default.accept_source_route)

TASK [security : Disable ICMP Redirect Acceptance] *****************************
changed: [<redacted>] => (item=net.ipv4.conf.all.accept_redirects)
changed: [<redacted>] => (item=net.ipv4.conf.default.accept_redirects)

TASK [security : Disable Secure ICMP Redirect Acceptance] **********************
changed: [<redacted>] => (item=net.ipv4.conf.all.secure_redirects)
changed: [<redacted>] => (item=net.ipv4.conf.default.secure_redirects)

TASK [security : Enable Bad Error Message Protection] **************************
changed: [<redacted>]

TASK [security : Enable RFC-recommended Source Route Validation] ***************
changed: [<redacted>] => (item=net.ipv4.conf.all.rp_filter)
changed: [<redacted>] => (item=net.ipv4.conf.default.rp_filter)

TASK [security : Do not send ICMP redirects (we are not a router)] *************
changed: [<redacted>]

TASK [security : SSH config] ***************************************************
changed: [<redacted>]

TASK [dns_adblocking : The DNS tag is defined] *********************************
ok: [<redacted>]

TASK [dns_adblocking : Dnsmasq installed] **************************************
changed: [<redacted>]

TASK [dns_adblocking : Ensure that the dnsmasq user exist] *********************
changed: [<redacted>]

TASK [dns_adblocking : The dnsmasq directory created] **************************
changed: [<redacted>]

TASK [dns_adblocking : Ubuntu | Dnsmasq profile for apparmor configured] *******
changed: [<redacted>]

TASK [dns_adblocking : Ubuntu | Enforce the dnsmasq AppArmor policy] ***********
changed: [<redacted>]

TASK [dns_adblocking : Ubuntu | Ensure that the dnsmasq service directory exist] ***
changed: [<redacted>]

TASK [dns_adblocking : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ***
changed: [<redacted>]

TASK [dns_adblocking : FreeBSD / HardenedBSD | Enable dnsmasq] *****************
skipping: [<redacted>]

TASK [dns_adblocking : Dnsmasq configured] *************************************
changed: [<redacted>]

TASK [dns_adblocking : Adblock script created] *********************************
changed: [<redacted>]

TASK [dns_adblocking : Adblock script added to cron] ***************************
changed: [<redacted>]

TASK [dns_adblocking : Update adblock hosts] ***********************************
changed: [<redacted>]

RUNNING HANDLER [common : flush routing cache] *********************************
changed: [<redacted>]

RUNNING HANDLER [security : restart ssh] ***************************************
changed: [<redacted>]

RUNNING HANDLER [dns_adblocking : restart dnsmasq] *****************************
changed: [<redacted>]

RUNNING HANDLER [vpn : daemon-reload] ******************************************
changed: [<redacted>]

TASK [dns_adblocking : Dnsmasq enabled and started] ****************************
ok: [<redacted>]

TASK [ssh_tunneling : Ensure that the sshd_config file has desired options] ****
changed: [<redacted>]

TASK [ssh_tunneling : Ensure that the algo group exist] ************************
changed: [<redacted>]

TASK [ssh_tunneling : Ensure that the jail directory exist] ********************
changed: [<redacted>]

TASK [ssh_tunneling : Ensure that the SSH users exist] *************************
changed: [<redacted>] => (item=foo)
changed: [<redacted>] => (item=bar)

TASK [ssh_tunneling : The authorized keys file created] ************************
changed: [<redacted>] => (item=foo)
changed: [<redacted>] => (item=bar)

TASK [ssh_tunneling : Generate SSH fingerprints] *******************************
changed: [<redacted>]

TASK [ssh_tunneling : Fetch users SSH private keys] ****************************
changed: [<redacted>] => (item=foo)
changed: [<redacted>] => (item=bar)

TASK [ssh_tunneling : Change mode for SSH private keys] ************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [ssh_tunneling : Fetch the known_hosts file] ******************************
changed: [<redacted> -> localhost]

TASK [ssh_tunneling : Build the client ssh config] *****************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [ssh_tunneling : SSH | Get active system users] ***************************
skipping: [<redacted>]

TASK [ssh_tunneling : SSH | Delete non-existing users] *************************
skipping: [<redacted>] => (item=null) 

TASK [vpn : Ensure that the strongswan group exist] ****************************
changed: [<redacted>]

TASK [vpn : Ensure that the strongswan user exist] *****************************
changed: [<redacted>]

TASK [vpn : set_fact] **********************************************************
ok: [<redacted>]

TASK [vpn : Ubuntu | Install strongSwan] ***************************************
changed: [<redacted>]

TASK [vpn : Ubuntu | Enforcing ipsec with apparmor] ****************************
changed: [<redacted>] => (item=/usr/lib/ipsec/charon)
changed: [<redacted>] => (item=/usr/lib/ipsec/lookip)
changed: [<redacted>] => (item=/usr/lib/ipsec/stroke)

TASK [vpn : Ubuntu | Enable services] ******************************************
ok: [<redacted>] => (item=apparmor)
ok: [<redacted>] => (item=strongswan)
ok: [<redacted>] => (item=netfilter-persistent)

TASK [vpn : Ubuntu | Ensure that the strongswan service directory exist] *******
changed: [<redacted>]

TASK [vpn : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ********
changed: [<redacted>]

TASK [vpn : Iptables configured] ***********************************************
changed: [<redacted>] => (item={u'dest': u'/etc/iptables/rules.v4', u'src': u'rules.v4.j2'})

TASK [vpn : Iptables configured] ***********************************************
changed: [<redacted>] => (item={u'dest': u'/etc/iptables/rules.v6', u'src': u'rules.v6.j2'})

TASK [vpn : FreeBSD / HardenedBSD | Get the existing kernel parameters] ********
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Set the rebuild_needed fact] ***************
skipping: [<redacted>] => (item=IPSEC) 
skipping: [<redacted>] => (item=IPSEC_NAT_T) 
skipping: [<redacted>] => (item=crypto) 

TASK [vpn : FreeBSD / HardenedBSD | Make the kernel config] ********************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Ensure the all options are enabled] ********
skipping: [<redacted>] => (item=options IPSEC) 
skipping: [<redacted>] => (item=options IPSEC_NAT_T) 
skipping: [<redacted>] => (item=device  crypto) 

TASK [vpn : HardenedBSD | Determine the sources] *******************************
skipping: [<redacted>]

TASK [vpn : FreeBSD | Determine the sources] ***********************************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Increase the git postBuffer size] **********
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Fetching the sources...] *******************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Fetching the sources...] *******************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | The kernel is being built...] **************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | The kernel is being built...] **************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Reboot] ************************************
skipping: [<redacted>]

TASK [vpn : FreeBSD / HardenedBSD | Enable strongswan] *************************
skipping: [<redacted>]

TASK [vpn : Install strongSwan] ************************************************
ok: [<redacted>]

TASK [vpn : Setup the config files from our templates] *************************
changed: [<redacted>] => (item={u'dest': u'/etc/strongswan.conf', u'src': u'strongswan.conf.j2', u'group': u'root', u'mode': u'0644', u'owner': u'root'})
changed: [<redacted>] => (item={u'dest': u'/etc/ipsec.conf', u'src': u'ipsec.conf.j2', u'group': u'root', u'mode': u'0644', u'owner': u'root'})
changed: [<redacted>] => (item={u'dest': u'/etc/ipsec.secrets', u'src': u'ipsec.secrets.j2', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'})

TASK [vpn : Get loaded plugins] ************************************************
changed: [<redacted>]

TASK [vpn : Disable unneeded plugins] ******************************************
changed: [<redacted>] => (item=agent)
skipping: [<redacted>] => (item=sha2) 
changed: [<redacted>] => (item=attr)
skipping: [<redacted>] => (item=pkcs12) 
changed: [<redacted>] => (item=updown)
skipping: [<redacted>] => (item=pkcs7) 
skipping: [<redacted>] => (item=aes) 
skipping: [<redacted>] => (item=openssl) 
changed: [<redacted>] => (item=constraints)
skipping: [<redacted>] => (item=hmac) 
skipping: [<redacted>] => (item=random) 
changed: [<redacted>] => (item=resolve)
skipping: [<redacted>] => (item=socket-default) 
changed: [<redacted>] => (item=connmark)
skipping: [<redacted>] => (item=pem) 
skipping: [<redacted>] => (item=pgp) 
changed: [<redacted>] => (item=md5)
changed: [<redacted>] => (item=sha1)
skipping: [<redacted>] => (item=x509) 
skipping: [<redacted>] => (item=stroke) 
skipping: [<redacted>] => (item=kernel-netlink) 
changed: [<redacted>] => (item=gmp)
skipping: [<redacted>] => (item=nonce) 
changed: [<redacted>] => (item=test-vectors)
changed: [<redacted>] => (item=dnskey)
skipping: [<redacted>] => (item=pubkey) 
changed: [<redacted>] => (item=md4)
changed: [<redacted>] => (item=xcbc)
changed: [<redacted>] => (item=pkcs1)
skipping: [<redacted>] => (item=gcm) 
changed: [<redacted>] => (item=fips-prf)
skipping: [<redacted>] => (item=revocation) 
changed: [<redacted>] => (item=rc2)
changed: [<redacted>] => (item=sshkey)
skipping: [<redacted>] => (item=pkcs8) 

TASK [vpn : Ensure that required plugins are enabled] **************************
skipping: [<redacted>] => (item=agent) 
changed: [<redacted>] => (item=sha2)
skipping: [<redacted>] => (item=attr) 
changed: [<redacted>] => (item=pkcs12)
skipping: [<redacted>] => (item=updown) 
changed: [<redacted>] => (item=pkcs7)
changed: [<redacted>] => (item=aes)
changed: [<redacted>] => (item=openssl)
skipping: [<redacted>] => (item=constraints) 
changed: [<redacted>] => (item=hmac)
changed: [<redacted>] => (item=random)
skipping: [<redacted>] => (item=resolve) 
changed: [<redacted>] => (item=socket-default)
skipping: [<redacted>] => (item=connmark) 
changed: [<redacted>] => (item=pem)
changed: [<redacted>] => (item=pgp)
skipping: [<redacted>] => (item=md5) 
skipping: [<redacted>] => (item=sha1) 
changed: [<redacted>] => (item=x509)
changed: [<redacted>] => (item=stroke)
changed: [<redacted>] => (item=kernel-netlink)
skipping: [<redacted>] => (item=gmp) 
changed: [<redacted>] => (item=nonce)
skipping: [<redacted>] => (item=test-vectors) 
skipping: [<redacted>] => (item=dnskey) 
changed: [<redacted>] => (item=pubkey)
skipping: [<redacted>] => (item=md4) 
skipping: [<redacted>] => (item=xcbc) 
skipping: [<redacted>] => (item=pkcs1) 
changed: [<redacted>] => (item=gcm)
skipping: [<redacted>] => (item=fips-prf) 
changed: [<redacted>] => (item=revocation)
skipping: [<redacted>] => (item=rc2) 
skipping: [<redacted>] => (item=sshkey) 
changed: [<redacted>] => (item=pkcs8)

TASK [vpn : Ensure the pki directory does not exist] ***************************
skipping: [<redacted>]

TASK [vpn : Ensure the pki directories exist] **********************************
changed: [<redacted> -> localhost] => (item=ecparams)
changed: [<redacted> -> localhost] => (item=certs)
changed: [<redacted> -> localhost] => (item=crl)
changed: [<redacted> -> localhost] => (item=newcerts)
changed: [<redacted> -> localhost] => (item=private)
changed: [<redacted> -> localhost] => (item=reqs)

TASK [vpn : Ensure the files exist] ********************************************
changed: [<redacted> -> localhost] => (item=.rnd)
changed: [<redacted> -> localhost] => (item=private/.rnd)
changed: [<redacted> -> localhost] => (item=index.txt)
changed: [<redacted> -> localhost] => (item=index.txt.attr)
changed: [<redacted> -> localhost] => (item=serial)

TASK [vpn : Generate the openssl server configs] *******************************
changed: [<redacted> -> localhost]

TASK [vpn : Build the CA pair] *************************************************
changed: [<redacted> -> localhost]

TASK [vpn : Copy the CA certificate] *******************************************
changed: [<redacted> -> localhost]

TASK [vpn : Generate the serial number] ****************************************
changed: [<redacted> -> localhost]

TASK [vpn : Build the server pair] *********************************************
changed: [<redacted> -> localhost]

TASK [vpn : Build the client's pair] *******************************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Build the client's p12] ********************************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Copy the p12 certificates] *****************************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Get active users] **************************************************
changed: [<redacted> -> localhost]

TASK [vpn : Revoke non-existing users] *****************************************
skipping: [<redacted>] => (item=foo) 
skipping: [<redacted>] => (item=bar) 

TASK [vpn : Copy the revoked certificates to the vpn server] *******************
skipping: [<redacted>] => (item=foo) 
skipping: [<redacted>] => (item=bar) 

TASK [vpn : Copy the keys to the strongswan directory] *************************
changed: [<redacted>] => (item={u'dest': u'/etc/ipsec.d/cacerts/ca.crt', u'src': u'configs/<redacted>/pki/cacert.pem', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'})
changed: [<redacted>] => (item={u'dest': u'/etc/ipsec.d/certs/<redacted>.crt', u'src': u'configs/<redacted>/pki/certs/<redacted>.crt', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'})
changed: [<redacted>] => (item={u'dest': u'/etc/ipsec.d/private/<redacted>.key', u'src': u'configs/<redacted>/pki/private/<redacted>.key', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'})

TASK [vpn : Register p12 PayloadContent] ***************************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Set facts for mobileconfigs] ***************************************
ok: [<redacted> -> localhost]

TASK [vpn : Build the mobileconfigs] *******************************************
changed: [<redacted> -> localhost] => (item=(censored due to no_log))
changed: [<redacted> -> localhost] => (item=(censored due to no_log))

TASK [vpn : Build the strongswan app android config] ***************************
changed: [<redacted> -> localhost] => (item=(censored due to no_log))
changed: [<redacted> -> localhost] => (item=(censored due to no_log))

TASK [vpn : Build the android helper html] *************************************
changed: [<redacted> -> localhost] => (item=(censored due to no_log))
changed: [<redacted> -> localhost] => (item=(censored due to no_log))

TASK [vpn : Build the client ipsec config file] ********************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Build the client ipsec secret file] ********************************
changed: [<redacted> -> localhost] => (item=foo)
changed: [<redacted> -> localhost] => (item=bar)

TASK [vpn : Create the windows check file] *************************************
skipping: [<redacted>]

TASK [vpn : Check if the windows check file exists] ****************************
ok: [<redacted> -> localhost]

TASK [vpn : Build the windows client powershell script] ************************
skipping: [<redacted>] => (item=foo) 
skipping: [<redacted>] => (item=bar) 

TASK [vpn : Restrict permissions for the local private directories] ************
changed: [<redacted> -> localhost] => (item=configs/<redacted>)

RUNNING HANDLER [security : restart ssh] ***************************************
changed: [<redacted>]

RUNNING HANDLER [dns_adblocking : restart apparmor] ****************************
changed: [<redacted>]

RUNNING HANDLER [vpn : restart strongswan] *************************************
changed: [<redacted>]

RUNNING HANDLER [vpn : daemon-reload] ******************************************
changed: [<redacted>]

RUNNING HANDLER [vpn : restart iptables] ***************************************
changed: [<redacted>]

TASK [vpn : strongSwan started] ************************************************
ok: [<redacted>]

TASK [debug] *******************************************************************
ok: [<redacted>] => {
    "msg": [
        [
            "\"#                          Congratulations!                            #\"", 
            "\"#                     Your Algo server is running.                     #\"", 
            "\"#    Config files and certificates are in the ./configs/ directory.    #\"", 
            "\"#              Go to https://whoer.net/ after connecting               #\"", 
            "\"#        and ensure that all your traffic passes through the VPN.      #\"", 
            "\"#               Local DNS resolver 172.16.0.1              #\"", 
            ""
        ], 
        "    \"#                The p12 and SSH keys password for new users is f58623d1             #\"\n", 
        "    ", 
        "    \"#      Shell access: ssh -i configs/algo.pem ubuntu@<redacted>        #\"\n"
    ]
}

TASK [Delete the CA key] *******************************************************
changed: [<redacted> -> localhost]

PLAY RECAP *********************************************************************
<redacted>                 : ok=112  changed=90   unreachable=0    failed=0   
localhost                  : ok=19   changed=4    unreachable=0    failed=0   
dguido commented 7 years ago

This feature is only available in advanced manual installs, as noted in the docs.