As of 2015 Columbia UIT does not officially support Linux VPN. For Windows and Mac OS instructions click here.
Using VPNs, an organization can help secure private network traffic over an unsecured network, such as the Internet. VPN helps provide a secure mechanism for encrypting and encapsulating private network traffic and moving it through an intermediate network. Data is encrypted for confidentiality, and packets that might be intercepted on the shared or public network are indecipherable without the correct encryption keys. Data is also encapsulated, or wrapped, with an IP header containing routing information.†
By routing traffic through the Columbia VPN you will have access to the university and library resources. Your traffic will be secured from point access to Columbia servers. This may be important when traveling or working from home.
This tutorial assumes Ubuntu or Debian derivatives. Your mileage may vary. You will need to have some proficiency with the terminal to follow.
-
Download the oldest Mac client from the official CUIT page. You will need your ID and password.
-
The client comes as a
.dmgfile. Use the7zutility to unpack by running7z x vpnclient-XXXXXXXXXXXXXX-k9.dmg. -
cdinto the resultingCiscoVPNClient/Profilesdirectory. OpenColumbia VPN.pcfin your text editor. -
Note the encrypted
enc_GroupPwdvalue which should be a long (100+ bytes) string. You will also need values from theHostandGroupNamefields. -
Use the Cisco Vpnclient Password Decoder.† This should produce a short password that you should keep somewhere safe.
†† Note that this step presents a minor security vulnerability, as you are potentially exposing the group password to third parties. Contact CUIT to request Linux VPN support today! Until they do, run the C script locally instead of using the web service.
-
Install
network-manager-vpncornetwork-manager-vpnc-gnomedepending on your distribution. In my case, I run "sudo apt-get install network-manager-vpnc-gnome`. -
Alternatively,
sudo apt-get install vpncfor the command line version of the tool. Skip to Step 11. -
If you installed the network manager (nm) plugin, reboot. Left-click on the nm status icon, select
vpn connectionsandconfigure vpn. -
Enter the value of
hostfrom Step 4 forgatewayand your UNI and password foruser name. Copy the group name from Step 4, and the decoded password forgroup password. Give the connection a reasonable name and save. -
In
ipv4 settingsclickRoutesand select "Ignore automatically obtained routes." -
You are all set! To use, left click on nm status, select
vpn connectionsand click on name to connect. Look for a visual indication from nm to see if you are connected. -
Optionally, right click to edit connection and select "automatically connect to VPN when using this connection." You are done!
-
If you went the command line route, edit
/etc/vpnc/default.conf(create if needed) to include the following (without the squre brackets):IPSec gateway host [Host from Step 4] IPSec id [groupname from Step 4] IPSec secret [decrypted pass from Step 4] Xauth username [your UNI]You can include your UNI password here, but it is not recommended to keep passwords in cleartext. For more information see here.
-
Run
sudo vpnc-connectandsudo vpnc-disconnectto operate. Look fortunwhen runningsudo ifconfigto check for the connection. You are done!