diff --git a/extras/add_vpn_user.sh b/extras/add_vpn_user.sh
index 5606f7a..0c142eb 100755
--- a/extras/add_vpn_user.sh
+++ b/extras/add_vpn_user.sh
@@ -28,67 +28,57 @@ EOF
 }
 
 add_vpn_user() {
-
-if [ "$(id -u)" != 0 ]; then
-  exiterr "Script must be run as root. Try 'sudo bash $0'"
-fi
-
-if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
-  || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
+  if [ "$(id -u)" != 0 ]; then
+    exiterr "Script must be run as root. Try 'sudo bash $0'"
+  fi
+  if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
+    || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
 cat 1>&2 <<'EOF'
 Error: Your must first set up the IPsec VPN server before adding VPN users.
        See: https://github.com/hwdsl2/setup-ipsec-vpn
 EOF
-  exit 1
-fi
-
-command -v openssl >/dev/null 2>&1 || exiterr "'openssl' not found. Abort."
-
-if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
+    exit 1
+  fi
+  command -v openssl >/dev/null 2>&1 || exiterr "'openssl' not found. Abort."
+  if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
 cat 1>&2 <<EOF
 Usage: sudo bash $0 'username_to_add' 'password'
        sudo bash $0 'username_to_update' 'new_password'
 You may also run this script interactively without arguments.
 EOF
-  exit 1
-fi
-
-VPN_USER=$1
-VPN_PASSWORD=$2
-
-if [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
-  show_intro
-  echo
-  echo "List of existing VPN usernames:"
-  cut -f1 -d : /etc/ipsec.d/passwd | LC_ALL=C sort
-  echo
-  echo "Enter the VPN username you want to add or update."
-  read -rp "Username: " VPN_USER
-  if [ -z "$VPN_USER" ]; then
-    echo "Abort. No changes were made." >&2
     exit 1
   fi
-  read -rp "Password: " VPN_PASSWORD
-  if [ -z "$VPN_PASSWORD" ]; then
-    echo "Abort. No changes were made." >&2
-    exit 1
+  VPN_USER=$1
+  VPN_PASSWORD=$2
+  if [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
+    show_intro
+    echo
+    echo "List of existing VPN usernames:"
+    cut -f1 -d : /etc/ipsec.d/passwd | LC_ALL=C sort
+    echo
+    echo "Enter the VPN username you want to add or update."
+    read -rp "Username: " VPN_USER
+    if [ -z "$VPN_USER" ]; then
+      echo "Abort. No changes were made." >&2
+      exit 1
+    fi
+    read -rp "Password: " VPN_PASSWORD
+    if [ -z "$VPN_PASSWORD" ]; then
+      echo "Abort. No changes were made." >&2
+      exit 1
+    fi
+  fi
+  if printf '%s' "$VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
+    exiterr "VPN credentials must not contain non-ASCII characters."
+  fi
+  case "$VPN_USER $VPN_PASSWORD" in
+    *[\\\"\']*)
+      exiterr "VPN credentials must not contain these special characters: \\ \" '"
+      ;;
+  esac
+  if [ -n "$1" ] && [ -n "$2" ]; then
+    show_intro
   fi
-fi
-
-if printf '%s' "$VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
-  exiterr "VPN credentials must not contain non-ASCII characters."
-fi
-
-case "$VPN_USER $VPN_PASSWORD" in
-  *[\\\"\']*)
-    exiterr "VPN credentials must not contain these special characters: \\ \" '"
-    ;;
-esac
-
-if [ -n "$1" ] && [ -n "$2" ]; then
-  show_intro
-fi
-
 cat <<EOF
 
 ================================================
@@ -106,41 +96,35 @@ Setup VPN clients: https://git.io/vpnclients
 ================================================
 
 EOF
-
-printf "Do you want to continue? [Y/n] "
-read -r response
-case $response in
-  [yY][eE][sS]|[yY]|'')
-    echo
-    echo "Adding or updating VPN user..."
-    echo
-    ;;
-  *)
-    echo "Abort. No changes were made."
-    exit 1
-    ;;
-esac
-
-# Backup config files
-conf_bk "/etc/ppp/chap-secrets"
-conf_bk "/etc/ipsec.d/passwd"
-
-# Add or update VPN user
-sed -i "/^\"$VPN_USER\" /d" /etc/ppp/chap-secrets
+  printf "Do you want to continue? [Y/n] "
+  read -r response
+  case $response in
+    [yY][eE][sS]|[yY]|'')
+      echo
+      echo "Adding or updating VPN user..."
+      echo
+      ;;
+    *)
+      echo "Abort. No changes were made."
+      exit 1
+      ;;
+  esac
+  # Backup config files
+  conf_bk "/etc/ppp/chap-secrets"
+  conf_bk "/etc/ipsec.d/passwd"
+  # Add or update VPN user
+  sed -i "/^\"$VPN_USER\" /d" /etc/ppp/chap-secrets
 cat >> /etc/ppp/chap-secrets <<EOF
 "$VPN_USER" l2tpd "$VPN_PASSWORD" *
 EOF
-
-# shellcheck disable=SC2016
-sed -i '/^'"$VPN_USER"':\$1\$/d' /etc/ipsec.d/passwd
-VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
+  # shellcheck disable=SC2016
+  sed -i '/^'"$VPN_USER"':\$1\$/d' /etc/ipsec.d/passwd
+  VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
 cat >> /etc/ipsec.d/passwd <<EOF
 $VPN_USER:$VPN_PASSWORD_ENC:xauth-psk
 EOF
-
-# Update file attributes
-chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
+  # Update file attributes
+  chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
 cat <<'EOF'
 Done!
 
@@ -148,7 +132,6 @@ Note: All VPN users will share the same IPsec PSK.
       If you forgot the PSK, check /etc/ipsec.secrets.
 
 EOF
-
 }
 
 ## Defer until we have the complete script
diff --git a/extras/del_vpn_user.sh b/extras/del_vpn_user.sh
index e0ac633..b9624b1 100755
--- a/extras/del_vpn_user.sh
+++ b/extras/del_vpn_user.sh
@@ -25,74 +25,63 @@ EOF
 }
 
 del_vpn_user() {
-
-if [ "$(id -u)" != 0 ]; then
-  exiterr "Script must be run as root. Try 'sudo bash $0'"
-fi
-
-if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
-  || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
+  if [ "$(id -u)" != 0 ]; then
+    exiterr "Script must be run as root. Try 'sudo bash $0'"
+  fi
+  if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
+    || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
 cat 1>&2 <<'EOF'
 Error: Your must first set up the IPsec VPN server before deleting VPN users.
        See: https://github.com/hwdsl2/setup-ipsec-vpn
 EOF
-  exit 1
-fi
-
-if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
+    exit 1
+  fi
+  if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
 cat 1>&2 <<EOF
 Usage: sudo bash $0 'username_to_delete'
 You may also run this script interactively without arguments.
 EOF
-  exit 1
-fi
-
-VPN_USER=$1
-
-if [ -z "$VPN_USER" ]; then
-  show_intro
-  echo
-  echo "List of existing VPN usernames:"
-  cut -f1 -d : /etc/ipsec.d/passwd | LC_ALL=C sort
-  echo
-  echo "Enter the VPN username you want to delete."
-  read -rp "Username: " VPN_USER
-  if [ -z "$VPN_USER" ]; then
-    echo "Abort. No changes were made." >&2
     exit 1
   fi
-fi
-
-if printf '%s' "$VPN_USER" | LC_ALL=C grep -q '[^ -~]\+'; then
-  exiterr "VPN username must not contain non-ASCII characters."
-fi
-
-case "$VPN_USER" in
-  *[\\\"\']*)
-    exiterr "VPN username must not contain these special characters: \\ \" '"
-    ;;
-esac
-
-if [ "$(grep -c "^\"$VPN_USER\" " /etc/ppp/chap-secrets)" = "0" ] \
-  || [ "$(grep -c "^$VPN_USER:\\\$1\\\$" /etc/ipsec.d/passwd)" = "0" ]; then
+  VPN_USER=$1
+  if [ -z "$VPN_USER" ]; then
+    show_intro
+    echo
+    echo "List of existing VPN usernames:"
+    cut -f1 -d : /etc/ipsec.d/passwd | LC_ALL=C sort
+    echo
+    echo "Enter the VPN username you want to delete."
+    read -rp "Username: " VPN_USER
+    if [ -z "$VPN_USER" ]; then
+      echo "Abort. No changes were made." >&2
+      exit 1
+    fi
+  fi
+  if printf '%s' "$VPN_USER" | LC_ALL=C grep -q '[^ -~]\+'; then
+    exiterr "VPN username must not contain non-ASCII characters."
+  fi
+  case "$VPN_USER" in
+    *[\\\"\']*)
+      exiterr "VPN username must not contain these special characters: \\ \" '"
+      ;;
+  esac
+  if [ "$(grep -c "^\"$VPN_USER\" " /etc/ppp/chap-secrets)" = "0" ] \
+    || [ "$(grep -c "^$VPN_USER:\\\$1\\\$" /etc/ipsec.d/passwd)" = "0" ]; then
 cat 1>&2 <<'EOF'
 Error: The specified VPN user does not exist in /etc/ppp/chap-secrets
        and/or /etc/ipsec.d/passwd.
 EOF
-  exit 1
-fi
-
-if [ "$(grep -c -v -e '^#' -e '^[[:space:]]*$' /etc/ppp/chap-secrets)" = "1" ] \
-  || [ "$(grep -c -v -e '^#' -e '^[[:space:]]*$' /etc/ipsec.d/passwd)" = "1" ]; then
+    exit 1
+  fi
+  if [ "$(grep -c -v -e '^#' -e '^[[:space:]]*$' /etc/ppp/chap-secrets)" = "1" ] \
+    || [ "$(grep -c -v -e '^#' -e '^[[:space:]]*$' /etc/ipsec.d/passwd)" = "1" ]; then
 cat 1>&2 <<'EOF'
 Error: Could not delete the only VPN user from /etc/ppp/chap-secrets
        and/or /etc/ipsec.d/passwd.
 EOF
-  exit 1
-fi
-
-[ -n "$1" ] && show_intro
-
+    exit 1
+  fi
+  [ -n "$1" ] && show_intro
 cat <<EOF
 
 ================================================
@@ -104,38 +93,32 @@ Username: $VPN_USER
 ================================================
 
 EOF
-
-printf "Do you want to continue? [Y/n] "
-read -r response
-case $response in
-  [yY][eE][sS]|[yY]|'')
-    echo
-    echo "Deleting VPN user..."
-    echo
-    ;;
-  *)
-    echo "Abort. No changes were made."
-    exit 1
-    ;;
-esac
-
-# Backup config files
-conf_bk "/etc/ppp/chap-secrets"
-conf_bk "/etc/ipsec.d/passwd"
-
-# Delete VPN user
-sed -i "/^\"$VPN_USER\" /d" /etc/ppp/chap-secrets
-# shellcheck disable=SC2016
-sed -i '/^'"$VPN_USER"':\$1\$/d' /etc/ipsec.d/passwd
-
-# Update file attributes
-chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
+  printf "Do you want to continue? [Y/n] "
+  read -r response
+  case $response in
+    [yY][eE][sS]|[yY]|'')
+      echo
+      echo "Deleting VPN user..."
+      echo
+      ;;
+    *)
+      echo "Abort. No changes were made."
+      exit 1
+      ;;
+  esac
+  # Backup config files
+  conf_bk "/etc/ppp/chap-secrets"
+  conf_bk "/etc/ipsec.d/passwd"
+  # Delete VPN user
+  sed -i "/^\"$VPN_USER\" /d" /etc/ppp/chap-secrets
+  # shellcheck disable=SC2016
+  sed -i '/^'"$VPN_USER"':\$1\$/d' /etc/ipsec.d/passwd
+  # Update file attributes
+  chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
 cat <<'EOF'
 Done!
 
 EOF
-
 }
 
 ## Defer until we have the complete script
diff --git a/extras/ikev2setup.sh b/extras/ikev2setup.sh
index 32c5705..35b5aad 100755
--- a/extras/ikev2setup.sh
+++ b/extras/ikev2setup.sh
@@ -151,14 +151,14 @@ confirm_or_abort() {
 show_header() {
 cat <<'EOF'
 
-IKEv2 Script   Copyright (c) 2020-2022 Lin Song   7 Apr 2022
+IKEv2 Script   Copyright (c) 2020-2022 Lin Song   27 Apr 2022
 
 EOF
 }
 
 show_usage() {
   if [ -n "$1" ]; then
-    echo "Error: $1" >&2;
+    echo "Error: $1" >&2
   fi
   show_header
 cat 1>&2 <<EOF
@@ -186,7 +186,7 @@ check_ikev2_exists() {
 
 check_client_name() {
   ! { [ "${#1}" -gt "64" ] || printf '%s' "$1" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-    || case $1 in -*) true;; *) false;; esac; }
+    || case $1 in -*) true ;; *) false ;; esac; }
 }
 
 check_cert_exists() {
@@ -1271,8 +1271,7 @@ EOF
 cat <<'EOF'
 
 Next steps: Configure IKEv2 clients. See:
-  https://git.io/ikev2clients
-Feedback: https://bit.ly/vpn-feedback
+https://git.io/ikev2clients
 
 ================================================
 
diff --git a/extras/quickstart.sh b/extras/quickstart.sh
index 2407940..7097714 100755
--- a/extras/quickstart.sh
+++ b/extras/quickstart.sh
@@ -1,8 +1,7 @@
 #!/bin/sh
 #
-# Quick start script to set up an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL,
+# Script for automatic setup of an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL,
 # Rocky Linux, AlmaLinux, Oracle Linux, Amazon Linux 2 and Alpine Linux
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -159,19 +158,15 @@ check_creds() {
   [ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK"
   [ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME"
   [ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD"
-
   if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then
     return 0
   fi
-
   if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
     exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
   fi
-
   if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
     exiterr "VPN credentials must not contain non-ASCII characters."
   fi
-
   case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in
     *[\\\"\']*)
       exiterr "VPN credentials must not contain these special characters: \\ \" '"
@@ -196,7 +191,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
@@ -293,7 +288,7 @@ run_setup() {
   fi
 }
 
-quickstart() {
+vpnsetup() {
   check_root
   check_vz
   check_lxc
@@ -310,6 +305,6 @@ quickstart() {
 }
 
 ## Defer setup until we have the complete script
-quickstart "$@"
+vpnsetup "$@"
 
 exit "$status"
diff --git a/extras/update_vpn_users.sh b/extras/update_vpn_users.sh
index c744f57..bd42c97 100755
--- a/extras/update_vpn_users.sh
+++ b/extras/update_vpn_users.sh
@@ -39,57 +39,46 @@ noquotes() { printf '%s' "$1" | sed -e 's/^"\(.*\)"$/\1/' -e "s/^'\(.*\)'$/\1/";
 noquotes2() { printf '%s' "$1" | sed -e 's/" "/ /g' -e "s/' '/ /g"; }
 
 update_vpn_users() {
-
-if [ "$(id -u)" != 0 ]; then
-  exiterr "Script must be run as root. Try 'sudo bash $0'"
-fi
-
-if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
-  || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
+  if [ "$(id -u)" != 0 ]; then
+    exiterr "Script must be run as root. Try 'sudo bash $0'"
+  fi
+  if ! grep -qs "hwdsl2 VPN script" /etc/sysctl.conf \
+    || [ ! -f /etc/ppp/chap-secrets ] || [ ! -f /etc/ipsec.d/passwd ]; then
 cat 1>&2 <<'EOF'
 Error: Your must first set up the IPsec VPN server before updating VPN users.
        See: https://github.com/hwdsl2/setup-ipsec-vpn
 EOF
-  exit 1
-fi
-
-command -v openssl >/dev/null 2>&1 || exiterr "'openssl' not found. Abort."
-
-if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
+    exit 1
+  fi
+  command -v openssl >/dev/null 2>&1 || exiterr "'openssl' not found. Abort."
+  if [ "$1" = "-h" ] || [ "$1" = "--help" ]; then
 cat 1>&2 <<'EOF'
 For usage information, visit https://git.io/vpnnotes, then click on Manage VPN Users.
 EOF
-  exit 1
-fi
-
-[ -n "$YOUR_USERNAMES" ] && VPN_USERS="$YOUR_USERNAMES"
-[ -n "$YOUR_PASSWORDS" ] && VPN_PASSWORDS="$YOUR_PASSWORDS"
-
-VPN_USERS=$(noquotes "$VPN_USERS")
-VPN_USERS=$(onespace "$VPN_USERS")
-VPN_USERS=$(noquotes2 "$VPN_USERS")
-VPN_PASSWORDS=$(noquotes "$VPN_PASSWORDS")
-VPN_PASSWORDS=$(onespace "$VPN_PASSWORDS")
-VPN_PASSWORDS=$(noquotes2 "$VPN_PASSWORDS")
-
-if [ -z "$VPN_USERS" ] || [ -z "$VPN_PASSWORDS" ]; then
-  exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
-fi
-
-if printf '%s' "$VPN_USERS $VPN_PASSWORDS" | LC_ALL=C grep -q '[^ -~]\+'; then
-  exiterr "VPN credentials must not contain non-ASCII characters."
-fi
-
-case "$VPN_USERS $VPN_PASSWORDS" in
-  *[\\\"\']*)
-    exiterr "VPN credentials must not contain these special characters: \\ \" '"
-    ;;
-esac
-
-if printf '%s' "$VPN_USERS" | tr ' ' '\n' | sort | uniq -c | grep -qv '^ *1 '; then
-  exiterr "VPN usernames must not contain duplicates."
-fi
-
+    exit 1
+  fi
+  [ -n "$YOUR_USERNAMES" ] && VPN_USERS="$YOUR_USERNAMES"
+  [ -n "$YOUR_PASSWORDS" ] && VPN_PASSWORDS="$YOUR_PASSWORDS"
+  VPN_USERS=$(noquotes "$VPN_USERS")
+  VPN_USERS=$(onespace "$VPN_USERS")
+  VPN_USERS=$(noquotes2 "$VPN_USERS")
+  VPN_PASSWORDS=$(noquotes "$VPN_PASSWORDS")
+  VPN_PASSWORDS=$(onespace "$VPN_PASSWORDS")
+  VPN_PASSWORDS=$(noquotes2 "$VPN_PASSWORDS")
+  if [ -z "$VPN_USERS" ] || [ -z "$VPN_PASSWORDS" ]; then
+    exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
+  fi
+  if printf '%s' "$VPN_USERS $VPN_PASSWORDS" | LC_ALL=C grep -q '[^ -~]\+'; then
+    exiterr "VPN credentials must not contain non-ASCII characters."
+  fi
+  case "$VPN_USERS $VPN_PASSWORDS" in
+    *[\\\"\']*)
+      exiterr "VPN credentials must not contain these special characters: \\ \" '"
+      ;;
+  esac
+  if printf '%s' "$VPN_USERS" | tr ' ' '\n' | sort | uniq -c | grep -qv '^ *1 '; then
+    exiterr "VPN usernames must not contain duplicates."
+  fi
 cat <<'EOF'
 
 Welcome! Use this script to update VPN user accounts for both
@@ -103,19 +92,17 @@ WARNING: *ALL* existing VPN users will be removed and replaced
 Updated list of VPN users (username | password):
 
 EOF
-
-count=1
-vpn_user=$(printf '%s' "$VPN_USERS" | cut -d ' ' -f 1)
-vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -d ' ' -f 1)
-while [ -n "$vpn_user" ] && [ -n "$vpn_password" ]; do
+  count=1
+  vpn_user=$(printf '%s' "$VPN_USERS" | cut -d ' ' -f 1)
+  vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -d ' ' -f 1)
+  while [ -n "$vpn_user" ] && [ -n "$vpn_password" ]; do
 cat <<EOF
 $vpn_user | $vpn_password
 EOF
-  count=$((count+1))
-  vpn_user=$(printf '%s' "$VPN_USERS" | cut -s -d ' ' -f "$count")
-  vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -s -d ' ' -f "$count")
-done
-
+    count=$((count+1))
+    vpn_user=$(printf '%s' "$VPN_USERS" | cut -s -d ' ' -f "$count")
+    vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -s -d ' ' -f "$count")
+  done
 cat <<'EOF'
 
 Write these down. You'll need them to connect!
@@ -126,46 +113,41 @@ Setup VPN clients: https://git.io/vpnclients
 ==================================================
 
 EOF
-
-printf "Do you want to continue? [Y/n] "
-read -r response
-case $response in
-  [yY][eE][sS]|[yY]|'')
-    echo
-    echo "Updating VPN users..."
-    echo
-    ;;
-  *)
-    echo "Abort. No changes were made."
-    exit 1
-    ;;
-esac
-
-# Backup and remove config files
-conf_bk "/etc/ppp/chap-secrets"
-conf_bk "/etc/ipsec.d/passwd"
-/bin/rm -f /etc/ppp/chap-secrets /etc/ipsec.d/passwd
-
-# Update VPN users
-count=1
-vpn_user=$(printf '%s' "$VPN_USERS" | cut -d ' ' -f 1)
-vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -d ' ' -f 1)
-while [ -n "$vpn_user" ] && [ -n "$vpn_password" ]; do
-  vpn_password_enc=$(openssl passwd -1 "$vpn_password")
+  printf "Do you want to continue? [Y/n] "
+  read -r response
+  case $response in
+    [yY][eE][sS]|[yY]|'')
+      echo
+      echo "Updating VPN users..."
+      echo
+      ;;
+    *)
+      echo "Abort. No changes were made."
+      exit 1
+      ;;
+  esac
+  # Backup and remove config files
+  conf_bk "/etc/ppp/chap-secrets"
+  conf_bk "/etc/ipsec.d/passwd"
+  /bin/rm -f /etc/ppp/chap-secrets /etc/ipsec.d/passwd
+  # Update VPN users
+  count=1
+  vpn_user=$(printf '%s' "$VPN_USERS" | cut -d ' ' -f 1)
+  vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -d ' ' -f 1)
+  while [ -n "$vpn_user" ] && [ -n "$vpn_password" ]; do
+    vpn_password_enc=$(openssl passwd -1 "$vpn_password")
 cat >> /etc/ppp/chap-secrets <<EOF
 "$vpn_user" l2tpd "$vpn_password" *
 EOF
 cat >> /etc/ipsec.d/passwd <<EOF
 $vpn_user:$vpn_password_enc:xauth-psk
 EOF
-  count=$((count+1))
-  vpn_user=$(printf '%s' "$VPN_USERS" | cut -s -d ' ' -f "$count")
-  vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -s -d ' ' -f "$count")
-done
-
-# Update file attributes
-chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
+    count=$((count+1))
+    vpn_user=$(printf '%s' "$VPN_USERS" | cut -s -d ' ' -f "$count")
+    vpn_password=$(printf '%s' "$VPN_PASSWORDS" | cut -s -d ' ' -f "$count")
+  done
+  # Update file attributes
+  chmod 600 /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
 cat <<'EOF'
 Done!
 
@@ -173,7 +155,6 @@ Note: All VPN users will share the same IPsec PSK.
       If you forgot the PSK, check /etc/ipsec.secrets.
 
 EOF
-
 }
 
 ## Defer until we have the complete script
diff --git a/extras/vpnuninstall.sh b/extras/vpnuninstall.sh
index e737fe1..d34cb69 100755
--- a/extras/vpnuninstall.sh
+++ b/extras/vpnuninstall.sh
@@ -234,7 +234,6 @@ update_iptables_rules() {
   if grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
     ipt_flag=1
   fi
-
   ipi='iptables -D INPUT'
   ipf='iptables -D FORWARD'
   ipp='iptables -t nat -D POSTROUTING'
@@ -261,7 +260,6 @@ update_iptables_rules() {
       $ipp -s "$XAUTH_NET" -o "$NET_IFACE" -m policy --dir out --pol none -j MASQUERADE
       $ipp -s "$L2TP_NET" -o "$NET_IFACE" -j MASQUERADE
       iptables-save > "$IPT_FILE"
-
       if [ "$os_type" = "ubuntu" ] || [ "$os_type" = "debian" ] || [ "$os_type" = "raspbian" ]; then
         if [ -f "$IPT_FILE2" ]; then
           conf_bk "$IPT_FILE2"
diff --git a/extras/vpnupgrade_alpine.sh b/extras/vpnupgrade_alpine.sh
index e26b203..a352a9a 100755
--- a/extras/vpnupgrade_alpine.sh
+++ b/extras/vpnupgrade_alpine.sh
@@ -106,7 +106,6 @@ Note: This script will make the following changes to your VPN configuration:
       Your other VPN config files will not be modified.
 
 EOF
-
   if [ "$SWAN_VER" != "$swan_ver_cur" ]; then
 cat <<'EOF'
 WARNING: Older versions of Libreswan could contain known security vulnerabilities.
@@ -115,7 +114,6 @@ WARNING: Older versions of Libreswan could contain known security vulnerabilitie
 
 EOF
   fi
-
   if [ "$swan_ver_old" = "$SWAN_VER" ]; then
 cat <<EOF
 Note: You already have Libreswan version $SWAN_VER installed!
@@ -123,7 +121,6 @@ Note: You already have Libreswan version $SWAN_VER installed!
 
 EOF
   fi
-
   printf "Do you want to continue? [Y/n] "
   read -r response
   case $response in
@@ -186,7 +183,6 @@ EOF
     set -x
     make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null
   )
-
   cd /opt/src || exit 1
   /bin/rm -rf "/opt/src/libreswan-$SWAN_VER"
   if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then
@@ -215,20 +211,17 @@ update_config() {
   bigecho "Updating VPN configuration..."
   IKE_NEW="  ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024"
   PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2"
-
   if uname -m | grep -qi '^arm'; then
     if ! modprobe -q sha512; then
       PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes128-sha2,aes256-sha2"
     fi
   fi
-
   dns_state=0
   DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   [ -n "$DNS_SRV1" ] && dns_state=2
   [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1
   [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3
-
   sed -i".old-$SYS_DT" \
       -e "s/^[[:space:]]\+auth=/  phase2=/" \
       -e "s/^[[:space:]]\+forceencaps=/  encapsulation=/" \
@@ -237,17 +230,14 @@ update_config() {
       -e "s/^[[:space:]]\+sha2-truncbug=yes/  sha2-truncbug=no/" \
       -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \
       -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf
-
   if [ "$dns_state" = "1" ]; then
     sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \
         -e "/modecfgdns2=/d" /etc/ipsec.conf
   elif [ "$dns_state" = "2" ]; then
     sed -i "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=$DNS_SRV1/" /etc/ipsec.conf
   fi
-
   sed -i "/ikev2=never/d" /etc/ipsec.conf
   sed -i "/conn shared/a \  ikev2=never" /etc/ipsec.conf
-
   if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then
     sed -i".old-$SYS_DT" 's/^[[:space:]]\+ike-frag=/  fragmentation=/' /etc/ipsec.d/ikev2.conf
   fi
@@ -270,7 +260,6 @@ Libreswan $SWAN_VER has been successfully installed!
 ================================================
 
 EOF
-
   if [ "$dns_state" = "3" ]; then
 cat <<'EOF'
 IMPORTANT: You must edit /etc/ipsec.conf and replace
diff --git a/extras/vpnupgrade_amzn.sh b/extras/vpnupgrade_amzn.sh
index 69ee61c..e08df01 100755
--- a/extras/vpnupgrade_amzn.sh
+++ b/extras/vpnupgrade_amzn.sh
@@ -90,7 +90,6 @@ Note: This script will make the following changes to your VPN configuration:
       Your other VPN config files will not be modified.
 
 EOF
-
   if [ "$SWAN_VER" != "$swan_ver_cur" ]; then
 cat <<'EOF'
 WARNING: Older versions of Libreswan could contain known security vulnerabilities.
@@ -99,7 +98,6 @@ WARNING: Older versions of Libreswan could contain known security vulnerabilitie
 
 EOF
   fi
-
   if [ "$swan_ver_old" = "$SWAN_VER" ]; then
 cat <<EOF
 Note: You already have Libreswan version $SWAN_VER installed!
@@ -107,7 +105,6 @@ Note: You already have Libreswan version $SWAN_VER installed!
 
 EOF
   fi
-
   printf "Do you want to continue? [Y/n] "
   read -r response
   case $response in
@@ -174,7 +171,6 @@ EOF
     set -x
     make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null
   )
-
   cd /opt/src || exit 1
   /bin/rm -rf "/opt/src/libreswan-$SWAN_VER"
   if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then
@@ -209,14 +205,12 @@ update_config() {
   bigecho "Updating VPN configuration..."
   IKE_NEW="  ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024"
   PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2"
-
   dns_state=0
   DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   [ -n "$DNS_SRV1" ] && dns_state=2
   [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1
   [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3
-
   sed -i".old-$SYS_DT" \
       -e "s/^[[:space:]]\+auth=/  phase2=/" \
       -e "s/^[[:space:]]\+forceencaps=/  encapsulation=/" \
@@ -225,17 +219,14 @@ update_config() {
       -e "s/^[[:space:]]\+sha2-truncbug=yes/  sha2-truncbug=no/" \
       -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \
       -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf
-
   if [ "$dns_state" = "1" ]; then
     sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \
         -e "/modecfgdns2=/d" /etc/ipsec.conf
   elif [ "$dns_state" = "2" ]; then
     sed -i "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=$DNS_SRV1/" /etc/ipsec.conf
   fi
-
   sed -i "/ikev2=never/d" /etc/ipsec.conf
   sed -i "/conn shared/a \  ikev2=never" /etc/ipsec.conf
-
   if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then
     sed -i".old-$SYS_DT" 's/^[[:space:]]\+ike-frag=/  fragmentation=/' /etc/ipsec.d/ikev2.conf
   fi
@@ -257,7 +248,6 @@ Libreswan $SWAN_VER has been successfully installed!
 ================================================
 
 EOF
-
   if [ "$dns_state" = "3" ]; then
 cat <<'EOF'
 IMPORTANT: You must edit /etc/ipsec.conf and replace
diff --git a/extras/vpnupgrade_centos.sh b/extras/vpnupgrade_centos.sh
index 7f3c3a0..3432758 100755
--- a/extras/vpnupgrade_centos.sh
+++ b/extras/vpnupgrade_centos.sh
@@ -116,7 +116,6 @@ Note: This script will make the following changes to your VPN configuration:
       Your other VPN config files will not be modified.
 
 EOF
-
   if [ "$SWAN_VER" != "$swan_ver_cur" ]; then
 cat <<'EOF'
 WARNING: Older versions of Libreswan could contain known security vulnerabilities.
@@ -125,7 +124,6 @@ WARNING: Older versions of Libreswan could contain known security vulnerabilitie
 
 EOF
   fi
-
   if [ "$swan_ver_old" = "$SWAN_VER" ]; then
 cat <<EOF
 Note: You already have Libreswan version $SWAN_VER installed!
@@ -133,7 +131,6 @@ Note: You already have Libreswan version $SWAN_VER installed!
 
 EOF
   fi
-
   printf "Do you want to continue? [Y/n] "
   read -r response
   case $response in
@@ -224,7 +221,6 @@ EOF
     set -x
     make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null
   )
-
   cd /opt/src || exit 1
   /bin/rm -rf "/opt/src/libreswan-$SWAN_VER"
   if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then
@@ -259,14 +255,12 @@ update_config() {
   bigecho "Updating VPN configuration..."
   IKE_NEW="  ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024"
   PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2"
-
   dns_state=0
   DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   [ -n "$DNS_SRV1" ] && dns_state=2
   [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1
   [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3
-
   sed -i".old-$SYS_DT" \
       -e "s/^[[:space:]]\+auth=/  phase2=/" \
       -e "s/^[[:space:]]\+forceencaps=/  encapsulation=/" \
@@ -275,17 +269,14 @@ update_config() {
       -e "s/^[[:space:]]\+sha2-truncbug=yes/  sha2-truncbug=no/" \
       -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \
       -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf
-
   if [ "$dns_state" = "1" ]; then
     sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \
         -e "/modecfgdns2=/d" /etc/ipsec.conf
   elif [ "$dns_state" = "2" ]; then
     sed -i "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=$DNS_SRV1/" /etc/ipsec.conf
   fi
-
   sed -i "/ikev2=never/d" /etc/ipsec.conf
   sed -i "/conn shared/a \  ikev2=never" /etc/ipsec.conf
-
   if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then
     sed -i".old-$SYS_DT" 's/^[[:space:]]\+ike-frag=/  fragmentation=/' /etc/ipsec.d/ikev2.conf
   fi
@@ -307,7 +298,6 @@ Libreswan $SWAN_VER has been successfully installed!
 ================================================
 
 EOF
-
   if [ "$dns_state" = "3" ]; then
 cat <<'EOF'
 IMPORTANT: You must edit /etc/ipsec.conf and replace
diff --git a/extras/vpnupgrade_ubuntu.sh b/extras/vpnupgrade_ubuntu.sh
index f27d7a0..3474865 100755
--- a/extras/vpnupgrade_ubuntu.sh
+++ b/extras/vpnupgrade_ubuntu.sh
@@ -89,7 +89,6 @@ check_swan_ver() {
   if [ "$SWAN_VER" = "3.32" ] && [ "$os_ver" = "11" ]; then
     exiterr "Libreswan 3.32 is not supported on Debian 11."
   fi
-
   if [ "$SWAN_VER" != "3.32" ] \
     && { ! printf '%s\n%s' "4.1" "$SWAN_VER" | sort -C -V \
     || ! printf '%s\n%s' "$SWAN_VER" "$swan_ver_cur" | sort -C -V; }; then
@@ -117,7 +116,6 @@ Note: This script will make the following changes to your VPN configuration:
       Your other VPN config files will not be modified.
 
 EOF
-
   if [ "$SWAN_VER" != "$swan_ver_cur" ]; then
 cat <<'EOF'
 WARNING: Older versions of Libreswan could contain known security vulnerabilities.
@@ -126,7 +124,6 @@ WARNING: Older versions of Libreswan could contain known security vulnerabilitie
 
 EOF
   fi
-
   if [ "$swan_ver_old" = "$SWAN_VER" ]; then
 cat <<EOF
 Note: You already have Libreswan version $SWAN_VER installed!
@@ -134,7 +131,6 @@ Note: You already have Libreswan version $SWAN_VER installed!
 
 EOF
   fi
-
   printf "Do you want to continue? [Y/n] "
   read -r response
   case $response in
@@ -217,7 +213,6 @@ EOF
     set -x
     make "-j$((NPROCS+1))" -s base >/dev/null && make -s install-base >/dev/null
   )
-
   cd /opt/src || exit 1
   /bin/rm -rf "/opt/src/libreswan-$SWAN_VER"
   if ! /usr/local/sbin/ipsec --version 2>/dev/null | grep -qF "$SWAN_VER"; then
@@ -246,20 +241,17 @@ update_config() {
   bigecho "Updating VPN configuration..."
   IKE_NEW="  ike=aes256-sha2,aes128-sha2,aes256-sha1,aes128-sha1,aes256-sha2;modp1024,aes128-sha1;modp1024"
   PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes256-sha2_512,aes128-sha2,aes256-sha2"
-
   if uname -m | grep -qi '^arm'; then
     if ! modprobe -q sha512; then
       PHASE2_NEW="  phase2alg=aes_gcm-null,aes128-sha1,aes256-sha1,aes128-sha2,aes256-sha2"
     fi
   fi
-
   dns_state=0
   DNS_SRV1=$(grep "modecfgdns1=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   DNS_SRV2=$(grep "modecfgdns2=" /etc/ipsec.conf | head -n 1 | cut -d '=' -f 2)
   [ -n "$DNS_SRV1" ] && dns_state=2
   [ -n "$DNS_SRV1" ] && [ -n "$DNS_SRV2" ] && dns_state=1
   [ "$(grep -c "modecfgdns1=" /etc/ipsec.conf)" -gt "1" ] && dns_state=3
-
   sed -i".old-$SYS_DT" \
       -e "s/^[[:space:]]\+auth=/  phase2=/" \
       -e "s/^[[:space:]]\+forceencaps=/  encapsulation=/" \
@@ -268,17 +260,14 @@ update_config() {
       -e "s/^[[:space:]]\+sha2-truncbug=yes/  sha2-truncbug=no/" \
       -e "s/^[[:space:]]\+ike=.\+/$IKE_NEW/" \
       -e "s/^[[:space:]]\+phase2alg=.\+/$PHASE2_NEW/" /etc/ipsec.conf
-
   if [ "$dns_state" = "1" ]; then
     sed -i -e "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=\"$DNS_SRV1 $DNS_SRV2\"/" \
         -e "/modecfgdns2=/d" /etc/ipsec.conf
   elif [ "$dns_state" = "2" ]; then
     sed -i "s/^[[:space:]]\+modecfgdns1=.\+/  modecfgdns=$DNS_SRV1/" /etc/ipsec.conf
   fi
-
   sed -i "/ikev2=never/d" /etc/ipsec.conf
   sed -i "/conn shared/a \  ikev2=never" /etc/ipsec.conf
-
   if grep -qs ike-frag /etc/ipsec.d/ikev2.conf; then
     sed -i".old-$SYS_DT" 's/^[[:space:]]\+ike-frag=/  fragmentation=/' /etc/ipsec.d/ikev2.conf
   fi
@@ -300,7 +289,6 @@ Libreswan $SWAN_VER has been successfully installed!
 ================================================
 
 EOF
-
   if [ "$dns_state" = "3" ]; then
 cat <<'EOF'
 IMPORTANT: You must edit /etc/ipsec.conf and replace
diff --git a/vpnsetup.sh b/vpnsetup.sh
index 5f3d165..7097714 100755
--- a/vpnsetup.sh
+++ b/vpnsetup.sh
@@ -2,7 +2,6 @@
 #
 # Script for automatic setup of an IPsec VPN server on Ubuntu, Debian, CentOS/RHEL,
 # Rocky Linux, AlmaLinux, Oracle Linux, Amazon Linux 2 and Alpine Linux
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -159,19 +158,15 @@ check_creds() {
   [ -n "$YOUR_IPSEC_PSK" ] && VPN_IPSEC_PSK="$YOUR_IPSEC_PSK"
   [ -n "$YOUR_USERNAME" ] && VPN_USER="$YOUR_USERNAME"
   [ -n "$YOUR_PASSWORD" ] && VPN_PASSWORD="$YOUR_PASSWORD"
-
   if [ -z "$VPN_IPSEC_PSK" ] && [ -z "$VPN_USER" ] && [ -z "$VPN_PASSWORD" ]; then
     return 0
   fi
-
   if [ -z "$VPN_IPSEC_PSK" ] || [ -z "$VPN_USER" ] || [ -z "$VPN_PASSWORD" ]; then
     exiterr "All VPN credentials must be specified. Edit the script and re-enter them."
   fi
-
   if printf '%s' "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" | LC_ALL=C grep -q '[^ -~]\+'; then
     exiterr "VPN credentials must not contain non-ASCII characters."
   fi
-
   case "$VPN_IPSEC_PSK $VPN_USER $VPN_PASSWORD" in
     *[\\\"\']*)
       exiterr "VPN credentials must not contain these special characters: \\ \" '"
@@ -196,7 +191,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
diff --git a/vpnsetup_alpine.sh b/vpnsetup_alpine.sh
index c7ce791..19f7d4f 100755
--- a/vpnsetup_alpine.sh
+++ b/vpnsetup_alpine.sh
@@ -1,7 +1,6 @@
 #!/bin/bash
 #
 # Script for automatic setup of an IPsec VPN server on Alpine Linux
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -141,7 +140,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
@@ -285,7 +284,6 @@ EOF
 
 create_vpn_config() {
   bigecho "Creating VPN configuration..."
-
   L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'}
   L2TP_LOCAL=${VPN_L2TP_LOCAL:-'192.168.42.1'}
   L2TP_POOL=${VPN_L2TP_POOL:-'192.168.42.10-192.168.42.250'}
@@ -295,7 +293,6 @@ create_vpn_config() {
   DNS_SRV2=${VPN_DNS_SRV2:-'8.8.4.4'}
   DNS_SRVS="\"$DNS_SRV1 $DNS_SRV2\""
   [ -n "$VPN_DNS_SRV1" ] && [ -z "$VPN_DNS_SRV2" ] && DNS_SRVS="$DNS_SRV1"
-
   # Create IPsec config
   conf_bk "/etc/ipsec.conf"
 cat > /etc/ipsec.conf <<EOF
@@ -346,19 +343,16 @@ conn xauth-psk
 
 include /etc/ipsec.d/*.conf
 EOF
-
   if uname -m | grep -qi '^arm'; then
     if ! modprobe -q sha512; then
       sed -i '/phase2alg/s/,aes256-sha2_512//' /etc/ipsec.conf
     fi
   fi
-
   # Specify IPsec PSK
   conf_bk "/etc/ipsec.secrets"
 cat > /etc/ipsec.secrets <<EOF
 %any  %any  : PSK "$VPN_IPSEC_PSK"
 EOF
-
   # Create xl2tpd config
   conf_bk "/etc/xl2tpd/xl2tpd.conf"
 cat > /etc/xl2tpd/xl2tpd.conf <<EOF
@@ -375,7 +369,6 @@ name = l2tpd
 pppoptfile = /etc/ppp/options.xl2tpd
 length bit = yes
 EOF
-
   # Set xl2tpd options
   conf_bk "/etc/ppp/options.xl2tpd"
 cat > /etc/ppp/options.xl2tpd <<EOF
@@ -392,19 +385,16 @@ lcp-echo-interval 30
 connect-delay 5000
 ms-dns $DNS_SRV1
 EOF
-
   if [ -z "$VPN_DNS_SRV1" ] || [ -n "$VPN_DNS_SRV2" ]; then
 cat >> /etc/ppp/options.xl2tpd <<EOF
 ms-dns $DNS_SRV2
 EOF
   fi
-
   # Create VPN credentials
   conf_bk "/etc/ppp/chap-secrets"
 cat > /etc/ppp/chap-secrets <<EOF
 "$VPN_USER" l2tpd "$VPN_PASSWORD" *
 EOF
-
   conf_bk "/etc/ipsec.d/passwd"
   VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
 cat > /etc/ipsec.d/passwd <<EOF
@@ -447,7 +437,6 @@ update_iptables() {
   if ! grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
     ipt_flag=1
   fi
-
   ipi='iptables -I INPUT'
   ipf='iptables -I FORWARD'
   ipp='iptables -t nat -I POSTROUTING'
@@ -485,7 +474,6 @@ iptables-restore < /etc/iptables.rules
 exit 0
 EOF
   chmod +x /etc/network/if-pre-up.d/iptablesload
-
   sed -i '1c\#!/sbin/openrc-run' /etc/init.d/ipsec
   for svc in fail2ban ipsec xl2tpd; do
     rc-update add "$svc" default >/dev/null
@@ -495,14 +483,11 @@ EOF
 start_services() {
   bigecho "Starting services..."
   sysctl -e -q -p
-
   chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
   mkdir -p /run/pluto
   service fail2ban restart >/dev/null 2>&1
   service ipsec restart >/dev/null 2>&1
   service xl2tpd restart >/dev/null 2>&1
-
   mkdir -p /etc/crontabs
   cron_cmd="rc-service -c ipsec zap start"
 if ! grep -qs "$cron_cmd" /etc/crontabs/root; then
diff --git a/vpnsetup_amzn.sh b/vpnsetup_amzn.sh
index 749fcee..73a2381 100755
--- a/vpnsetup_amzn.sh
+++ b/vpnsetup_amzn.sh
@@ -1,7 +1,6 @@
 #!/bin/bash
 #
 # Script for automatic setup of an IPsec VPN server on Amazon Linux 2
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -123,7 +122,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
@@ -287,7 +286,6 @@ EOF
 
 create_vpn_config() {
   bigecho "Creating VPN configuration..."
-
   L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'}
   L2TP_LOCAL=${VPN_L2TP_LOCAL:-'192.168.42.1'}
   L2TP_POOL=${VPN_L2TP_POOL:-'192.168.42.10-192.168.42.250'}
@@ -297,7 +295,6 @@ create_vpn_config() {
   DNS_SRV2=${VPN_DNS_SRV2:-'8.8.4.4'}
   DNS_SRVS="\"$DNS_SRV1 $DNS_SRV2\""
   [ -n "$VPN_DNS_SRV1" ] && [ -z "$VPN_DNS_SRV2" ] && DNS_SRVS="$DNS_SRV1"
-
   # Create IPsec config
   conf_bk "/etc/ipsec.conf"
 cat > /etc/ipsec.conf <<EOF
@@ -348,13 +345,11 @@ conn xauth-psk
 
 include /etc/ipsec.d/*.conf
 EOF
-
   # Specify IPsec PSK
   conf_bk "/etc/ipsec.secrets"
 cat > /etc/ipsec.secrets <<EOF
 %any  %any  : PSK "$VPN_IPSEC_PSK"
 EOF
-
   # Create xl2tpd config
   conf_bk "/etc/xl2tpd/xl2tpd.conf"
 cat > /etc/xl2tpd/xl2tpd.conf <<EOF
@@ -371,7 +366,6 @@ name = l2tpd
 pppoptfile = /etc/ppp/options.xl2tpd
 length bit = yes
 EOF
-
   # Set xl2tpd options
   conf_bk "/etc/ppp/options.xl2tpd"
 cat > /etc/ppp/options.xl2tpd <<EOF
@@ -388,19 +382,16 @@ lcp-echo-interval 30
 connect-delay 5000
 ms-dns $DNS_SRV1
 EOF
-
   if [ -z "$VPN_DNS_SRV1" ] || [ -n "$VPN_DNS_SRV2" ]; then
 cat >> /etc/ppp/options.xl2tpd <<EOF
 ms-dns $DNS_SRV2
 EOF
   fi
-
   # Create VPN credentials
   conf_bk "/etc/ppp/chap-secrets"
 cat > /etc/ppp/chap-secrets <<EOF
 "$VPN_USER" l2tpd "$VPN_PASSWORD" *
 EOF
-
   conf_bk "/etc/ipsec.d/passwd"
   VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
 cat > /etc/ipsec.d/passwd <<EOF
@@ -457,7 +448,6 @@ update_iptables() {
   if ! grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
     ipt_flag=1
   fi
-
   ipi='iptables -I INPUT'
   ipf='iptables -I FORWARD'
   ipp='iptables -t nat -I POSTROUTING'
@@ -490,7 +480,6 @@ enable_on_boot() {
   bigecho "Enabling services on boot..."
   systemctl --now mask firewalld 2>/dev/null
   systemctl enable iptables fail2ban 2>/dev/null
-
   if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
     if [ -f /etc/rc.local ]; then
       conf_bk "/etc/rc.local"
@@ -511,22 +500,17 @@ EOF
 start_services() {
   bigecho "Starting services..."
   sysctl -e -q -p
-
   chmod +x /etc/rc.local
   chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
   restorecon /etc/ipsec.d/*db 2>/dev/null
   restorecon /usr/local/sbin -Rv 2>/dev/null
   restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null
-
   iptables-restore < "$IPT_FILE"
-
   # Fix xl2tpd if l2tp_ppp is unavailable
   if ! modprobe -q l2tp_ppp; then
     sed -i '/^ExecStartPre=\//s/=/=-/' /usr/lib/systemd/system/xl2tpd.service
     systemctl daemon-reload
   fi
-
   mkdir -p /run/pluto
   service fail2ban restart 2>/dev/null
   service ipsec restart 2>/dev/null
diff --git a/vpnsetup_centos.sh b/vpnsetup_centos.sh
index afecddb..e3d6ed1 100755
--- a/vpnsetup_centos.sh
+++ b/vpnsetup_centos.sh
@@ -2,7 +2,6 @@
 #
 # Script for automatic setup of an IPsec VPN server on CentOS/RHEL, Rocky Linux,
 # AlmaLinux and Oracle Linux
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -151,7 +150,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
@@ -358,7 +357,6 @@ EOF
 
 create_vpn_config() {
   bigecho "Creating VPN configuration..."
-
   L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'}
   L2TP_LOCAL=${VPN_L2TP_LOCAL:-'192.168.42.1'}
   L2TP_POOL=${VPN_L2TP_POOL:-'192.168.42.10-192.168.42.250'}
@@ -368,7 +366,6 @@ create_vpn_config() {
   DNS_SRV2=${VPN_DNS_SRV2:-'8.8.4.4'}
   DNS_SRVS="\"$DNS_SRV1 $DNS_SRV2\""
   [ -n "$VPN_DNS_SRV1" ] && [ -z "$VPN_DNS_SRV2" ] && DNS_SRVS="$DNS_SRV1"
-
   # Create IPsec config
   conf_bk "/etc/ipsec.conf"
 cat > /etc/ipsec.conf <<EOF
@@ -419,13 +416,11 @@ conn xauth-psk
 
 include /etc/ipsec.d/*.conf
 EOF
-
   # Specify IPsec PSK
   conf_bk "/etc/ipsec.secrets"
 cat > /etc/ipsec.secrets <<EOF
 %any  %any  : PSK "$VPN_IPSEC_PSK"
 EOF
-
   # Create xl2tpd config
   conf_bk "/etc/xl2tpd/xl2tpd.conf"
 cat > /etc/xl2tpd/xl2tpd.conf <<EOF
@@ -442,7 +437,6 @@ name = l2tpd
 pppoptfile = /etc/ppp/options.xl2tpd
 length bit = yes
 EOF
-
   # Set xl2tpd options
   conf_bk "/etc/ppp/options.xl2tpd"
 cat > /etc/ppp/options.xl2tpd <<EOF
@@ -459,19 +453,16 @@ lcp-echo-interval 30
 connect-delay 5000
 ms-dns $DNS_SRV1
 EOF
-
   if [ -z "$VPN_DNS_SRV1" ] || [ -n "$VPN_DNS_SRV2" ]; then
 cat >> /etc/ppp/options.xl2tpd <<EOF
 ms-dns $DNS_SRV2
 EOF
   fi
-
   # Create VPN credentials
   conf_bk "/etc/ppp/chap-secrets"
 cat > /etc/ppp/chap-secrets <<EOF
 "$VPN_USER" l2tpd "$VPN_PASSWORD" *
 EOF
-
   conf_bk "/etc/ipsec.d/passwd"
   VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
 cat > /etc/ipsec.d/passwd <<EOF
@@ -539,7 +530,6 @@ update_iptables() {
   if ! grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
     ipt_flag=1
   fi
-
   ipi='iptables -I INPUT'
   ipf='iptables -I FORWARD'
   ipp='iptables -t nat -I POSTROUTING'
@@ -613,7 +603,6 @@ enable_on_boot() {
   else
     systemctl enable iptables fail2ban 2>/dev/null
   fi
-
   if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
     if [ -f /etc/rc.local ]; then
       conf_bk "/etc/rc.local"
@@ -634,26 +623,21 @@ EOF
 start_services() {
   bigecho "Starting services..."
   sysctl -e -q -p
-
   chmod +x /etc/rc.local
   chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
   restorecon /etc/ipsec.d/*db 2>/dev/null
   restorecon /usr/local/sbin -Rv 2>/dev/null
   restorecon /usr/local/libexec/ipsec -Rv 2>/dev/null
-
   if [ "$use_nft" = "1" ]; then
     nft -f "$IPT_FILE"
   else
     iptables-restore < "$IPT_FILE"
   fi
-
   # Fix xl2tpd if l2tp_ppp is unavailable
   if ! modprobe -q l2tp_ppp; then
     sed -i '/^ExecStartPre=\//s/=/=-/' /usr/lib/systemd/system/xl2tpd.service
     systemctl daemon-reload
   fi
-
   mkdir -p /run/pluto
   service fail2ban restart 2>/dev/null
   service ipsec restart 2>/dev/null
diff --git a/vpnsetup_ubuntu.sh b/vpnsetup_ubuntu.sh
index 64fd26f..8cda816 100755
--- a/vpnsetup_ubuntu.sh
+++ b/vpnsetup_ubuntu.sh
@@ -1,7 +1,6 @@
 #!/bin/bash
 #
 # Script for automatic setup of an IPsec VPN server on Ubuntu and Debian
-# Works on any dedicated server or virtual private server (VPS)
 #
 # DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC!
 #
@@ -149,7 +148,7 @@ check_client_name() {
   if [ -n "$VPN_CLIENT_NAME" ]; then
     name_len="$(printf '%s' "$VPN_CLIENT_NAME" | wc -m)"
     if [ "$name_len" -gt "64" ] || printf '%s' "$VPN_CLIENT_NAME" | LC_ALL=C grep -q '[^A-Za-z0-9_-]\+' \
-      || case $VPN_CLIENT_NAME in -*) true;; *) false;; esac; then
+      || case $VPN_CLIENT_NAME in -*) true ;; *) false ;; esac; then
       exiterr "Invalid client name. Use one word only, no special characters except '-' and '_'."
     fi
   fi
@@ -335,7 +334,6 @@ EOF
 
 create_vpn_config() {
   bigecho "Creating VPN configuration..."
-
   L2TP_NET=${VPN_L2TP_NET:-'192.168.42.0/24'}
   L2TP_LOCAL=${VPN_L2TP_LOCAL:-'192.168.42.1'}
   L2TP_POOL=${VPN_L2TP_POOL:-'192.168.42.10-192.168.42.250'}
@@ -345,7 +343,6 @@ create_vpn_config() {
   DNS_SRV2=${VPN_DNS_SRV2:-'8.8.4.4'}
   DNS_SRVS="\"$DNS_SRV1 $DNS_SRV2\""
   [ -n "$VPN_DNS_SRV1" ] && [ -z "$VPN_DNS_SRV2" ] && DNS_SRVS="$DNS_SRV1"
-
   # Create IPsec config
   conf_bk "/etc/ipsec.conf"
 cat > /etc/ipsec.conf <<EOF
@@ -396,19 +393,16 @@ conn xauth-psk
 
 include /etc/ipsec.d/*.conf
 EOF
-
   if uname -m | grep -qi '^arm'; then
     if ! modprobe -q sha512; then
       sed -i '/phase2alg/s/,aes256-sha2_512//' /etc/ipsec.conf
     fi
   fi
-
   # Specify IPsec PSK
   conf_bk "/etc/ipsec.secrets"
 cat > /etc/ipsec.secrets <<EOF
 %any  %any  : PSK "$VPN_IPSEC_PSK"
 EOF
-
   # Create xl2tpd config
   conf_bk "/etc/xl2tpd/xl2tpd.conf"
 cat > /etc/xl2tpd/xl2tpd.conf <<EOF
@@ -425,7 +419,6 @@ name = l2tpd
 pppoptfile = /etc/ppp/options.xl2tpd
 length bit = yes
 EOF
-
   # Set xl2tpd options
   conf_bk "/etc/ppp/options.xl2tpd"
 cat > /etc/ppp/options.xl2tpd <<EOF
@@ -442,19 +435,16 @@ lcp-echo-interval 30
 connect-delay 5000
 ms-dns $DNS_SRV1
 EOF
-
   if [ -z "$VPN_DNS_SRV1" ] || [ -n "$VPN_DNS_SRV2" ]; then
 cat >> /etc/ppp/options.xl2tpd <<EOF
 ms-dns $DNS_SRV2
 EOF
   fi
-
   # Create VPN credentials
   conf_bk "/etc/ppp/chap-secrets"
 cat > /etc/ppp/chap-secrets <<EOF
 "$VPN_USER" l2tpd "$VPN_PASSWORD" *
 EOF
-
   conf_bk "/etc/ipsec.d/passwd"
   VPN_PASSWORD_ENC=$(openssl passwd -1 "$VPN_PASSWORD")
 cat > /etc/ipsec.d/passwd <<EOF
@@ -498,7 +488,6 @@ update_iptables() {
   if ! grep -qs "hwdsl2 VPN script" "$IPT_FILE"; then
     ipt_flag=1
   fi
-
   ipi='iptables -I INPUT'
   ipf='iptables -I FORWARD'
   ipp='iptables -t nat -I POSTROUTING'
@@ -524,7 +513,6 @@ update_iptables() {
     $ipp -s "$L2TP_NET" -o "$NET_IFACE" -j MASQUERADE
     echo "# Modified by hwdsl2 VPN script" > "$IPT_FILE"
     iptables-save >> "$IPT_FILE"
-
     if [ -f "$IPT_FILE2" ]; then
       conf_bk "$IPT_FILE2"
       /bin/cp -f "$IPT_FILE" "$IPT_FILE2"
@@ -555,7 +543,6 @@ enable_on_boot() {
   if [ -f "$IPT_FILE2" ] && { [ -f "$IPT_PST" ] || [ -f "$IPT_PST2" ]; }; then
     ipt_load=0
   fi
-
   if [ "$ipt_load" = "1" ]; then
     mkdir -p /etc/network/if-pre-up.d
 cat > /etc/network/if-pre-up.d/iptablesload <<'EOF'
@@ -564,7 +551,6 @@ iptables-restore < /etc/iptables.rules
 exit 0
 EOF
     chmod +x /etc/network/if-pre-up.d/iptablesload
-
     if [ -f /usr/sbin/netplan ]; then
       mkdir -p /etc/systemd/system
 cat > /etc/systemd/system/load-iptables-rules.service <<'EOF'
@@ -588,12 +574,10 @@ EOF
       systemctl enable load-iptables-rules 2>/dev/null
     fi
   fi
-
   for svc in fail2ban ipsec xl2tpd; do
     update-rc.d "$svc" enable >/dev/null 2>&1
     systemctl enable "$svc" 2>/dev/null
   done
-
   if ! grep -qs "hwdsl2 VPN script" /etc/rc.local; then
     if [ -f /etc/rc.local ]; then
       conf_bk "/etc/rc.local"
@@ -616,10 +600,8 @@ EOF
 start_services() {
   bigecho "Starting services..."
   sysctl -e -q -p
-
   chmod +x /etc/rc.local
   chmod 600 /etc/ipsec.secrets* /etc/ppp/chap-secrets* /etc/ipsec.d/passwd*
-
   mkdir -p /run/pluto
   service fail2ban restart 2>/dev/null
   service ipsec restart 2>/dev/null