Pulse Connect Secure
Pulse Connect Secure (PCS), previously known as Juniper SSL VPN, is a commercial VPN solution targeted at businesses.
Installation
AUR
Install the pulse-secureAUR package and start/enable pulsesecure.service
.
To connect via the command line, run the command:
$ /opt/pulsesecure/bin/pulselauncher [-U signinUrl] [-r realm] [-l role] [-c cert] [-u username] [-p password]
Note that the login URL is different from the URL used in browsers. Check "Note regarding Server/URL" section below.
To use the pulseUi
GUI client you need to additionally install webkit2gtk and gtkmm3. In the GUI client, the URL should be same as that used in browsers.
/etc/resolv.conf
to have NetworkManager correctly detect that it should manage DNS.# mkdir -p /var/lib/pulsesecure/pulse # mkdir -p /etc/pki/ca-trust/extracted/openssl # ln -s /etc/ca-certificates/extracted/ca-bundle.trust.crt /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
OpenConnect
The OpenConnect VPN client also supports Pulse Connect Secure. See the initial announcement for more details.
To use, install openconnect. If your Juniper VPN setup does not require any input after connecting you can use this command in order to connect
# openconnect --protocol=pulse https://vpn.example.com/
If you want NetworkManager support, install networkmanager-openconnect, or try the latest git version. The VPN connection can be created through the GUI or by using this command:
$ nmcli con add type vpn con-name "Connection Name" ifname "*" vpn-type openconnect -- vpn.data "gateway=vpn.example.com,protocol=nc"
Third-party scripts
JNC
1. Go to your company's VPN site, log in and download/install the Juniper client.
2. Install jncAUR[broken link: package not found]. You need to enable the multilib repository: see the upstream website.
3. Make a directory for the .config file:
$ mkdir -p ~/.juniper_networks/network_connect/config
4. Copy and adapt this .config file in this directory:
~/.juniper_networks/network_connect/config/.config
host=foo.bar.com user=username password=secret realm= realm with spaces cafile=/etc/ssl/bar-chain.pem certfile=
- cafile
- ca chain to verify the host certificate
- certfile
- host certificate in DER format. Cafile or certfile must be configured, you can download them from your VPN sign-in page (certificate information, export certificate).
- realm
- You can find out your realm by viewing the page source of your VPN sign-in page: just search for the word realm in it.
5. Start/stop network connect:
$ jnc --nox
for use without GUI. To stop the client, execute
$ jnc stop
MSJNC
The Mad Scientist's "msjnc" script requires gtk2-perl, glib-perl and unzip.
Instructions for 64-bit users
Enable multilib and then install lib32-zlib, net-tools, glib-perl, perl-libwww and gtk2-perl.
Access the the Juniper VPN website you need to use. Log in and allow the installation to attempt and fail (due to non-32 bit Java). You should get an error similar to the following:
Setup failed. Please install 32 bit Java and update alternatives links using update-alternatives command. For more details, refer KB article KB25230
You should now have the file ~/.juniper_networks/ncLinuxApp.jar
present.
However, if ncLinuxApp.jar
is not downloaded, fetch it manually - see the following example URL: https://server/dana-cached/nc/ncLinuxApp.jar
(note: you need to log in first).
Then download the msjnc script, make it executable, and put it in your PATH
.
Automatic installation of ncsvc using msjnc
The first time you launch msjnc (before ncsvc is installed), it will extract ncLinuxApp.jar
and prompt for your password in order to install the service. This requires sudo to be configured to allow all commands to your user.
After the service is installed to ~/.juniper_networks/network_connect/ncsvc
with suid, create a profile and connect.
Manual installation of msjnc
Create these directories:
$ mkdir -p ~/.juniper_networks/network_connect $ mkdir -p ~/.juniper_networks/tmp
Extract the software:
$ unzip ~/.juniper_networks/ncLinuxApp.jar -d ~/.juniper_networks/tmp
Copy NC.jar
to the network_connect
directory:
$ cp ~/.juniper_networks/tmp/NC.jar ~/.juniper_networks/network_connect
Install the service:
$ sh ~/.juniper_networks/tmp/installNC.sh ~/.juniper_networks/network_connect
Launch msjnc, create a profile, and connect.
Note regarding Server/URL
For the Server/URL, you may have to provide the URL that processes the login form rather than the login page itself. As an example, one company's login form is on /dana-na/auth/url_0/welcome.cgi
but the form is actually processed by /dana-na/auth/url_0/login.cgi
. You may have to inspect the html of the login page to find the form's action attribute.
JVPN
The JVPN Perl script establishes a Juniper VPN connection and supports the following features:
- Connection using Host Checker.
- Automatic download of the required Juniper java and daemon files (ncsvc) when run as root.
Installation
Install the perl dependencies perl-term-readkey and perl-lwp-protocol-https. Once you have done so, you must choose whether to run jvpn as root (easiest method) or as a regular user and run the steps below accordingly.
Running as root
Run the command:
# curl -L https://github.com/samm-git/jvpn/archive/v0.7.0.tar.gz | tar xz
The command creates a file jvpn-0.7.0
in current directory.
Finally, start the script with:
# ./jvpn.pl
On first run, the script will download all the necessary files
Running as a regular user
Use your web browser (no need for 32-bit Java) to connect to the VPN website and download the appropriate software. The files downloaded will be located in ~/.juniper_networks/network_connect/
(even if the VPN connection actually fails).
This step is considered more complex because you have to have a functional Java plugin in your browser (configured with appropriate security settings). During installation of Network Connect, the browser will request a root password to set the setuid flag on ncsvc (Juniper daemon).
Then install jvpn into the folder by executing the following:
$ cd ~/.juniper_networks/network_connect $ curl -L https://github.com/samm-git/jvpn/archive/v0.7.0.tar.gz | tar xz --strip-components=1
Next, edit jvpn.ini
(directions are included in the file).
Finally, start the script with the following:
$ cd ~/.juniper_networks/network_connect $ ./jvpn.pl
Workarounds
64-bit Java (workaround 1)
1) Install bin32-jreAUR. Make sure the PKGBUILD installs it to /opt/bin32-jre
, rather than /opt/java
, where it will conflict with the 64-bit JRE.
2) Install jreAUR.
3) Move the java binary to java.orig
:
# mv /opt/java/jre/bin/java /opt/java/jre/bin/java.orig
4) Create a bash script java
and make it executable:
# touch /opt/java/jre/bin/java # chmod 755 /opt/java/jre/bin/java
5) Finally, edit the bash script as per the below:
/opt/java/jre/bin/java
#!/bin/bash if [ $3x = "NCx" ] then /opt/bin32-jre/jre/bin/java "$@" else /opt/java/jre/bin/java.orig "$@" fi
64-bit Java (workaround 2)
Another approach is to install an alternative version of Java and link the Java plugin for Firefox manually - this avoids the necessity of using a chroot environment. Follow the instructions below:
- install xterm.
- Install a custom 64-bit Java environment from java.com. Select the Linux x64 version. Once you have decided upon a location for the installation, extract the binary into that location and then mark it executable. Finally, run the binary to install Java.
- Install a custom 32-bit Java environment, also from java.com but this time, select the Linux (self-extracting) option. Extract the new binary to the same location created above, mark it executable, and run the binary. It will ask you whether you want to replace the files to 32 bit: Type "A" to overwrite all the 64-bit files with the 32-bit ones.
- Finally, link the library into the required location. The relevant library for Firefox is
libnpjp2.so
. To link it, use the following commandln -s location-of-custom-java-installation/lib/amd64/libnpjp2.so /usr/lib/mozilla/plugins/libnpjp2.so
.
/usr/lib/mozilla/plugins
for plugins instead of ~/.mozilla/plugins
which was used in previous versions.For more information, see the following guide from Southern Illinois University.
Motif and libstdc++-libc6.2-2.so.3
When trying to use Juniper VPN, you may be informed that there are missing libraries. If so, follow the instructions below.
1) Install a Java Runtime Environment (JRE) - see Java.
2) Install libstdc++296AUR which provides the required libstdc++-libc6.2-2.so.3
library.
3) Install the Motif toolkit. Note that lesstif must be used - the openmotif package provides a version of Motif that is too recent. Specifically, it provides libXm.so.4
instead of libXm.so.3
.
4) Then create symlinks in order to be able to use lesstif as if it is official Motif - see the reference below.
5) Install xterm - the installation uses xterm to ask for the root password.
6) Next, run: modprobe tun
as root. You will need to do this every time before you connect. As such, you might want to setup the tun module to be autoloaded at startup.
7) Finally, head over to your VPN portal page and initiate the connection by clicking on Network Connect.
For more information see: Gentoo Wiki Archives
Troubleshooting
Password incorrect
If your username and password are correct but the system reports that they are incorrect, that means the POST request to the Juniper IVE box failed.
The Tamper Data addon for Firefox can be used to debug. Try changing the fields in the headers.
Note that Juniper IVE does not support UTF-8. The intl.charset.default
setting in about:config
for Firefox is UTF-8, causing a POST request to have only UTF-8 in the charset. Setting it to ISO-8859-1
might fix the problem. Also double check the intl.accept_charsets
Firefox setting. Using UTF-8, Chinese and European charsets is possible but ensure you have ISO-8859-1
as a fallback. Note that you can use the Tamper Data addon to make sure you really are accepting ISO-8859-1
in the HTTP header.
Finally, ensure that the useragent is Firefox
, not Bon Echo
. You may need to change this under general.useragent.extra.firefox
in about:config
.
Login succeeds but Network Connect will not launch
- Firstly, verify your Java installation.
- Then navigate to
~/.juniper_networks/network_connect
. - Check that
ncsvc
is setuid root. Fix it if not. - Run
ldd ncsvc
and see if there are any missing libraries. - Follow the instructions from the Juniper forum to run it from command line. Use the
-L 5
switch to log everything and use strace as root. Also try consultingncsvc.log
for any possible errors.
Network Connect launched but the VPN does not work
Run ip route
to to check if the route is present. Network connect has a diagnosis tool in the GUI. You can also checks the logs (also available in the GUI).
Other cause for VPN not working can lie in DNS settings. Check whether they really are set (usually in /etc/resolv.conf) and that DNS cache does not intervene (stop systemd-resolved service if running).
/etc/resolv.conf
will periodically get overwritten by DHCPCD so your VPN will stop working eventually. If that happens, just restart Network Connect. You might also wish to save your /etc/resolv.conf
file so that your VPN settings can be easily restored. As of 2007, there is no known solution to the problem but there is a bug report on Red Hat Bugzilla.Network Connect launched and a configuration error message is displayed
Check that you have net-tools installed.
ncapp.error Failed to connect/authenticate with IVE.
See this post on the Ubuntu forums. Note that in some cases, the policy will not permit a connection initiated from the command line. Instead, you have to install both bin32-jreAUR and bin32-firefoxAUR and authenticate through the browser.
ncsvc and kernel versions 3.19 and 4.5 to 4.9
Juniter VPN does not support linux 3.19. See UNIXgr.
There are also issues with linux versions 4.5 to 4.9 (and probably later versions too). See Bug 121131 on the Kernel bug tracker for more information. There are two ways to work around this issue:
- Downgrade to version 4.4, or install linux-lts.
- According to a comment on the kernel bugzilla disabling router solicitations for IPv6 and reconnecting will also solve the issue. This can be done with the following command:
# echo 0 > /proc/sys/net/ipv6/conf/default/router_solicitations
- To make this setting automatically on boot time use systemd-tmpfiles:
/etc/tmpfiles.d/disable-router-solicitations.conf
w /proc/sys/net/ipv6/conf/default/router_solicitations - - - - 0
Unauthorized new route has been added, disconnecting
When using the pulse-secureAUR client, VPN may not work with connman due to conflicting routing table strategies. Check ~/.pulse_secure/pulse/pulsesvc.log
for such messages:
rmon.error Unauthorized new route to x.x.x.x/y.y.y.y has been added (conflicts with our route to z.z.z.z), disconnecting (routemon.cpp:598)
If this is the case, using NetworkManager instead can fix the issue.
After login, pulseUi displays 'Compliance: Security policies not met'
It seems that pulseUi
uses NetworkManager internally while verifying connection in some cases. If this is the case, install NetworkManager and start NetworkManager.sevice
.