As of 2015 Columbia UIT does not officially support Linux VPN. For Windows and Mac OS instructions click here.
Using VPNs, an organization can help secure private network traffic over an unsecured network, such as the Internet. VPN helps provide a secure mechanism for encrypting and encapsulating private network traffic and moving it through an intermediate network. Data is encrypted for confidentiality, and packets that might be intercepted on the shared or public network are indecipherable without the correct encryption keys. Data is also encapsulated, or wrapped, with an IP header containing routing information.†
By routing traffic through the Columbia VPN you will have access to the university and library resources. Your traffic will be secured from point access to Columbia servers. This may be important when traveling or working from home.
This tutorial assumes Ubuntu or Debian derivatives. Your mileage may vary. You will need to have some proficiency with the terminal to follow.
-
Download the oldest Mac client from the official CUIT page. You will need your ID and password.
-
The client comes as a
.dmg
file. Use the7z
utility to unpack by running7z x vpnclient-XXXXXXXXXXXXXX-k9.dmg
. -
cd
into the resultingCiscoVPNClient/Profiles
directory. OpenColumbia VPN.pcf
in your text editor. -
Note the encrypted
enc_GroupPwd
value which should be a long (100+ bytes) string. You will also need values from theHost
andGroupName
fields. -
Use the Cisco Vpnclient Password Decoder.† This should produce a short password that you should keep somewhere safe.
†† Note that this step presents a minor security vulnerability, as you are potentially exposing the group password to third parties. Contact CUIT to request Linux VPN support today! Until they do, run the C script locally instead of using the web service.
-
Install
network-manager-vpnc
ornetwork-manager-vpnc-gnome
depending on your distribution. In my case, I run "sudo apt-get install network-manager-vpnc-gnome`. -
Alternatively,
sudo apt-get install vpnc
for the command line version of the tool. Skip to Step 11. -
If you installed the network manager (nm) plugin, reboot. Left-click on the nm status icon, select
vpn connections
andconfigure vpn
. -
Enter the value of
host
from Step 4 forgateway
and your UNI and password foruser name
. Copy the group name from Step 4, and the decoded password forgroup password
. Give the connection a reasonable name and save. -
In
ipv4 settings
clickRoutes
and select "Ignore automatically obtained routes." -
You are all set! To use, left click on nm status, select
vpn connections
and click on name to connect. Look for a visual indication from nm to see if you are connected. -
Optionally, right click to edit connection and select "automatically connect to VPN when using this connection." You are done!
-
If you went the command line route, edit
/etc/vpnc/default.conf
(create if needed) to include the following (without the squre brackets):IPSec gateway host [Host from Step 4] IPSec id [groupname from Step 4] IPSec secret [decrypted pass from Step 4] Xauth username [your UNI]
You can include your UNI password here, but it is not recommended to keep passwords in cleartext. For more information see here.
-
Run
sudo vpnc-connect
andsudo vpnc-disconnect
to operate. Look fortun
when runningsudo ifconfig
to check for the connection. You are done!