Initial commit
This commit is contained in:
4
123/openvpn/ccd/server-gw-ckubu/VPN-123Comics-gw-ckubu
Normal file
4
123/openvpn/ccd/server-gw-ckubu/VPN-123Comics-gw-ckubu
Normal file
@ -0,0 +1,4 @@
|
||||
ifconfig-push 10.1.142.2 255.255.255.0
|
||||
push "route 172.16.142.0 255.255.255.0 10.1.142.1"
|
||||
iroute 192.168.63.0 255.255.255.0
|
||||
iroute 192.168.64.0 255.255.255.0
|
1
123/openvpn/ccd/server-home/VPN-123Comics-chris
Normal file
1
123/openvpn/ccd/server-home/VPN-123Comics-chris
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.142.2 255.255.255.0
|
13
123/openvpn/crl.pem
Normal file
13
123/openvpn/crl.pem
Normal file
@ -0,0 +1,13 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIB+DCB4TANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUxDzANBgNVBAgT
|
||||
BkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9QRU4xGTAXBgNV
|
||||
BAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjNDb21pY3MtY2Ex
|
||||
FjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFk
|
||||
bUBvb3Blbi5kZRcNMTgwMTI1MjMwODQwWhcNMjgwMTIzMjMwODQwWjANBgkqhkiG
|
||||
9w0BAQsFAAOCAQEACi4ntL7wo7DvF+i3I8I44fI3Gx2tWARiTKzXs3M66ICzy8uG
|
||||
CLFEIF0Sz2jNHZDIWqpzmy5wbzdekRJbmwj4LWErKvcPULjoBxpnz4N1HRF0j7fw
|
||||
IcAacdfw9lDZFX/ia545xt/mQx4s7gMksc4cwwyZ8EJYcyZaYlLN/edxY5tn32z7
|
||||
OgWY4xDXvsXfgucCYT7k+SJ4ElNXroh5TIMrvSPCvLtWylzoOCZg9kSv1a0slkLl
|
||||
EmrwTAZLJTkl6Yv/G7ebNUDvjg6N0oA0NdTaDdA9oVaTqDGw3k/AVL5i7mgqdFoB
|
||||
6kFHw4oJfFRQ6vNIZsGX0rH60zLmL+Ea7jDT/Q==
|
||||
-----END X509 CRL-----
|
1
123/openvpn/easy-rsa/build-ca
Symbolic link
1
123/openvpn/easy-rsa/build-ca
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-ca
|
1
123/openvpn/easy-rsa/build-dh
Symbolic link
1
123/openvpn/easy-rsa/build-dh
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-dh
|
1
123/openvpn/easy-rsa/build-inter
Symbolic link
1
123/openvpn/easy-rsa/build-inter
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-inter
|
1
123/openvpn/easy-rsa/build-key
Symbolic link
1
123/openvpn/easy-rsa/build-key
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key
|
1
123/openvpn/easy-rsa/build-key-pass
Symbolic link
1
123/openvpn/easy-rsa/build-key-pass
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-pass
|
1
123/openvpn/easy-rsa/build-key-pkcs12
Symbolic link
1
123/openvpn/easy-rsa/build-key-pkcs12
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-pkcs12
|
1
123/openvpn/easy-rsa/build-key-server
Symbolic link
1
123/openvpn/easy-rsa/build-key-server
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-server
|
1
123/openvpn/easy-rsa/build-req
Symbolic link
1
123/openvpn/easy-rsa/build-req
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-req
|
1
123/openvpn/easy-rsa/build-req-pass
Symbolic link
1
123/openvpn/easy-rsa/build-req-pass
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-req-pass
|
1
123/openvpn/easy-rsa/clean-all
Symbolic link
1
123/openvpn/easy-rsa/clean-all
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/clean-all
|
1
123/openvpn/easy-rsa/inherit-inter
Symbolic link
1
123/openvpn/easy-rsa/inherit-inter
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/inherit-inter
|
1
123/openvpn/easy-rsa/list-crl
Symbolic link
1
123/openvpn/easy-rsa/list-crl
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/list-crl
|
268
123/openvpn/easy-rsa/openssl-0.9.6.cnf
Normal file
268
123/openvpn/easy-rsa/openssl-0.9.6.cnf
Normal file
@ -0,0 +1,268 @@
|
||||
# For use with easy-rsa version 2.0
|
||||
|
||||
#
|
||||
# OpenSSL example configuration file.
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
default_crl_days= 30 # how long before next CRL
|
||||
default_md = sha256 # which md to use.
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString.
|
||||
# utf8only: only UTF8Strings.
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||
# so use this option with caution!
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
293
123/openvpn/easy-rsa/openssl-0.9.8.cnf
Normal file
293
123/openvpn/easy-rsa/openssl-0.9.8.cnf
Normal file
@ -0,0 +1,293 @@
|
||||
# For use with easy-rsa version 2.0
|
||||
|
||||
#
|
||||
# OpenSSL example configuration file.
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
openssl_conf = openssl_init
|
||||
|
||||
[ openssl_init ]
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
engines = engine_section
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
default_crl_days= 30 # how long before next CRL
|
||||
default_md = sha256 # which md to use.
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString.
|
||||
# utf8only: only UTF8Strings.
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||
# so use this option with caution!
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
name = Name
|
||||
name_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
name_default = $ENV::KEY_NAME
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
[ engine_section ]
|
||||
#
|
||||
# If you are using PKCS#11
|
||||
# Install engine_pkcs11 of opensc (www.opensc.org)
|
||||
# And uncomment the following
|
||||
# verify that dynamic_path points to the correct location
|
||||
#
|
||||
#pkcs11 = pkcs11_section
|
||||
|
||||
[ pkcs11_section ]
|
||||
engine_id = pkcs11
|
||||
dynamic_path = /usr/lib/engines/engine_pkcs11.so
|
||||
MODULE_PATH = $ENV::PKCS11_MODULE_PATH
|
||||
PIN = $ENV::PKCS11_PIN
|
||||
init = 0
|
289
123/openvpn/easy-rsa/openssl-1.0.0.cnf
Normal file
289
123/openvpn/easy-rsa/openssl-1.0.0.cnf
Normal file
@ -0,0 +1,289 @@
|
||||
# For use with easy-rsa version 2.0 and OpenSSL 1.0.0*
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
openssl_conf = openssl_init
|
||||
|
||||
[ openssl_init ]
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
engines = engine_section
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
#default_crl_days= 30 # how long before next CRL
|
||||
default_crl_days= 3650 # how long before next CRL
|
||||
default_md = sha256 # use public key default MD
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString (PKIX recommendation after 2004).
|
||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
name = Name
|
||||
name_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
name_default = $ENV::KEY_NAME
|
||||
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
[ engine_section ]
|
||||
#
|
||||
# If you are using PKCS#11
|
||||
# Install engine_pkcs11 of opensc (www.opensc.org)
|
||||
# And uncomment the following
|
||||
# verify that dynamic_path points to the correct location
|
||||
#
|
||||
#pkcs11 = pkcs11_section
|
||||
|
||||
[ pkcs11_section ]
|
||||
engine_id = pkcs11
|
||||
dynamic_path = /usr/lib/engines/engine_pkcs11.so
|
||||
MODULE_PATH = $ENV::PKCS11_MODULE_PATH
|
||||
PIN = $ENV::PKCS11_PIN
|
||||
init = 0
|
289
123/openvpn/easy-rsa/openssl-1.1.0.cnf
Normal file
289
123/openvpn/easy-rsa/openssl-1.1.0.cnf
Normal file
@ -0,0 +1,289 @@
|
||||
# For use with easy-rsa version 2.0 and OpenSSL 1.0.0*
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
openssl_conf = openssl_init
|
||||
|
||||
[ openssl_init ]
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
engines = engine_section
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
#default_crl_days= 30 # how long before next CRL
|
||||
default_crl_days= 3650 # how long before next CRL
|
||||
default_md = sha256 # use public key default MD
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString (PKIX recommendation after 2004).
|
||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
name = Name
|
||||
name_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
name_default = $ENV::KEY_NAME
|
||||
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
[ engine_section ]
|
||||
#
|
||||
# If you are using PKCS#11
|
||||
# Install engine_pkcs11 of opensc (www.opensc.org)
|
||||
# And uncomment the following
|
||||
# verify that dynamic_path points to the correct location
|
||||
#
|
||||
#pkcs11 = pkcs11_section
|
||||
|
||||
[ pkcs11_section ]
|
||||
engine_id = pkcs11
|
||||
dynamic_path = /usr/lib/engines/engine_pkcs11.so
|
||||
MODULE_PATH = $ENV::PKCS11_MODULE_PATH
|
||||
PIN = $ENV::PKCS11_PIN
|
||||
init = 0
|
1
123/openvpn/easy-rsa/openssl.cnf
Symbolic link
1
123/openvpn/easy-rsa/openssl.cnf
Symbolic link
@ -0,0 +1 @@
|
||||
openssl-1.1.0.cnf
|
1
123/openvpn/easy-rsa/pkitool
Symbolic link
1
123/openvpn/easy-rsa/pkitool
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/pkitool
|
1
123/openvpn/easy-rsa/revoke-full
Symbolic link
1
123/openvpn/easy-rsa/revoke-full
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/revoke-full
|
1
123/openvpn/easy-rsa/sign-req
Symbolic link
1
123/openvpn/easy-rsa/sign-req
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/sign-req
|
95
123/openvpn/easy-rsa/vars
Normal file
95
123/openvpn/easy-rsa/vars
Normal file
@ -0,0 +1,95 @@
|
||||
# easy-rsa parameter settings
|
||||
|
||||
# NOTE: If you installed from an RPM,
|
||||
# don't edit this file in place in
|
||||
# /usr/share/openvpn/easy-rsa --
|
||||
# instead, you should copy the whole
|
||||
# easy-rsa directory to another location
|
||||
# (such as /etc/openvpn) so that your
|
||||
# edits will not be wiped out by a future
|
||||
# OpenVPN package upgrade.
|
||||
|
||||
# This variable should point to
|
||||
# the top level of the easy-rsa
|
||||
# tree.
|
||||
##export EASY_RSA="`pwd`"
|
||||
export BASE_DIR="/etc/openvpn"
|
||||
export EASY_RSA="$BASE_DIR/easy-rsa"
|
||||
|
||||
#
|
||||
# This variable should point to
|
||||
# the requested executables
|
||||
#
|
||||
export OPENSSL="openssl"
|
||||
export PKCS11TOOL="pkcs11-tool"
|
||||
export GREP="grep"
|
||||
|
||||
|
||||
# This variable should point to
|
||||
# the openssl.cnf file included
|
||||
# with easy-rsa.
|
||||
export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`
|
||||
|
||||
# Edit this variable to point to
|
||||
# your soon-to-be-created key
|
||||
# directory.
|
||||
#
|
||||
# WARNING: clean-all will do
|
||||
# a rm -rf on this directory
|
||||
# so make sure you define
|
||||
# it correctly!
|
||||
##export KEY_DIR="$EASY_RSA/keys"
|
||||
export KEY_DIR="$BASE_DIR/keys"
|
||||
|
||||
# Issue rm -rf warning
|
||||
echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR
|
||||
|
||||
# PKCS11 fixes
|
||||
export PKCS11_MODULE_PATH="dummy"
|
||||
export PKCS11_PIN="dummy"
|
||||
|
||||
# Increase this to 2048 if you
|
||||
# are paranoid. This will slow
|
||||
# down TLS negotiation performance
|
||||
# as well as the one-time DH parms
|
||||
# generation process.
|
||||
export KEY_SIZE=2048
|
||||
|
||||
# In how many days should the root CA key expire?
|
||||
##export CA_EXPIRE=3650
|
||||
export CA_EXPIRE=11688
|
||||
|
||||
# In how many days should certificates expire?
|
||||
##export KEY_EXPIRE=3650
|
||||
export KEY_EXPIRE=7305
|
||||
|
||||
# These are the default values for fields
|
||||
# which will be placed in the certificate.
|
||||
# Don't leave any of these fields blank.
|
||||
##export KEY_COUNTRY="US"
|
||||
export KEY_COUNTRY="DE"
|
||||
##export KEY_PROVINCE="CA"
|
||||
export KEY_PROVINCE="Berlin"
|
||||
##export KEY_CITY="SanFrancisco"
|
||||
export KEY_CITY="Berlin"
|
||||
##export KEY_ORG="Fort-Funston"
|
||||
export KEY_ORG="O.OPEN"
|
||||
##export KEY_EMAIL="me@myhost.mydomain"
|
||||
export KEY_EMAIL="ckubu-adm@oopen.de"
|
||||
##export KEY_OU="MyOrganizationalUnit"
|
||||
export KEY_OU="Network Services"
|
||||
|
||||
# X509 Subject Field
|
||||
##export KEY_NAME="EasyRSA"
|
||||
export KEY_NAME="VPN 123Comics"
|
||||
|
||||
# PKCS11 Smart Card
|
||||
# export PKCS11_MODULE_PATH="/usr/lib/changeme.so"
|
||||
# export PKCS11_PIN=1234
|
||||
|
||||
# If you'd like to sign all keys with the same Common Name, uncomment the KEY_CN export below
|
||||
# You will also need to make sure your OpenVPN server config has the duplicate-cn option set
|
||||
## export KEY_CN="CommonName"
|
||||
export KEY_CN="VPN-123Comics"
|
||||
|
||||
export KEY_ALTNAMES="VPN 123Comics"
|
1
123/openvpn/easy-rsa/whichopensslcnf
Symbolic link
1
123/openvpn/easy-rsa/whichopensslcnf
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/whichopensslcnf
|
0
123/openvpn/ipp.txt
Normal file
0
123/openvpn/ipp.txt
Normal file
101
123/openvpn/keys/01.pem
Normal file
101
123/openvpn/keys/01.pem
Normal file
@ -0,0 +1,101 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 11 02:18:50 2017 GMT
|
||||
Not After : Mar 11 02:18:50 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-server/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:dc:9a:13:40:1a:60:e4:03:90:5a:6c:6e:19:9a:
|
||||
2d:03:7d:a2:58:70:0b:d1:ac:1c:79:2e:e4:62:2c:
|
||||
89:62:94:36:0c:8f:81:91:7c:65:ee:52:97:0f:c6:
|
||||
53:a8:4f:a8:65:a5:15:6d:03:95:92:46:d1:b2:62:
|
||||
a7:39:eb:f3:cd:b5:65:c8:7c:3d:0c:e9:16:25:f1:
|
||||
61:f5:76:8f:0c:a8:f7:c0:76:83:11:45:59:d5:f7:
|
||||
d4:c5:c3:33:66:1d:33:90:66:8f:65:d2:20:f7:8a:
|
||||
b1:a3:73:58:79:a6:ec:a9:b0:a3:71:90:49:61:d3:
|
||||
c2:be:72:19:92:38:ac:35:28:99:f6:5b:57:bb:28:
|
||||
5c:9a:4c:15:05:24:b8:2d:c3:11:82:25:75:a3:59:
|
||||
81:33:04:03:b7:f6:86:3b:27:48:0c:b9:11:0d:a3:
|
||||
cb:43:13:bc:60:65:e8:eb:42:2d:e9:c6:2d:6f:ce:
|
||||
49:59:ae:24:4f:06:29:21:d9:43:5e:8d:15:91:24:
|
||||
d1:0c:7d:a4:93:93:5e:56:f7:f9:39:b6:2c:ae:c2:
|
||||
80:7d:1c:6e:13:83:d5:26:b0:db:f4:fd:20:75:f9:
|
||||
d4:3a:c8:b6:00:8a:96:f8:3b:82:b0:f0:4f:98:49:
|
||||
3e:1d:49:d6:15:a9:3c:9b:b8:5f:c8:14:85:27:54:
|
||||
e5:57
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Cert Type:
|
||||
SSL Server
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Server Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
44:47:4F:F6:97:8F:87:FB:A3:02:61:45:7F:69:1F:2E:CA:32:37:63
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:server
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
9b:9a:81:35:cb:4f:32:b4:c0:aa:09:b7:e8:9b:ca:d4:7e:c5:
|
||||
e8:4a:21:6b:41:a0:34:e4:a6:bf:07:20:42:6c:e5:a8:50:6b:
|
||||
67:c4:1e:9d:2a:76:e3:ea:7d:68:67:12:ab:54:64:83:dd:7a:
|
||||
d1:13:95:76:5e:57:38:6b:59:4c:47:14:63:a4:4d:25:41:e4:
|
||||
e2:79:35:36:fd:98:c4:47:80:b4:d4:31:7a:db:d1:88:3d:5d:
|
||||
25:20:0b:c4:40:0a:dd:b5:48:21:92:86:18:85:22:f3:6a:80:
|
||||
ad:a1:71:d7:8a:69:a9:78:b1:dd:90:b8:eb:ec:90:0b:68:e1:
|
||||
40:2c:99:02:2b:31:18:2b:e0:d4:22:d1:1e:f3:77:98:9f:bb:
|
||||
68:00:f4:6e:51:45:1b:a8:ad:ee:03:fb:62:1d:fb:57:c6:7d:
|
||||
fe:91:3c:c1:6e:f9:34:0c:cb:a0:ce:7f:9b:ed:41:b6:65:c1:
|
||||
5c:e9:83:de:98:00:bb:7f:4c:b3:7d:bf:f4:e3:0a:6b:e5:ad:
|
||||
71:ae:8b:b9:98:d6:a2:8d:ed:5c:b8:87:fb:35:f5:90:11:9e:
|
||||
89:90:f9:b1:ee:6f:e3:a8:d4:42:6b:c4:43:04:13:24:a2:5c:
|
||||
33:8a:43:f1:95:bf:ab:7a:db:4b:6a:fe:49:f0:de:ef:39:86:
|
||||
90:25:19:54
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFejCCBGKgAwIBAgIBATANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMTEwMjE4NTBaFw0zNzAzMTEwMjE4
|
||||
NTBaMIG1MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEdMBsGA1UEAxMUVlBOLTEyM0NvbWljcy1zZXJ2ZXIxFjAUBgNVBCkTDVZQTiAx
|
||||
MjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZTCCASIw
|
||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANyaE0AaYOQDkFpsbhmaLQN9olhw
|
||||
C9GsHHku5GIsiWKUNgyPgZF8Ze5Slw/GU6hPqGWlFW0DlZJG0bJipznr8821Zch8
|
||||
PQzpFiXxYfV2jwyo98B2gxFFWdX31MXDM2YdM5Bmj2XSIPeKsaNzWHmm7Kmwo3GQ
|
||||
SWHTwr5yGZI4rDUomfZbV7soXJpMFQUkuC3DEYIldaNZgTMEA7f2hjsnSAy5EQ2j
|
||||
y0MTvGBl6OtCLenGLW/OSVmuJE8GKSHZQ16NFZEk0Qx9pJOTXlb3+Tm2LK7CgH0c
|
||||
bhOD1Saw2/T9IHX51DrItgCKlvg7grDwT5hJPh1J1hWpPJu4X8gUhSdU5VcCAwEA
|
||||
AaOCAZUwggGRMAkGA1UdEwQCMAAwEQYJYIZIAYb4QgEBBAQDAgZAMDQGCWCGSAGG
|
||||
+EIBDQQnFiVFYXN5LVJTQSBHZW5lcmF0ZWQgU2VydmVyIENlcnRpZmljYXRlMB0G
|
||||
A1UdDgQWBBRER0/2l4+H+6MCYUV/aR8uyjI3YzCB5gYDVR0jBIHeMIHbgBRgch7q
|
||||
Ry2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTELMAkGA1UEBhMCREUxDzANBgNVBAgT
|
||||
BkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9QRU4xGTAXBgNV
|
||||
BAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjNDb21pY3MtY2Ex
|
||||
FjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFk
|
||||
bUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1UdJQQMMAoGCCsGAQUFBwMBMAsGA1Ud
|
||||
DwQEAwIFoDARBgNVHREECjAIggZzZXJ2ZXIwDQYJKoZIhvcNAQELBQADggEBAJua
|
||||
gTXLTzK0wKoJt+ibytR+xehKIWtBoDTkpr8HIEJs5ahQa2fEHp0qduPqfWhnEqtU
|
||||
ZIPdetETlXZeVzhrWUxHFGOkTSVB5OJ5NTb9mMRHgLTUMXrb0Yg9XSUgC8RACt21
|
||||
SCGShhiFIvNqgK2hcdeKaal4sd2QuOvskAto4UAsmQIrMRgr4NQi0R7zd5ifu2gA
|
||||
9G5RRRuore4D+2Id+1fGff6RPMFu+TQMy6DOf5vtQbZlwVzpg96YALt/TLN9v/Tj
|
||||
CmvlrXGui7mY1qKN7Vy4h/s19ZARnomQ+bHub+Oo1EJrxEMEEySiXDOKQ/GVv6t6
|
||||
20tq/knw3u85hpAlGVQ=
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/02.pem
Normal file
98
123/openvpn/keys/02.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 11 02:24:18 2017 GMT
|
||||
Not After : Mar 11 02:24:18 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-chris/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ac:3d:7f:1e:1e:d7:15:85:96:bf:74:de:56:88:
|
||||
9c:7c:dd:45:e5:51:6f:db:c5:a6:0e:48:ab:33:0d:
|
||||
f6:d7:16:6b:5b:9c:63:ab:7b:20:49:aa:f4:6c:31:
|
||||
02:cc:24:46:01:fe:c2:c3:42:b8:46:3d:6c:09:13:
|
||||
e7:d3:81:10:e7:09:0b:5d:63:e8:cf:61:01:bf:53:
|
||||
00:a4:2e:e6:1e:6b:eb:02:ed:4a:e8:5c:c1:0d:e1:
|
||||
b2:5d:b1:a1:11:92:5e:7b:21:50:a2:e0:1b:77:53:
|
||||
fd:e2:13:a5:9f:2f:3d:ed:5b:a0:68:6f:b0:75:22:
|
||||
05:f9:dd:94:cc:e7:87:ee:be:c7:77:a3:cd:c2:78:
|
||||
b0:d3:f5:40:8b:c8:ba:70:9f:f5:99:b7:49:0f:a4:
|
||||
c4:b7:70:94:7c:d8:3a:87:bd:58:af:f7:71:45:7b:
|
||||
b7:2f:a9:09:dc:71:89:85:42:5f:b1:0d:cc:c1:46:
|
||||
8a:22:fb:44:26:e2:f6:00:10:df:3f:76:43:6b:92:
|
||||
ed:f9:0e:41:fa:b1:bc:43:29:45:5d:48:05:8c:83:
|
||||
fd:c4:31:1f:7a:41:a5:97:05:e5:2b:a1:8a:ca:70:
|
||||
37:09:81:c7:52:80:c2:93:07:1f:81:6c:fd:f3:e0:
|
||||
46:58:00:6a:ef:7a:eb:37:ca:fb:cf:71:67:87:86:
|
||||
bb:31
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
8B:AE:40:F9:23:AD:01:8E:59:9A:6E:80:8A:C5:CD:9E:ED:2A:29:A8
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:chris
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b8:5e:18:10:4f:91:50:53:78:26:cd:c7:5a:1f:2e:50:e8:79:
|
||||
cc:ae:d4:92:21:fb:08:25:69:44:c5:a0:a6:67:a9:23:f7:40:
|
||||
c7:d8:66:c9:21:50:34:1e:d9:8c:12:9d:ab:de:f6:a3:bc:78:
|
||||
fa:85:cc:d7:1b:84:4a:f1:19:10:9c:39:4d:c5:21:bc:db:32:
|
||||
25:51:d1:44:96:a8:32:0f:57:e5:1a:60:b2:01:7a:6e:d6:c8:
|
||||
00:3b:2f:82:0c:3d:10:bc:81:df:4f:eb:a3:7f:cf:a4:79:21:
|
||||
ba:1e:25:e4:eb:fb:65:5e:dd:ec:27:4a:15:c5:45:70:ae:60:
|
||||
a0:dc:7d:25:37:de:8c:79:a1:49:38:00:8f:9b:7c:94:d6:02:
|
||||
0a:4c:d3:c3:28:86:1d:ec:5d:11:97:7d:7c:07:0d:92:67:dc:
|
||||
0c:29:8c:c8:16:68:a4:df:8a:db:89:ed:dc:e8:88:1a:6d:58:
|
||||
c5:74:3c:f0:25:ad:58:f6:e8:1e:89:78:4d:d7:1c:a3:8d:8a:
|
||||
93:89:9e:7e:19:24:03:7e:c8:1f:7d:48:98:4e:f1:ba:86:e5:
|
||||
ae:d1:45:a8:80:f0:90:ed:b5:23:8c:75:6f:9b:f4:73:04:c0:
|
||||
82:e0:b4:df:7f:33:36:bc:c7:32:de:52:cc:4c:33:0c:e6:e4:
|
||||
b7:23:16:9e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMTEwMjI0MThaFw0zNzAzMTEwMjI0
|
||||
MThaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1jaHJpczEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArD1/Hh7XFYWWv3TeVoicfN1F5VFv
|
||||
28WmDkirMw321xZrW5xjq3sgSar0bDECzCRGAf7Cw0K4Rj1sCRPn04EQ5wkLXWPo
|
||||
z2EBv1MApC7mHmvrAu1K6FzBDeGyXbGhEZJeeyFQouAbd1P94hOlny897VugaG+w
|
||||
dSIF+d2UzOeH7r7Hd6PNwniw0/VAi8i6cJ/1mbdJD6TEt3CUfNg6h71Yr/dxRXu3
|
||||
L6kJ3HGJhUJfsQ3MwUaKIvtEJuL2ABDfP3ZDa5Lt+Q5B+rG8QylFXUgFjIP9xDEf
|
||||
ekGllwXlK6GKynA3CYHHUoDCkwcfgWz98+BGWABq73rrN8r7z3Fnh4a7MQIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSLrkD5I60BjlmaboCKxc2e7Sop
|
||||
qDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVjaHJpczAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAuF4YEE+RUFN4Js3HWh8uUOh5zK7UkiH7CCVpRMWg
|
||||
pmepI/dAx9hmySFQNB7ZjBKdq972o7x4+oXM1xuESvEZEJw5TcUhvNsyJVHRRJao
|
||||
Mg9X5RpgsgF6btbIADsvggw9ELyB30/ro3/PpHkhuh4l5Ov7ZV7d7CdKFcVFcK5g
|
||||
oNx9JTfejHmhSTgAj5t8lNYCCkzTwyiGHexdEZd9fAcNkmfcDCmMyBZopN+K24nt
|
||||
3OiIGm1YxXQ88CWtWPboHol4Tdcco42Kk4mefhkkA37IH31ImE7xuoblrtFFqIDw
|
||||
kO21I4x1b5v0cwTAguC0338zNrzHMt5SzEwzDObktyMWng==
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/03.pem
Normal file
98
123/openvpn/keys/03.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 3 (0x3)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 27 01:22:52 2017 GMT
|
||||
Not After : Mar 27 01:22:52 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-gw-ckubu/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d6:4a:11:c9:92:5d:41:10:43:41:f9:d0:31:82:
|
||||
47:6f:9c:10:dd:f2:2d:c1:14:0a:56:6a:82:54:01:
|
||||
7c:7c:aa:ec:13:c9:26:c1:38:cb:f5:ae:3c:c2:1f:
|
||||
f0:88:ba:7b:84:e1:ce:bf:40:54:a2:87:40:49:e7:
|
||||
4e:e0:5c:1a:e5:cb:a5:37:73:99:5f:f2:ed:38:c1:
|
||||
a5:10:72:8a:10:3d:d6:41:dc:a5:e3:28:f1:2b:b0:
|
||||
6b:0a:f2:4a:9a:be:15:07:e1:0d:40:69:e2:53:b4:
|
||||
1e:1e:32:fe:1c:65:4f:38:d5:e8:a1:38:eb:fa:8a:
|
||||
46:2e:e3:2d:ed:be:1e:e9:5a:c9:62:e3:59:f2:28:
|
||||
fc:28:c0:9e:ee:8a:12:73:d2:a2:be:6d:41:eb:f1:
|
||||
85:29:2e:3e:cd:73:ba:37:a0:eb:cf:a3:04:29:db:
|
||||
79:5f:9b:a8:80:e9:ec:80:94:6a:8e:83:5f:bd:9d:
|
||||
02:20:27:0b:00:1d:17:3d:50:71:a2:b8:fd:92:c8:
|
||||
f8:db:a1:1d:98:43:3a:d9:b0:66:0d:ce:62:26:a6:
|
||||
e2:cb:92:04:de:9d:1c:ea:5a:3b:53:10:a8:36:4c:
|
||||
b7:07:37:da:aa:01:9a:a9:98:37:b1:23:b2:19:a7:
|
||||
e7:40:20:09:0b:e8:b1:5c:87:66:05:27:90:a8:a1:
|
||||
fd:3d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
88:EE:C2:37:75:7A:6F:00:9C:EF:11:64:CD:08:96:0A:45:18:63:1B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:gw-ckubu
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
66:20:ee:15:bf:c7:8e:47:40:4c:1b:6e:b6:c9:82:53:a9:67:
|
||||
52:51:f1:38:c0:b8:19:90:c2:40:49:2e:b4:27:d3:b8:0f:4a:
|
||||
a2:cc:0b:5b:5a:34:07:aa:32:3e:7f:bf:1d:75:5a:69:19:7f:
|
||||
37:a7:89:dd:6d:c5:8c:6a:68:c7:c7:e3:96:83:cc:26:b1:86:
|
||||
a9:02:07:6c:f1:52:9a:0a:00:b2:39:9b:b2:6b:3b:01:97:9e:
|
||||
02:53:28:07:0f:3d:77:24:3e:69:98:aa:28:99:ac:fa:18:06:
|
||||
a2:ae:c5:ca:b5:3f:4b:ab:30:db:65:99:95:55:52:1e:a4:b4:
|
||||
c6:94:eb:b5:66:ef:2c:7e:5d:cd:0c:0d:be:9d:8e:79:46:90:
|
||||
50:5e:29:99:36:c8:9d:83:5f:d9:da:3d:e9:56:17:2e:0c:8c:
|
||||
57:84:2c:75:92:5f:ac:69:58:59:db:2d:d8:e6:c8:e8:b4:74:
|
||||
c7:b5:33:a5:95:cc:8f:0f:f6:c1:73:4e:40:4b:a3:a1:60:40:
|
||||
d8:2a:2d:87:84:d5:77:35:37:d0:b7:8e:e7:31:01:8e:cf:03:
|
||||
9e:80:3c:25:0e:83:63:34:e7:5e:4e:1f:c6:d6:6f:da:96:b8:
|
||||
c0:9d:fd:d5:57:84:98:9d:28:f7:ca:9d:c5:1b:87:03:4a:46:
|
||||
60:94:02:18
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFZDCCBEygAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMjcwMTIyNTJaFw0zNzAzMjcwMTIy
|
||||
NTJaMIG3MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEfMB0GA1UEAxMWVlBOLTEyM0NvbWljcy1ndy1ja3VidTEWMBQGA1UEKRMNVlBO
|
||||
IDEyM0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIB
|
||||
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1koRyZJdQRBDQfnQMYJHb5wQ
|
||||
3fItwRQKVmqCVAF8fKrsE8kmwTjL9a48wh/wiLp7hOHOv0BUoodASedO4Fwa5cul
|
||||
N3OZX/LtOMGlEHKKED3WQdyl4yjxK7BrCvJKmr4VB+ENQGniU7QeHjL+HGVPONXo
|
||||
oTjr+opGLuMt7b4e6VrJYuNZ8ij8KMCe7ooSc9Kivm1B6/GFKS4+zXO6N6Drz6ME
|
||||
Kdt5X5uogOnsgJRqjoNfvZ0CICcLAB0XPVBxorj9ksj426EdmEM62bBmDc5iJqbi
|
||||
y5IE3p0c6lo7UxCoNky3BzfaqgGaqZg3sSOyGafnQCAJC+ixXIdmBSeQqKH9PQID
|
||||
AQABo4IBfTCCAXkwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0Eg
|
||||
R2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSI7sI3dXpvAJzvEWTNCJYK
|
||||
RRhjGzCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCB
|
||||
sTELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGlu
|
||||
MQ8wDQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAX
|
||||
BgNVBAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3Mx
|
||||
ITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMG
|
||||
A1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDATBgNVHREEDDAKgghndy1j
|
||||
a3VidTANBgkqhkiG9w0BAQsFAAOCAQEAZiDuFb/HjkdATBtutsmCU6lnUlHxOMC4
|
||||
GZDCQEkutCfTuA9KoswLW1o0B6oyPn+/HXVaaRl/N6eJ3W3FjGpox8fjloPMJrGG
|
||||
qQIHbPFSmgoAsjmbsms7AZeeAlMoBw89dyQ+aZiqKJms+hgGoq7FyrU/S6sw22WZ
|
||||
lVVSHqS0xpTrtWbvLH5dzQwNvp2OeUaQUF4pmTbInYNf2do96VYXLgyMV4QsdZJf
|
||||
rGlYWdst2ObI6LR0x7UzpZXMjw/2wXNOQEujoWBA2Coth4TVdzU30LeO5zEBjs8D
|
||||
noA8JQ6DYzTnXk4fxtZv2pa4wJ391VeEmJ0o98qdxRuHA0pGYJQCGA==
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/04.pem
Normal file
98
123/openvpn/keys/04.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 4 (0x4)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:38:42 2017 GMT
|
||||
Not After : Mar 31 19:38:42 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ellen/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ec:72:92:5c:45:07:06:c3:ef:8b:49:fb:53:2b:
|
||||
64:9f:07:47:e4:2f:84:64:35:a9:6a:93:77:a9:3e:
|
||||
8a:47:fe:52:fc:1f:e9:9c:05:13:74:a6:d5:5e:12:
|
||||
ab:c9:55:1d:d7:83:a7:9e:e4:76:f9:c3:ee:b4:b5:
|
||||
c6:d7:ae:fb:05:e1:5f:3e:d5:c5:08:31:cc:40:bf:
|
||||
9e:17:ea:b5:69:c1:e3:f5:8a:55:b7:39:10:4c:39:
|
||||
d4:a5:1a:6c:da:1c:df:08:60:41:43:cc:78:cc:9b:
|
||||
3f:f0:64:35:a6:bd:7d:0c:86:55:20:66:e8:7f:d9:
|
||||
0d:06:03:d5:42:d2:b0:43:54:92:69:5e:97:20:d6:
|
||||
d9:0d:5a:95:86:5b:82:59:f0:d4:6a:5c:4c:01:ca:
|
||||
ae:17:da:7c:04:27:d5:55:1b:22:88:0f:82:ea:0d:
|
||||
3b:3e:0a:92:6c:7f:5c:a4:4f:4d:b3:ea:b1:fd:e9:
|
||||
25:20:87:af:52:36:ad:3c:d5:1a:f1:45:9a:8d:a8:
|
||||
33:8c:0c:0c:97:24:7b:5d:32:fe:ad:f9:b7:15:5d:
|
||||
a4:16:c5:a9:52:89:d3:4d:26:08:10:6f:3b:5a:3b:
|
||||
0a:32:c0:8a:fb:a0:23:8c:bf:bd:d8:b1:8e:b4:a7:
|
||||
05:86:1f:99:6f:7c:c0:57:7d:ba:19:f0:5f:3b:d2:
|
||||
91:53
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
CB:73:DC:89:31:5E:B7:F6:7A:2D:B1:39:A7:E3:03:5C:38:75:B6:FC
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:ellen
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
41:78:fd:3e:cc:67:5a:80:3e:7a:e2:1f:21:fe:de:be:54:29:
|
||||
f4:96:b3:22:ec:8e:55:8e:da:af:97:9f:d7:71:97:c6:83:9a:
|
||||
26:da:9d:47:f1:a2:3f:75:a0:26:09:e4:e9:cd:cc:d2:c0:3b:
|
||||
fc:76:1e:08:1a:23:23:b0:e2:c6:52:63:57:c3:ca:55:d5:32:
|
||||
c8:d2:ac:d3:5c:c2:16:e6:03:72:b3:cf:67:74:f4:ae:64:a4:
|
||||
bf:10:0d:ba:ed:f4:89:df:7d:c3:61:e1:76:9a:81:8d:f7:ec:
|
||||
a9:b0:20:25:7f:57:4d:36:87:dc:bb:34:8f:e2:95:0f:41:85:
|
||||
fc:10:e0:ff:31:9d:c4:fd:79:81:ee:34:33:24:72:a8:19:77:
|
||||
49:66:ea:9b:28:90:14:29:fb:3d:e6:81:98:55:4f:d5:be:95:
|
||||
7a:8c:46:d8:78:e7:5d:16:2a:de:6c:fe:a8:46:d0:e1:04:c7:
|
||||
f7:25:64:7a:fd:ed:ef:ef:98:44:96:3a:15:f7:c6:e9:16:09:
|
||||
ea:8c:fc:c6:34:4e:83:fe:88:46:71:25:fb:3e:62:76:92:15:
|
||||
05:44:43:12:75:b7:f8:8f:5c:64:be:36:83:ba:8b:be:b1:46:
|
||||
3f:d0:c7:01:81:1d:49:00:f3:fa:42:74:3c:c9:b1:37:78:30:
|
||||
2e:4f:c3:61
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBBDANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM4NDJaFw0zNzAzMzExOTM4
|
||||
NDJaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1lbGxlbjEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7HKSXEUHBsPvi0n7UytknwdH5C+E
|
||||
ZDWpapN3qT6KR/5S/B/pnAUTdKbVXhKryVUd14OnnuR2+cPutLXG1677BeFfPtXF
|
||||
CDHMQL+eF+q1acHj9YpVtzkQTDnUpRps2hzfCGBBQ8x4zJs/8GQ1pr19DIZVIGbo
|
||||
f9kNBgPVQtKwQ1SSaV6XINbZDVqVhluCWfDUalxMAcquF9p8BCfVVRsiiA+C6g07
|
||||
PgqSbH9cpE9Ns+qx/eklIIevUjatPNUa8UWajagzjAwMlyR7XTL+rfm3FV2kFsWp
|
||||
UonTTSYIEG87WjsKMsCK+6AjjL+92LGOtKcFhh+Zb3zAV326GfBfO9KRUwIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTLc9yJMV639notsTmn4wNcOHW2
|
||||
/DCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVlbGxlbjAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAQXj9PsxnWoA+euIfIf7evlQp9JazIuyOVY7ar5ef
|
||||
13GXxoOaJtqdR/GiP3WgJgnk6c3M0sA7/HYeCBojI7DixlJjV8PKVdUyyNKs01zC
|
||||
FuYDcrPPZ3T0rmSkvxANuu30id99w2HhdpqBjffsqbAgJX9XTTaH3Ls0j+KVD0GF
|
||||
/BDg/zGdxP15ge40MyRyqBl3SWbqmyiQFCn7PeaBmFVP1b6VeoxG2HjnXRYq3mz+
|
||||
qEbQ4QTH9yVkev3t7++YRJY6FffG6RYJ6oz8xjROg/6IRnEl+z5idpIVBURDEnW3
|
||||
+I9cZL42g7qLvrFGP9DHAYEdSQDz+kJ0PMmxN3gwLk/DYQ==
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/05.pem
Normal file
98
123/openvpn/keys/05.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 5 (0x5)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:39:19 2017 GMT
|
||||
Not After : Mar 31 19:39:19 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-henny/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:df:b0:f5:e3:00:76:72:1f:19:3d:f1:1b:cb:bc:
|
||||
52:1c:ec:3c:65:14:bd:ac:c7:cd:f3:5a:4e:16:c5:
|
||||
af:a9:f6:60:0e:c8:de:62:51:1c:9c:d0:0c:64:d6:
|
||||
5d:16:51:53:22:3a:f1:f0:1b:92:9c:a9:ae:39:82:
|
||||
87:82:23:62:5c:68:7d:0c:fc:61:ec:f8:02:c8:57:
|
||||
bd:27:da:1c:65:0d:69:25:2a:25:13:af:91:79:4c:
|
||||
55:be:7e:ae:80:e7:d3:69:e1:79:cd:94:a7:98:25:
|
||||
9a:bc:9c:de:9a:62:42:5c:06:b8:de:1e:82:d5:a8:
|
||||
06:0e:c2:d0:11:96:a4:4c:76:f8:17:40:20:4f:f1:
|
||||
d4:d9:94:8a:fc:06:04:e5:5c:cd:a1:70:51:4c:41:
|
||||
13:00:ed:6d:f3:73:f0:3a:b3:c1:94:45:57:6b:d2:
|
||||
19:f3:b0:43:d6:8c:bd:89:5f:e3:ad:93:7d:3d:f5:
|
||||
61:e7:96:89:a1:08:5c:2d:74:32:03:77:8f:74:e7:
|
||||
f2:36:49:c6:e8:20:ec:e4:67:e0:0b:d0:38:2a:c0:
|
||||
84:d9:fa:da:db:75:0d:c0:86:d5:89:ef:33:9d:bf:
|
||||
dd:6b:a1:78:83:fe:78:1e:32:56:38:84:d3:fb:4f:
|
||||
28:41:ee:9f:9e:1d:51:c1:2e:f6:67:87:bb:c6:83:
|
||||
d0:f5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
37:06:33:52:9E:7C:42:62:7C:AA:37:82:9F:97:4D:89:25:8B:1B:03
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:henny
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b3:7a:5c:64:cd:53:5a:23:ec:35:79:4b:ac:ca:c3:0c:39:c7:
|
||||
e9:2b:89:d6:a2:51:1c:a1:ce:48:a9:8b:f7:5f:dd:fb:43:70:
|
||||
2a:17:bc:04:90:31:ea:e6:85:cb:df:41:a4:f0:63:fb:d9:bf:
|
||||
33:6b:6e:80:b5:62:d9:83:6d:4e:01:f7:e0:ae:b6:20:6b:eb:
|
||||
d0:76:7d:e0:1e:f9:de:d6:e3:c2:cf:91:2c:59:f2:01:1e:63:
|
||||
46:7b:a8:7a:8e:af:e4:45:43:4b:f9:c8:5c:b9:e2:26:d8:a8:
|
||||
b1:74:91:d0:ff:ae:fe:c4:73:f4:06:07:40:00:72:16:5c:44:
|
||||
29:af:37:31:4b:3f:3e:09:64:a0:e3:d5:fe:6c:f7:e6:2e:c5:
|
||||
4b:61:41:df:0b:66:b4:7b:3e:21:7e:24:7d:27:b2:2a:cd:ef:
|
||||
9d:a1:f7:bf:57:c1:f6:a8:24:52:ba:0c:31:fd:6e:24:e1:11:
|
||||
b9:a8:62:27:54:3c:59:3f:3a:d2:45:9d:81:77:d8:2e:b1:4e:
|
||||
6e:41:a6:e8:89:e3:44:f0:be:da:58:02:67:d8:c8:51:fb:2c:
|
||||
57:01:10:19:d8:10:7e:d6:9c:70:f7:32:91:ed:26:53:66:39:
|
||||
19:99:f8:63:cd:c6:a8:c2:35:1d:f4:0c:b7:02:a8:4d:3b:ac:
|
||||
68:ec:f9:de
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBBTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM5MTlaFw0zNzAzMzExOTM5
|
||||
MTlaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1oZW5ueTEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37D14wB2ch8ZPfEby7xSHOw8ZRS9
|
||||
rMfN81pOFsWvqfZgDsjeYlEcnNAMZNZdFlFTIjrx8BuSnKmuOYKHgiNiXGh9DPxh
|
||||
7PgCyFe9J9ocZQ1pJSolE6+ReUxVvn6ugOfTaeF5zZSnmCWavJzemmJCXAa43h6C
|
||||
1agGDsLQEZakTHb4F0AgT/HU2ZSK/AYE5VzNoXBRTEETAO1t83PwOrPBlEVXa9IZ
|
||||
87BD1oy9iV/jrZN9PfVh55aJoQhcLXQyA3ePdOfyNknG6CDs5GfgC9A4KsCE2fra
|
||||
23UNwIbVie8znb/da6F4g/54HjJWOITT+08oQe6fnh1RwS72Z4e7xoPQ9QIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQ3BjNSnnxCYnyqN4Kfl02JJYsb
|
||||
AzCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVoZW5ueTAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAs3pcZM1TWiPsNXlLrMrDDDnH6SuJ1qJRHKHOSKmL
|
||||
91/d+0NwKhe8BJAx6uaFy99BpPBj+9m/M2tugLVi2YNtTgH34K62IGvr0HZ94B75
|
||||
3tbjws+RLFnyAR5jRnuoeo6v5EVDS/nIXLniJtiosXSR0P+u/sRz9AYHQAByFlxE
|
||||
Ka83MUs/PglkoOPV/mz35i7FS2FB3wtmtHs+IX4kfSeyKs3vnaH3v1fB9qgkUroM
|
||||
Mf1uJOERuahiJ1Q8WT860kWdgXfYLrFObkGm6InjRPC+2lgCZ9jIUfssVwEQGdgQ
|
||||
ftaccPcyke0mU2Y5GZn4Y83GqMI1HfQMtwKoTTusaOz53g==
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/06.pem
Normal file
98
123/openvpn/keys/06.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6 (0x6)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:39:47 2017 GMT
|
||||
Not After : Mar 31 19:39:47 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-kaya/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b6:4c:3e:b1:90:01:7e:74:fe:03:c4:de:9c:5d:
|
||||
37:23:f6:93:fd:c0:08:bc:49:ea:df:4b:ff:39:22:
|
||||
1b:42:a6:fd:86:6c:52:2a:69:ae:9f:5a:d7:1c:e3:
|
||||
fa:c9:c1:15:e8:64:ee:01:90:28:ad:9b:42:8d:09:
|
||||
e7:42:ef:b3:db:0d:4f:52:05:bc:22:05:ac:e5:78:
|
||||
ce:64:9e:96:ed:dc:45:04:bb:99:b7:1b:f6:31:3e:
|
||||
3f:b7:04:cb:9d:8e:44:f0:9d:c5:9e:08:3d:fe:46:
|
||||
7a:fd:9d:56:8b:49:1d:b7:f1:b6:7c:e1:da:e8:4a:
|
||||
fe:ae:28:70:10:88:c2:04:cc:83:14:8e:65:da:6e:
|
||||
c3:1b:83:81:67:9f:df:d4:39:ce:48:71:37:7b:49:
|
||||
fa:3c:19:dd:75:33:bc:cc:82:75:af:6f:dd:06:eb:
|
||||
3a:cd:a0:d5:c3:10:e2:0b:58:3f:95:35:35:0e:ce:
|
||||
34:ed:03:13:a5:24:7a:24:8f:32:7c:c8:09:a9:6b:
|
||||
23:54:19:13:23:af:b0:54:e5:0f:27:9a:e6:33:dc:
|
||||
0f:2a:2c:d2:3e:60:ee:b3:8c:7d:c2:a5:43:d9:07:
|
||||
0a:84:76:10:8a:6f:f1:db:6e:22:1e:b9:71:aa:c4:
|
||||
52:e3:56:a1:26:6f:c6:17:0f:f2:4f:8d:88:e9:a0:
|
||||
3b:b5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E2:E0:31:7D:AC:4D:8F:1B:67:83:67:66:52:39:CA:43:4C:FF:99:B0
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:kaya
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
8f:ef:78:2e:54:f1:b4:a3:92:89:25:cc:85:b9:28:2d:aa:2e:
|
||||
28:9a:53:f1:09:99:95:34:6c:f3:58:d8:4c:6d:a1:cc:f5:93:
|
||||
07:53:8c:53:4b:0f:80:29:33:83:a2:f5:13:64:ae:23:d4:c8:
|
||||
6f:75:48:41:42:81:40:a8:b7:7f:70:fb:7f:97:55:5d:82:b8:
|
||||
1d:7e:96:50:5e:2d:a9:eb:66:cd:c0:89:5f:ca:ec:c2:bc:7f:
|
||||
33:db:e2:fa:28:54:00:6a:3e:72:2e:71:fe:d8:d2:d3:4d:fe:
|
||||
6e:1b:e2:71:e2:e5:cf:7d:aa:4e:92:9f:d4:b7:20:fe:2b:98:
|
||||
2f:a1:a2:f8:87:07:a1:a9:7b:5f:b9:d6:f9:b2:b5:23:17:98:
|
||||
99:c7:00:d0:29:cb:59:2e:9e:c6:b0:f3:54:a4:c7:3d:82:d1:
|
||||
aa:f8:f2:e1:23:cf:74:ed:25:f3:b8:24:c9:c6:0a:d9:41:6d:
|
||||
d6:a8:c1:a7:96:85:51:13:f3:cc:36:fa:5e:e1:32:aa:f6:e8:
|
||||
93:a2:43:ce:40:33:33:5e:6a:b4:65:c2:32:e3:0c:62:a6:f6:
|
||||
48:c5:0e:2e:02:cd:92:45:9e:dc:2f:a5:66:57:b4:ca:35:0f:
|
||||
5d:ed:10:42:d9:0d:7b:0b:0a:75:62:5f:12:ac:9b:29:bd:14:
|
||||
9e:e4:5a:9f
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXDCCBESgAwIBAgIBBjANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM5NDdaFw0zNzAzMzExOTM5
|
||||
NDdaMIGzMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEbMBkGA1UEAxMSVlBOLTEyM0NvbWljcy1rYXlhMRYwFAYDVQQpEw1WUE4gMTIz
|
||||
Q29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC2TD6xkAF+dP4DxN6cXTcj9pP9wAi8
|
||||
SerfS/85IhtCpv2GbFIqaa6fWtcc4/rJwRXoZO4BkCitm0KNCedC77PbDU9SBbwi
|
||||
BazleM5knpbt3EUEu5m3G/YxPj+3BMudjkTwncWeCD3+Rnr9nVaLSR238bZ84dro
|
||||
Sv6uKHAQiMIEzIMUjmXabsMbg4Fnn9/UOc5IcTd7Sfo8Gd11M7zMgnWvb90G6zrN
|
||||
oNXDEOILWD+VNTUOzjTtAxOlJHokjzJ8yAmpayNUGRMjr7BU5Q8nmuYz3A8qLNI+
|
||||
YO6zjH3CpUPZBwqEdhCKb/HbbiIeuXGqxFLjVqEmb8YXD/JPjYjpoDu1AgMBAAGj
|
||||
ggF5MIIBdTAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOLgMX2sTY8bZ4NnZlI5ykNM/5mw
|
||||
MIHmBgNVHSMEgd4wgduAFGByHupHLaqzcRgy4TAcdwix1CQRoYG3pIG0MIGxMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEZMBcGA1UE
|
||||
AxMQVlBOLTEyM0NvbWljcy1jYTEWMBQGA1UEKRMNVlBOIDEyM0NvbWljczEhMB8G
|
||||
CSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlggkA4KYz/4Mr9Y8wEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQIMAaCBGtheWEwDQYJ
|
||||
KoZIhvcNAQELBQADggEBAI/veC5U8bSjkoklzIW5KC2qLiiaU/EJmZU0bPNY2Ext
|
||||
ocz1kwdTjFNLD4ApM4Oi9RNkriPUyG91SEFCgUCot39w+3+XVV2CuB1+llBeLanr
|
||||
Zs3AiV/K7MK8fzPb4vooVABqPnIucf7Y0tNN/m4b4nHi5c99qk6Sn9S3IP4rmC+h
|
||||
oviHB6Gpe1+51vmytSMXmJnHANApy1kunsaw81Skxz2C0ar48uEjz3TtJfO4JMnG
|
||||
CtlBbdaowaeWhVET88w2+l7hMqr26JOiQ85AMzNearRlwjLjDGKm9kjFDi4CzZJF
|
||||
ntwvpWZXtMo1D13tEELZDXsLCnViXxKsmym9FJ7kWp8=
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/07.pem
Normal file
98
123/openvpn/keys/07.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7 (0x7)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:40:21 2017 GMT
|
||||
Not After : Mar 31 19:40:21 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-imke/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:a8:e8:10:ee:4a:85:18:13:fe:a5:da:ff:1f:22:
|
||||
95:6f:f3:49:52:31:30:0d:0e:fd:c4:22:06:39:c7:
|
||||
36:d9:39:2f:61:f1:c7:e4:2e:fa:8e:45:e2:37:74:
|
||||
fb:74:07:4a:9f:14:02:f6:76:b4:bc:f2:23:0f:18:
|
||||
e2:37:d0:db:32:3f:a7:48:45:0f:87:f7:d1:43:fa:
|
||||
64:3b:9d:b0:05:b3:95:9a:77:53:43:05:61:26:54:
|
||||
4e:c9:9e:a5:f7:ff:3b:e2:da:45:3e:2c:ca:f0:d7:
|
||||
84:99:be:57:2a:d3:f1:ac:f1:4a:33:82:d8:ba:8a:
|
||||
49:35:e5:7c:cf:87:ad:ec:12:b2:15:34:8e:6b:ae:
|
||||
e9:2e:12:8e:3f:cf:5d:51:bc:30:fc:76:8d:ea:c7:
|
||||
a8:dd:25:8b:c0:b4:6f:f1:15:60:55:81:28:8f:80:
|
||||
eb:38:77:44:f8:0e:e4:53:ed:fb:18:32:cf:23:21:
|
||||
7f:ab:23:d6:5d:10:44:11:c3:c3:3e:6a:8d:38:cd:
|
||||
c2:a2:9c:de:34:54:3b:88:0d:a8:ab:7b:a5:b7:fc:
|
||||
9c:0e:8c:62:36:cc:71:1e:f0:1f:7e:f4:ab:81:03:
|
||||
27:ca:5d:0b:13:0a:06:1a:ca:a3:4d:72:7c:3a:f4:
|
||||
79:9b:3a:04:8b:6d:12:90:8d:ad:16:78:3a:8d:b4:
|
||||
b4:57
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
FB:3D:B0:64:04:E9:11:FC:C6:DC:25:61:27:3E:BE:35:30:38:FD:20
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:imke
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a7:0a:bf:f1:a9:64:1a:a6:a5:98:1d:de:3a:11:01:1d:1f:17:
|
||||
bf:e2:ae:d6:46:08:f0:6f:fe:63:32:5f:00:60:24:ad:a4:0e:
|
||||
04:8b:40:01:a7:cb:64:bb:48:a6:c0:21:d0:33:dd:89:c0:68:
|
||||
aa:b2:50:c9:73:2a:32:e3:ac:93:0c:d4:cd:73:92:21:5f:df:
|
||||
0c:a9:c4:d4:57:33:c4:b2:88:a9:c9:0f:73:06:98:d4:d9:ca:
|
||||
81:3d:17:45:8b:55:8f:5c:f1:f7:55:dd:42:0d:d2:bc:96:fa:
|
||||
5d:cd:7f:45:08:61:88:5f:22:9c:e5:26:62:c1:ef:f5:0a:51:
|
||||
a8:a1:83:e9:36:ea:7a:3f:7e:d4:c7:70:73:ca:c3:ec:44:ca:
|
||||
47:c9:f1:7e:fa:46:e4:e0:c2:9b:75:cc:02:cc:e8:e5:50:18:
|
||||
76:0c:88:28:4a:db:90:f5:60:f1:55:88:fa:e6:27:54:3f:b1:
|
||||
50:7c:30:8d:9e:9b:b0:0f:f2:e1:3e:d2:99:f7:b2:8b:25:04:
|
||||
0b:dc:76:4a:6f:29:8e:9a:e3:9c:17:c6:a9:a0:2d:b3:d8:2a:
|
||||
f5:d8:e1:b7:73:32:ef:b0:39:48:ca:f8:5a:c2:d0:69:0b:37:
|
||||
0f:50:ef:1f:53:0a:1c:6a:1f:7f:9c:a1:47:f3:9c:8f:10:27:
|
||||
52:bc:d9:5a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXDCCBESgAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQwMjFaFw0zNzAzMzExOTQw
|
||||
MjFaMIGzMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEbMBkGA1UEAxMSVlBOLTEyM0NvbWljcy1pbWtlMRYwFAYDVQQpEw1WUE4gMTIz
|
||||
Q29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCo6BDuSoUYE/6l2v8fIpVv80lSMTAN
|
||||
Dv3EIgY5xzbZOS9h8cfkLvqOReI3dPt0B0qfFAL2drS88iMPGOI30NsyP6dIRQ+H
|
||||
99FD+mQ7nbAFs5Wad1NDBWEmVE7JnqX3/zvi2kU+LMrw14SZvlcq0/Gs8Uozgti6
|
||||
ikk15XzPh63sErIVNI5rrukuEo4/z11RvDD8do3qx6jdJYvAtG/xFWBVgSiPgOs4
|
||||
d0T4DuRT7fsYMs8jIX+rI9ZdEEQRw8M+ao04zcKinN40VDuIDaire6W3/JwOjGI2
|
||||
zHEe8B9+9KuBAyfKXQsTCgYayqNNcnw69HmbOgSLbRKQja0WeDqNtLRXAgMBAAGj
|
||||
ggF5MIIBdTAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFPs9sGQE6RH8xtwlYSc+vjUwOP0g
|
||||
MIHmBgNVHSMEgd4wgduAFGByHupHLaqzcRgy4TAcdwix1CQRoYG3pIG0MIGxMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEZMBcGA1UE
|
||||
AxMQVlBOLTEyM0NvbWljcy1jYTEWMBQGA1UEKRMNVlBOIDEyM0NvbWljczEhMB8G
|
||||
CSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlggkA4KYz/4Mr9Y8wEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQIMAaCBGlta2UwDQYJ
|
||||
KoZIhvcNAQELBQADggEBAKcKv/GpZBqmpZgd3joRAR0fF7/irtZGCPBv/mMyXwBg
|
||||
JK2kDgSLQAGny2S7SKbAIdAz3YnAaKqyUMlzKjLjrJMM1M1zkiFf3wypxNRXM8Sy
|
||||
iKnJD3MGmNTZyoE9F0WLVY9c8fdV3UIN0ryW+l3Nf0UIYYhfIpzlJmLB7/UKUaih
|
||||
g+k26no/ftTHcHPKw+xEykfJ8X76RuTgwpt1zALM6OVQGHYMiChK25D1YPFViPrm
|
||||
J1Q/sVB8MI2em7AP8uE+0pn3soslBAvcdkpvKY6a45wXxqmgLbPYKvXY4bdzMu+w
|
||||
OUjK+FrC0GkLNw9Q7x9TChxqH3+coUfznI8QJ1K82Vo=
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/08.pem
Normal file
98
123/openvpn/keys/08.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8 (0x8)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:41:04 2017 GMT
|
||||
Not After : Mar 31 19:41:04 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-jonas/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d5:bf:31:fd:f5:63:4a:66:e5:7a:36:e9:07:ab:
|
||||
db:50:b4:92:9c:9e:ad:28:4e:86:ac:b0:6d:c2:b9:
|
||||
e7:dd:fb:8d:01:21:82:33:ed:cf:dc:ee:2b:84:96:
|
||||
37:c7:fa:e7:12:42:af:b1:4d:70:37:9a:7b:de:27:
|
||||
6b:8f:dd:67:20:90:2c:29:ed:b0:fa:05:01:5c:9d:
|
||||
74:13:19:41:a7:da:7d:b5:f2:f4:3b:97:71:28:97:
|
||||
b0:62:eb:5a:93:75:70:6d:45:53:57:14:a2:c4:73:
|
||||
2f:3a:d6:f0:84:74:25:ae:50:db:6b:44:4b:e0:8f:
|
||||
70:87:49:49:be:b8:f8:58:df:89:ab:dd:66:6f:46:
|
||||
39:90:00:26:d4:fd:3d:94:31:bb:45:0b:60:54:9a:
|
||||
5c:53:2e:52:bd:6b:c3:1a:ec:7a:a3:d7:b6:20:52:
|
||||
3f:7c:25:e6:2d:e8:68:ca:fb:76:a0:fa:fb:65:71:
|
||||
77:46:44:ee:9f:fc:b6:7d:d3:28:11:ee:35:5e:08:
|
||||
ff:d5:6c:5e:a9:21:44:12:79:98:3b:3a:87:df:d7:
|
||||
df:a0:12:dd:58:fb:9a:be:b8:4d:b4:92:28:d8:22:
|
||||
24:ed:0c:e5:04:c0:b3:42:7e:c6:61:1b:4b:b6:9d:
|
||||
5f:31:de:34:3e:f7:5a:51:cc:70:83:11:3d:0d:01:
|
||||
56:bb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
4C:7D:CA:9A:DA:5B:60:31:54:FD:35:1D:60:7E:04:4C:0D:30:76:44
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:jonas
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b0:7c:4a:7b:47:83:33:f3:76:c5:33:32:14:17:ed:3b:44:e2:
|
||||
d0:4c:f6:66:90:76:be:16:1c:62:95:25:f3:78:cb:6d:c1:ef:
|
||||
6c:ba:66:ed:10:16:07:26:83:89:78:49:58:fc:46:d8:c6:8e:
|
||||
26:c6:51:12:37:20:ca:30:c8:35:5a:68:69:70:95:a9:7f:20:
|
||||
3e:af:8d:73:c5:f2:1f:28:50:0d:48:18:cb:9f:46:45:16:b1:
|
||||
f2:ac:e7:1c:54:dd:af:c8:06:ec:bb:4c:dd:71:d0:e9:c8:54:
|
||||
8f:8c:12:e1:d7:1e:53:f9:42:61:98:0e:3a:b6:35:d8:e8:c7:
|
||||
2a:d6:e2:78:74:8e:f5:4e:1e:1b:98:aa:e3:84:fd:d4:d7:27:
|
||||
95:a5:fd:b5:db:f5:42:e1:9a:9a:2e:b7:f7:0d:e5:49:10:50:
|
||||
c4:01:e3:95:6e:53:b3:6b:7f:34:38:7c:49:1e:84:85:6a:8e:
|
||||
63:01:49:b9:b1:e5:71:09:31:0a:7c:2c:ce:ea:d7:33:4b:11:
|
||||
fa:e2:69:ed:30:96:a5:08:2b:fd:b9:1e:13:30:3f:bf:4d:7c:
|
||||
2a:56:8a:7a:ef:a1:76:2c:fa:12:5a:46:ed:bf:4c:90:54:24:
|
||||
7d:91:a7:b3:ef:2b:09:dc:f8:06:56:ac:e7:f5:52:43:80:5c:
|
||||
73:93:f4:01
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBCDANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQxMDRaFw0zNzAzMzExOTQx
|
||||
MDRaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1qb25hczEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1b8x/fVjSmblejbpB6vbULSSnJ6t
|
||||
KE6GrLBtwrnn3fuNASGCM+3P3O4rhJY3x/rnEkKvsU1wN5p73idrj91nIJAsKe2w
|
||||
+gUBXJ10ExlBp9p9tfL0O5dxKJewYutak3VwbUVTVxSixHMvOtbwhHQlrlDba0RL
|
||||
4I9wh0lJvrj4WN+Jq91mb0Y5kAAm1P09lDG7RQtgVJpcUy5SvWvDGux6o9e2IFI/
|
||||
fCXmLehoyvt2oPr7ZXF3RkTun/y2fdMoEe41Xgj/1WxeqSFEEnmYOzqH39ffoBLd
|
||||
WPuavrhNtJIo2CIk7QzlBMCzQn7GYRtLtp1fMd40PvdaUcxwgxE9DQFWuwIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRMfcqa2ltgMVT9NR1gfgRMDTB2
|
||||
RDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVqb25hczAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAsHxKe0eDM/N2xTMyFBftO0Ti0Ez2ZpB2vhYcYpUl
|
||||
83jLbcHvbLpm7RAWByaDiXhJWPxG2MaOJsZREjcgyjDINVpoaXCVqX8gPq+Nc8Xy
|
||||
HyhQDUgYy59GRRax8qznHFTdr8gG7LtM3XHQ6chUj4wS4dceU/lCYZgOOrY12OjH
|
||||
KtbieHSO9U4eG5iq44T91NcnlaX9tdv1QuGami639w3lSRBQxAHjlW5Ts2t/NDh8
|
||||
SR6EhWqOYwFJubHlcQkxCnwszurXM0sR+uJp7TCWpQgr/bkeEzA/v018KlaKeu+h
|
||||
diz6ElpG7b9MkFQkfZGns+8rCdz4Blas5/VSQ4Bcc5P0AQ==
|
||||
-----END CERTIFICATE-----
|
98
123/openvpn/keys/09.pem
Normal file
98
123/openvpn/keys/09.pem
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 9 (0x9)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:41:44 2017 GMT
|
||||
Not After : Mar 31 19:41:44 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-julia/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c4:08:b1:f5:86:9b:8a:90:97:32:4e:a7:55:cc:
|
||||
65:85:5a:f5:10:2e:5b:ef:8d:61:60:66:3a:53:5d:
|
||||
fc:90:82:ec:0c:ba:b3:ab:7d:b8:56:9b:4c:6e:73:
|
||||
d6:72:61:bc:74:17:2f:a3:6b:f5:66:c6:72:b7:11:
|
||||
f5:bb:8c:47:5b:04:d8:4c:74:6e:22:d3:21:8a:32:
|
||||
41:9e:1d:8a:8b:e0:b4:ec:b8:15:40:26:08:3d:97:
|
||||
7c:a7:20:1e:ca:60:8d:0e:7e:58:cd:a6:0b:f7:c2:
|
||||
7b:7e:9f:c7:55:87:01:3d:ce:37:7c:32:b8:36:bd:
|
||||
1b:90:24:43:e1:c3:5c:5f:bd:f3:5c:32:0f:5d:7c:
|
||||
0f:87:ef:8d:03:0a:e9:23:eb:8d:7b:89:f2:4b:cc:
|
||||
83:d8:32:58:26:75:ff:81:74:83:d7:ea:2f:11:07:
|
||||
59:97:08:e1:38:e4:be:14:d1:2c:8b:1c:f5:b8:53:
|
||||
65:b7:25:8f:5f:e6:5d:f1:d8:76:ab:64:df:b3:e5:
|
||||
09:3b:84:f1:9c:34:f0:7e:bb:e7:e0:3c:da:0f:87:
|
||||
77:44:95:c2:e5:bd:29:3f:43:0b:d8:8d:d5:07:cf:
|
||||
26:54:b3:50:dc:64:1c:a7:67:3d:c1:3c:fa:9e:0f:
|
||||
db:3d:97:fa:28:7f:bb:6f:92:b6:e3:44:a2:47:1a:
|
||||
18:51
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
8D:D2:9E:D6:B2:D3:DA:D0:60:7D:69:D6:5C:EA:40:5A:E4:39:01:34
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:julia
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
10:0f:b3:1e:bd:29:70:ac:a3:20:8d:77:b2:5c:6d:bf:25:9f:
|
||||
07:b3:c2:0c:ec:41:8e:98:cc:3f:d2:0c:84:17:55:97:1b:e6:
|
||||
4e:76:c5:12:a3:7c:32:a3:81:e4:53:06:4e:c6:67:e4:ad:14:
|
||||
70:4e:1f:ca:e8:5f:dd:b1:d9:e4:ac:4c:b5:d2:51:25:89:27:
|
||||
48:05:a5:2f:c0:de:ed:7a:8b:84:59:73:19:ee:6d:6d:e0:be:
|
||||
5d:36:d4:ea:c3:40:0f:60:94:f3:e8:3d:5d:86:88:75:c1:38:
|
||||
f4:91:6e:4f:5c:ff:11:d8:56:d3:9f:89:58:89:c6:24:32:d3:
|
||||
ad:d2:5b:f1:cd:62:ed:95:12:d7:79:5c:ec:86:45:39:4d:97:
|
||||
02:9e:f5:06:d7:4f:12:2c:f7:b2:ce:59:6b:3d:3f:88:b6:e3:
|
||||
03:24:1e:cf:9c:6f:d6:3c:6f:6c:ed:5b:50:ef:0a:cf:96:f5:
|
||||
98:f8:a5:fa:ce:e3:2c:f8:8f:0f:84:0e:0b:27:c4:07:87:6f:
|
||||
e2:a5:ef:73:db:e5:c9:20:a1:81:e0:a3:16:ec:de:d0:47:a6:
|
||||
ac:ad:c3:a5:16:c2:7d:de:27:67:58:59:4b:20:c6:08:01:55:
|
||||
62:ce:14:f3:5a:5e:23:9b:c5:d6:ba:4c:e4:d6:40:12:09:b1:
|
||||
58:8f:b8:05
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBCTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQxNDRaFw0zNzAzMzExOTQx
|
||||
NDRaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1qdWxpYTEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxAix9YabipCXMk6nVcxlhVr1EC5b
|
||||
741hYGY6U138kILsDLqzq324VptMbnPWcmG8dBcvo2v1ZsZytxH1u4xHWwTYTHRu
|
||||
ItMhijJBnh2Ki+C07LgVQCYIPZd8pyAeymCNDn5YzaYL98J7fp/HVYcBPc43fDK4
|
||||
Nr0bkCRD4cNcX73zXDIPXXwPh++NAwrpI+uNe4nyS8yD2DJYJnX/gXSD1+ovEQdZ
|
||||
lwjhOOS+FNEsixz1uFNltyWPX+Zd8dh2q2Tfs+UJO4TxnDTwfrvn4DzaD4d3RJXC
|
||||
5b0pP0ML2I3VB88mVLNQ3GQcp2c9wTz6ng/bPZf6KH+7b5K240SiRxoYUQIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSN0p7WstPa0GB9adZc6kBa5DkB
|
||||
NDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVqdWxpYTAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAEA+zHr0pcKyjII13slxtvyWfB7PCDOxBjpjMP9IM
|
||||
hBdVlxvmTnbFEqN8MqOB5FMGTsZn5K0UcE4fyuhf3bHZ5KxMtdJRJYknSAWlL8De
|
||||
7XqLhFlzGe5tbeC+XTbU6sNAD2CU8+g9XYaIdcE49JFuT1z/EdhW05+JWInGJDLT
|
||||
rdJb8c1i7ZUS13lc7IZFOU2XAp71BtdPEiz3ss5Zaz0/iLbjAyQez5xv1jxvbO1b
|
||||
UO8Kz5b1mPil+s7jLPiPD4QOCyfEB4dv4qXvc9vlySChgeCjFuze0EemrK3DpRbC
|
||||
fd4nZ1hZSyDGCAFVYs4U81peI5vF1rpM5NZAEgmxWI+4BQ==
|
||||
-----END CERTIFICATE-----
|
29
123/openvpn/keys/ca.crt
Normal file
29
123/openvpn/keys/ca.crt
Normal file
@ -0,0 +1,29 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFAzCCA+ugAwIBAgIJAOCmM/+DK/WPMA0GCSqGSIb3DQEBCwUAMIGxMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEZMBcGA1UEAxMQ
|
||||
VlBOLTEyM0NvbWljcy1jYTEWMBQGA1UEKRMNVlBOIDEyM0NvbWljczEhMB8GCSqG
|
||||
SIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMB4XDTE3MDMxMTAyMTYyOFoXDTQ5
|
||||
MDMxMTAyMTYyOFowgbExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRkwFwYDVQQDExBWUE4tMTIzQ29taWNzLWNhMRYwFAYDVQQpEw1W
|
||||
UE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGUw
|
||||
ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDI6ZDkXY0diPbLB91BnCq6
|
||||
yzxnCn/zp6jHE1D/pHWSRFcitbne4z4n7uHg9rVo+ytwS32KOSqDKUw7nV1SdoGT
|
||||
29R6Hoy6RV5aub7UD6CeF7ksZ2xd7359PIYedeyBKB/R3TlLo/2w+sW1womyEdpl
|
||||
USvG3nVYGBL/KFKxIaKUXxzTAPagzBUfzgI0AfVCzOJlRmw7Oin/xmrf7Bp0FQnx
|
||||
labMu0FVWuKrwvNL0IeQkRvm4zVICFsajjzaWribwKxVZe88iDVCCkizgv9HI7yk
|
||||
G+YrnZJbYxYvWisv5Gf6yDBfixgRES1itkGHEco4qBjTNfXxc1TvxBQZdHVkes3L
|
||||
AgMBAAGjggEaMIIBFjAdBgNVHQ4EFgQUYHIe6kctqrNxGDLhMBx3CLHUJBEwgeYG
|
||||
A1UdIwSB3jCB24AUYHIe6kctqrNxGDLhMBx3CLHUJBGhgbekgbQwgbExCzAJBgNV
|
||||
BAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UE
|
||||
ChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRkwFwYDVQQDExBW
|
||||
UE4tMTIzQ29taWNzLWNhMRYwFAYDVQQpEw1WUE4gMTIzQ29taWNzMSEwHwYJKoZI
|
||||
hvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGWCCQDgpjP/gyv1jzAMBgNVHRMEBTAD
|
||||
AQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBqSNHim3BDVX4ptcnhYaw1RNEHq2sWkL6O
|
||||
m6MLJpwk1BW0ZhKG45/lA8x+FB1npsL9ck/GcTG41UOwCJU3jIKyS5rug7hHAz7t
|
||||
GShvWEOLnk0Y9veMOM0Iwsqs4d4qeDQZH2RZCnQqjVt5bXRFDGE0X0Lqa04nVXVU
|
||||
8JThZvjNq19jzEulZwg/x356J/VbNX/gtqddqRHw1j5uvsiAnTjQeDZTLjP3SDOS
|
||||
vYVjJGF35QyarN0iJpH8TQGeA89EOJyLaQjfd+MG05cDYHo44brJgc26rJRp5QCa
|
||||
cp2h9ajosKcIhk1lrY+kLf/XiwYDZ3TyhYhqoM998XggUuinF1r9
|
||||
-----END CERTIFICATE-----
|
28
123/openvpn/keys/ca.key
Normal file
28
123/openvpn/keys/ca.key
Normal file
@ -0,0 +1,28 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDI6ZDkXY0diPbL
|
||||
B91BnCq6yzxnCn/zp6jHE1D/pHWSRFcitbne4z4n7uHg9rVo+ytwS32KOSqDKUw7
|
||||
nV1SdoGT29R6Hoy6RV5aub7UD6CeF7ksZ2xd7359PIYedeyBKB/R3TlLo/2w+sW1
|
||||
womyEdplUSvG3nVYGBL/KFKxIaKUXxzTAPagzBUfzgI0AfVCzOJlRmw7Oin/xmrf
|
||||
7Bp0FQnxlabMu0FVWuKrwvNL0IeQkRvm4zVICFsajjzaWribwKxVZe88iDVCCkiz
|
||||
gv9HI7ykG+YrnZJbYxYvWisv5Gf6yDBfixgRES1itkGHEco4qBjTNfXxc1TvxBQZ
|
||||
dHVkes3LAgMBAAECggEAOUvy2E2dquieiTRK8yUYQoEnTrN93fzYcz2dAeri5L28
|
||||
o9dzlI718Ol9XWy+O5w1vSaqPLsk1pb2eKHeNWA6f/JXXCROOekCiZkjRNLYGX3m
|
||||
fzVXgEqGpiyWiyVSN1s8B9uxNVMlTE2YCMfcAP56bB6D/4j9qgvjjwTu4DkZZnpf
|
||||
iGswdUf2KJZ2Wr08wVjvmKBnJYazXDjMbhXQ+hCSK6yr8zaJIrchdkgJc1lC9Z49
|
||||
8HEpc2SwSJrrOUpyQNQ/dNbtYeK1cqqgADguXuxwDRmV/BYycpJ8Yg4hynsWqDR/
|
||||
nUOiy/UqisYaEVCW2nLKOsj29YGguGhMXPwPL7oxQQKBgQD5pRuoDmQNOPMcnjfQ
|
||||
uVCh1f+VoeKHMuguDmJBEl62hbamAesOdOL0ghmcTAb1JQCtwbdPlvuUuGsvukky
|
||||
yCLa4sz7UU6ZSSW6XYD/9oEq/Usp1sdX8MP3Dd8nOXVPxdGzEc8syKDMULkVh/2C
|
||||
y8qENGgg9sA5X4RJKIzaFnCFkQKBgQDOBuBWJ1f1RB/O29eutL7Hs68MpiM37B90
|
||||
XLLDAIz8DrgGrwBaasdfFxhRZEmU2KHG5LmVCPvZg6au8NFYFoixdqyJZghWBAOO
|
||||
pzO8wk939kqSHwgpJcRPXWKG7TCltVEcxO/iocW7qgTGpTeBfK1NbaRqTKDHGzTo
|
||||
GTIr8yd/mwKBgQCJjgdaJ2vLuViDqU5Z7PJX6gFlYojeNBeo4PYUotmbOrw0ZpQt
|
||||
KAyx60nPTDj9NMFV/IpUCX5gKOmup7eTiqFh+Fw4Ekn7vklSkhj1cM8lb+HNkPHQ
|
||||
K/Lemz8dbtSL+xUb1TFRnM61JbmF+qOeQUo6ZGIH3851DoNmiDhsJrcjcQKBgQCW
|
||||
/zMr8WnluCgX08gfoxiwBGEnRBxLwCLNhaL+iEjL832saFY57khwyNxpyrajAKKQ
|
||||
wtHBCPSMVpCzZowHo3xLlE6f5Mf3QrnYs3KXxVG4+iltLpEslyFpiWfMu8oLqPfp
|
||||
veySjT3+bH1TmYM0w8vAE7uMrNypEKeV8+FxlKQ+QQKBgDmUIEgJVMjrD26GJeuB
|
||||
bgeAHoC1XDNZCpp3g99n/za373MnJPahxo6Pz2rHv5WGE1lm8AE2CTtQjtzIE0KB
|
||||
VsiFP4srSvNtYRuH3gAuEL28ETc5ZAYYrPRlsErNi+KbM3TNNzV9FuvAaRAMb9l0
|
||||
Nuvd4s7RiQllg5o+aM+I3V8f
|
||||
-----END PRIVATE KEY-----
|
98
123/openvpn/keys/chris.crt
Normal file
98
123/openvpn/keys/chris.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 11 02:24:18 2017 GMT
|
||||
Not After : Mar 11 02:24:18 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-chris/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ac:3d:7f:1e:1e:d7:15:85:96:bf:74:de:56:88:
|
||||
9c:7c:dd:45:e5:51:6f:db:c5:a6:0e:48:ab:33:0d:
|
||||
f6:d7:16:6b:5b:9c:63:ab:7b:20:49:aa:f4:6c:31:
|
||||
02:cc:24:46:01:fe:c2:c3:42:b8:46:3d:6c:09:13:
|
||||
e7:d3:81:10:e7:09:0b:5d:63:e8:cf:61:01:bf:53:
|
||||
00:a4:2e:e6:1e:6b:eb:02:ed:4a:e8:5c:c1:0d:e1:
|
||||
b2:5d:b1:a1:11:92:5e:7b:21:50:a2:e0:1b:77:53:
|
||||
fd:e2:13:a5:9f:2f:3d:ed:5b:a0:68:6f:b0:75:22:
|
||||
05:f9:dd:94:cc:e7:87:ee:be:c7:77:a3:cd:c2:78:
|
||||
b0:d3:f5:40:8b:c8:ba:70:9f:f5:99:b7:49:0f:a4:
|
||||
c4:b7:70:94:7c:d8:3a:87:bd:58:af:f7:71:45:7b:
|
||||
b7:2f:a9:09:dc:71:89:85:42:5f:b1:0d:cc:c1:46:
|
||||
8a:22:fb:44:26:e2:f6:00:10:df:3f:76:43:6b:92:
|
||||
ed:f9:0e:41:fa:b1:bc:43:29:45:5d:48:05:8c:83:
|
||||
fd:c4:31:1f:7a:41:a5:97:05:e5:2b:a1:8a:ca:70:
|
||||
37:09:81:c7:52:80:c2:93:07:1f:81:6c:fd:f3:e0:
|
||||
46:58:00:6a:ef:7a:eb:37:ca:fb:cf:71:67:87:86:
|
||||
bb:31
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
8B:AE:40:F9:23:AD:01:8E:59:9A:6E:80:8A:C5:CD:9E:ED:2A:29:A8
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:chris
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b8:5e:18:10:4f:91:50:53:78:26:cd:c7:5a:1f:2e:50:e8:79:
|
||||
cc:ae:d4:92:21:fb:08:25:69:44:c5:a0:a6:67:a9:23:f7:40:
|
||||
c7:d8:66:c9:21:50:34:1e:d9:8c:12:9d:ab:de:f6:a3:bc:78:
|
||||
fa:85:cc:d7:1b:84:4a:f1:19:10:9c:39:4d:c5:21:bc:db:32:
|
||||
25:51:d1:44:96:a8:32:0f:57:e5:1a:60:b2:01:7a:6e:d6:c8:
|
||||
00:3b:2f:82:0c:3d:10:bc:81:df:4f:eb:a3:7f:cf:a4:79:21:
|
||||
ba:1e:25:e4:eb:fb:65:5e:dd:ec:27:4a:15:c5:45:70:ae:60:
|
||||
a0:dc:7d:25:37:de:8c:79:a1:49:38:00:8f:9b:7c:94:d6:02:
|
||||
0a:4c:d3:c3:28:86:1d:ec:5d:11:97:7d:7c:07:0d:92:67:dc:
|
||||
0c:29:8c:c8:16:68:a4:df:8a:db:89:ed:dc:e8:88:1a:6d:58:
|
||||
c5:74:3c:f0:25:ad:58:f6:e8:1e:89:78:4d:d7:1c:a3:8d:8a:
|
||||
93:89:9e:7e:19:24:03:7e:c8:1f:7d:48:98:4e:f1:ba:86:e5:
|
||||
ae:d1:45:a8:80:f0:90:ed:b5:23:8c:75:6f:9b:f4:73:04:c0:
|
||||
82:e0:b4:df:7f:33:36:bc:c7:32:de:52:cc:4c:33:0c:e6:e4:
|
||||
b7:23:16:9e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMTEwMjI0MThaFw0zNzAzMTEwMjI0
|
||||
MThaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1jaHJpczEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArD1/Hh7XFYWWv3TeVoicfN1F5VFv
|
||||
28WmDkirMw321xZrW5xjq3sgSar0bDECzCRGAf7Cw0K4Rj1sCRPn04EQ5wkLXWPo
|
||||
z2EBv1MApC7mHmvrAu1K6FzBDeGyXbGhEZJeeyFQouAbd1P94hOlny897VugaG+w
|
||||
dSIF+d2UzOeH7r7Hd6PNwniw0/VAi8i6cJ/1mbdJD6TEt3CUfNg6h71Yr/dxRXu3
|
||||
L6kJ3HGJhUJfsQ3MwUaKIvtEJuL2ABDfP3ZDa5Lt+Q5B+rG8QylFXUgFjIP9xDEf
|
||||
ekGllwXlK6GKynA3CYHHUoDCkwcfgWz98+BGWABq73rrN8r7z3Fnh4a7MQIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSLrkD5I60BjlmaboCKxc2e7Sop
|
||||
qDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVjaHJpczAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAuF4YEE+RUFN4Js3HWh8uUOh5zK7UkiH7CCVpRMWg
|
||||
pmepI/dAx9hmySFQNB7ZjBKdq972o7x4+oXM1xuESvEZEJw5TcUhvNsyJVHRRJao
|
||||
Mg9X5RpgsgF6btbIADsvggw9ELyB30/ro3/PpHkhuh4l5Ov7ZV7d7CdKFcVFcK5g
|
||||
oNx9JTfejHmhSTgAj5t8lNYCCkzTwyiGHexdEZd9fAcNkmfcDCmMyBZopN+K24nt
|
||||
3OiIGm1YxXQ88CWtWPboHol4Tdcco42Kk4mefhkkA37IH31ImE7xuoblrtFFqIDw
|
||||
kO21I4x1b5v0cwTAguC0338zNrzHMt5SzEwzDObktyMWng==
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/chris.csr
Normal file
18
123/openvpn/keys/chris.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+jCCAeICAQAwgbQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRwwGgYDVQQDExNWUE4tMTIzQ29taWNzLWNocmlzMRYwFAYDVQQp
|
||||
Ew1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4u
|
||||
ZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsPX8eHtcVhZa/dN5W
|
||||
iJx83UXlUW/bxaYOSKszDfbXFmtbnGOreyBJqvRsMQLMJEYB/sLDQrhGPWwJE+fT
|
||||
gRDnCQtdY+jPYQG/UwCkLuYea+sC7UroXMEN4bJdsaERkl57IVCi4Bt3U/3iE6Wf
|
||||
Lz3tW6Bob7B1IgX53ZTM54fuvsd3o83CeLDT9UCLyLpwn/WZt0kPpMS3cJR82DqH
|
||||
vViv93FFe7cvqQnccYmFQl+xDczBRooi+0Qm4vYAEN8/dkNrku35DkH6sbxDKUVd
|
||||
SAWMg/3EMR96QaWXBeUroYrKcDcJgcdSgMKTBx+BbP3z4EZYAGrveus3yvvPcWeH
|
||||
hrsxAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEASmlVisLd3+jGo6+VsSaSGU6f
|
||||
18zt8X6ZPjJghwdEUcoHecUTFLUgob9yVW5VJkMvO6OZf76kv84Wy/TuqaHjzlr9
|
||||
YmEYdiRASTUsKs4EdUHqbgk5tkB82+TOHsSUeqdU/IzjhvYo2/+S/S35w6coMJ2v
|
||||
rje585Qt0uRBZFjre0dPufpwCi68ss0WR9pOUsnFczM+t2WjU9eRgrHlkD5oFhvI
|
||||
Jfr9yRKRcKKneDycRbMEQr8hWBU18OSuM2bPfzjin0n/K9LI2kWYyb2lxJw4wjwv
|
||||
bovWlHsrRa4ejn7XPKoQraqavtknw1oTJTfSaaBrUY4HB99zvMUpn2+tILymmA==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/chris.key
Normal file
30
123/openvpn/keys/chris.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIF9LLzSpsCMUCAggA
|
||||
MBQGCCqGSIb3DQMHBAifugS728VxeASCBMiRBT6FcoCVZiCBpRqbL8jwWTvOpwMQ
|
||||
bHbKobUVCNK2WJddIA0bvnhj2xlNHx0Ka9B182f0h1AE/5fRyONc+IrwazswOJ0D
|
||||
hKWnYNwSmhTZdUy6r0zQWBEr4tzJKNxSNqMrXVBnZPVQYfNWHuxNTcaOR8qu5DW1
|
||||
bAhJ9WVBLgKA/D8tssoqcyxEBKPmhQiPj1m1TewkaxaOCHe9fF+cQUZ8AdTkd0po
|
||||
FehYPSqkPJ6MYJwX+yNXFct47LioQWkl+v/GtURgkszKRY9AT3c3YqWZ4QJwQZG9
|
||||
mGEMqQq9vDzAclLaeol4C5yHZ3cpP5xdRyg3D6xb1H51zj0hQvDuVqSBanNbM1zo
|
||||
rYR2s9gNpeWS7KbJuFZ0CLlRFFJK074r6HLuBp5Xwtcj0TPj0xKpAGHFAZ8vplCm
|
||||
YqOUZiDOUlSVuEylXxeXR71G9CKqyu+ZPGqjd/kkGuCUzS3m7OKayuy4MAmPyU6O
|
||||
zQ1Ggn1/LgAhgpH5n4QVkWnGciUx+17ePgQNuYiT2gyLDaFS+AMeF+myl8fW39UK
|
||||
CrwaqzSZxewKj+NJNIoofFPXDP8HC3lU1nRdxRjke7zLNhWvtmfmeLmJOx8kGE4o
|
||||
zV+1ifL171JT0I1k+xc7lX/fgVV/JNWqj47ncgbCDaUV14t8P2L9EfBDdueghm9i
|
||||
phniM9DrqZncGeBsVUTMqVwjF2R4CAPQjxR6ZALzYBTLVVjiEl9IDQFuxeLTAS72
|
||||
o03yZQCMBud0YKXrVb6rPLQKrMENXSEMBUfJ7KQ/twSG2RMZ/fohcPu86wNWStPe
|
||||
ZlcPB8QvVbNrOgt51+tLMmsFGNYo1JEiZ8WTbuu5O6dsiapb9v3e4+5scW/f65Gh
|
||||
NNFC9cTv9kdfwXUZMqF6cQP/3A/DcG6otycXXui5AES3dyzeL+FDYn+TPMlFS79c
|
||||
deWCZ/lvjZl/VapyrFfO4xZYNTd+um5zovfCuWYb88SVz203iuw6dqvI4mcIoXoa
|
||||
SW+vSjpm3DXpHxYJ3dK3FfclRMg931d9VxTjwCUmBjuxxcm4YHa13PI2VJG8gCF2
|
||||
UyO9gBzbuIl5coMRsee0TWbeTatsjVHRhl2Vr1n/5ZVw/Jghj4WhejnsjKGDItGU
|
||||
YLWaQJ1oHSW3XK1f/l/QGrETiO0sTOqDHs7AKZMoeKoKG+wZrv+CU4gskmSHkw3T
|
||||
rBaJL5MeQwJYG4Y9sT7q8G74SlRBOfyu1dKYB827Ev/JB75KDbuct6ClX4RS84Nk
|
||||
8kaJ8xeCBDKVagNQV/uQJ1BJtyNp8paAEmiEIn+uAyosmFBhOL1op1UfydA4GQO2
|
||||
x8VcNkIz+gnESL2g1/w0/WfCaR5RsuSI9KwdzvWFl2bfpAh1A3hU7WRjJytzh5Nk
|
||||
9nPj1f5OqP9rl/9Lgl3JlY1zSS+g2ZDlIZAVF6gHrApFh2FrCVaT82o5maiJNIKm
|
||||
DMwus2EAUAlL8Yc9XK/5Cgh9mh5Sjd/qrTdiSr/bVvVl28gDeyKPGrQdlB0X6F7E
|
||||
Pb77QGdyt+0FRlwu3mEKsfPvOTAVPF3TIz0eMUPsP7+f4Nf+Vk/5WUDd2ViAzWWg
|
||||
YCJTlvkeORhU79ClFKc12bQdF6UBfRFQYqQXQfdD8326XWH89c5wFIsrPfA1s5pj
|
||||
Uwo=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
1
123/openvpn/keys/crl.pem
Symbolic link
1
123/openvpn/keys/crl.pem
Symbolic link
@ -0,0 +1 @@
|
||||
../crl.pem
|
8
123/openvpn/keys/dh2048.pem
Normal file
8
123/openvpn/keys/dh2048.pem
Normal file
@ -0,0 +1,8 @@
|
||||
-----BEGIN DH PARAMETERS-----
|
||||
MIIBCAKCAQEA75kjXi5DAAimhQ0GKJ/22y2OWcZAkNqVc2bfStyQUlYnm2E2NFxN
|
||||
nakpLWICxxWB7FpxKA/H7qM3i5lY6MIumrw8Fk/NKxtKwxYf3guNW12lVU3qFY5M
|
||||
h1vvMovyiZYxvftWIA2xxAlZLDS9UpO1dTzZspTIWJkRjOpOdq+4VHG216EWkH/b
|
||||
dP+epeDPLAksZ46iiQs80d9PSOSeHg5uVDtRK+1S5Xf9dAvTzWBRSDiS5r/PLskJ
|
||||
KasyUM+4dLG+Ex/M/ertR/nAQ9JhVfsKjIJaH9BRc+6Wq7NX1yLRwYWYHuRyBG1q
|
||||
1o7fcpMvteFXJe7CB8xifSAoNdEg1UeUcwIBAg==
|
||||
-----END DH PARAMETERS-----
|
98
123/openvpn/keys/ellen.crt
Normal file
98
123/openvpn/keys/ellen.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 4 (0x4)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:38:42 2017 GMT
|
||||
Not After : Mar 31 19:38:42 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ellen/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ec:72:92:5c:45:07:06:c3:ef:8b:49:fb:53:2b:
|
||||
64:9f:07:47:e4:2f:84:64:35:a9:6a:93:77:a9:3e:
|
||||
8a:47:fe:52:fc:1f:e9:9c:05:13:74:a6:d5:5e:12:
|
||||
ab:c9:55:1d:d7:83:a7:9e:e4:76:f9:c3:ee:b4:b5:
|
||||
c6:d7:ae:fb:05:e1:5f:3e:d5:c5:08:31:cc:40:bf:
|
||||
9e:17:ea:b5:69:c1:e3:f5:8a:55:b7:39:10:4c:39:
|
||||
d4:a5:1a:6c:da:1c:df:08:60:41:43:cc:78:cc:9b:
|
||||
3f:f0:64:35:a6:bd:7d:0c:86:55:20:66:e8:7f:d9:
|
||||
0d:06:03:d5:42:d2:b0:43:54:92:69:5e:97:20:d6:
|
||||
d9:0d:5a:95:86:5b:82:59:f0:d4:6a:5c:4c:01:ca:
|
||||
ae:17:da:7c:04:27:d5:55:1b:22:88:0f:82:ea:0d:
|
||||
3b:3e:0a:92:6c:7f:5c:a4:4f:4d:b3:ea:b1:fd:e9:
|
||||
25:20:87:af:52:36:ad:3c:d5:1a:f1:45:9a:8d:a8:
|
||||
33:8c:0c:0c:97:24:7b:5d:32:fe:ad:f9:b7:15:5d:
|
||||
a4:16:c5:a9:52:89:d3:4d:26:08:10:6f:3b:5a:3b:
|
||||
0a:32:c0:8a:fb:a0:23:8c:bf:bd:d8:b1:8e:b4:a7:
|
||||
05:86:1f:99:6f:7c:c0:57:7d:ba:19:f0:5f:3b:d2:
|
||||
91:53
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
CB:73:DC:89:31:5E:B7:F6:7A:2D:B1:39:A7:E3:03:5C:38:75:B6:FC
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:ellen
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
41:78:fd:3e:cc:67:5a:80:3e:7a:e2:1f:21:fe:de:be:54:29:
|
||||
f4:96:b3:22:ec:8e:55:8e:da:af:97:9f:d7:71:97:c6:83:9a:
|
||||
26:da:9d:47:f1:a2:3f:75:a0:26:09:e4:e9:cd:cc:d2:c0:3b:
|
||||
fc:76:1e:08:1a:23:23:b0:e2:c6:52:63:57:c3:ca:55:d5:32:
|
||||
c8:d2:ac:d3:5c:c2:16:e6:03:72:b3:cf:67:74:f4:ae:64:a4:
|
||||
bf:10:0d:ba:ed:f4:89:df:7d:c3:61:e1:76:9a:81:8d:f7:ec:
|
||||
a9:b0:20:25:7f:57:4d:36:87:dc:bb:34:8f:e2:95:0f:41:85:
|
||||
fc:10:e0:ff:31:9d:c4:fd:79:81:ee:34:33:24:72:a8:19:77:
|
||||
49:66:ea:9b:28:90:14:29:fb:3d:e6:81:98:55:4f:d5:be:95:
|
||||
7a:8c:46:d8:78:e7:5d:16:2a:de:6c:fe:a8:46:d0:e1:04:c7:
|
||||
f7:25:64:7a:fd:ed:ef:ef:98:44:96:3a:15:f7:c6:e9:16:09:
|
||||
ea:8c:fc:c6:34:4e:83:fe:88:46:71:25:fb:3e:62:76:92:15:
|
||||
05:44:43:12:75:b7:f8:8f:5c:64:be:36:83:ba:8b:be:b1:46:
|
||||
3f:d0:c7:01:81:1d:49:00:f3:fa:42:74:3c:c9:b1:37:78:30:
|
||||
2e:4f:c3:61
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBBDANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM4NDJaFw0zNzAzMzExOTM4
|
||||
NDJaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1lbGxlbjEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7HKSXEUHBsPvi0n7UytknwdH5C+E
|
||||
ZDWpapN3qT6KR/5S/B/pnAUTdKbVXhKryVUd14OnnuR2+cPutLXG1677BeFfPtXF
|
||||
CDHMQL+eF+q1acHj9YpVtzkQTDnUpRps2hzfCGBBQ8x4zJs/8GQ1pr19DIZVIGbo
|
||||
f9kNBgPVQtKwQ1SSaV6XINbZDVqVhluCWfDUalxMAcquF9p8BCfVVRsiiA+C6g07
|
||||
PgqSbH9cpE9Ns+qx/eklIIevUjatPNUa8UWajagzjAwMlyR7XTL+rfm3FV2kFsWp
|
||||
UonTTSYIEG87WjsKMsCK+6AjjL+92LGOtKcFhh+Zb3zAV326GfBfO9KRUwIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTLc9yJMV639notsTmn4wNcOHW2
|
||||
/DCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVlbGxlbjAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAQXj9PsxnWoA+euIfIf7evlQp9JazIuyOVY7ar5ef
|
||||
13GXxoOaJtqdR/GiP3WgJgnk6c3M0sA7/HYeCBojI7DixlJjV8PKVdUyyNKs01zC
|
||||
FuYDcrPPZ3T0rmSkvxANuu30id99w2HhdpqBjffsqbAgJX9XTTaH3Ls0j+KVD0GF
|
||||
/BDg/zGdxP15ge40MyRyqBl3SWbqmyiQFCn7PeaBmFVP1b6VeoxG2HjnXRYq3mz+
|
||||
qEbQ4QTH9yVkev3t7++YRJY6FffG6RYJ6oz8xjROg/6IRnEl+z5idpIVBURDEnW3
|
||||
+I9cZL42g7qLvrFGP9DHAYEdSQDz+kJ0PMmxN3gwLk/DYQ==
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/ellen.csr
Normal file
18
123/openvpn/keys/ellen.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+jCCAeICAQAwgbQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRwwGgYDVQQDExNWUE4tMTIzQ29taWNzLWVsbGVuMRYwFAYDVQQp
|
||||
Ew1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4u
|
||||
ZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDscpJcRQcGw++LSftT
|
||||
K2SfB0fkL4RkNalqk3epPopH/lL8H+mcBRN0ptVeEqvJVR3Xg6ee5Hb5w+60tcbX
|
||||
rvsF4V8+1cUIMcxAv54X6rVpweP1ilW3ORBMOdSlGmzaHN8IYEFDzHjMmz/wZDWm
|
||||
vX0MhlUgZuh/2Q0GA9VC0rBDVJJpXpcg1tkNWpWGW4JZ8NRqXEwByq4X2nwEJ9VV
|
||||
GyKID4LqDTs+CpJsf1ykT02z6rH96SUgh69SNq081RrxRZqNqDOMDAyXJHtdMv6t
|
||||
+bcVXaQWxalSidNNJggQbztaOwoywIr7oCOMv73YsY60pwWGH5lvfMBXfboZ8F87
|
||||
0pFTAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAqG7Pm86xMI259YHJgwVxEex7
|
||||
DLKabh2Xe/JHCBRyc6ZrzthjexIQocIg8XbjHuU0ReciUbk2GvBHt89/s0Mrpo+C
|
||||
1iqKrgFXMM5W8igCZaTWMRxJ5f8EDj99W8cps29/NojakzyO2UMA7iYRv54qDCJb
|
||||
tR7tqadpgzn/x6DbyjzJOPTTb2FK/PWYxP8t3SVvXSOrwgmHSTqsh4KWocTdfokk
|
||||
VHSl9R/Larcl/XieShOzsGBXjmupJL2G9xk286bahaLaSob865IhwTKJ1sMwLPOn
|
||||
4f0003qE5ptK6V5cAhsBtyIjZvnoni/gRHSSnwsgoqmC5wOKVtraScHEmAxk6Q==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/ellen.key
Normal file
30
123/openvpn/keys/ellen.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIqYNbs1KjCD4CAggA
|
||||
MBQGCCqGSIb3DQMHBAjQbwXPEJZtUgSCBMhTxI7dblWQWEPoEqmxGV2qWiQrw3y3
|
||||
ZboekVfEP57rNyKS+xgJuo/gYTncgeTYe0c9aoqO4tZneIa5KavsrKyKCTGQLnOM
|
||||
qq2rlZDJ2uPi1u4qo8GDaILQ19rNMy1HSL0NrLuxG7zyRPnhhacnoEDr1z2ypv9k
|
||||
U6Tz3oKyIA9617xxSQ7KPV7FzJMmTuxDEO/tX0TDeoAOxfVMU463S4XDEiCFXUUN
|
||||
ETSXed626B7FE4Q3RI7vVRnWOOPTcAoEJoj6TZxaqfwOZGSofluKYyu9LS9CNX91
|
||||
EteAGRWAzTj0MGWtfUwChCo9z0ZAwNAlHltXJyFmPnyuTZ0WRZ+iFtbXUeuHfis+
|
||||
CF07SrNqlDLGu2TctuQR0CvvpFzs+pAJBX//x4A+R03aJZ+30M/VkgHhQUIGMFeI
|
||||
daxWDSpPqLBkQDmTgJaO9F4PFyNylYIC0VZhvmGlX+obTbLfuaDVW4HvR1dwglQs
|
||||
9PQoJAHg9HJIb1CW30vJMc892C6e/SEOK3VNzsT0Pr1EIo6GqiTg/GRpvxjRHsLW
|
||||
HzuCm/X6MOLlLy7lQkV9I6ewNCIjeY045B8UpKUmd/bEC6LRU8qTTx+N+3eub4/C
|
||||
e9amZyvBk334dB0IfSMO/eYEbuoVkqjmYWQUokLtK7+JwXFPUkjJ9InqaDTIqbtn
|
||||
pxOlShzH2A5guPsclkNrKXVmv6VWGke0JQ/tMgaXBpVaTl/SeFEKs56zJ8SVN6Ep
|
||||
3I1r1nWkUZbGypdu/CNVZmmdRII4PFtxsqQjag7+YNJlp/e58m7FBinDS4q4vT4f
|
||||
UjNNSP9T9tD5f/PaK+j9q5ZynBguHS3SbFA3zO8Wfed8YB+1qsLJ93coaBJNfTaY
|
||||
S/DCLVLXnP8LcGvcFHkHOfrUKQuSnW0or+rtifbXwdQSEX2xiTNG0CjXZnRlS1oq
|
||||
70ZOG97/QYyssEGdVN+OHPQ1aywnkf5qhruafG1Ue8W45CIGHQ7bmSlLzMzVo0Py
|
||||
5o6b93bVIiN7LCS6vojM+s2Sa5s0VWC+JsdJHX8IGF/Evf4gn1e+yLO1g8qNuGO4
|
||||
7GhUxFmM0OlhRo9CW5/t8x862p6kvOcTYeddDlRzgAwOJ8sfwpwHUmnloigb4jb6
|
||||
McCR/MJvq3KGGf5K8bcAwPkQFZBtBHl9jdjPpBxpjobQp9GitfjwXYZ41HepCtNU
|
||||
XIEnJWcpj77okAuz9PSmS4NtK9OdBK0IBm+vsSPxJUvDy7QYekqSaab9MUCk20Vy
|
||||
lDPwZfLuFuHrhyRqrx3n1vjGc7T3amANo0BEG+yFZruMwqkC15bGKnPmy95kCvGB
|
||||
uFpymGJBZJOQe9hUML5jJNIEReQHIoPO5CFzTzoCDGP3NzgP6nXUOY0SsCG17k46
|
||||
rWpFTVMM8TJWVEhhn7RrTk/QM0pCfCFUcpe591jgS/XewuzFKeOGyvBcQL2azhY/
|
||||
OLhh/byqX2XPDT/dISUM7uyxbMn0/o9MXx86kKbCP9mLWir6GYqOrw+SvNKIYDPg
|
||||
rABZ4Lm2YhHur0WU4aICloUO1/qm9iPiVqBcGmOneh5TuSO02u8HAdR/Bh62s7k9
|
||||
xdXGaYtqHW2jgM90gYTRGbP8CQL5QGu8/MXJdslaEuAZvlEcVgd0I5kI1TvgjTRg
|
||||
eNI=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
98
123/openvpn/keys/gw-ckubu.crt
Normal file
98
123/openvpn/keys/gw-ckubu.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 3 (0x3)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 27 01:22:52 2017 GMT
|
||||
Not After : Mar 27 01:22:52 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-gw-ckubu/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d6:4a:11:c9:92:5d:41:10:43:41:f9:d0:31:82:
|
||||
47:6f:9c:10:dd:f2:2d:c1:14:0a:56:6a:82:54:01:
|
||||
7c:7c:aa:ec:13:c9:26:c1:38:cb:f5:ae:3c:c2:1f:
|
||||
f0:88:ba:7b:84:e1:ce:bf:40:54:a2:87:40:49:e7:
|
||||
4e:e0:5c:1a:e5:cb:a5:37:73:99:5f:f2:ed:38:c1:
|
||||
a5:10:72:8a:10:3d:d6:41:dc:a5:e3:28:f1:2b:b0:
|
||||
6b:0a:f2:4a:9a:be:15:07:e1:0d:40:69:e2:53:b4:
|
||||
1e:1e:32:fe:1c:65:4f:38:d5:e8:a1:38:eb:fa:8a:
|
||||
46:2e:e3:2d:ed:be:1e:e9:5a:c9:62:e3:59:f2:28:
|
||||
fc:28:c0:9e:ee:8a:12:73:d2:a2:be:6d:41:eb:f1:
|
||||
85:29:2e:3e:cd:73:ba:37:a0:eb:cf:a3:04:29:db:
|
||||
79:5f:9b:a8:80:e9:ec:80:94:6a:8e:83:5f:bd:9d:
|
||||
02:20:27:0b:00:1d:17:3d:50:71:a2:b8:fd:92:c8:
|
||||
f8:db:a1:1d:98:43:3a:d9:b0:66:0d:ce:62:26:a6:
|
||||
e2:cb:92:04:de:9d:1c:ea:5a:3b:53:10:a8:36:4c:
|
||||
b7:07:37:da:aa:01:9a:a9:98:37:b1:23:b2:19:a7:
|
||||
e7:40:20:09:0b:e8:b1:5c:87:66:05:27:90:a8:a1:
|
||||
fd:3d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
88:EE:C2:37:75:7A:6F:00:9C:EF:11:64:CD:08:96:0A:45:18:63:1B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:gw-ckubu
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
66:20:ee:15:bf:c7:8e:47:40:4c:1b:6e:b6:c9:82:53:a9:67:
|
||||
52:51:f1:38:c0:b8:19:90:c2:40:49:2e:b4:27:d3:b8:0f:4a:
|
||||
a2:cc:0b:5b:5a:34:07:aa:32:3e:7f:bf:1d:75:5a:69:19:7f:
|
||||
37:a7:89:dd:6d:c5:8c:6a:68:c7:c7:e3:96:83:cc:26:b1:86:
|
||||
a9:02:07:6c:f1:52:9a:0a:00:b2:39:9b:b2:6b:3b:01:97:9e:
|
||||
02:53:28:07:0f:3d:77:24:3e:69:98:aa:28:99:ac:fa:18:06:
|
||||
a2:ae:c5:ca:b5:3f:4b:ab:30:db:65:99:95:55:52:1e:a4:b4:
|
||||
c6:94:eb:b5:66:ef:2c:7e:5d:cd:0c:0d:be:9d:8e:79:46:90:
|
||||
50:5e:29:99:36:c8:9d:83:5f:d9:da:3d:e9:56:17:2e:0c:8c:
|
||||
57:84:2c:75:92:5f:ac:69:58:59:db:2d:d8:e6:c8:e8:b4:74:
|
||||
c7:b5:33:a5:95:cc:8f:0f:f6:c1:73:4e:40:4b:a3:a1:60:40:
|
||||
d8:2a:2d:87:84:d5:77:35:37:d0:b7:8e:e7:31:01:8e:cf:03:
|
||||
9e:80:3c:25:0e:83:63:34:e7:5e:4e:1f:c6:d6:6f:da:96:b8:
|
||||
c0:9d:fd:d5:57:84:98:9d:28:f7:ca:9d:c5:1b:87:03:4a:46:
|
||||
60:94:02:18
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFZDCCBEygAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMjcwMTIyNTJaFw0zNzAzMjcwMTIy
|
||||
NTJaMIG3MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEfMB0GA1UEAxMWVlBOLTEyM0NvbWljcy1ndy1ja3VidTEWMBQGA1UEKRMNVlBO
|
||||
IDEyM0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIB
|
||||
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1koRyZJdQRBDQfnQMYJHb5wQ
|
||||
3fItwRQKVmqCVAF8fKrsE8kmwTjL9a48wh/wiLp7hOHOv0BUoodASedO4Fwa5cul
|
||||
N3OZX/LtOMGlEHKKED3WQdyl4yjxK7BrCvJKmr4VB+ENQGniU7QeHjL+HGVPONXo
|
||||
oTjr+opGLuMt7b4e6VrJYuNZ8ij8KMCe7ooSc9Kivm1B6/GFKS4+zXO6N6Drz6ME
|
||||
Kdt5X5uogOnsgJRqjoNfvZ0CICcLAB0XPVBxorj9ksj426EdmEM62bBmDc5iJqbi
|
||||
y5IE3p0c6lo7UxCoNky3BzfaqgGaqZg3sSOyGafnQCAJC+ixXIdmBSeQqKH9PQID
|
||||
AQABo4IBfTCCAXkwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0Eg
|
||||
R2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSI7sI3dXpvAJzvEWTNCJYK
|
||||
RRhjGzCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCB
|
||||
sTELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGlu
|
||||
MQ8wDQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAX
|
||||
BgNVBAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3Mx
|
||||
ITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMG
|
||||
A1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDATBgNVHREEDDAKgghndy1j
|
||||
a3VidTANBgkqhkiG9w0BAQsFAAOCAQEAZiDuFb/HjkdATBtutsmCU6lnUlHxOMC4
|
||||
GZDCQEkutCfTuA9KoswLW1o0B6oyPn+/HXVaaRl/N6eJ3W3FjGpox8fjloPMJrGG
|
||||
qQIHbPFSmgoAsjmbsms7AZeeAlMoBw89dyQ+aZiqKJms+hgGoq7FyrU/S6sw22WZ
|
||||
lVVSHqS0xpTrtWbvLH5dzQwNvp2OeUaQUF4pmTbInYNf2do96VYXLgyMV4QsdZJf
|
||||
rGlYWdst2ObI6LR0x7UzpZXMjw/2wXNOQEujoWBA2Coth4TVdzU30LeO5zEBjs8D
|
||||
noA8JQ6DYzTnXk4fxtZv2pa4wJ391VeEmJ0o98qdxRuHA0pGYJQCGA==
|
||||
-----END CERTIFICATE-----
|
19
123/openvpn/keys/gw-ckubu.csr
Normal file
19
123/openvpn/keys/gw-ckubu.csr
Normal file
@ -0,0 +1,19 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC/TCCAeUCAQAwgbcxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMR8wHQYDVQQDExZWUE4tMTIzQ29taWNzLWd3LWNrdWJ1MRYwFAYD
|
||||
VQQpEw1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29w
|
||||
ZW4uZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDWShHJkl1BEENB
|
||||
+dAxgkdvnBDd8i3BFApWaoJUAXx8quwTySbBOMv1rjzCH/CIunuE4c6/QFSih0BJ
|
||||
507gXBrly6U3c5lf8u04waUQcooQPdZB3KXjKPErsGsK8kqavhUH4Q1AaeJTtB4e
|
||||
Mv4cZU841eihOOv6ikYu4y3tvh7pWsli41nyKPwowJ7uihJz0qK+bUHr8YUpLj7N
|
||||
c7o3oOvPowQp23lfm6iA6eyAlGqOg1+9nQIgJwsAHRc9UHGiuP2SyPjboR2YQzrZ
|
||||
sGYNzmImpuLLkgTenRzqWjtTEKg2TLcHN9qqAZqpmDexI7IZp+dAIAkL6LFch2YF
|
||||
J5Coof09AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAFpE/mx+rBsU1MCbDfpBi
|
||||
cvggKoOMmjBy8+jhdhK95waWF+V2VykOi4/+WLZZRM9BEIblpWqT5jcbap74ScQ5
|
||||
dfbXLcFO6tKumqppbw099C6wI2tXpwinDsd6dze1P7s+Sng5lcwUmwRcjD9xlNrs
|
||||
C5ia/RXPeKqj/BGbQpN5Prc7Etxx6ip3YNM2khaSSdsHQ13l7f4IYW3H1sUzUqMI
|
||||
hgvsk+Tkva5CusmxE3qI37BKaAwi9Jm0r5feinBwRNy4/8ogvXFerbJyOOe0PQH3
|
||||
pi97H1Ia33NYmYNKTYiTDR3/AF6rw4Flv99pxuBAargxaf8g+o0cup1e3uFsUEto
|
||||
Kg==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/gw-ckubu.key
Normal file
30
123/openvpn/keys/gw-ckubu.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIUPPvb55y11ACAggA
|
||||
MBQGCCqGSIb3DQMHBAjjOqpaPsnUowSCBMiALIvfB2vXtETRZxybvvubeJLEp5eA
|
||||
qkQ7cdy331ti8XJ6fkHcU3mBQwbBDD5KSDBLRnRU8LegMWvRTKGjQ8lRGCULTvxI
|
||||
sr3HuR5omwXUMVwRLWTht++I1IIYoIwwnVU9/7vMy3nJPixP3OKRGwkmv5IedCvc
|
||||
5a/KqJuc+ezRVjQ8/Dl8fs+VRefd5Tmh3TYROu1vuV0pQaT33ceXDVJqZ2B+dmoT
|
||||
AHFE3FUex60YlXt5iUhdGWzItdeXnI5tDMnoFcAtCPbBAB7DhynqfEn7dlaxrCrH
|
||||
4POq5KvMUu5/sXlQoZR+SvkOx7Z3JNTYj/PL0OpM8tXJFvc5nT733iVcNjyauLhf
|
||||
rcXqnih6MUrWYaBAfL4od6/ne27vqriKwtFUfASTqlW8pN4uESbngXx2Ww5CqM7+
|
||||
K7Hz3XDF04Y92YBndBr1ZTUiFbypO5PjygZz8Jeia6RYXLUU+6kO/VQ4WsnbGep1
|
||||
ftQGc5tNhwEwJC+tacFzPdd6hRnosGSs9jhHk7v8CY58V2wBcgXxBDgVZeHbp2bL
|
||||
9lJmyohvZ/nzxmb99TxD6j154OqC+4cJLze5AG2AO5QmrNhMcFt+mEIxL1uiBU77
|
||||
SHe+konUZuAH67UPR5oJm1x7KmGjYOmdeke3wgkFKUIRCQ04OikOvUkIJB5mO2D0
|
||||
uoG6caj/KQQdweqhOMELoOj/GDQhxNCtD4Zx8LhKDz4VL/c5+s23oJX/pALuDlNs
|
||||
JpxI/v6gkxVLIZwyxhNVxKFNYEMERmxN6GePdPki0iEDGRRuSjat3xnMh0N+Yp2f
|
||||
N3lNDNoBfZRuBcgugF70O7P38tQXgEZF8tECwRHogmCDDSSOw4DbvbBSVdMhlMIF
|
||||
oUmNKqSyGKIONwsvCYHSKJ37DDIyvi/nEbSLHy+HRQ7/foM0nwnmxrgUk17VVknK
|
||||
RUqob0PeSFBMsjVV6kDrTHj2uiRYq5qD5bRh9hCKOWCdk0WgRspjUlBm4Yw1sTan
|
||||
/Zakk8MAyIl3dOrwnaTuiiYVFi2mIWwRSrjV0wYriGypez5LdVew01ISx/tqudzC
|
||||
6XvwMcNFeM0bzIT8PJI0g9b8JZrDGk8UbMIw0AfV1jakzZoDUNcv9BQHNGxcdcLN
|
||||
TFNY6BiTgAAsZvaapUU+oRqPB6UHubbfmRAfX2AzrctucYtVNZTNExytM85qslPF
|
||||
ZE4dx+yJ/irUzenP5ABVobpbvriX78d6hiuRHiAqbO90Co9nBffwDQnZptSdXRGT
|
||||
+aubzGluIA0piOyW3r2s4KGRH+2s5TqHeW3WoTJTJuFlGB2lqn/Ieg0xl9Xy6rNp
|
||||
31oh/n8K6XjqIl1k7NWjLq++gzkoRyidZjvjzkKGkCEqfbZvE31m9LQ3ntxAsMgs
|
||||
WWXfWz+O9INtN2YzcVEDPNvbNA31FdtUs5nLVO5KPut2Rl/po2d8m+5WTdgQkpmm
|
||||
8x2IA7ZEUyYXKmFa0nFEZ7H2XhRizk4jfr0eQyx43nfXab7s7L2wy5IAxpksO54P
|
||||
H0VNIaaADeV/4PdbHODB4zOrrYEigUeMBVJaiZAyjvC1u1mLEtFkajWwBMaqgWA0
|
||||
0A31VtMvPn8b8lEhQhirgcJzHK/550hkEAgm5kmiWe8ZoLCw0Ej8Dofr5HA/GuZg
|
||||
mNs=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
98
123/openvpn/keys/henny.crt
Normal file
98
123/openvpn/keys/henny.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 5 (0x5)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:39:19 2017 GMT
|
||||
Not After : Mar 31 19:39:19 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-henny/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:df:b0:f5:e3:00:76:72:1f:19:3d:f1:1b:cb:bc:
|
||||
52:1c:ec:3c:65:14:bd:ac:c7:cd:f3:5a:4e:16:c5:
|
||||
af:a9:f6:60:0e:c8:de:62:51:1c:9c:d0:0c:64:d6:
|
||||
5d:16:51:53:22:3a:f1:f0:1b:92:9c:a9:ae:39:82:
|
||||
87:82:23:62:5c:68:7d:0c:fc:61:ec:f8:02:c8:57:
|
||||
bd:27:da:1c:65:0d:69:25:2a:25:13:af:91:79:4c:
|
||||
55:be:7e:ae:80:e7:d3:69:e1:79:cd:94:a7:98:25:
|
||||
9a:bc:9c:de:9a:62:42:5c:06:b8:de:1e:82:d5:a8:
|
||||
06:0e:c2:d0:11:96:a4:4c:76:f8:17:40:20:4f:f1:
|
||||
d4:d9:94:8a:fc:06:04:e5:5c:cd:a1:70:51:4c:41:
|
||||
13:00:ed:6d:f3:73:f0:3a:b3:c1:94:45:57:6b:d2:
|
||||
19:f3:b0:43:d6:8c:bd:89:5f:e3:ad:93:7d:3d:f5:
|
||||
61:e7:96:89:a1:08:5c:2d:74:32:03:77:8f:74:e7:
|
||||
f2:36:49:c6:e8:20:ec:e4:67:e0:0b:d0:38:2a:c0:
|
||||
84:d9:fa:da:db:75:0d:c0:86:d5:89:ef:33:9d:bf:
|
||||
dd:6b:a1:78:83:fe:78:1e:32:56:38:84:d3:fb:4f:
|
||||
28:41:ee:9f:9e:1d:51:c1:2e:f6:67:87:bb:c6:83:
|
||||
d0:f5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
37:06:33:52:9E:7C:42:62:7C:AA:37:82:9F:97:4D:89:25:8B:1B:03
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:henny
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b3:7a:5c:64:cd:53:5a:23:ec:35:79:4b:ac:ca:c3:0c:39:c7:
|
||||
e9:2b:89:d6:a2:51:1c:a1:ce:48:a9:8b:f7:5f:dd:fb:43:70:
|
||||
2a:17:bc:04:90:31:ea:e6:85:cb:df:41:a4:f0:63:fb:d9:bf:
|
||||
33:6b:6e:80:b5:62:d9:83:6d:4e:01:f7:e0:ae:b6:20:6b:eb:
|
||||
d0:76:7d:e0:1e:f9:de:d6:e3:c2:cf:91:2c:59:f2:01:1e:63:
|
||||
46:7b:a8:7a:8e:af:e4:45:43:4b:f9:c8:5c:b9:e2:26:d8:a8:
|
||||
b1:74:91:d0:ff:ae:fe:c4:73:f4:06:07:40:00:72:16:5c:44:
|
||||
29:af:37:31:4b:3f:3e:09:64:a0:e3:d5:fe:6c:f7:e6:2e:c5:
|
||||
4b:61:41:df:0b:66:b4:7b:3e:21:7e:24:7d:27:b2:2a:cd:ef:
|
||||
9d:a1:f7:bf:57:c1:f6:a8:24:52:ba:0c:31:fd:6e:24:e1:11:
|
||||
b9:a8:62:27:54:3c:59:3f:3a:d2:45:9d:81:77:d8:2e:b1:4e:
|
||||
6e:41:a6:e8:89:e3:44:f0:be:da:58:02:67:d8:c8:51:fb:2c:
|
||||
57:01:10:19:d8:10:7e:d6:9c:70:f7:32:91:ed:26:53:66:39:
|
||||
19:99:f8:63:cd:c6:a8:c2:35:1d:f4:0c:b7:02:a8:4d:3b:ac:
|
||||
68:ec:f9:de
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBBTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM5MTlaFw0zNzAzMzExOTM5
|
||||
MTlaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1oZW5ueTEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37D14wB2ch8ZPfEby7xSHOw8ZRS9
|
||||
rMfN81pOFsWvqfZgDsjeYlEcnNAMZNZdFlFTIjrx8BuSnKmuOYKHgiNiXGh9DPxh
|
||||
7PgCyFe9J9ocZQ1pJSolE6+ReUxVvn6ugOfTaeF5zZSnmCWavJzemmJCXAa43h6C
|
||||
1agGDsLQEZakTHb4F0AgT/HU2ZSK/AYE5VzNoXBRTEETAO1t83PwOrPBlEVXa9IZ
|
||||
87BD1oy9iV/jrZN9PfVh55aJoQhcLXQyA3ePdOfyNknG6CDs5GfgC9A4KsCE2fra
|
||||
23UNwIbVie8znb/da6F4g/54HjJWOITT+08oQe6fnh1RwS72Z4e7xoPQ9QIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQ3BjNSnnxCYnyqN4Kfl02JJYsb
|
||||
AzCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVoZW5ueTAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAs3pcZM1TWiPsNXlLrMrDDDnH6SuJ1qJRHKHOSKmL
|
||||
91/d+0NwKhe8BJAx6uaFy99BpPBj+9m/M2tugLVi2YNtTgH34K62IGvr0HZ94B75
|
||||
3tbjws+RLFnyAR5jRnuoeo6v5EVDS/nIXLniJtiosXSR0P+u/sRz9AYHQAByFlxE
|
||||
Ka83MUs/PglkoOPV/mz35i7FS2FB3wtmtHs+IX4kfSeyKs3vnaH3v1fB9qgkUroM
|
||||
Mf1uJOERuahiJ1Q8WT860kWdgXfYLrFObkGm6InjRPC+2lgCZ9jIUfssVwEQGdgQ
|
||||
ftaccPcyke0mU2Y5GZn4Y83GqMI1HfQMtwKoTTusaOz53g==
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/henny.csr
Normal file
18
123/openvpn/keys/henny.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+jCCAeICAQAwgbQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRwwGgYDVQQDExNWUE4tMTIzQ29taWNzLWhlbm55MRYwFAYDVQQp
|
||||
Ew1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4u
|
||||
ZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDfsPXjAHZyHxk98RvL
|
||||
vFIc7DxlFL2sx83zWk4Wxa+p9mAOyN5iURyc0Axk1l0WUVMiOvHwG5Kcqa45goeC
|
||||
I2JcaH0M/GHs+ALIV70n2hxlDWklKiUTr5F5TFW+fq6A59Np4XnNlKeYJZq8nN6a
|
||||
YkJcBrjeHoLVqAYOwtARlqRMdvgXQCBP8dTZlIr8BgTlXM2hcFFMQRMA7W3zc/A6
|
||||
s8GURVdr0hnzsEPWjL2JX+Otk3099WHnlomhCFwtdDIDd4905/I2ScboIOzkZ+AL
|
||||
0DgqwITZ+trbdQ3AhtWJ7zOdv91roXiD/ngeMlY4hNP7TyhB7p+eHVHBLvZnh7vG
|
||||
g9D1AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAlOXGdx6QKaFjIIuk84NOYSU/
|
||||
cE0RPVt9JT3sQjSVdNgLK0zk0R77VTSgdeBj95DymXw4ddPUHVZn14WUgjJ+wgv4
|
||||
HFsjJgDeeHfubNa0I8W0CJVP9Odh+C70luwODL7yMqf5dPVxy9JDQ9VsQvxQvd2T
|
||||
+m8rqlzufMs06gyOy+N0mWT9Yhkqc/8nP34Cj/AQ7ZvzCi40xj9Iu50gu5tkZ7mn
|
||||
Kl7ioLrduYnuS627m+HdQawooSuCiy5Z7WPZUFht8sAI+xYIZlp9UrjO2HfkadDa
|
||||
8+6XMsUxdbrqpWQ3M3fPZAS3f03TOUtFNYbPQyzaKM7jK5yYIM86vb0gZMGVrA==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/henny.key
Normal file
30
123/openvpn/keys/henny.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQILw41jEbgddACAggA
|
||||
MBQGCCqGSIb3DQMHBAge9xlKHjSx/gSCBMhCXhTMBoLct77t+mgoYWhvHhJh2TEC
|
||||
7XsQ6ucs3SvcbQXqRDT7rQ/OZwepuw2pepCoLdsI48BVhMqehqsCEK35wrSDP81I
|
||||
dt513F0KjAIuZn8BrUUnNB5PnzjCnf9S45GFtX22uVwZvfXSOm6qGPe/5RyEn+p1
|
||||
5HJyrmBYZD4SdT50dOTbOrxqSWNthW34hB7YwJIdcXLA4xUKtSSY5JfEkWnuCZnJ
|
||||
DDOWoKLXOLHASX4D9OvhOZmmDH/QGYLzNVbgewl1Na0nQofL1RQoQxbvkVD8Mtng
|
||||
TJ8XT9svTZVayBVfjlgvxdHll4XFcDQOmQO9OipxsZW03JCG78jJMv2YoiZhdv2l
|
||||
cmFMpMKV1RnGVeW1VNAi5bYujreihCMRnfiJ0Brp+tiDJAKQvowCeeEiMDFPh/M7
|
||||
qLee7V73u1kAzf0wt4JLIcJ51PGh585tr/zWt9Hgp5ajAS8TiIG/53WzWmXeU5L1
|
||||
2CcFQEydZCDt4L2lFoVBPqQLr9mykVqnsGjGuznKjv8CaMji4Ko/jv/huR3mVYlq
|
||||
EjA75DH8SHcKHrOJMTVzLUt23LntIPjwt2So0WNtey1q5MFO91DHw7+Bi3he95uy
|
||||
GEfnrGlMZuinMoXdCIX3AnCU2dArSw7l5ugd3CSnZOz6ggpnSaeq5+hUGCKpfDx3
|
||||
nqUNjlycN213QQF/9u73kotOkEDvy0SdYY8Uab/0x7LavH5fRvES7icdh0zMYcFA
|
||||
qQipRFWEbXh7EQ1cUMO1Gv5KE/QIu8z34lPKPiYbReAdkazkEaiEC4LxiMA12o5e
|
||||
+s7QeXR3oSqo+zOcwtxuHVLLwbQzCrxJzNIndH7VjEqa1A8iGdo6AQxNoyRd1uyA
|
||||
bq8YZLavwVho89NCFv1bZaMGUi6XaA7WiYDUtcE07I9yjwFIdh+Ymd3KRYL0g0YP
|
||||
ec/1xPgqpdKiX2exuwiP347zHBwI5w1VF/oHD89iBnC2Y2ZV2nShlCZRzT12Mkqs
|
||||
JffCOGj3iY15qxytayLXE/Kfl+qScyxf925L8sVCVNOm2D9eH1jkUDfk6vg9lFZ5
|
||||
NxDaej+hjODr6FQgUE98obZwLucpWQKSSw8UC87yQUnS1cNvK9mUD2zHnTuFZg2Q
|
||||
EW+GTxhkl3OdajHNSTpkJjn+XLR0ctvFa8pPG9lcrTm3h4T45RpmNVty0zCbR/9I
|
||||
INmWQt/3s8Fse393ZKg65356eCH5JJqDbQIptfy6fpgSWlsS+EjiQib2ZvDD0jOC
|
||||
JsBvE0kMGOC4seOn8xDhajiXTO09U/rcHXAIPdyEqRAQRUrNe+hA3ZdgFi4CYhWb
|
||||
72N34OAYFXmO1qnJsAxjADNeaLa3LSNd5kZALs1S9TWshBxXpfBpWxERzUanyW4y
|
||||
joLmdC/uq6xj/FSvJ8vWb81gc/68dQobY1T4fI5Jbsr2l2dtf9/qfA4RF069CRXN
|
||||
r3Xe46hRzVVbQBS6dBlPDnYn+Rcy0mAYh+OL3FW1DMnTsKR7CRlPSG9FP5YbDiq1
|
||||
s0/heClAF15O4bzotHSKMMrOoJOB02a6QlyxgWy8n8mndIXO9tYrxPA6TYeAWMng
|
||||
U4cwP1EEeBK0CaLb+KfPGlrf9VqW46LvkShCmr4vTgBnX2x658lbDRA2Ynk1gbp8
|
||||
eBw=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
98
123/openvpn/keys/imke.crt
Normal file
98
123/openvpn/keys/imke.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7 (0x7)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:40:21 2017 GMT
|
||||
Not After : Mar 31 19:40:21 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-imke/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:a8:e8:10:ee:4a:85:18:13:fe:a5:da:ff:1f:22:
|
||||
95:6f:f3:49:52:31:30:0d:0e:fd:c4:22:06:39:c7:
|
||||
36:d9:39:2f:61:f1:c7:e4:2e:fa:8e:45:e2:37:74:
|
||||
fb:74:07:4a:9f:14:02:f6:76:b4:bc:f2:23:0f:18:
|
||||
e2:37:d0:db:32:3f:a7:48:45:0f:87:f7:d1:43:fa:
|
||||
64:3b:9d:b0:05:b3:95:9a:77:53:43:05:61:26:54:
|
||||
4e:c9:9e:a5:f7:ff:3b:e2:da:45:3e:2c:ca:f0:d7:
|
||||
84:99:be:57:2a:d3:f1:ac:f1:4a:33:82:d8:ba:8a:
|
||||
49:35:e5:7c:cf:87:ad:ec:12:b2:15:34:8e:6b:ae:
|
||||
e9:2e:12:8e:3f:cf:5d:51:bc:30:fc:76:8d:ea:c7:
|
||||
a8:dd:25:8b:c0:b4:6f:f1:15:60:55:81:28:8f:80:
|
||||
eb:38:77:44:f8:0e:e4:53:ed:fb:18:32:cf:23:21:
|
||||
7f:ab:23:d6:5d:10:44:11:c3:c3:3e:6a:8d:38:cd:
|
||||
c2:a2:9c:de:34:54:3b:88:0d:a8:ab:7b:a5:b7:fc:
|
||||
9c:0e:8c:62:36:cc:71:1e:f0:1f:7e:f4:ab:81:03:
|
||||
27:ca:5d:0b:13:0a:06:1a:ca:a3:4d:72:7c:3a:f4:
|
||||
79:9b:3a:04:8b:6d:12:90:8d:ad:16:78:3a:8d:b4:
|
||||
b4:57
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
FB:3D:B0:64:04:E9:11:FC:C6:DC:25:61:27:3E:BE:35:30:38:FD:20
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:imke
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a7:0a:bf:f1:a9:64:1a:a6:a5:98:1d:de:3a:11:01:1d:1f:17:
|
||||
bf:e2:ae:d6:46:08:f0:6f:fe:63:32:5f:00:60:24:ad:a4:0e:
|
||||
04:8b:40:01:a7:cb:64:bb:48:a6:c0:21:d0:33:dd:89:c0:68:
|
||||
aa:b2:50:c9:73:2a:32:e3:ac:93:0c:d4:cd:73:92:21:5f:df:
|
||||
0c:a9:c4:d4:57:33:c4:b2:88:a9:c9:0f:73:06:98:d4:d9:ca:
|
||||
81:3d:17:45:8b:55:8f:5c:f1:f7:55:dd:42:0d:d2:bc:96:fa:
|
||||
5d:cd:7f:45:08:61:88:5f:22:9c:e5:26:62:c1:ef:f5:0a:51:
|
||||
a8:a1:83:e9:36:ea:7a:3f:7e:d4:c7:70:73:ca:c3:ec:44:ca:
|
||||
47:c9:f1:7e:fa:46:e4:e0:c2:9b:75:cc:02:cc:e8:e5:50:18:
|
||||
76:0c:88:28:4a:db:90:f5:60:f1:55:88:fa:e6:27:54:3f:b1:
|
||||
50:7c:30:8d:9e:9b:b0:0f:f2:e1:3e:d2:99:f7:b2:8b:25:04:
|
||||
0b:dc:76:4a:6f:29:8e:9a:e3:9c:17:c6:a9:a0:2d:b3:d8:2a:
|
||||
f5:d8:e1:b7:73:32:ef:b0:39:48:ca:f8:5a:c2:d0:69:0b:37:
|
||||
0f:50:ef:1f:53:0a:1c:6a:1f:7f:9c:a1:47:f3:9c:8f:10:27:
|
||||
52:bc:d9:5a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXDCCBESgAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQwMjFaFw0zNzAzMzExOTQw
|
||||
MjFaMIGzMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEbMBkGA1UEAxMSVlBOLTEyM0NvbWljcy1pbWtlMRYwFAYDVQQpEw1WUE4gMTIz
|
||||
Q29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCo6BDuSoUYE/6l2v8fIpVv80lSMTAN
|
||||
Dv3EIgY5xzbZOS9h8cfkLvqOReI3dPt0B0qfFAL2drS88iMPGOI30NsyP6dIRQ+H
|
||||
99FD+mQ7nbAFs5Wad1NDBWEmVE7JnqX3/zvi2kU+LMrw14SZvlcq0/Gs8Uozgti6
|
||||
ikk15XzPh63sErIVNI5rrukuEo4/z11RvDD8do3qx6jdJYvAtG/xFWBVgSiPgOs4
|
||||
d0T4DuRT7fsYMs8jIX+rI9ZdEEQRw8M+ao04zcKinN40VDuIDaire6W3/JwOjGI2
|
||||
zHEe8B9+9KuBAyfKXQsTCgYayqNNcnw69HmbOgSLbRKQja0WeDqNtLRXAgMBAAGj
|
||||
ggF5MIIBdTAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFPs9sGQE6RH8xtwlYSc+vjUwOP0g
|
||||
MIHmBgNVHSMEgd4wgduAFGByHupHLaqzcRgy4TAcdwix1CQRoYG3pIG0MIGxMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEZMBcGA1UE
|
||||
AxMQVlBOLTEyM0NvbWljcy1jYTEWMBQGA1UEKRMNVlBOIDEyM0NvbWljczEhMB8G
|
||||
CSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlggkA4KYz/4Mr9Y8wEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQIMAaCBGlta2UwDQYJ
|
||||
KoZIhvcNAQELBQADggEBAKcKv/GpZBqmpZgd3joRAR0fF7/irtZGCPBv/mMyXwBg
|
||||
JK2kDgSLQAGny2S7SKbAIdAz3YnAaKqyUMlzKjLjrJMM1M1zkiFf3wypxNRXM8Sy
|
||||
iKnJD3MGmNTZyoE9F0WLVY9c8fdV3UIN0ryW+l3Nf0UIYYhfIpzlJmLB7/UKUaih
|
||||
g+k26no/ftTHcHPKw+xEykfJ8X76RuTgwpt1zALM6OVQGHYMiChK25D1YPFViPrm
|
||||
J1Q/sVB8MI2em7AP8uE+0pn3soslBAvcdkpvKY6a45wXxqmgLbPYKvXY4bdzMu+w
|
||||
OUjK+FrC0GkLNw9Q7x9TChxqH3+coUfznI8QJ1K82Vo=
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/imke.csr
Normal file
18
123/openvpn/keys/imke.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+TCCAeECAQAwgbMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRswGQYDVQQDExJWUE4tMTIzQ29taWNzLWlta2UxFjAUBgNVBCkT
|
||||
DVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5k
|
||||
ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKjoEO5KhRgT/qXa/x8i
|
||||
lW/zSVIxMA0O/cQiBjnHNtk5L2Hxx+Qu+o5F4jd0+3QHSp8UAvZ2tLzyIw8Y4jfQ
|
||||
2zI/p0hFD4f30UP6ZDudsAWzlZp3U0MFYSZUTsmepff/O+LaRT4syvDXhJm+VyrT
|
||||
8azxSjOC2LqKSTXlfM+HrewSshU0jmuu6S4Sjj/PXVG8MPx2jerHqN0li8C0b/EV
|
||||
YFWBKI+A6zh3RPgO5FPt+xgyzyMhf6sj1l0QRBHDwz5qjTjNwqKc3jRUO4gNqKt7
|
||||
pbf8nA6MYjbMcR7wH370q4EDJ8pdCxMKBhrKo01yfDr0eZs6BIttEpCNrRZ4Oo20
|
||||
tFcCAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQBmA8hL1SJTtgroRER8GcUw/Cj8
|
||||
t02bzIK4Luk8qrq9bRq7chYveJ/iVJaLsEmuEeVSaeT0U0icC2P7aE1YiuVGG8F4
|
||||
bREHreTr9oiM/oGhMl6IYdAdrZ+mXGtDqhJWt4L7z/T+niifdF3zIW2CtDQXk8DU
|
||||
veMdkK0sgc5jKFLtwVdIzayHe66i/eI+M9MukZZsPulqDOBb8VKCNRbDe03CnWkr
|
||||
u17JNYT3rokXLL7I/vNPd3GMGf57CbAxYQiIy1xYd3pDpncCOO4DWxtW8s+mDX25
|
||||
YrgxWFAL40clQjap5bsgv6s2yWrOXkPF16Q2eMl8eXkE20dnQT/XAFQdXtiK
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/imke.key
Normal file
30
123/openvpn/keys/imke.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIFCaCOMCjiYsCAggA
|
||||
MBQGCCqGSIb3DQMHBAhLlMMTBOxONASCBMjfXIeGDEskJXziKjnBKcDNYL5C0tss
|
||||
uHyXI6XtBjk1SfnQUkbdTJpwLcc74/uU/fG0+Sjp6otGqU8Tf4+D+g1PXQOT2zNI
|
||||
B1h6Zm6I5+0jCRXv9v7MIo0CdnNQWMyogCcVwh5eK+1H+y83hP3zmZzWKQDbp3cp
|
||||
8TkNayRdcH7vMa3m5I2VS0bTs5aRCDa8gBwzBQzb7Vw+/brpD5OzZ9cBmrmawYFK
|
||||
v1Ah3AaUCEaa1PzAkgrK+Xtr49HGRokDEOUbi+5+Q82L4G7C5gJG7I9snGQUNDL2
|
||||
uEEX+REBQ/T0zX8pNz8+N18k8m/YwgzqEm3NIvui4PjddipRU03Zf0HWepVZECe9
|
||||
Jh7xJwEED4j397p3pUHU77A6X40g9FB5pMsLMyWm4KANUZlVHtnMU3KrmG0qBGfW
|
||||
q2PPjum5n2N14DLxQlx1WU9gXfAgcnA36z8rxZdyFKzSZLePKnPV2kMwqqb1sI/k
|
||||
Hro2cGQ4nSyBDsGCogIXzxS7i13x+0rMAa4U/UJ30OPFQN8kBAmYrnAyR957GGhz
|
||||
araleXoRY2ZkBHohISNDwPCzBT0AXNADlCNP4zsXINmFo30WmyhOtTdpk2DXeYfY
|
||||
fy6GFlUq+RX7+lFnA6LdTrJ895byXGjpI+dAToLLSL5T5AeHvh+kweaWU8cJ0Dp0
|
||||
5u8sUlzKvaVONL7crULB/5P7JBx1XTK1loOP8o789UPB2isAY3268ltZEkLcjS72
|
||||
Hx+rNhSj+G2iABK29QaifyvKQUeu0hd5aoYaSWTjfiYtJ4JpMgaIfLWGcLjZycuk
|
||||
DyLcobEXDHtlXjCIG3mea0+zZNwbwipAs4qVz2p7fIOQMQKQ0et5cY0ml0L+AQLO
|
||||
LrozREuUaNB6JzB5ZikTGWw+iIbGRGh08wGidhVd0TnZ3MjtTos65V1/vVcEbjp2
|
||||
SArbX3aZKN40Sp7G6QhaM5tLR7hxzwmiSJgb2qEJBU1H8kIgRS6mKI2WOfmNMBMt
|
||||
QQ8CyxiYQmuVLu4Hx0Vos0QXZsDeNAIQVITokPB+IbiinY7RugOgExtqvwnHclri
|
||||
98Dh9zGMONS88mP8cCCBbFuPibgrOg91V15tke/SsNMXxI8/nsG6f7SsI5kXHdws
|
||||
h7SEwN7vAR4VTC0WNBPbZYo42DpRPlXPSaFVDrmOBseeU8QoUPALGrlkaRteFqnW
|
||||
U8V1o0mjLt0vdjaGPcT9AR+TNpmxE9ZSF7vYKl2DssQ+GXf2mWryPJtfNVpNDD9s
|
||||
/igBsFRwNSiRDVpOhhZViHjzi1CZr+PHXr0v6RKXPRHJ5oA7fxHMtETaJTFuQQKQ
|
||||
f/Y6srD0rRTq3PtApZCPA7vJC2iYI3KxmMSF725wIqFYFiKoAc7bLQSZogZRYrvw
|
||||
1gDPzgZbYQz1Oeix5INdiL8Tb4dkdvuSeYUmTk9Eqvi5wOQ3i3mDwcuNpT9G491P
|
||||
B2St++lvcv/WpDiCEYQytXQS2iFEoecn6idY2zRn1akHaU8OIu0yml7rDg/uWFbH
|
||||
OD8mUPlFd2OlLRbDIK0eMkUMbMqvFrJinkURl9T6c/HTD8N+dtNosCH+s1WQfxSd
|
||||
hBCq/40Ql1JpIb0+hbBfU/hkXNvbppABzjZL9JpD60yXACMnvayJidWHizT/V7An
|
||||
jzk=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
9
123/openvpn/keys/index.txt
Normal file
9
123/openvpn/keys/index.txt
Normal file
@ -0,0 +1,9 @@
|
||||
V 370311021850Z 01 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-server/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370311022418Z 02 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-chris/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370327012252Z 03 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-gw-ckubu/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193842Z 04 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ellen/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193919Z 05 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-henny/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193947Z 06 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-kaya/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331194021Z 07 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-imke/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331194104Z 08 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-jonas/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331194144Z 09 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-julia/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
1
123/openvpn/keys/index.txt.attr
Normal file
1
123/openvpn/keys/index.txt.attr
Normal file
@ -0,0 +1 @@
|
||||
unique_subject = yes
|
1
123/openvpn/keys/index.txt.attr.old
Normal file
1
123/openvpn/keys/index.txt.attr.old
Normal file
@ -0,0 +1 @@
|
||||
unique_subject = yes
|
8
123/openvpn/keys/index.txt.old
Normal file
8
123/openvpn/keys/index.txt.old
Normal file
@ -0,0 +1,8 @@
|
||||
V 370311021850Z 01 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-server/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370311022418Z 02 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-chris/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370327012252Z 03 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-gw-ckubu/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193842Z 04 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ellen/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193919Z 05 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-henny/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331193947Z 06 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-kaya/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331194021Z 07 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-imke/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
V 370331194104Z 08 unknown /C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-jonas/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
98
123/openvpn/keys/jonas.crt
Normal file
98
123/openvpn/keys/jonas.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8 (0x8)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:41:04 2017 GMT
|
||||
Not After : Mar 31 19:41:04 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-jonas/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d5:bf:31:fd:f5:63:4a:66:e5:7a:36:e9:07:ab:
|
||||
db:50:b4:92:9c:9e:ad:28:4e:86:ac:b0:6d:c2:b9:
|
||||
e7:dd:fb:8d:01:21:82:33:ed:cf:dc:ee:2b:84:96:
|
||||
37:c7:fa:e7:12:42:af:b1:4d:70:37:9a:7b:de:27:
|
||||
6b:8f:dd:67:20:90:2c:29:ed:b0:fa:05:01:5c:9d:
|
||||
74:13:19:41:a7:da:7d:b5:f2:f4:3b:97:71:28:97:
|
||||
b0:62:eb:5a:93:75:70:6d:45:53:57:14:a2:c4:73:
|
||||
2f:3a:d6:f0:84:74:25:ae:50:db:6b:44:4b:e0:8f:
|
||||
70:87:49:49:be:b8:f8:58:df:89:ab:dd:66:6f:46:
|
||||
39:90:00:26:d4:fd:3d:94:31:bb:45:0b:60:54:9a:
|
||||
5c:53:2e:52:bd:6b:c3:1a:ec:7a:a3:d7:b6:20:52:
|
||||
3f:7c:25:e6:2d:e8:68:ca:fb:76:a0:fa:fb:65:71:
|
||||
77:46:44:ee:9f:fc:b6:7d:d3:28:11:ee:35:5e:08:
|
||||
ff:d5:6c:5e:a9:21:44:12:79:98:3b:3a:87:df:d7:
|
||||
df:a0:12:dd:58:fb:9a:be:b8:4d:b4:92:28:d8:22:
|
||||
24:ed:0c:e5:04:c0:b3:42:7e:c6:61:1b:4b:b6:9d:
|
||||
5f:31:de:34:3e:f7:5a:51:cc:70:83:11:3d:0d:01:
|
||||
56:bb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
4C:7D:CA:9A:DA:5B:60:31:54:FD:35:1D:60:7E:04:4C:0D:30:76:44
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:jonas
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
b0:7c:4a:7b:47:83:33:f3:76:c5:33:32:14:17:ed:3b:44:e2:
|
||||
d0:4c:f6:66:90:76:be:16:1c:62:95:25:f3:78:cb:6d:c1:ef:
|
||||
6c:ba:66:ed:10:16:07:26:83:89:78:49:58:fc:46:d8:c6:8e:
|
||||
26:c6:51:12:37:20:ca:30:c8:35:5a:68:69:70:95:a9:7f:20:
|
||||
3e:af:8d:73:c5:f2:1f:28:50:0d:48:18:cb:9f:46:45:16:b1:
|
||||
f2:ac:e7:1c:54:dd:af:c8:06:ec:bb:4c:dd:71:d0:e9:c8:54:
|
||||
8f:8c:12:e1:d7:1e:53:f9:42:61:98:0e:3a:b6:35:d8:e8:c7:
|
||||
2a:d6:e2:78:74:8e:f5:4e:1e:1b:98:aa:e3:84:fd:d4:d7:27:
|
||||
95:a5:fd:b5:db:f5:42:e1:9a:9a:2e:b7:f7:0d:e5:49:10:50:
|
||||
c4:01:e3:95:6e:53:b3:6b:7f:34:38:7c:49:1e:84:85:6a:8e:
|
||||
63:01:49:b9:b1:e5:71:09:31:0a:7c:2c:ce:ea:d7:33:4b:11:
|
||||
fa:e2:69:ed:30:96:a5:08:2b:fd:b9:1e:13:30:3f:bf:4d:7c:
|
||||
2a:56:8a:7a:ef:a1:76:2c:fa:12:5a:46:ed:bf:4c:90:54:24:
|
||||
7d:91:a7:b3:ef:2b:09:dc:f8:06:56:ac:e7:f5:52:43:80:5c:
|
||||
73:93:f4:01
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBCDANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQxMDRaFw0zNzAzMzExOTQx
|
||||
MDRaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1qb25hczEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1b8x/fVjSmblejbpB6vbULSSnJ6t
|
||||
KE6GrLBtwrnn3fuNASGCM+3P3O4rhJY3x/rnEkKvsU1wN5p73idrj91nIJAsKe2w
|
||||
+gUBXJ10ExlBp9p9tfL0O5dxKJewYutak3VwbUVTVxSixHMvOtbwhHQlrlDba0RL
|
||||
4I9wh0lJvrj4WN+Jq91mb0Y5kAAm1P09lDG7RQtgVJpcUy5SvWvDGux6o9e2IFI/
|
||||
fCXmLehoyvt2oPr7ZXF3RkTun/y2fdMoEe41Xgj/1WxeqSFEEnmYOzqH39ffoBLd
|
||||
WPuavrhNtJIo2CIk7QzlBMCzQn7GYRtLtp1fMd40PvdaUcxwgxE9DQFWuwIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRMfcqa2ltgMVT9NR1gfgRMDTB2
|
||||
RDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVqb25hczAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAsHxKe0eDM/N2xTMyFBftO0Ti0Ez2ZpB2vhYcYpUl
|
||||
83jLbcHvbLpm7RAWByaDiXhJWPxG2MaOJsZREjcgyjDINVpoaXCVqX8gPq+Nc8Xy
|
||||
HyhQDUgYy59GRRax8qznHFTdr8gG7LtM3XHQ6chUj4wS4dceU/lCYZgOOrY12OjH
|
||||
KtbieHSO9U4eG5iq44T91NcnlaX9tdv1QuGami639w3lSRBQxAHjlW5Ts2t/NDh8
|
||||
SR6EhWqOYwFJubHlcQkxCnwszurXM0sR+uJp7TCWpQgr/bkeEzA/v018KlaKeu+h
|
||||
diz6ElpG7b9MkFQkfZGns+8rCdz4Blas5/VSQ4Bcc5P0AQ==
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/jonas.csr
Normal file
18
123/openvpn/keys/jonas.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+jCCAeICAQAwgbQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRwwGgYDVQQDExNWUE4tMTIzQ29taWNzLWpvbmFzMRYwFAYDVQQp
|
||||
Ew1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4u
|
||||
ZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDVvzH99WNKZuV6NukH
|
||||
q9tQtJKcnq0oToassG3Cuefd+40BIYIz7c/c7iuEljfH+ucSQq+xTXA3mnveJ2uP
|
||||
3WcgkCwp7bD6BQFcnXQTGUGn2n218vQ7l3Eol7Bi61qTdXBtRVNXFKLEcy861vCE
|
||||
dCWuUNtrREvgj3CHSUm+uPhY34mr3WZvRjmQACbU/T2UMbtFC2BUmlxTLlK9a8Ma
|
||||
7Hqj17YgUj98JeYt6GjK+3ag+vtlcXdGRO6f/LZ90ygR7jVeCP/VbF6pIUQSeZg7
|
||||
Ooff19+gEt1Y+5q+uE20kijYIiTtDOUEwLNCfsZhG0u2nV8x3jQ+91pRzHCDET0N
|
||||
AVa7AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAkHF5JHvvdzX10B8ETEzngL5O
|
||||
uTQVTnN+xQo6Ub8/2ASEMS8PDDNYVo42iam3oYVIMDXdOVwXklQ9FIeX8IKkA2Rt
|
||||
vSBVEoKnkNL0Z7/Zy1+u6wndtqS8vIjtKncI0FczhVMDiK8Ad7LmTOSICBzCwhor
|
||||
PnTwxpz9qYb2nm39kD0OwtcasaWR9IyahSRv0bCk9aCgLadtcBtfEg/WLhmKBoDr
|
||||
+/a/pQQU7KFL5Tkkb9kEqqATjnTFFmE1FYn/GFc2lnSVNJKfEU55LRwVEdaNQ3XQ
|
||||
ZVWrNtjmgaisgI7ulxn9OWZ5SnRnldO5X62mCrzBLKaApv5WQ9smgrQSp5e0zg==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/jonas.key
Normal file
30
123/openvpn/keys/jonas.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIu5RbzGRy+DcCAggA
|
||||
MBQGCCqGSIb3DQMHBAi8C64C7zzAAgSCBMioHPaAWEaWjsDDqZ4St2lUHtBOGm89
|
||||
wfoqRtL9Hf/sLjNw0Hld4fOTTVW8Mo4uRw6VMUOtpfxh/sOSYBNvhkvD38YXWHnb
|
||||
rdptvyCP4ZoHXjwdvLpkV0iTV0UXbGSUgHPcFGMNDQ7rZvD8EN/Hw6Y6A8PqAAeV
|
||||
p2rBSY7YeWLofcWPTlXDvEJ00tzBZc8eTtyNYbNij7TTSTjYORt60O6Wr9I7adt4
|
||||
BbY1vtWbQJY5+JFiipzclWfiAkeWc8hPmn2EKAvl5aIx9wJLLn5Al81seC6KueTt
|
||||
ejLEXSRZFX0KbuxSKQ+ExkmWFkvqnYPr+MjtvHphgfCf7mSjvtb7NS/y8WD9Vb7t
|
||||
z57yIbMLTGO/nuynTwhuyQ/KnPgQOOvQHiG9HaCXqj85y3/5M6Z0/Jcg+uYMv9Z+
|
||||
bjlJ95v5OyWZpy40T1O9v8U61QiZ8pE7SkFO90bvRDxsLw15VlaiXtY+A0ux7+pp
|
||||
7qoXX00RKrinTKtRARYurRE8X8lus5YKC7W58v2d7JfJfPZiwWhg7qAW7Ef1dYOb
|
||||
SK2RWu/HnW0yEC10RrHhbE340h+ihgBir4Re7THO+QKaJLHTm75FC2a8+kQKMQ3y
|
||||
F1zqADdtw6E1ltMhbJcU0Aiolxn+tVsQvy/GsGlD5QQI+3Bwab7d8RDXsSIe6HUB
|
||||
Ggg6up6OKSPVLraYiCc1WLil5P5sgxKDiFtM5XT/HFRgL5tdnn1fkJAQbIU3ps12
|
||||
6aZkAVgEs+urBrdjMDCRBoUdkUEZtcE7CQ0v2imGKNtsy0KXqYrP4eTBwopBFi/H
|
||||
huN3jk+4pW5BqXkGqqfEzzAAi/cFsltOfxlXSF2YRu+rdPX80FJWbJPp0zxzxTmS
|
||||
FNCwbSdZHrwd83BpNry3hm1hqMVDYjLmhY4bk5ehtuhzBdRF5m6NvN3MUdv5QgWj
|
||||
VCzjZziov4P3vOfdJ5XHKWNpkJTCfIHHH4uGXyAcCUopyIs0XoSjDIttUu+JfgD4
|
||||
DaH3FOvJBSocftagp6Be1lYqpstRsIeeNPgW6vCzjCsPlQBUdBCMWyo87p37G8FX
|
||||
o6Uw9ZMBxTPqDRpsFs3PyPqpuEj41pFy7lH4U/DzcdYxtyB5GKvRLYAo40HJFEQx
|
||||
4jEOhvRwS/Mj/g7ETAr6ag2L0Cl1YMTFwKCgGzAy4zLV2kP3DKZ92L4eG+60ZEGh
|
||||
2K1TZ5Vb0g53Ug44uBfnxDpVdQzJT8L/noMUAYlubDgMXOiy1Xu8d8TGJr1pYApR
|
||||
5jNmBLUNBjlDh4Whg75xDtVM+yPsgmu7t+/E4ujpMQsl9KPsYZ20JX8FYso3NN+Z
|
||||
gKBlQfssipR8kqY6wLP4l9wNdNC4ZQGXvTyB1eZu6+feN1DzVJH3+7adgEOQLm6h
|
||||
BwteuuABrpQZIgT+2ROAuBykn6lEBf2Etxzd4HkQXemX43r9lgidq+3M3tMhKhuw
|
||||
i2T6/TjirsNZ5suXW8ePk4A2qDSFvCZaSfgEBypFMLbD5+YrwOWyqt7HU3gCEw0U
|
||||
ojlwI9awRXAjTl3h1Uk/G3Z4UIY02oxikxUztbhlcuYqZI4jrLdP637082Xdq82E
|
||||
lHTZyv9+0fjRetZNgie0dWIprFnjwyAOcrmNqNWopkMTiDx9wxOlXDp/gyyROtAM
|
||||
lBk=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
98
123/openvpn/keys/julia.crt
Normal file
98
123/openvpn/keys/julia.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 9 (0x9)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:41:44 2017 GMT
|
||||
Not After : Mar 31 19:41:44 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-julia/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c4:08:b1:f5:86:9b:8a:90:97:32:4e:a7:55:cc:
|
||||
65:85:5a:f5:10:2e:5b:ef:8d:61:60:66:3a:53:5d:
|
||||
fc:90:82:ec:0c:ba:b3:ab:7d:b8:56:9b:4c:6e:73:
|
||||
d6:72:61:bc:74:17:2f:a3:6b:f5:66:c6:72:b7:11:
|
||||
f5:bb:8c:47:5b:04:d8:4c:74:6e:22:d3:21:8a:32:
|
||||
41:9e:1d:8a:8b:e0:b4:ec:b8:15:40:26:08:3d:97:
|
||||
7c:a7:20:1e:ca:60:8d:0e:7e:58:cd:a6:0b:f7:c2:
|
||||
7b:7e:9f:c7:55:87:01:3d:ce:37:7c:32:b8:36:bd:
|
||||
1b:90:24:43:e1:c3:5c:5f:bd:f3:5c:32:0f:5d:7c:
|
||||
0f:87:ef:8d:03:0a:e9:23:eb:8d:7b:89:f2:4b:cc:
|
||||
83:d8:32:58:26:75:ff:81:74:83:d7:ea:2f:11:07:
|
||||
59:97:08:e1:38:e4:be:14:d1:2c:8b:1c:f5:b8:53:
|
||||
65:b7:25:8f:5f:e6:5d:f1:d8:76:ab:64:df:b3:e5:
|
||||
09:3b:84:f1:9c:34:f0:7e:bb:e7:e0:3c:da:0f:87:
|
||||
77:44:95:c2:e5:bd:29:3f:43:0b:d8:8d:d5:07:cf:
|
||||
26:54:b3:50:dc:64:1c:a7:67:3d:c1:3c:fa:9e:0f:
|
||||
db:3d:97:fa:28:7f:bb:6f:92:b6:e3:44:a2:47:1a:
|
||||
18:51
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
8D:D2:9E:D6:B2:D3:DA:D0:60:7D:69:D6:5C:EA:40:5A:E4:39:01:34
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:julia
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
10:0f:b3:1e:bd:29:70:ac:a3:20:8d:77:b2:5c:6d:bf:25:9f:
|
||||
07:b3:c2:0c:ec:41:8e:98:cc:3f:d2:0c:84:17:55:97:1b:e6:
|
||||
4e:76:c5:12:a3:7c:32:a3:81:e4:53:06:4e:c6:67:e4:ad:14:
|
||||
70:4e:1f:ca:e8:5f:dd:b1:d9:e4:ac:4c:b5:d2:51:25:89:27:
|
||||
48:05:a5:2f:c0:de:ed:7a:8b:84:59:73:19:ee:6d:6d:e0:be:
|
||||
5d:36:d4:ea:c3:40:0f:60:94:f3:e8:3d:5d:86:88:75:c1:38:
|
||||
f4:91:6e:4f:5c:ff:11:d8:56:d3:9f:89:58:89:c6:24:32:d3:
|
||||
ad:d2:5b:f1:cd:62:ed:95:12:d7:79:5c:ec:86:45:39:4d:97:
|
||||
02:9e:f5:06:d7:4f:12:2c:f7:b2:ce:59:6b:3d:3f:88:b6:e3:
|
||||
03:24:1e:cf:9c:6f:d6:3c:6f:6c:ed:5b:50:ef:0a:cf:96:f5:
|
||||
98:f8:a5:fa:ce:e3:2c:f8:8f:0f:84:0e:0b:27:c4:07:87:6f:
|
||||
e2:a5:ef:73:db:e5:c9:20:a1:81:e0:a3:16:ec:de:d0:47:a6:
|
||||
ac:ad:c3:a5:16:c2:7d:de:27:67:58:59:4b:20:c6:08:01:55:
|
||||
62:ce:14:f3:5a:5e:23:9b:c5:d6:ba:4c:e4:d6:40:12:09:b1:
|
||||
58:8f:b8:05
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXjCCBEagAwIBAgIBCTANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTQxNDRaFw0zNzAzMzExOTQx
|
||||
NDRaMIG0MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEcMBoGA1UEAxMTVlBOLTEyM0NvbWljcy1qdWxpYTEWMBQGA1UEKRMNVlBOIDEy
|
||||
M0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlMIIBIjAN
|
||||
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxAix9YabipCXMk6nVcxlhVr1EC5b
|
||||
741hYGY6U138kILsDLqzq324VptMbnPWcmG8dBcvo2v1ZsZytxH1u4xHWwTYTHRu
|
||||
ItMhijJBnh2Ki+C07LgVQCYIPZd8pyAeymCNDn5YzaYL98J7fp/HVYcBPc43fDK4
|
||||
Nr0bkCRD4cNcX73zXDIPXXwPh++NAwrpI+uNe4nyS8yD2DJYJnX/gXSD1+ovEQdZ
|
||||
lwjhOOS+FNEsixz1uFNltyWPX+Zd8dh2q2Tfs+UJO4TxnDTwfrvn4DzaD4d3RJXC
|
||||
5b0pP0ML2I3VB88mVLNQ3GQcp2c9wTz6ng/bPZf6KH+7b5K240SiRxoYUQIDAQAB
|
||||
o4IBejCCAXYwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu
|
||||
ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSN0p7WstPa0GB9adZc6kBa5DkB
|
||||
NDCB5gYDVR0jBIHeMIHbgBRgch7qRy2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTEL
|
||||
MAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8w
|
||||
DQYDVQQKEwZPLk9QRU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNV
|
||||
BAMTEFZQTi0xMjNDb21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAf
|
||||
BgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1Ud
|
||||
JQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREECTAHggVqdWxpYTAN
|
||||
BgkqhkiG9w0BAQsFAAOCAQEAEA+zHr0pcKyjII13slxtvyWfB7PCDOxBjpjMP9IM
|
||||
hBdVlxvmTnbFEqN8MqOB5FMGTsZn5K0UcE4fyuhf3bHZ5KxMtdJRJYknSAWlL8De
|
||||
7XqLhFlzGe5tbeC+XTbU6sNAD2CU8+g9XYaIdcE49JFuT1z/EdhW05+JWInGJDLT
|
||||
rdJb8c1i7ZUS13lc7IZFOU2XAp71BtdPEiz3ss5Zaz0/iLbjAyQez5xv1jxvbO1b
|
||||
UO8Kz5b1mPil+s7jLPiPD4QOCyfEB4dv4qXvc9vlySChgeCjFuze0EemrK3DpRbC
|
||||
fd4nZ1hZSyDGCAFVYs4U81peI5vF1rpM5NZAEgmxWI+4BQ==
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/julia.csr
Normal file
18
123/openvpn/keys/julia.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+jCCAeICAQAwgbQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRwwGgYDVQQDExNWUE4tMTIzQ29taWNzLWp1bGlhMRYwFAYDVQQp
|
||||
Ew1WUE4gMTIzQ29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4u
|
||||
ZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDECLH1hpuKkJcyTqdV
|
||||
zGWFWvUQLlvvjWFgZjpTXfyQguwMurOrfbhWm0xuc9ZyYbx0Fy+ja/VmxnK3EfW7
|
||||
jEdbBNhMdG4i0yGKMkGeHYqL4LTsuBVAJgg9l3ynIB7KYI0OfljNpgv3wnt+n8dV
|
||||
hwE9zjd8Mrg2vRuQJEPhw1xfvfNcMg9dfA+H740DCukj6417ifJLzIPYMlgmdf+B
|
||||
dIPX6i8RB1mXCOE45L4U0SyLHPW4U2W3JY9f5l3x2HarZN+z5Qk7hPGcNPB+u+fg
|
||||
PNoPh3dElcLlvSk/QwvYjdUHzyZUs1DcZBynZz3BPPqeD9s9l/oof7tvkrbjRKJH
|
||||
GhhRAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAGj/5sGbgVaTn0vf/MjMXKDVi
|
||||
Nv90OqQSe1bnpGPjzPwJ1GvsIFjV+nwtwxZhjIVB83Om/ZoM6z/9G+IGSaIyyqu2
|
||||
43v/BCUhGAgMLKfTWLuoQimzX7FUH78S+gZeM5TeK5PeIU+9QUgR+DJIalOpLQp8
|
||||
l7LW+/A/HxqjeFb98yfEyRErJd+NahJi8MC4dxKXHIfCPEPe2G/zL54c5DAmJdYH
|
||||
tDZgXRIEaG77V4UCQXhEgBNFEhKHFCs1N7wTtv92YPJ19hJmJpNpEzu6ABVJQHAi
|
||||
VAb9eM67gZycJvA7Wn89uNXBGDs+jSHqKTDSM3J7a1x1e1LY/D7m3djfrjjCiA==
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/julia.key
Normal file
30
123/openvpn/keys/julia.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIh1L9hbhN1U0CAggA
|
||||
MBQGCCqGSIb3DQMHBAjahUyThcGRIgSCBMgr5U/k0QU94nv8Ta0G5dMcoHY1Dm7J
|
||||
rYkovynP1CU36zf0HmgG7D616ZxWdvkSs+3onh3pvi9XHteLfqtdAIBBvG9n996C
|
||||
jVgMofTKATeLjZ69tU6re/U//4vqSRv4lEjGDQi9di/B0pacAmsInjfUjMcSY63f
|
||||
gz9qptBRc353LtY1X65N4eTpM8XmG94tcOaKIUYF7PX7TJAKBdSfj2Whxs3dMDF6
|
||||
djbPqGcaeT/rH0V7x01Y6B+1fCafNaRjerdNjTmMqxTOQAvfVcpo8sPOkAr6D9k2
|
||||
suz98XltDd4PCSENGVoU+7lR8uv9HfKQihAGaU1qvpDrA0UoybKt56mbcl4/COiI
|
||||
Y/8Hhcbcq2GzpMRwOGQ5HqS0cWetvWeCn0UncWOsNcHV64nRwJnmQc1OqIkxUXfP
|
||||
I919Hfnq0LpRN8pVb04fbY3nyQolqh9vZABqATs2cHbkjfvgpzzWQJ5+TudJhRZo
|
||||
BFNxvuv0sA8R/vHyxAgt179Q9vGWgvhOdTFhFxIZYRvGjo5rpRRiFgtF4TLpGCu3
|
||||
+6OJwgmphNipoV3GRE9LNjf2onTRvbyxTNUNw+P7UkXIZUlGuAc3Uxal0HQqlSkn
|
||||
zkPeyXaGCny8+iKCMRgJ/5UPVFe5s3Jx4Pv6p/WpTdcqSBSlx62yD2fdp9R/ohS2
|
||||
o4w9h/CV0GU7wT2xTbAvAU1vJdZKjS2tTteVS0/GDKtnlCpGGjTTRSd7FwEjImPH
|
||||
GvzZ2I8GjjpSd9bWDx1Nd+1QxfKDZDFgDzSdI1VH/qYO3ji5BeCBW/0OyQc4JrBF
|
||||
ER49/dFs0o2csSWPb/D0XGZxV7dmtIFrkzT4Wlh6Hzx2Q9PDqV5RjqmKrH7uxQXE
|
||||
Aa7hAS+qgyEdJMD05mApbXXjYrOAiRypIsaF/mRtBAjbgNhy0JpQL+1Y5HGF/vDv
|
||||
QAeQk+aa4Y0UAKLgJITsa++NmI1LC9xh3C8sFvM4u7+wacmxqwWTkj6TughIhtS5
|
||||
3nrvJK4csSJOgC4ZU8AkYzg1bScv9/h4o5OEO7AC7hqu56wKCeDwUnR5pw2VmX4h
|
||||
bLXBrwegYmi737/DXAFALmVByIIY/o2iUPeJJG64cl8Oauef1XF+bapaYaPLk/Nz
|
||||
Cc8lx1gSVxJdGmMAaC9FEslJw6JKvx6wcEcqV5uwJOX9t7VCD854EgJb8QI7DVUV
|
||||
0LUWt1OkyW4AU3n8dLSpYNCFIfOppjaBQOoIhYzKPO+w6VFR36CzEDkwgZdluYVO
|
||||
yS4Xtawgmv6+x7X+/q7uq2KcF38NkvLiDWVU18cikDBE8DJvIfcO6culTssYiyfA
|
||||
yhN3z56kZnUwnWAt281Q8Sin3SFaAqqbYCl/ZGO327i0Wa1NJk92GDEeXHCmreoZ
|
||||
lax435h56fcQo73xynZlPl7ytNB3T2pZ3UjEoPVzBhNDOrTQMEg7LLgSiM3sHI7q
|
||||
THURX7MYY9TfzY7WGgTBsA27BUjrPD5Sz/NvVOx/2c72PUlD30yIWa7xgVeotr3u
|
||||
PfNijqCR8siaWoEhx48zS/D4Vx5lIHc5hq1gtS4YvJmFYz5KcAbRYacJmpZt3hM4
|
||||
Cl53ZjCpkNGYT/oYjf+DFM4GWBXYsrIfIenvtZ8s2piPZguGnyIzl6LbY8Ioq9Su
|
||||
9w0=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
98
123/openvpn/keys/kaya.crt
Normal file
98
123/openvpn/keys/kaya.crt
Normal file
@ -0,0 +1,98 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6 (0x6)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 31 19:39:47 2017 GMT
|
||||
Not After : Mar 31 19:39:47 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-kaya/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b6:4c:3e:b1:90:01:7e:74:fe:03:c4:de:9c:5d:
|
||||
37:23:f6:93:fd:c0:08:bc:49:ea:df:4b:ff:39:22:
|
||||
1b:42:a6:fd:86:6c:52:2a:69:ae:9f:5a:d7:1c:e3:
|
||||
fa:c9:c1:15:e8:64:ee:01:90:28:ad:9b:42:8d:09:
|
||||
e7:42:ef:b3:db:0d:4f:52:05:bc:22:05:ac:e5:78:
|
||||
ce:64:9e:96:ed:dc:45:04:bb:99:b7:1b:f6:31:3e:
|
||||
3f:b7:04:cb:9d:8e:44:f0:9d:c5:9e:08:3d:fe:46:
|
||||
7a:fd:9d:56:8b:49:1d:b7:f1:b6:7c:e1:da:e8:4a:
|
||||
fe:ae:28:70:10:88:c2:04:cc:83:14:8e:65:da:6e:
|
||||
c3:1b:83:81:67:9f:df:d4:39:ce:48:71:37:7b:49:
|
||||
fa:3c:19:dd:75:33:bc:cc:82:75:af:6f:dd:06:eb:
|
||||
3a:cd:a0:d5:c3:10:e2:0b:58:3f:95:35:35:0e:ce:
|
||||
34:ed:03:13:a5:24:7a:24:8f:32:7c:c8:09:a9:6b:
|
||||
23:54:19:13:23:af:b0:54:e5:0f:27:9a:e6:33:dc:
|
||||
0f:2a:2c:d2:3e:60:ee:b3:8c:7d:c2:a5:43:d9:07:
|
||||
0a:84:76:10:8a:6f:f1:db:6e:22:1e:b9:71:aa:c4:
|
||||
52:e3:56:a1:26:6f:c6:17:0f:f2:4f:8d:88:e9:a0:
|
||||
3b:b5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E2:E0:31:7D:AC:4D:8F:1B:67:83:67:66:52:39:CA:43:4C:FF:99:B0
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:kaya
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
8f:ef:78:2e:54:f1:b4:a3:92:89:25:cc:85:b9:28:2d:aa:2e:
|
||||
28:9a:53:f1:09:99:95:34:6c:f3:58:d8:4c:6d:a1:cc:f5:93:
|
||||
07:53:8c:53:4b:0f:80:29:33:83:a2:f5:13:64:ae:23:d4:c8:
|
||||
6f:75:48:41:42:81:40:a8:b7:7f:70:fb:7f:97:55:5d:82:b8:
|
||||
1d:7e:96:50:5e:2d:a9:eb:66:cd:c0:89:5f:ca:ec:c2:bc:7f:
|
||||
33:db:e2:fa:28:54:00:6a:3e:72:2e:71:fe:d8:d2:d3:4d:fe:
|
||||
6e:1b:e2:71:e2:e5:cf:7d:aa:4e:92:9f:d4:b7:20:fe:2b:98:
|
||||
2f:a1:a2:f8:87:07:a1:a9:7b:5f:b9:d6:f9:b2:b5:23:17:98:
|
||||
99:c7:00:d0:29:cb:59:2e:9e:c6:b0:f3:54:a4:c7:3d:82:d1:
|
||||
aa:f8:f2:e1:23:cf:74:ed:25:f3:b8:24:c9:c6:0a:d9:41:6d:
|
||||
d6:a8:c1:a7:96:85:51:13:f3:cc:36:fa:5e:e1:32:aa:f6:e8:
|
||||
93:a2:43:ce:40:33:33:5e:6a:b4:65:c2:32:e3:0c:62:a6:f6:
|
||||
48:c5:0e:2e:02:cd:92:45:9e:dc:2f:a5:66:57:b4:ca:35:0f:
|
||||
5d:ed:10:42:d9:0d:7b:0b:0a:75:62:5f:12:ac:9b:29:bd:14:
|
||||
9e:e4:5a:9f
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFXDCCBESgAwIBAgIBBjANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMzExOTM5NDdaFw0zNzAzMzExOTM5
|
||||
NDdaMIGzMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEbMBkGA1UEAxMSVlBOLTEyM0NvbWljcy1rYXlhMRYwFAYDVQQpEw1WUE4gMTIz
|
||||
Q29taWNzMSEwHwYJKoZIhvcNAQkBFhJja3VidS1hZG1Ab29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC2TD6xkAF+dP4DxN6cXTcj9pP9wAi8
|
||||
SerfS/85IhtCpv2GbFIqaa6fWtcc4/rJwRXoZO4BkCitm0KNCedC77PbDU9SBbwi
|
||||
BazleM5knpbt3EUEu5m3G/YxPj+3BMudjkTwncWeCD3+Rnr9nVaLSR238bZ84dro
|
||||
Sv6uKHAQiMIEzIMUjmXabsMbg4Fnn9/UOc5IcTd7Sfo8Gd11M7zMgnWvb90G6zrN
|
||||
oNXDEOILWD+VNTUOzjTtAxOlJHokjzJ8yAmpayNUGRMjr7BU5Q8nmuYz3A8qLNI+
|
||||
YO6zjH3CpUPZBwqEdhCKb/HbbiIeuXGqxFLjVqEmb8YXD/JPjYjpoDu1AgMBAAGj
|
||||
ggF5MIIBdTAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOLgMX2sTY8bZ4NnZlI5ykNM/5mw
|
||||
MIHmBgNVHSMEgd4wgduAFGByHupHLaqzcRgy4TAcdwix1CQRoYG3pIG0MIGxMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEZMBcGA1UE
|
||||
AxMQVlBOLTEyM0NvbWljcy1jYTEWMBQGA1UEKRMNVlBOIDEyM0NvbWljczEhMB8G
|
||||
CSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVuLmRlggkA4KYz/4Mr9Y8wEwYDVR0l
|
||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQIMAaCBGtheWEwDQYJ
|
||||
KoZIhvcNAQELBQADggEBAI/veC5U8bSjkoklzIW5KC2qLiiaU/EJmZU0bPNY2Ext
|
||||
ocz1kwdTjFNLD4ApM4Oi9RNkriPUyG91SEFCgUCot39w+3+XVV2CuB1+llBeLanr
|
||||
Zs3AiV/K7MK8fzPb4vooVABqPnIucf7Y0tNN/m4b4nHi5c99qk6Sn9S3IP4rmC+h
|
||||
oviHB6Gpe1+51vmytSMXmJnHANApy1kunsaw81Skxz2C0ar48uEjz3TtJfO4JMnG
|
||||
CtlBbdaowaeWhVET88w2+l7hMqr26JOiQ85AMzNearRlwjLjDGKm9kjFDi4CzZJF
|
||||
ntwvpWZXtMo1D13tEELZDXsLCnViXxKsmym9FJ7kWp8=
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/kaya.csr
Normal file
18
123/openvpn/keys/kaya.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+TCCAeECAQAwgbMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMRswGQYDVQQDExJWUE4tMTIzQ29taWNzLWtheWExFjAUBgNVBCkT
|
||||
DVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5k
|
||||
ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALZMPrGQAX50/gPE3pxd
|
||||
NyP2k/3ACLxJ6t9L/zkiG0Km/YZsUipprp9a1xzj+snBFehk7gGQKK2bQo0J50Lv
|
||||
s9sNT1IFvCIFrOV4zmSelu3cRQS7mbcb9jE+P7cEy52ORPCdxZ4IPf5Gev2dVotJ
|
||||
Hbfxtnzh2uhK/q4ocBCIwgTMgxSOZdpuwxuDgWef39Q5zkhxN3tJ+jwZ3XUzvMyC
|
||||
da9v3QbrOs2g1cMQ4gtYP5U1NQ7ONO0DE6UkeiSPMnzICalrI1QZEyOvsFTlDyea
|
||||
5jPcDyos0j5g7rOMfcKlQ9kHCoR2EIpv8dtuIh65carEUuNWoSZvxhcP8k+NiOmg
|
||||
O7UCAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQCx5tFgFP2Tey7DNs+J5rCZg8LI
|
||||
HMmptqZJ4oX2TEJcJtjyfZcJXQ/m/cKnLBkTi86LsNArgWnnALAq7Ax8O1Q/4AVZ
|
||||
5wxe7i8H/EB07wJiz+EQi0yIezztAzYuWeWqYRFlVG3OQiTlpYJoLdHj7hgYZMf3
|
||||
kOK20TfrtD0hiB5IIkw4IKEmYmeDM1mKklaagFONHkCm+qRnqNFqrAQTDL0+oFsg
|
||||
11gKAvYh500n7p3aUuRJKTNBWtl2t8bvB1Gdg5Gn5o+0rJ+vblb6Ws0slcH7YZEY
|
||||
Xsa54GgQ/+ZkBsc8eC+3kEZ9/Y+77hCSWwC0iY9CdK+zBgaMwe1bthOJr2MX
|
||||
-----END CERTIFICATE REQUEST-----
|
30
123/openvpn/keys/kaya.key
Normal file
30
123/openvpn/keys/kaya.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIlBrWBsuF9nMCAggA
|
||||
MBQGCCqGSIb3DQMHBAhcdEybYkVf6gSCBMg9O9QPAMrh8k/+IW53q4NspUyg3kR8
|
||||
PKbrLaGd3LB8WdOV0cKxiJ+u+BhNpX0v2lIedOVq2yaUJkWwE5jCwc6XpBDkvD/l
|
||||
N4XzoNNvG6v+ExK+pkXmxvTluEmjTAZG3CUIdcj3n+CGsKBJZO+APgz0BYi2pskk
|
||||
Oi/cX2Rm67lKt/dT/bA7W9nrB4K0YbYARsFFuDu/5ggdEEcalc75WZMxd5Bxt811
|
||||
xOLQSrpDcYFIBB/9pMG+kZhUIRFnqmeKNUpQZKhR5d2CWN20q9HRT5UDkaGowoTe
|
||||
xk0uA8JjVarFM8VRX6JqmGSPLVOoxtPB+47/QWv2XQtYXMJm3UNmC8gD0cKvr0up
|
||||
9G/3Or0QU7FE/W/O06/5uPKRsrTfouNUhkEAlyE3gMMvIVmnOSeEuifKR1QGX7Bt
|
||||
2foqnnHZtjadRP0TeM17JvDKNZSEU+S/YNBpFoORxVvzklZYICPX7GVUKxfwrCfi
|
||||
P3ecVoVeM6DwdAyhuUVFRsQ9XeU2U5f+BD56QsCNcKqd8jqGCYPvT3oKFXazFsx4
|
||||
KRrT6X8xgKrTwbI5Tfff7S3Vy3FbGVhHs9XzCQlHGsETc6dq54kIcoKhQxAE35Sl
|
||||
xxa9RHkvHVqoUwaTJDhldIbDsIgWErO/gcRSHzxpJofoFDoEngXc4oKRHNLkWB3M
|
||||
JgXLnIEO3C9rVzTi9x3Di382/FJLQWAMWv8u6pB7KQ6VDYJM6oP2d4Pccm0a60z9
|
||||
q1ZhrAFiGFrAnpKSAhmYWBznu9pFn7h08N3fZLt43CzS05q2akoktkNMDz9w6eFb
|
||||
XfpHoBLjZNx5hc3e04T5flEFAIYsW/VQpceyCS7xIPCLFwm/wb3Mv9Tfp62ortJl
|
||||
BXjzFEcwuvMMlZrcJnsPlcnPnKJWYgzxKrrtCWfFg+0z3zKUN5hYhxmrFFShIork
|
||||
rNzxf922RTE75umJHeLwEQAN1+hw4smke9ooJGz7oFRwSVYhvUUigvHTrNouNVWz
|
||||
P7vS+xAzOqdrZvROV++PdzsCwZOF/3QXd0muR65HoX1PC9zBun/TSbk5gyF17aZ+
|
||||
wOoMM2XOmrUyDi+A6+DnjN7w/VfNiohFR2WxnPG3dsPsHkf7FNG9Osv0PUqpB/oj
|
||||
6gymendOB5rP3LfiD6jXnCHFA40cH+ATYEhqzKF3ICb3Wb5xy2aWDH79lvMB+BAI
|
||||
YJJeVlt5oc8lqJEOyz+KsreCrmRgTlbVUVkPyQMcmliFfPG3W7nFTiI+2cflunGL
|
||||
zQNJrx7xQ8LUt71Ea6KRuhaqJKhUz/vGUg+aL1O+42yms2QvurfpDd5zL7XIlASO
|
||||
13SfptI9ffCxe/eLDkNd2vFy0E7yTAAVPw9bD88buZ3io2SQsfNqxVlygkb6GTHE
|
||||
tJ6j6idudeLj6doO9AKQfXwIYkU3qegRN7JKDN2yRCMxwVXeqiCnIJ+cUPisvMPf
|
||||
bhXXcQGz7coFbviGDBc8lttzY0Ig1mq6rp1he9+63A+VSAgqNfHlhmJFVzPj2sr4
|
||||
JVTDXw17yBV8mXNevLayfVA1LtLWle/UQtMUjxWN+YIFkYFO30nn2EHP603Llm/3
|
||||
VJw1A8niIJnG0dQe8vQFXjh2Pa1SQIZ6SJc1n735n9coHpJid8622odCjT1Wdf2d
|
||||
GNI=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
1
123/openvpn/keys/serial
Normal file
1
123/openvpn/keys/serial
Normal file
@ -0,0 +1 @@
|
||||
0A
|
1
123/openvpn/keys/serial.old
Normal file
1
123/openvpn/keys/serial.old
Normal file
@ -0,0 +1 @@
|
||||
09
|
101
123/openvpn/keys/server.crt
Normal file
101
123/openvpn/keys/server.crt
Normal file
@ -0,0 +1,101 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 11 02:18:50 2017 GMT
|
||||
Not After : Mar 11 02:18:50 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=O.OPEN, OU=Network Services, CN=VPN-123Comics-server/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:dc:9a:13:40:1a:60:e4:03:90:5a:6c:6e:19:9a:
|
||||
2d:03:7d:a2:58:70:0b:d1:ac:1c:79:2e:e4:62:2c:
|
||||
89:62:94:36:0c:8f:81:91:7c:65:ee:52:97:0f:c6:
|
||||
53:a8:4f:a8:65:a5:15:6d:03:95:92:46:d1:b2:62:
|
||||
a7:39:eb:f3:cd:b5:65:c8:7c:3d:0c:e9:16:25:f1:
|
||||
61:f5:76:8f:0c:a8:f7:c0:76:83:11:45:59:d5:f7:
|
||||
d4:c5:c3:33:66:1d:33:90:66:8f:65:d2:20:f7:8a:
|
||||
b1:a3:73:58:79:a6:ec:a9:b0:a3:71:90:49:61:d3:
|
||||
c2:be:72:19:92:38:ac:35:28:99:f6:5b:57:bb:28:
|
||||
5c:9a:4c:15:05:24:b8:2d:c3:11:82:25:75:a3:59:
|
||||
81:33:04:03:b7:f6:86:3b:27:48:0c:b9:11:0d:a3:
|
||||
cb:43:13:bc:60:65:e8:eb:42:2d:e9:c6:2d:6f:ce:
|
||||
49:59:ae:24:4f:06:29:21:d9:43:5e:8d:15:91:24:
|
||||
d1:0c:7d:a4:93:93:5e:56:f7:f9:39:b6:2c:ae:c2:
|
||||
80:7d:1c:6e:13:83:d5:26:b0:db:f4:fd:20:75:f9:
|
||||
d4:3a:c8:b6:00:8a:96:f8:3b:82:b0:f0:4f:98:49:
|
||||
3e:1d:49:d6:15:a9:3c:9b:b8:5f:c8:14:85:27:54:
|
||||
e5:57
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Cert Type:
|
||||
SSL Server
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Server Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
44:47:4F:F6:97:8F:87:FB:A3:02:61:45:7F:69:1F:2E:CA:32:37:63
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:60:72:1E:EA:47:2D:AA:B3:71:18:32:E1:30:1C:77:08:B1:D4:24:11
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=O.OPEN/OU=Network Services/CN=VPN-123Comics-ca/name=VPN 123Comics/emailAddress=ckubu-adm@oopen.de
|
||||
serial:E0:A6:33:FF:83:2B:F5:8F
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:server
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
9b:9a:81:35:cb:4f:32:b4:c0:aa:09:b7:e8:9b:ca:d4:7e:c5:
|
||||
e8:4a:21:6b:41:a0:34:e4:a6:bf:07:20:42:6c:e5:a8:50:6b:
|
||||
67:c4:1e:9d:2a:76:e3:ea:7d:68:67:12:ab:54:64:83:dd:7a:
|
||||
d1:13:95:76:5e:57:38:6b:59:4c:47:14:63:a4:4d:25:41:e4:
|
||||
e2:79:35:36:fd:98:c4:47:80:b4:d4:31:7a:db:d1:88:3d:5d:
|
||||
25:20:0b:c4:40:0a:dd:b5:48:21:92:86:18:85:22:f3:6a:80:
|
||||
ad:a1:71:d7:8a:69:a9:78:b1:dd:90:b8:eb:ec:90:0b:68:e1:
|
||||
40:2c:99:02:2b:31:18:2b:e0:d4:22:d1:1e:f3:77:98:9f:bb:
|
||||
68:00:f4:6e:51:45:1b:a8:ad:ee:03:fb:62:1d:fb:57:c6:7d:
|
||||
fe:91:3c:c1:6e:f9:34:0c:cb:a0:ce:7f:9b:ed:41:b6:65:c1:
|
||||
5c:e9:83:de:98:00:bb:7f:4c:b3:7d:bf:f4:e3:0a:6b:e5:ad:
|
||||
71:ae:8b:b9:98:d6:a2:8d:ed:5c:b8:87:fb:35:f5:90:11:9e:
|
||||
89:90:f9:b1:ee:6f:e3:a8:d4:42:6b:c4:43:04:13:24:a2:5c:
|
||||
33:8a:43:f1:95:bf:ab:7a:db:4b:6a:fe:49:f0:de:ef:39:86:
|
||||
90:25:19:54
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFejCCBGKgAwIBAgIBATANBgkqhkiG9w0BAQsFADCBsTELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9Q
|
||||
RU4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjND
|
||||
b21pY3MtY2ExFjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEW
|
||||
EmNrdWJ1LWFkbUBvb3Blbi5kZTAeFw0xNzAzMTEwMjE4NTBaFw0zNzAzMTEwMjE4
|
||||
NTBaMIG1MQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC
|
||||
ZXJsaW4xDzANBgNVBAoTBk8uT1BFTjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl
|
||||
czEdMBsGA1UEAxMUVlBOLTEyM0NvbWljcy1zZXJ2ZXIxFjAUBgNVBCkTDVZQTiAx
|
||||
MjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFkbUBvb3Blbi5kZTCCASIw
|
||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANyaE0AaYOQDkFpsbhmaLQN9olhw
|
||||
C9GsHHku5GIsiWKUNgyPgZF8Ze5Slw/GU6hPqGWlFW0DlZJG0bJipznr8821Zch8
|
||||
PQzpFiXxYfV2jwyo98B2gxFFWdX31MXDM2YdM5Bmj2XSIPeKsaNzWHmm7Kmwo3GQ
|
||||
SWHTwr5yGZI4rDUomfZbV7soXJpMFQUkuC3DEYIldaNZgTMEA7f2hjsnSAy5EQ2j
|
||||
y0MTvGBl6OtCLenGLW/OSVmuJE8GKSHZQ16NFZEk0Qx9pJOTXlb3+Tm2LK7CgH0c
|
||||
bhOD1Saw2/T9IHX51DrItgCKlvg7grDwT5hJPh1J1hWpPJu4X8gUhSdU5VcCAwEA
|
||||
AaOCAZUwggGRMAkGA1UdEwQCMAAwEQYJYIZIAYb4QgEBBAQDAgZAMDQGCWCGSAGG
|
||||
+EIBDQQnFiVFYXN5LVJTQSBHZW5lcmF0ZWQgU2VydmVyIENlcnRpZmljYXRlMB0G
|
||||
A1UdDgQWBBRER0/2l4+H+6MCYUV/aR8uyjI3YzCB5gYDVR0jBIHeMIHbgBRgch7q
|
||||
Ry2qs3EYMuEwHHcIsdQkEaGBt6SBtDCBsTELMAkGA1UEBhMCREUxDzANBgNVBAgT
|
||||
BkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZPLk9QRU4xGTAXBgNV
|
||||
BAsTEE5ldHdvcmsgU2VydmljZXMxGTAXBgNVBAMTEFZQTi0xMjNDb21pY3MtY2Ex
|
||||
FjAUBgNVBCkTDVZQTiAxMjNDb21pY3MxITAfBgkqhkiG9w0BCQEWEmNrdWJ1LWFk
|
||||
bUBvb3Blbi5kZYIJAOCmM/+DK/WPMBMGA1UdJQQMMAoGCCsGAQUFBwMBMAsGA1Ud
|
||||
DwQEAwIFoDARBgNVHREECjAIggZzZXJ2ZXIwDQYJKoZIhvcNAQELBQADggEBAJua
|
||||
gTXLTzK0wKoJt+ibytR+xehKIWtBoDTkpr8HIEJs5ahQa2fEHp0qduPqfWhnEqtU
|
||||
ZIPdetETlXZeVzhrWUxHFGOkTSVB5OJ5NTb9mMRHgLTUMXrb0Yg9XSUgC8RACt21
|
||||
SCGShhiFIvNqgK2hcdeKaal4sd2QuOvskAto4UAsmQIrMRgr4NQi0R7zd5ifu2gA
|
||||
9G5RRRuore4D+2Id+1fGff6RPMFu+TQMy6DOf5vtQbZlwVzpg96YALt/TLN9v/Tj
|
||||
CmvlrXGui7mY1qKN7Vy4h/s19ZARnomQ+bHub+Oo1EJrxEMEEySiXDOKQ/GVv6t6
|
||||
20tq/knw3u85hpAlGVQ=
|
||||
-----END CERTIFICATE-----
|
18
123/openvpn/keys/server.csr
Normal file
18
123/openvpn/keys/server.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC+zCCAeMCAQAwgbUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGTy5PUEVOMRkwFwYDVQQLExBOZXR3b3Jr
|
||||
IFNlcnZpY2VzMR0wGwYDVQQDExRWUE4tMTIzQ29taWNzLXNlcnZlcjEWMBQGA1UE
|
||||
KRMNVlBOIDEyM0NvbWljczEhMB8GCSqGSIb3DQEJARYSY2t1YnUtYWRtQG9vcGVu
|
||||
LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3JoTQBpg5AOQWmxu
|
||||
GZotA32iWHAL0awceS7kYiyJYpQ2DI+BkXxl7lKXD8ZTqE+oZaUVbQOVkkbRsmKn
|
||||
OevzzbVlyHw9DOkWJfFh9XaPDKj3wHaDEUVZ1ffUxcMzZh0zkGaPZdIg94qxo3NY
|
||||
eabsqbCjcZBJYdPCvnIZkjisNSiZ9ltXuyhcmkwVBSS4LcMRgiV1o1mBMwQDt/aG
|
||||
OydIDLkRDaPLQxO8YGXo60It6cYtb85JWa4kTwYpIdlDXo0VkSTRDH2kk5NeVvf5
|
||||
ObYsrsKAfRxuE4PVJrDb9P0gdfnUOsi2AIqW+DuCsPBPmEk+HUnWFak8m7hfyBSF
|
||||
J1TlVwIDAQABoAAwDQYJKoZIhvcNAQELBQADggEBAGvR7iwOtDyLU80L/CXRBWLX
|
||||
sTa4sNTLHe/mCs8nGSTjNGrP++rNgBnkaSeRQorw8bXZJ1/xNtIUaEEZTvNYry+z
|
||||
nKU25wdsxwge2Cz5bYYLKaZxTAdVEJgY8uYRZCd76SajfFZKGwBQBiv9tBTbFlw8
|
||||
d7QJqIZHWHgOW+6uRiWCdQ3pGSLFjPSxpDbw09SDsHPC8TaZHRmaN835JjytXODX
|
||||
mRWRe2pWXTFwn55+5+iiJS9D33NJKnY2UpdSCwg96CwEd+3juvCnhgbpAllJku2k
|
||||
PoeFl4e6pI4mZF3tOkK94Guchuf+fzWwkGimxulQSt5N/PT+lv6MucYjir2akHI=
|
||||
-----END CERTIFICATE REQUEST-----
|
28
123/openvpn/keys/server.key
Normal file
28
123/openvpn/keys/server.key
Normal file
@ -0,0 +1,28 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDcmhNAGmDkA5Ba
|
||||
bG4Zmi0DfaJYcAvRrBx5LuRiLIlilDYMj4GRfGXuUpcPxlOoT6hlpRVtA5WSRtGy
|
||||
Yqc56/PNtWXIfD0M6RYl8WH1do8MqPfAdoMRRVnV99TFwzNmHTOQZo9l0iD3irGj
|
||||
c1h5puypsKNxkElh08K+chmSOKw1KJn2W1e7KFyaTBUFJLgtwxGCJXWjWYEzBAO3
|
||||
9oY7J0gMuRENo8tDE7xgZejrQi3pxi1vzklZriRPBikh2UNejRWRJNEMfaSTk15W
|
||||
9/k5tiyuwoB9HG4Tg9UmsNv0/SB1+dQ6yLYAipb4O4Kw8E+YST4dSdYVqTybuF/I
|
||||
FIUnVOVXAgMBAAECggEAbrFtWWwjFCbpp0XjVTt0vNysur22YIaBXxl1hgGdCnce
|
||||
S90ygcMvDpAotsSos7sM37wfbS0wP08D6APyr3DDTIRqR1h39eN7tpxRsC7Ghu6+
|
||||
KrgM+nyXIHOUM4vIXcPnXNzptYjj+/J/QmodiiWFeXxl9xUUjV8JyDBOvn1rg9wm
|
||||
Lp3Ukspx0zBmGg3kdO7nU59iD3QSn5I9xJ0BwMxGvH3gvV4d8qy7RDhpAFoZ81SK
|
||||
gp1sUVIZE9aP0yJaABCub1Ul7vbtSIhT/MkPDjG1b+Ibe1rKO4Gd2xTTZD5SVgFE
|
||||
Zv8XNOky48nD0HgroXl15qKDOjaUSYkK+uiv4SWH0QKBgQDvBFBsNQ8uVggLL4vh
|
||||
p5DGoNBAs08CpoU809daTBDT7ID6wuJwSga/E2fnHXgYxuRNUzy5ql1g8ytBSyyE
|
||||
cxJmIHxbUn74BzJRf32x0P0zhkmX8lYSVeG/uDHICR22MIjARzCcqEKAogQpV6a2
|
||||
35A/A+Z314TRyXdagsfCUoi/TwKBgQDsRsttLldcMwNcXz8Hl7GUA26eWAUvP7FA
|
||||
E6QvnhxpnEtyIlCbZpOEc41oSJegpn6XLursI1HlhsBquaTty8xH20/OOt8m3aeJ
|
||||
X2vs2P7SDQjmMf7200iYgUqJALbwHHNXEbeUKgORXcke5j7IZ9i9VU/Eb0fjZc98
|
||||
BNpV2L+3eQKBgF3rPA7I6qYyeAatMDIDPghOuIYz7yADfudf9ocszI/5ptTiL0gg
|
||||
TnZWkcVm9wIFZUBdLMdoAjlOU/jcKSoCbYBj03mu+OVNLqCHkESG8neElPZ36wpZ
|
||||
ZNOI9Ua9DkfA2ntzfc6Q71DMWQZFwuSpBG0+gxkkPrSQja2rJgNdmw5RAoGAXXrw
|
||||
9yRzidXhCYXhgRaCOoZVGK7IdlYjwa9DsVdD9IDS1LhA3grqaGfzVYQLAZN92EDG
|
||||
z2B2AXKb5F3IpBCSpQde/sAKE+10YIRxRcbgoqhnkfPL5UnYmgXlQGkY98y50YP/
|
||||
9s3clYHelawQwOddOCNtqNFCRvS771xYKcjUqTkCgYEAw4IHPbNI6LuUUaMaoWqi
|
||||
jFC8nL/odvhrsbjeKA1pKTNmhwEJsSFhydhm3urCL2x2wH6ybFNFtGZqz0T9Rb1k
|
||||
iyJo542QMIy7OeY+agdp6Q9yB5V7bcXuOXInKqGqs/GGZXgdGpmOfE9k0RIhl8+G
|
||||
+W9rQ41MPu7kY0ZebBUgeAk=
|
||||
-----END PRIVATE KEY-----
|
21
123/openvpn/keys/ta.key
Normal file
21
123/openvpn/keys/ta.key
Normal file
@ -0,0 +1,21 @@
|
||||
#
|
||||
# 2048 bit OpenVPN static key
|
||||
#
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
92f8950e3eeb9728413080949bac24e9
|
||||
d84bc4e08de921cb7c64250dbbe03d9c
|
||||
27040263bc8d4c035bb5f5d7b6445cd7
|
||||
ac017ce7ab6830264b1246289401cfc4
|
||||
84e6173530cc4e602cfac0d736e7633e
|
||||
54314d44704842dab40b638bd9860bec
|
||||
a770067ee4aa7d35ed085359f0ac6370
|
||||
ec85b7a1eddd369eca7b9aad36651484
|
||||
1836322e2d1dd5dc1b405f042f19c9b4
|
||||
9857030d1d37880f26a17c9e7eb9cb50
|
||||
97e7927acdd974d34f1eb57b3d4c1dad
|
||||
ad3bb0380b80b673508022c3895bb6d2
|
||||
9b9f1b3b4b3ecb9155523799708032bd
|
||||
c3172244a5f639bc8dd1d94c1197e0b1
|
||||
94f69490aee75ba48ae63b442119918a
|
||||
707bfc5c40ae6ebfe6fe3f93f311a924
|
||||
-----END OpenVPN Static key V1-----
|
317
123/openvpn/server-gw-ckubu.conf
Normal file
317
123/openvpn/server-gw-ckubu.conf
Normal file
@ -0,0 +1,317 @@
|
||||
#################################################
|
||||
# Sample OpenVPN 2.0 config file for #
|
||||
# multi-client server. #
|
||||
# #
|
||||
# This file is for the server side #
|
||||
# of a many-clients <-> one-server #
|
||||
# OpenVPN configuration. #
|
||||
# #
|
||||
# OpenVPN also supports #
|
||||
# single-machine <-> single-machine #
|
||||
# configurations (See the Examples page #
|
||||
# on the web site for more info). #
|
||||
# #
|
||||
# This config should work on Windows #
|
||||
# or Linux/BSD systems. Remember on #
|
||||
# Windows to quote pathnames and use #
|
||||
# double backslashes, e.g.: #
|
||||
# "C:\Program Files\OpenVPN\config\foo.key" #
|
||||
# #
|
||||
# Comments are preceded with '#' or ';' #
|
||||
#################################################
|
||||
|
||||
# Which local IP address should OpenVPN
|
||||
# listen on? (optional)
|
||||
;local a.b.c.d
|
||||
|
||||
# Which TCP/UDP port should OpenVPN listen on?
|
||||
# If you want to run multiple OpenVPN instances
|
||||
# on the same machine, use a different port
|
||||
# number for each one. You will need to
|
||||
# open up this port on your firewall.
|
||||
port 1195
|
||||
|
||||
# TCP or UDP server?
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
|
||||
topology subnet
|
||||
route 192.168.63.0 255.255.255.0 10.1.142.1
|
||||
route 192.168.64.0 255.255.255.0 10.1.142.1
|
||||
|
||||
# "dev tun" will create a routed IP tunnel,
|
||||
# "dev tap" will create an ethernet tunnel.
|
||||
# Use "dev tap" if you are ethernet bridging.
|
||||
# If you want to control access policies
|
||||
# over the VPN, you must create firewall
|
||||
# rules for the the TUN/TAP interface.
|
||||
# On non-Windows systems, you can give
|
||||
# an explicit unit number, such as tun0.
|
||||
# On Windows, use "dev-node" for this.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel if you
|
||||
# have more than one. On XP SP2 or higher,
|
||||
# you may need to selectively disable the
|
||||
# Windows firewall for the TAP adapter.
|
||||
# Non-Windows systems usually don't need this.
|
||||
;dev-node MyTap
|
||||
|
||||
# SSL/TLS root certificate (ca), certificate
|
||||
# (cert), and private key (key). Each client
|
||||
# and the server must have their own cert and
|
||||
# key file. The server and all clients will
|
||||
# use the same ca file.
|
||||
#
|
||||
# See the "easy-rsa" directory for a series
|
||||
# of scripts for generating RSA certificates
|
||||
# and private keys. Remember to use
|
||||
# a unique Common Name for the server
|
||||
# and each of the client certificates.
|
||||
#
|
||||
# Any X509 key management system can be used.
|
||||
# OpenVPN can also use a PKCS #12 formatted key file
|
||||
# (see "pkcs12" directive in man page).
|
||||
ca keys/ca.crt
|
||||
cert keys/server.crt
|
||||
key keys/server.key # This file should be kept secret
|
||||
|
||||
# Diffie hellman parameters.
|
||||
# Generate your own with:
|
||||
# openssl dhparam -out dh1024.pem 1024
|
||||
# Substitute 2048 for 1024 if you are using
|
||||
# 2048 bit keys.
|
||||
dh keys/dh2048.pem
|
||||
|
||||
# Configure server mode and supply a VPN subnet
|
||||
# for OpenVPN to draw client addresses from.
|
||||
# The server will take 10.8.0.1 for itself,
|
||||
# the rest will be made available to clients.
|
||||
# Each client will be able to reach the server
|
||||
# on 10.8.0.1. Comment this line out if you are
|
||||
# ethernet bridging. See the man page for more info.
|
||||
server 10.1.142.0 255.255.255.0
|
||||
|
||||
# Maintain a record of client <-> virtual IP address
|
||||
# associations in this file. If OpenVPN goes down or
|
||||
# is restarted, reconnecting clients can be assigned
|
||||
# the same virtual IP address from the pool that was
|
||||
# previously assigned.
|
||||
ifconfig-pool-persist /etc/openvpn/ipp.txt
|
||||
|
||||
# Configure server mode for ethernet bridging.
|
||||
# You must first use your OS's bridging capability
|
||||
# to bridge the TAP interface with the ethernet
|
||||
# NIC interface. Then you must manually set the
|
||||
# IP/netmask on the bridge interface, here we
|
||||
# assume 10.8.0.4/255.255.255.0. Finally we
|
||||
# must set aside an IP range in this subnet
|
||||
# (start=10.8.0.50 end=10.8.0.100) to allocate
|
||||
# to connecting clients. Leave this line commented
|
||||
# out unless you are ethernet bridging.
|
||||
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
|
||||
|
||||
# Push routes to the client to allow it
|
||||
# to reach other private subnets behind
|
||||
# the server. Remember that these
|
||||
# private subnets will also need
|
||||
# to know to route the OpenVPN client
|
||||
# address pool (10.8.0.0/255.255.255.0)
|
||||
# back to the OpenVPN server.
|
||||
;push "route 10.8.0.0 255.255.255.0"
|
||||
push "route 192.168.142.0 255.255.255.0"
|
||||
|
||||
# To assign specific IP addresses to specific
|
||||
# clients or if a connecting client has a private
|
||||
# subnet behind it that should also have VPN access,
|
||||
# use the subdirectory "ccd" for client-specific
|
||||
# configuration files (see man page for more info).
|
||||
|
||||
client-config-dir /etc/openvpn/ccd/server-gw-ckubu
|
||||
|
||||
# ---
|
||||
# EXAMPLE: Suppose the client
|
||||
# having the certificate common name "Thelonious"
|
||||
# also has a small subnet behind his connecting
|
||||
# machine, such as 192.168.40.128/255.255.255.248.
|
||||
# First, uncomment out these lines:
|
||||
;client-config-dir /etc/openvpn/ccd
|
||||
;route 192.168.40.128 255.255.255.248
|
||||
|
||||
# Then create a file ccd/Thelonious with this line:
|
||||
# iroute 192.168.40.128 255.255.255.248
|
||||
# This will allow Thelonious' private subnet to
|
||||
# access the VPN. This example will only work
|
||||
# if you are routing, not bridging, i.e. you are
|
||||
# using "dev tun" and "server" directives.
|
||||
# ---
|
||||
|
||||
# ---
|
||||
# EXAMPLE: Suppose you want to give
|
||||
# Thelonious a fixed VPN IP address of 10.9.0.1.
|
||||
# First uncomment out these lines:
|
||||
;client-config-dir ccd
|
||||
;route 10.9.0.0 255.255.255.252
|
||||
|
||||
# Then add this line to ccd/Thelonious:
|
||||
# ifconfig-push 10.9.0.1 10.9.0.2
|
||||
# ---
|
||||
|
||||
# ---
|
||||
# Suppose that you want to enable different
|
||||
# firewall access policies for different groups
|
||||
# of clients. There are two methods:
|
||||
# (1) Run multiple OpenVPN daemons, one for each
|
||||
# group, and firewall the TUN/TAP interface
|
||||
# for each group/daemon appropriately.
|
||||
# (2) (Advanced) Create a script to dynamically
|
||||
# modify the firewall in response to access
|
||||
# from different clients. See man
|
||||
# page for more info on learn-address script.
|
||||
;learn-address ./script
|
||||
# ---
|
||||
|
||||
# If enabled, this directive will configure
|
||||
# all clients to redirect their default
|
||||
# network gateway through the VPN, causing
|
||||
# all IP traffic such as web browsing and
|
||||
# and DNS lookups to go through the VPN
|
||||
# (The OpenVPN server machine may need to NAT
|
||||
# the TUN/TAP interface to the internet in
|
||||
# order for this to work properly).
|
||||
# CAVEAT: May break client's network config if
|
||||
# client's local DHCP server packets get routed
|
||||
# through the tunnel. Solution: make sure
|
||||
# client's local DHCP server is reachable via
|
||||
# a more specific route than the default route
|
||||
# of 0.0.0.0/0.0.0.0.
|
||||
;push "redirect-gateway"
|
||||
|
||||
# Certain Windows-specific network settings
|
||||
# can be pushed to clients, such as DNS
|
||||
# or WINS server addresses. CAVEAT:
|
||||
# http://openvpn.net/faq.html#dhcpcaveats
|
||||
;push "dhcp-option WINS 10.8.0.1"
|
||||
|
||||
# - Do NOT push DNS settings in THIS configuration. We use
|
||||
# - this VPN tunnel as a static line, and the remote host
|
||||
# - should user his own dns settings.
|
||||
# -
|
||||
;push "dhcp-option DNS 192.168.142.1"
|
||||
;push "dhcp-option DOMAIN 123.netz"
|
||||
|
||||
# Uncomment this directive to allow different
|
||||
# clients to be able to "see" each other.
|
||||
# By default, clients will only see the server.
|
||||
# To force clients to only see the server, you
|
||||
# will also need to appropriately firewall the
|
||||
# server's TUN/TAP interface.
|
||||
client-to-client
|
||||
|
||||
# Uncomment this directive if multiple clients
|
||||
# might connect with the same certificate/key
|
||||
# files or common names. This is recommended
|
||||
# only for testing purposes. For production use,
|
||||
# each client should have its own certificate/key
|
||||
# pair.
|
||||
#
|
||||
# IF YOU HAVE NOT GENERATED INDIVIDUAL
|
||||
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
|
||||
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
|
||||
# UNCOMMENT THIS LINE OUT.
|
||||
;duplicate-cn
|
||||
|
||||
# The keepalive directive causes ping-like
|
||||
# messages to be sent back and forth over
|
||||
# the link so that each side knows when
|
||||
# the other side has gone down.
|
||||
# Ping every 10 seconds, assume that remote
|
||||
# peer is down if no ping received during
|
||||
# a 120 second time period.
|
||||
keepalive 10 120
|
||||
|
||||
# For extra security beyond that provided
|
||||
# by SSL/TLS, create an "HMAC firewall"
|
||||
# to help block DoS attacks and UDP port flooding.
|
||||
#
|
||||
# Generate with:
|
||||
# openvpn --genkey --secret ta.key
|
||||
#
|
||||
# The server and each client must have
|
||||
# a copy of this key.
|
||||
# The second parameter should be '0'
|
||||
# on the server and '1' on the clients.
|
||||
;tls-auth ta.key 0 # This file is secret
|
||||
tls-auth keys/ta.key 0
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# This config item must be copied to
|
||||
# the client config file as well.
|
||||
;cipher BF-CBC # Blowfish (default)
|
||||
;cipher AES-128-CBC # AES
|
||||
;cipher DES-EDE3-CBC # Triple-DES
|
||||
cipher AES-256-CBC
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# If you enable it here, you must also
|
||||
# enable it in the client config file.
|
||||
comp-lzo
|
||||
|
||||
# The maximum number of concurrently connected
|
||||
# clients we want to allow.
|
||||
;max-clients 100
|
||||
|
||||
# It's a good idea to reduce the OpenVPN
|
||||
# daemon's privileges after initialization.
|
||||
#
|
||||
# You can uncomment this out on
|
||||
# non-Windows systems.
|
||||
user nobody
|
||||
group nogroup
|
||||
|
||||
# The persist options will try to avoid
|
||||
# accessing certain resources on restart
|
||||
# that may no longer be accessible because
|
||||
# of the privilege downgrade.
|
||||
persist-key
|
||||
persist-tun
|
||||
persist-local-ip
|
||||
persist-remote-ip
|
||||
|
||||
# Output a short status file showing
|
||||
# current connections, truncated
|
||||
# and rewritten every minute.
|
||||
status /var/log/openvpn/status-server-gw-ckubu.log
|
||||
|
||||
# By default, log messages will go to the syslog (or
|
||||
# on Windows, if running as a service, they will go to
|
||||
# the "\Program Files\OpenVPN\log" directory).
|
||||
# Use log or log-append to override this default.
|
||||
# "log" will truncate the log file on OpenVPN startup,
|
||||
# while "log-append" will append to it. Use one
|
||||
# or the other (but not both).
|
||||
log /var/log/openvpn/server-gw-ckubu.log
|
||||
;log-append openvpn.log
|
||||
|
||||
# Set the appropriate level of log
|
||||
# file verbosity.
|
||||
#
|
||||
# 0 is silent, except for fatal errors
|
||||
# 4 is reasonable for general usage
|
||||
# 5 and 6 can help to debug connection problems
|
||||
# 9 is extremely verbose
|
||||
verb 4
|
||||
|
||||
# Silence repeating messages. At most 20
|
||||
# sequential messages of the same message
|
||||
# category will be output to the log.
|
||||
;mute 20
|
||||
|
||||
crl-verify /etc/openvpn/keys/crl.pem
|
||||
|
312
123/openvpn/server-home.conf
Normal file
312
123/openvpn/server-home.conf
Normal file
@ -0,0 +1,312 @@
|
||||
#################################################
|
||||
# Sample OpenVPN 2.0 config file for #
|
||||
# multi-client server. #
|
||||
# #
|
||||
# This file is for the server side #
|
||||
# of a many-clients <-> one-server #
|
||||
# OpenVPN configuration. #
|
||||
# #
|
||||
# OpenVPN also supports #
|
||||
# single-machine <-> single-machine #
|
||||
# configurations (See the Examples page #
|
||||
# on the web site for more info). #
|
||||
# #
|
||||
# This config should work on Windows #
|
||||
# or Linux/BSD systems. Remember on #
|
||||
# Windows to quote pathnames and use #
|
||||
# double backslashes, e.g.: #
|
||||
# "C:\Program Files\OpenVPN\config\foo.key" #
|
||||
# #
|
||||
# Comments are preceded with '#' or ';' #
|
||||
#################################################
|
||||
|
||||
# Which local IP address should OpenVPN
|
||||
# listen on? (optional)
|
||||
;local a.b.c.d
|
||||
|
||||
# Which TCP/UDP port should OpenVPN listen on?
|
||||
# If you want to run multiple OpenVPN instances
|
||||
# on the same machine, use a different port
|
||||
# number for each one. You will need to
|
||||
# open up this port on your firewall.
|
||||
port 1194
|
||||
|
||||
# TCP or UDP server?
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
|
||||
topology subnet
|
||||
#route 192.168.63.0 255.255.255.0 10.1.72.1
|
||||
#route 192.168.64.0 255.255.255.0 10.1.72.1
|
||||
|
||||
# "dev tun" will create a routed IP tunnel,
|
||||
# "dev tap" will create an ethernet tunnel.
|
||||
# Use "dev tap" if you are ethernet bridging.
|
||||
# If you want to control access policies
|
||||
# over the VPN, you must create firewall
|
||||
# rules for the the TUN/TAP interface.
|
||||
# On non-Windows systems, you can give
|
||||
# an explicit unit number, such as tun0.
|
||||
# On Windows, use "dev-node" for this.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel if you
|
||||
# have more than one. On XP SP2 or higher,
|
||||
# you may need to selectively disable the
|
||||
# Windows firewall for the TAP adapter.
|
||||
# Non-Windows systems usually don't need this.
|
||||
;dev-node MyTap
|
||||
|
||||
# SSL/TLS root certificate (ca), certificate
|
||||
# (cert), and private key (key). Each client
|
||||
# and the server must have their own cert and
|
||||
# key file. The server and all clients will
|
||||
# use the same ca file.
|
||||
#
|
||||
# See the "easy-rsa" directory for a series
|
||||
# of scripts for generating RSA certificates
|
||||
# and private keys. Remember to use
|
||||
# a unique Common Name for the server
|
||||
# and each of the client certificates.
|
||||
#
|
||||
# Any X509 key management system can be used.
|
||||
# OpenVPN can also use a PKCS #12 formatted key file
|
||||
# (see "pkcs12" directive in man page).
|
||||
ca keys/ca.crt
|
||||
cert keys/server.crt
|
||||
key keys/server.key # This file should be kept secret
|
||||
|
||||
# Diffie hellman parameters.
|
||||
# Generate your own with:
|
||||
# openssl dhparam -out dh1024.pem 1024
|
||||
# Substitute 2048 for 1024 if you are using
|
||||
# 2048 bit keys.
|
||||
dh keys/dh2048.pem
|
||||
|
||||
# Configure server mode and supply a VPN subnet
|
||||
# for OpenVPN to draw client addresses from.
|
||||
# The server will take 10.8.0.1 for itself,
|
||||
# the rest will be made available to clients.
|
||||
# Each client will be able to reach the server
|
||||
# on 10.8.0.1. Comment this line out if you are
|
||||
# ethernet bridging. See the man page for more info.
|
||||
server 10.0.142.0 255.255.255.0
|
||||
|
||||
# Maintain a record of client <-> virtual IP address
|
||||
# associations in this file. If OpenVPN goes down or
|
||||
# is restarted, reconnecting clients can be assigned
|
||||
# the same virtual IP address from the pool that was
|
||||
# previously assigned.
|
||||
ifconfig-pool-persist /etc/openvpn/ipp.txt
|
||||
|
||||
# Configure server mode for ethernet bridging.
|
||||
# You must first use your OS's bridging capability
|
||||
# to bridge the TAP interface with the ethernet
|
||||
# NIC interface. Then you must manually set the
|
||||
# IP/netmask on the bridge interface, here we
|
||||
# assume 10.8.0.4/255.255.255.0. Finally we
|
||||
# must set aside an IP range in this subnet
|
||||
# (start=10.8.0.50 end=10.8.0.100) to allocate
|
||||
# to connecting clients. Leave this line commented
|
||||
# out unless you are ethernet bridging.
|
||||
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
|
||||
|
||||
# Push routes to the client to allow it
|
||||
# to reach other private subnets behind
|
||||
# the server. Remember that these
|
||||
# private subnets will also need
|
||||
# to know to route the OpenVPN client
|
||||
# address pool (10.8.0.0/255.255.255.0)
|
||||
# back to the OpenVPN server.
|
||||
;push "route 10.8.0.0 255.255.255.0"
|
||||
push "route 192.168.142.0 255.255.255.0"
|
||||
|
||||
# To assign specific IP addresses to specific
|
||||
# clients or if a connecting client has a private
|
||||
# subnet behind it that should also have VPN access,
|
||||
# use the subdirectory "ccd" for client-specific
|
||||
# configuration files (see man page for more info).
|
||||
|
||||
client-config-dir /etc/openvpn/ccd/server-home
|
||||
|
||||
# ---
|
||||
# EXAMPLE: Suppose the client
|
||||
# having the certificate common name "Thelonious"
|
||||
# also has a small subnet behind his connecting
|
||||
# machine, such as 192.168.40.128/255.255.255.248.
|
||||
# First, uncomment out these lines:
|
||||
;client-config-dir /etc/openvpn/ccd
|
||||
;route 192.168.40.128 255.255.255.248
|
||||
|
||||
# Then create a file ccd/Thelonious with this line:
|
||||
# iroute 192.168.40.128 255.255.255.248
|
||||
# This will allow Thelonious' private subnet to
|
||||
# access the VPN. This example will only work
|
||||
# if you are routing, not bridging, i.e. you are
|
||||
# using "dev tun" and "server" directives.
|
||||
# ---
|
||||
|
||||
# ---
|
||||
# EXAMPLE: Suppose you want to give
|
||||
# Thelonious a fixed VPN IP address of 10.9.0.1.
|
||||
# First uncomment out these lines:
|
||||
;client-config-dir ccd
|
||||
;route 10.9.0.0 255.255.255.252
|
||||
|
||||
# Then add this line to ccd/Thelonious:
|
||||
# ifconfig-push 10.9.0.1 10.9.0.2
|
||||
# ---
|
||||
|
||||
# ---
|
||||
# Suppose that you want to enable different
|
||||
# firewall access policies for different groups
|
||||
# of clients. There are two methods:
|
||||
# (1) Run multiple OpenVPN daemons, one for each
|
||||
# group, and firewall the TUN/TAP interface
|
||||
# for each group/daemon appropriately.
|
||||
# (2) (Advanced) Create a script to dynamically
|
||||
# modify the firewall in response to access
|
||||
# from different clients. See man
|
||||
# page for more info on learn-address script.
|
||||
;learn-address ./script
|
||||
# ---
|
||||
|
||||
# If enabled, this directive will configure
|
||||
# all clients to redirect their default
|
||||
# network gateway through the VPN, causing
|
||||
# all IP traffic such as web browsing and
|
||||
# and DNS lookups to go through the VPN
|
||||
# (The OpenVPN server machine may need to NAT
|
||||
# the TUN/TAP interface to the internet in
|
||||
# order for this to work properly).
|
||||
# CAVEAT: May break client's network config if
|
||||
# client's local DHCP server packets get routed
|
||||
# through the tunnel. Solution: make sure
|
||||
# client's local DHCP server is reachable via
|
||||
# a more specific route than the default route
|
||||
# of 0.0.0.0/0.0.0.0.
|
||||
;push "redirect-gateway"
|
||||
|
||||
# Certain Windows-specific network settings
|
||||
# can be pushed to clients, such as DNS
|
||||
# or WINS server addresses. CAVEAT:
|
||||
# http://openvpn.net/faq.html#dhcpcaveats
|
||||
;push "dhcp-option WINS 10.8.0.1"
|
||||
push "dhcp-option DNS 192.168.142.1"
|
||||
push "dhcp-option DOMAIN 123.netz"
|
||||
|
||||
# Uncomment this directive to allow different
|
||||
# clients to be able to "see" each other.
|
||||
# By default, clients will only see the server.
|
||||
# To force clients to only see the server, you
|
||||
# will also need to appropriately firewall the
|
||||
# server's TUN/TAP interface.
|
||||
client-to-client
|
||||
|
||||
# Uncomment this directive if multiple clients
|
||||
# might connect with the same certificate/key
|
||||
# files or common names. This is recommended
|
||||
# only for testing purposes. For production use,
|
||||
# each client should have its own certificate/key
|
||||
# pair.
|
||||
#
|
||||
# IF YOU HAVE NOT GENERATED INDIVIDUAL
|
||||
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
|
||||
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
|
||||
# UNCOMMENT THIS LINE OUT.
|
||||
;duplicate-cn
|
||||
|
||||
# The keepalive directive causes ping-like
|
||||
# messages to be sent back and forth over
|
||||
# the link so that each side knows when
|
||||
# the other side has gone down.
|
||||
# Ping every 10 seconds, assume that remote
|
||||
# peer is down if no ping received during
|
||||
# a 120 second time period.
|
||||
keepalive 10 120
|
||||
|
||||
# For extra security beyond that provided
|
||||
# by SSL/TLS, create an "HMAC firewall"
|
||||
# to help block DoS attacks and UDP port flooding.
|
||||
#
|
||||
# Generate with:
|
||||
# openvpn --genkey --secret ta.key
|
||||
#
|
||||
# The server and each client must have
|
||||
# a copy of this key.
|
||||
# The second parameter should be '0'
|
||||
# on the server and '1' on the clients.
|
||||
;tls-auth ta.key 0 # This file is secret
|
||||
tls-auth keys/ta.key 0
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# This config item must be copied to
|
||||
# the client config file as well.
|
||||
;cipher BF-CBC # Blowfish (default)
|
||||
;cipher AES-128-CBC # AES
|
||||
;cipher DES-EDE3-CBC # Triple-DES
|
||||
cipher AES-256-CBC
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# If you enable it here, you must also
|
||||
# enable it in the client config file.
|
||||
comp-lzo
|
||||
|
||||
# The maximum number of concurrently connected
|
||||
# clients we want to allow.
|
||||
;max-clients 100
|
||||
|
||||
# It's a good idea to reduce the OpenVPN
|
||||
# daemon's privileges after initialization.
|
||||
#
|
||||
# You can uncomment this out on
|
||||
# non-Windows systems.
|
||||
user nobody
|
||||
group nogroup
|
||||
|
||||
# The persist options will try to avoid
|
||||
# accessing certain resources on restart
|
||||
# that may no longer be accessible because
|
||||
# of the privilege downgrade.
|
||||
persist-key
|
||||
persist-tun
|
||||
persist-local-ip
|
||||
persist-remote-ip
|
||||
|
||||
# Output a short status file showing
|
||||
# current connections, truncated
|
||||
# and rewritten every minute.
|
||||
status /var/log/openvpn/status-server-home.log
|
||||
|
||||
# By default, log messages will go to the syslog (or
|
||||
# on Windows, if running as a service, they will go to
|
||||
# the "\Program Files\OpenVPN\log" directory).
|
||||
# Use log or log-append to override this default.
|
||||
# "log" will truncate the log file on OpenVPN startup,
|
||||
# while "log-append" will append to it. Use one
|
||||
# or the other (but not both).
|
||||
log /var/log/openvpn/server-home.log
|
||||
;log-append openvpn.log
|
||||
|
||||
# Set the appropriate level of log
|
||||
# file verbosity.
|
||||
#
|
||||
# 0 is silent, except for fatal errors
|
||||
# 4 is reasonable for general usage
|
||||
# 5 and 6 can help to debug connection problems
|
||||
# 9 is extremely verbose
|
||||
verb 4
|
||||
|
||||
# Silence repeating messages. At most 20
|
||||
# sequential messages of the same message
|
||||
# category will be output to the log.
|
||||
;mute 20
|
||||
|
||||
crl-verify /etc/openvpn/keys/crl.pem
|
||||
|
58
123/openvpn/update-resolv-conf
Executable file
58
123/openvpn/update-resolv-conf
Executable file
@ -0,0 +1,58 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# Parses DHCP options from openvpn to update resolv.conf
|
||||
# To use set as 'up' and 'down' script in your openvpn *.conf:
|
||||
# up /etc/openvpn/update-resolv-conf
|
||||
# down /etc/openvpn/update-resolv-conf
|
||||
#
|
||||
# Used snippets of resolvconf script by Thomas Hood and Chris Hanson.
|
||||
# Licensed under the GNU GPL. See /usr/share/common-licenses/GPL.
|
||||
#
|
||||
# Example envs set from openvpn:
|
||||
#
|
||||
# foreign_option_1='dhcp-option DNS 193.43.27.132'
|
||||
# foreign_option_2='dhcp-option DNS 193.43.27.133'
|
||||
# foreign_option_3='dhcp-option DOMAIN be.bnc.ch'
|
||||
#
|
||||
|
||||
[ -x /sbin/resolvconf ] || exit 0
|
||||
[ "$script_type" ] || exit 0
|
||||
[ "$dev" ] || exit 0
|
||||
|
||||
split_into_parts()
|
||||
{
|
||||
part1="$1"
|
||||
part2="$2"
|
||||
part3="$3"
|
||||
}
|
||||
|
||||
case "$script_type" in
|
||||
up)
|
||||
NMSRVRS=""
|
||||
SRCHS=""
|
||||
for optionvarname in ${!foreign_option_*} ; do
|
||||
option="${!optionvarname}"
|
||||
echo "$option"
|
||||
split_into_parts $option
|
||||
if [ "$part1" = "dhcp-option" ] ; then
|
||||
if [ "$part2" = "DNS" ] ; then
|
||||
NMSRVRS="${NMSRVRS:+$NMSRVRS }$part3"
|
||||
elif [ "$part2" = "DOMAIN" ] ; then
|
||||
SRCHS="${SRCHS:+$SRCHS }$part3"
|
||||
fi
|
||||
fi
|
||||
done
|
||||
R=""
|
||||
[ "$SRCHS" ] && R="search $SRCHS
|
||||
"
|
||||
for NS in $NMSRVRS ; do
|
||||
R="${R}nameserver $NS
|
||||
"
|
||||
done
|
||||
echo -n "$R" | /sbin/resolvconf -a "${dev}.openvpn"
|
||||
;;
|
||||
down)
|
||||
/sbin/resolvconf -d "${dev}.openvpn"
|
||||
;;
|
||||
esac
|
||||
|
Reference in New Issue
Block a user