From Makers Local 256
Jump to: navigation, search


  • We use the ocserv VPN server.
    • This server implements the Cisco AnyConnect protocol. You can use either the OpenConnect open source client or Cisco's AnyConnect client to connect. Both AnyConnect and OpenConnect are available on many platforms, including GNU/Linux, Windows, Mac OS X, and Android. On Windows, you might want to try this OpenConnect GUI, but I don't know much about it.
  • All members have the option to use the VPN. Since we have not enabled LDAP authentication just yet, you will need to set a VPN password first.

Acquiring access

  1. Request VPN account from EnabrinTain or hfuller.
    • This will need to be done in person, or in a way that the admin can be certain of your identity.
  2. Set your VPN password.


  1. Start the AnyConnect or OpenConnect client, and supply the address
    • On most platforms, you can do openconnect
  2. Enter your VPN username and continue.
  3. Enter your VPN password and continue.
  4. Accept the terms of use for the VPN.

Now your connection will be brought online and you can access Maker-exclusive network resources. (Your connection may be announced in IRC.)

Script with Pass

If you want to automate some of the connection process without using NetworkManager, then you can try this.

Now we're ready to write a small bash script:


# Check to see if the device already exists
ip addr | grep "vpn0"
if [ !$IPADDR ]; then
	sudo ip tuntap add vpn0 mode tun user berocs # berocs is my system username

PSWD=$(pass makers/vpn) # Or hardcode it if your password manager isn't amazing.

echo -e "${PSWD}\n" | \ # Send "$PSWD" to stdin
openconnect -b --pid-file=/tmp/ -i vpn0 \
-s 'sudo -E /etc/vpnc/vpnc-script' \
-u ctag # ctag is my VPN username


Poor Man's VPN

If you have a VPN account, but you can't run OpenConnect or AnyConnect at the moment, you can use ssh to log into the newvpn box:


From there, you could ssh to other resources at the shop, or do whatever else you can do from the command line.

You can also use ssh's -L option to forward ports on your local machine to ports on the Makers network, if that's your thing:

ssh -L 2222:cascade:22

If I were Tyler, this example would expose port 22 on CasCADE as port 2222 on my local computer. See man ssh for more help with this.

Finally, mosh is also available. As you might guess, you can do this: