Initial commit
This commit is contained in:
		| @@ -0,0 +1,3 @@ | ||||
| ifconfig-push 10.1.82.2 255.255.255.0 | ||||
| iroute 192.168.63.0 255.255.255.0 | ||||
| iroute 192.168.64.0 255.255.255.0 | ||||
							
								
								
									
										18
									
								
								AKB/openvpn/gw-ckubu/crl.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								AKB/openvpn/gw-ckubu/crl.pem
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,18 @@ | ||||
| -----BEGIN X509 CRL----- | ||||
| MIIC5zCB0DANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUxDzANBgNVBAgT | ||||
| BkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNV | ||||
| BAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0IxEDAOBgNVBCkT | ||||
| B1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlFw0xODAyMDUy | ||||
| MDQ1MDNaGA8yMDUwMDIwNTIwNDUwM1owDQYJKoZIhvcNAQELBQADggIBAEHFf5Wz | ||||
| 7q/gyccEWkUQrTlBuDnLUN8U/yDo/esulxKw2u+hE9x/57UIzk6X8HeCdlorP0WW | ||||
| YXCHfm0KrSZHeoUDMQF/NdspB8+wKHKcIuAvv3Ji09rvGADGUBCtBDp+hzpbFRvv | ||||
| UwrNId3atCyMttFNU6ZkjjfnMxTJeYB0H/KXbGfOrisXKHq7cesjo4H/JFu61m+4 | ||||
| nig9yjLD7zfSIFPql1G0a8pssN3NPtAfyfpkDaqHE/LU1EAVUH2RQowEZAm/Mrqz | ||||
| MyKbxoo0mzC+ymeP5YzdMJBdDK0bcCjSN54jhDhoZH36+D88UVgWGWHwogOXOah7 | ||||
| R5Xc8L9LDd1vbggErxbfBFxMoP4Rk8wg2Ou4s1jWCJkzDQuCKCaG7npmbA4rRkfv | ||||
| jHJEKWPN0v2awNLPcr/xxx3Y09mYew2TEnBSoolUzPDe03xU3jmVqsiM9jfwdz+W | ||||
| NX8WA+IzIUrZGfr7k8uPYRak1LNOq1Xkxr3NMbOgJXth/2pvSoT3HFBy4+aLfNxi | ||||
| fj2Aplr6QNXSr9/L0XtZdU9qz7aox66feaG3q/OtXUtT8249WXJ9JHnz0vnQdWzU | ||||
| GRA9fH+fR0lP+MajiFy+Y7HNgzJPTHk6gOySjTRdaCyP0NTn0G5q/XTmpSq9E2wt | ||||
| bcvE+k05ahe4l04R7OIm9zSC8hHqlWHdJYEo | ||||
| -----END X509 CRL----- | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-ca
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-ca
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-ca | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-dh
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-dh
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-dh | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-inter
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-inter
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-inter | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-key | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-pass
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-pass
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-key-pass | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-pkcs12
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-pkcs12
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-key-pkcs12 | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-server
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-key-server
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-key-server | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-req
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-req
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-req | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-req-pass
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/build-req-pass
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/build-req-pass | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/clean-all
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/clean-all
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/clean-all | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/inherit-inter
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/inherit-inter
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/inherit-inter | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/list-crl
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/list-crl
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/list-crl | ||||
							
								
								
									
										268
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-0.9.6.cnf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										268
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-0.9.6.cnf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,268 @@ | ||||
| # For use with easy-rsa version 2.0 | ||||
|  | ||||
| # | ||||
| # OpenSSL example configuration file. | ||||
| # This is mostly being used for generation of certificate requests. | ||||
| # | ||||
|  | ||||
| # This definition stops the following lines choking if HOME isn't | ||||
| # defined. | ||||
| HOME			= . | ||||
| RANDFILE		= $ENV::HOME/.rnd | ||||
|  | ||||
| # Extra OBJECT IDENTIFIER info: | ||||
| #oid_file		= $ENV::HOME/.oid | ||||
| oid_section		= new_oids | ||||
|  | ||||
| # To use this configuration file with the "-extfile" option of the | ||||
| # "openssl x509" utility, name here the section containing the | ||||
| # X.509v3 extensions to use: | ||||
| # extensions		=  | ||||
| # (Alternatively, use a configuration file that has only | ||||
| # X.509v3 extensions in its main [= default] section.) | ||||
|  | ||||
| [ new_oids ] | ||||
|  | ||||
| # We can add new OIDs in here for use by 'ca' and 'req'. | ||||
| # Add a simple OID like this: | ||||
| # testoid1=1.2.3.4 | ||||
| # Or use config file substitution like this: | ||||
| # testoid2=${testoid1}.5.6 | ||||
|  | ||||
| #################################################################### | ||||
| [ ca ] | ||||
| default_ca	= CA_default		# The default ca section | ||||
|  | ||||
| #################################################################### | ||||
| [ CA_default ] | ||||
|  | ||||
| dir		= $ENV::KEY_DIR		# Where everything is kept | ||||
| certs		= $dir			# Where the issued certs are kept | ||||
| crl_dir		= $dir			# Where the issued crl are kept | ||||
| database	= $dir/index.txt	# database index file. | ||||
| new_certs_dir	= $dir			# default place for new certs. | ||||
|  | ||||
| certificate	= $dir/ca.crt	 	# The CA certificate | ||||
| serial		= $dir/serial 		# The current serial number | ||||
| crl		= $dir/crl.pem 		# The current CRL | ||||
| private_key	= $dir/ca.key	 	# The private key | ||||
| RANDFILE	= $dir/.rand		# private random number file | ||||
|  | ||||
| x509_extensions	= usr_cert		# The extentions to add to the cert | ||||
|  | ||||
| # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs | ||||
| # so this is commented out by default to leave a V1 CRL. | ||||
| # crl_extensions	= crl_ext | ||||
|  | ||||
| default_days	= 3650			# how long to certify for | ||||
| default_crl_days= 30			# how long before next CRL | ||||
| default_md	= sha256		# which md to use. | ||||
| preserve	= no			# keep passed DN ordering | ||||
|  | ||||
| # A few difference way of specifying how similar the request should look | ||||
| # For type CA, the listed attributes must be the same, and the optional | ||||
| # and supplied fields are just that :-) | ||||
| policy		= policy_anything | ||||
|  | ||||
| # For the CA policy | ||||
| [ policy_match ] | ||||
| countryName		= match | ||||
| stateOrProvinceName	= match | ||||
| organizationName	= match | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| emailAddress		= optional | ||||
|  | ||||
| # For the 'anything' policy | ||||
| # At this point in time, you must list all acceptable 'object' | ||||
| # types. | ||||
| [ policy_anything ] | ||||
| countryName		= optional | ||||
| stateOrProvinceName	= optional | ||||
| localityName		= optional | ||||
| organizationName	= optional | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| emailAddress		= optional | ||||
|  | ||||
| #################################################################### | ||||
| [ req ] | ||||
| default_bits		= $ENV::KEY_SIZE | ||||
| default_keyfile 	= privkey.pem | ||||
| default_md		= sha256 | ||||
| distinguished_name	= req_distinguished_name | ||||
| attributes		= req_attributes | ||||
| x509_extensions	= v3_ca	# The extentions to add to the self signed cert | ||||
|  | ||||
| # Passwords for private keys if not present they will be prompted for | ||||
| # input_password = secret | ||||
| # output_password = secret | ||||
|  | ||||
| # This sets a mask for permitted string types. There are several options.  | ||||
| # default: PrintableString, T61String, BMPString. | ||||
| # pkix	 : PrintableString, BMPString. | ||||
| # utf8only: only UTF8Strings. | ||||
| # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). | ||||
| # MASK:XXXX a literal mask value. | ||||
| # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings | ||||
| # so use this option with caution! | ||||
| string_mask = nombstr | ||||
|  | ||||
| # req_extensions = v3_req # The extensions to add to a certificate request | ||||
|  | ||||
| [ req_distinguished_name ] | ||||
| countryName			= Country Name (2 letter code) | ||||
| countryName_default		= $ENV::KEY_COUNTRY | ||||
| countryName_min			= 2 | ||||
| countryName_max			= 2 | ||||
|  | ||||
| stateOrProvinceName		= State or Province Name (full name) | ||||
| stateOrProvinceName_default	= $ENV::KEY_PROVINCE | ||||
|  | ||||
| localityName			= Locality Name (eg, city) | ||||
| localityName_default		= $ENV::KEY_CITY | ||||
|  | ||||
| 0.organizationName		= Organization Name (eg, company) | ||||
| 0.organizationName_default	= $ENV::KEY_ORG | ||||
|  | ||||
| # we can do this but it is not needed normally :-) | ||||
| #1.organizationName		= Second Organization Name (eg, company) | ||||
| #1.organizationName_default	= World Wide Web Pty Ltd | ||||
|  | ||||
| organizationalUnitName		= Organizational Unit Name (eg, section) | ||||
| #organizationalUnitName_default	= | ||||
|  | ||||
| commonName			= Common Name (eg, your name or your server\'s hostname) | ||||
| commonName_max			= 64 | ||||
|  | ||||
| emailAddress			= Email Address | ||||
| emailAddress_default		= $ENV::KEY_EMAIL | ||||
| emailAddress_max		= 40 | ||||
|  | ||||
| # JY -- added for batch mode | ||||
| organizationalUnitName_default = $ENV::KEY_OU | ||||
| commonName_default = $ENV::KEY_CN | ||||
|  | ||||
| # SET-ex3			= SET extension number 3 | ||||
|  | ||||
| [ req_attributes ] | ||||
| challengePassword		= A challenge password | ||||
| challengePassword_min		= 4 | ||||
| challengePassword_max		= 20 | ||||
|  | ||||
| unstructuredName		= An optional company name | ||||
|  | ||||
| [ usr_cert ] | ||||
|  | ||||
| # These extensions are added when 'ca' signs a request. | ||||
|  | ||||
| # This goes against PKIX guidelines but some CAs do it and some software | ||||
| # requires this to avoid interpreting an end user certificate as a CA. | ||||
|  | ||||
| basicConstraints=CA:FALSE | ||||
|  | ||||
| # Here are some examples of the usage of nsCertType. If it is omitted | ||||
| # the certificate can be used for anything *except* object signing. | ||||
|  | ||||
| # This is OK for an SSL server. | ||||
| # nsCertType			= server | ||||
|  | ||||
| # For an object signing certificate this would be used. | ||||
| # nsCertType = objsign | ||||
|  | ||||
| # For normal client use this is typical | ||||
| # nsCertType = client, email | ||||
|  | ||||
| # and for everything including object signing: | ||||
| # nsCertType = client, email, objsign | ||||
|  | ||||
| # This is typical in keyUsage for a client certificate. | ||||
| # keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| # This will be displayed in Netscape's comment listbox. | ||||
| nsComment			= "Easy-RSA Generated Certificate" | ||||
|  | ||||
| # PKIX recommendations harmless if included in all certificates. | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=clientAuth | ||||
| keyUsage = digitalSignature | ||||
|  | ||||
| # This stuff is for subjectAltName and issuerAltname. | ||||
| # Import the email address. | ||||
| # subjectAltName=email:copy | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| # Copy subject details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem | ||||
| #nsBaseUrl | ||||
| #nsRevocationUrl | ||||
| #nsRenewalUrl | ||||
| #nsCaPolicyUrl | ||||
| #nsSslServerName | ||||
|  | ||||
| [ server ] | ||||
|  | ||||
| # JY ADDED -- Make a cert with nsCertType set to "server" | ||||
| basicConstraints=CA:FALSE | ||||
| nsCertType			= server | ||||
| nsComment			= "Easy-RSA Generated Server Certificate" | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=serverAuth | ||||
| keyUsage = digitalSignature, keyEncipherment | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| [ v3_req ] | ||||
|  | ||||
| # Extensions to add to a certificate request | ||||
|  | ||||
| basicConstraints = CA:FALSE | ||||
| keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| [ v3_ca ] | ||||
|  | ||||
|  | ||||
| # Extensions for a typical CA | ||||
|  | ||||
|  | ||||
| # PKIX recommendation. | ||||
|  | ||||
| subjectKeyIdentifier=hash | ||||
|  | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| # This is what PKIX recommends but some broken software chokes on critical | ||||
| # extensions. | ||||
| #basicConstraints = critical,CA:true | ||||
| # So we do this instead. | ||||
| basicConstraints = CA:true | ||||
|  | ||||
| # Key usage: this is typical for a CA certificate. However since it will | ||||
| # prevent it being used as an test self-signed certificate it is best | ||||
| # left out by default. | ||||
| # keyUsage = cRLSign, keyCertSign | ||||
|  | ||||
| # Some might want this also | ||||
| # nsCertType = sslCA, emailCA | ||||
|  | ||||
| # Include email address in subject alt name: another PKIX recommendation | ||||
| # subjectAltName=email:copy | ||||
| # Copy issuer details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| # DER hex encoding of an extension: beware experts only! | ||||
| # obj=DER:02:03 | ||||
| # Where 'obj' is a standard or added object | ||||
| # You can even override a supported extension: | ||||
| # basicConstraints= critical, DER:30:03:01:01:FF | ||||
|  | ||||
| [ crl_ext ] | ||||
|  | ||||
| # CRL extensions. | ||||
| # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. | ||||
|  | ||||
| # issuerAltName=issuer:copy | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
							
								
								
									
										293
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-0.9.8.cnf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										293
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-0.9.8.cnf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,293 @@ | ||||
| # For use with easy-rsa version 2.0 | ||||
|  | ||||
| # | ||||
| # OpenSSL example configuration file. | ||||
| # This is mostly being used for generation of certificate requests. | ||||
| # | ||||
|  | ||||
| # This definition stops the following lines choking if HOME isn't | ||||
| # defined. | ||||
| HOME			= . | ||||
| RANDFILE		= $ENV::HOME/.rnd | ||||
| openssl_conf		= openssl_init | ||||
|  | ||||
| [ openssl_init ] | ||||
| # Extra OBJECT IDENTIFIER info: | ||||
| #oid_file		= $ENV::HOME/.oid | ||||
| oid_section		= new_oids | ||||
| engines                 = engine_section | ||||
|  | ||||
| # To use this configuration file with the "-extfile" option of the | ||||
| # "openssl x509" utility, name here the section containing the | ||||
| # X.509v3 extensions to use: | ||||
| # extensions		= | ||||
| # (Alternatively, use a configuration file that has only | ||||
| # X.509v3 extensions in its main [= default] section.) | ||||
|  | ||||
| [ new_oids ] | ||||
|  | ||||
| # We can add new OIDs in here for use by 'ca' and 'req'. | ||||
| # Add a simple OID like this: | ||||
| # testoid1=1.2.3.4 | ||||
| # Or use config file substitution like this: | ||||
| # testoid2=${testoid1}.5.6 | ||||
|  | ||||
| #################################################################### | ||||
| [ ca ] | ||||
| default_ca	= CA_default		# The default ca section | ||||
|  | ||||
| #################################################################### | ||||
| [ CA_default ] | ||||
|  | ||||
| dir		= $ENV::KEY_DIR		# Where everything is kept | ||||
| certs		= $dir			# Where the issued certs are kept | ||||
| crl_dir		= $dir			# Where the issued crl are kept | ||||
| database	= $dir/index.txt	# database index file. | ||||
| new_certs_dir	= $dir			# default place for new certs. | ||||
|  | ||||
| certificate	= $dir/ca.crt	 	# The CA certificate | ||||
| serial		= $dir/serial 		# The current serial number | ||||
| crl		= $dir/crl.pem 		# The current CRL | ||||
| private_key	= $dir/ca.key	 	# The private key | ||||
| RANDFILE	= $dir/.rand		# private random number file | ||||
|  | ||||
| x509_extensions	= usr_cert		# The extentions to add to the cert | ||||
|  | ||||
| # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs | ||||
| # so this is commented out by default to leave a V1 CRL. | ||||
| # crl_extensions	= crl_ext | ||||
|  | ||||
| default_days	= 3650			# how long to certify for | ||||
| default_crl_days= 30			# how long before next CRL | ||||
| default_md	= sha256		# which md to use. | ||||
| preserve	= no			# keep passed DN ordering | ||||
|  | ||||
| # A few difference way of specifying how similar the request should look | ||||
| # For type CA, the listed attributes must be the same, and the optional | ||||
| # and supplied fields are just that :-) | ||||
| policy		= policy_anything | ||||
|  | ||||
| # For the CA policy | ||||
| [ policy_match ] | ||||
| countryName		= match | ||||
| stateOrProvinceName	= match | ||||
| organizationName	= match | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| # For the 'anything' policy | ||||
| # At this point in time, you must list all acceptable 'object' | ||||
| # types. | ||||
| [ policy_anything ] | ||||
| countryName		= optional | ||||
| stateOrProvinceName	= optional | ||||
| localityName		= optional | ||||
| organizationName	= optional | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| #################################################################### | ||||
| [ req ] | ||||
| default_bits		= $ENV::KEY_SIZE | ||||
| default_keyfile 	= privkey.pem | ||||
| default_md		= sha256 | ||||
| distinguished_name	= req_distinguished_name | ||||
| attributes		= req_attributes | ||||
| x509_extensions	= v3_ca	# The extentions to add to the self signed cert | ||||
|  | ||||
| # Passwords for private keys if not present they will be prompted for | ||||
| # input_password = secret | ||||
| # output_password = secret | ||||
|  | ||||
| # This sets a mask for permitted string types. There are several options. | ||||
| # default: PrintableString, T61String, BMPString. | ||||
| # pkix	 : PrintableString, BMPString. | ||||
| # utf8only: only UTF8Strings. | ||||
| # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). | ||||
| # MASK:XXXX a literal mask value. | ||||
| # WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings | ||||
| # so use this option with caution! | ||||
| string_mask = nombstr | ||||
|  | ||||
| # req_extensions = v3_req # The extensions to add to a certificate request | ||||
|  | ||||
| [ req_distinguished_name ] | ||||
| countryName			= Country Name (2 letter code) | ||||
| countryName_default		= $ENV::KEY_COUNTRY | ||||
| countryName_min			= 2 | ||||
| countryName_max			= 2 | ||||
|  | ||||
| stateOrProvinceName		= State or Province Name (full name) | ||||
| stateOrProvinceName_default	= $ENV::KEY_PROVINCE | ||||
|  | ||||
| localityName			= Locality Name (eg, city) | ||||
| localityName_default		= $ENV::KEY_CITY | ||||
|  | ||||
| 0.organizationName		= Organization Name (eg, company) | ||||
| 0.organizationName_default	= $ENV::KEY_ORG | ||||
|  | ||||
| # we can do this but it is not needed normally :-) | ||||
| #1.organizationName		= Second Organization Name (eg, company) | ||||
| #1.organizationName_default	= World Wide Web Pty Ltd | ||||
|  | ||||
| organizationalUnitName		= Organizational Unit Name (eg, section) | ||||
| #organizationalUnitName_default	= | ||||
|  | ||||
| commonName			= Common Name (eg, your name or your server\'s hostname) | ||||
| commonName_max			= 64 | ||||
|  | ||||
| name				= Name | ||||
| name_max			= 64 | ||||
|  | ||||
| emailAddress			= Email Address | ||||
| emailAddress_default		= $ENV::KEY_EMAIL | ||||
| emailAddress_max		= 40 | ||||
|  | ||||
| # JY -- added for batch mode | ||||
| organizationalUnitName_default = $ENV::KEY_OU | ||||
| commonName_default = $ENV::KEY_CN | ||||
| name_default = $ENV::KEY_NAME | ||||
|  | ||||
| # SET-ex3			= SET extension number 3 | ||||
|  | ||||
| [ req_attributes ] | ||||
| challengePassword		= A challenge password | ||||
| challengePassword_min		= 4 | ||||
| challengePassword_max		= 20 | ||||
|  | ||||
| unstructuredName		= An optional company name | ||||
|  | ||||
| [ usr_cert ] | ||||
|  | ||||
| # These extensions are added when 'ca' signs a request. | ||||
|  | ||||
| # This goes against PKIX guidelines but some CAs do it and some software | ||||
| # requires this to avoid interpreting an end user certificate as a CA. | ||||
|  | ||||
| basicConstraints=CA:FALSE | ||||
|  | ||||
| # Here are some examples of the usage of nsCertType. If it is omitted | ||||
| # the certificate can be used for anything *except* object signing. | ||||
|  | ||||
| # This is OK for an SSL server. | ||||
| # nsCertType			= server | ||||
|  | ||||
| # For an object signing certificate this would be used. | ||||
| # nsCertType = objsign | ||||
|  | ||||
| # For normal client use this is typical | ||||
| # nsCertType = client, email | ||||
|  | ||||
| # and for everything including object signing: | ||||
| # nsCertType = client, email, objsign | ||||
|  | ||||
| # This is typical in keyUsage for a client certificate. | ||||
| # keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| # This will be displayed in Netscape's comment listbox. | ||||
| nsComment			= "Easy-RSA Generated Certificate" | ||||
|  | ||||
| # PKIX recommendations harmless if included in all certificates. | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=clientAuth | ||||
| keyUsage = digitalSignature | ||||
|  | ||||
| # This stuff is for subjectAltName and issuerAltname. | ||||
| # Import the email address. | ||||
| # subjectAltName=email:copy | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| # Copy subject details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem | ||||
| #nsBaseUrl | ||||
| #nsRevocationUrl | ||||
| #nsRenewalUrl | ||||
| #nsCaPolicyUrl | ||||
| #nsSslServerName | ||||
|  | ||||
| [ server ] | ||||
|  | ||||
| # JY ADDED -- Make a cert with nsCertType set to "server" | ||||
| basicConstraints=CA:FALSE | ||||
| nsCertType			= server | ||||
| nsComment			= "Easy-RSA Generated Server Certificate" | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=serverAuth | ||||
| keyUsage = digitalSignature, keyEncipherment | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| [ v3_req ] | ||||
|  | ||||
| # Extensions to add to a certificate request | ||||
|  | ||||
| basicConstraints = CA:FALSE | ||||
| keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| [ v3_ca ] | ||||
|  | ||||
|  | ||||
| # Extensions for a typical CA | ||||
|  | ||||
|  | ||||
| # PKIX recommendation. | ||||
|  | ||||
| subjectKeyIdentifier=hash | ||||
|  | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| # This is what PKIX recommends but some broken software chokes on critical | ||||
| # extensions. | ||||
| #basicConstraints = critical,CA:true | ||||
| # So we do this instead. | ||||
| basicConstraints = CA:true | ||||
|  | ||||
| # Key usage: this is typical for a CA certificate. However since it will | ||||
| # prevent it being used as an test self-signed certificate it is best | ||||
| # left out by default. | ||||
| # keyUsage = cRLSign, keyCertSign | ||||
|  | ||||
| # Some might want this also | ||||
| # nsCertType = sslCA, emailCA | ||||
|  | ||||
| # Include email address in subject alt name: another PKIX recommendation | ||||
| # subjectAltName=email:copy | ||||
| # Copy issuer details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| # DER hex encoding of an extension: beware experts only! | ||||
| # obj=DER:02:03 | ||||
| # Where 'obj' is a standard or added object | ||||
| # You can even override a supported extension: | ||||
| # basicConstraints= critical, DER:30:03:01:01:FF | ||||
|  | ||||
| [ crl_ext ] | ||||
|  | ||||
| # CRL extensions. | ||||
| # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. | ||||
|  | ||||
| # issuerAltName=issuer:copy | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| [ engine_section ] | ||||
| # | ||||
| # If you are using PKCS#11 | ||||
| # Install engine_pkcs11 of opensc (www.opensc.org) | ||||
| # And uncomment the following | ||||
| # verify that dynamic_path points to the correct location | ||||
| # | ||||
| #pkcs11 = pkcs11_section | ||||
|  | ||||
| [ pkcs11_section ] | ||||
| engine_id = pkcs11 | ||||
| dynamic_path = /usr/lib/engines/engine_pkcs11.so | ||||
| MODULE_PATH = $ENV::PKCS11_MODULE_PATH | ||||
| PIN = $ENV::PKCS11_PIN | ||||
| init = 0 | ||||
							
								
								
									
										290
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-1.0.0.cnf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										290
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-1.0.0.cnf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,290 @@ | ||||
| # For use with easy-rsa version 2.0 and OpenSSL 1.0.0* | ||||
|  | ||||
| # This definition stops the following lines choking if HOME isn't | ||||
| # defined. | ||||
| HOME			= . | ||||
| RANDFILE		= $ENV::HOME/.rnd | ||||
| openssl_conf		= openssl_init | ||||
|  | ||||
| [ openssl_init ] | ||||
| # Extra OBJECT IDENTIFIER info: | ||||
| #oid_file		= $ENV::HOME/.oid | ||||
| oid_section		= new_oids | ||||
| engines			= engine_section | ||||
|  | ||||
| # To use this configuration file with the "-extfile" option of the | ||||
| # "openssl x509" utility, name here the section containing the | ||||
| # X.509v3 extensions to use: | ||||
| # extensions		= | ||||
| # (Alternatively, use a configuration file that has only | ||||
| # X.509v3 extensions in its main [= default] section.) | ||||
|  | ||||
| [ new_oids ] | ||||
|  | ||||
| # We can add new OIDs in here for use by 'ca' and 'req'. | ||||
| # Add a simple OID like this: | ||||
| # testoid1=1.2.3.4 | ||||
| # Or use config file substitution like this: | ||||
| # testoid2=${testoid1}.5.6 | ||||
|  | ||||
| #################################################################### | ||||
| [ ca ] | ||||
| default_ca	= CA_default		# The default ca section | ||||
|  | ||||
| #################################################################### | ||||
| [ CA_default ] | ||||
|  | ||||
| dir		= $ENV::KEY_DIR		# Where everything is kept | ||||
| certs		= $dir			# Where the issued certs are kept | ||||
| crl_dir		= $dir			# Where the issued crl are kept | ||||
| database	= $dir/index.txt	# database index file. | ||||
| new_certs_dir	= $dir			# default place for new certs. | ||||
|  | ||||
| certificate	= $dir/ca.crt	 	# The CA certificate | ||||
| serial		= $dir/serial 		# The current serial number | ||||
| crl		= $dir/crl.pem 		# The current CRL | ||||
| private_key	= $dir/ca.key		# The private key | ||||
| RANDFILE	= $dir/.rand		# private random number file | ||||
|  | ||||
| x509_extensions	= usr_cert		# The extentions to add to the cert | ||||
|  | ||||
| # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs | ||||
| # so this is commented out by default to leave a V1 CRL. | ||||
| # crl_extensions	= crl_ext | ||||
|  | ||||
| #default_days	= 3650			# how long to certify for | ||||
| default_days   = 11688 | ||||
| #default_crl_days= 30			# how long before next CRL | ||||
| default_crl_days   = 11688 | ||||
| default_md	= sha256		# use public key default MD | ||||
| preserve	= no			# keep passed DN ordering | ||||
|  | ||||
| # A few difference way of specifying how similar the request should look | ||||
| # For type CA, the listed attributes must be the same, and the optional | ||||
| # and supplied fields are just that :-) | ||||
| policy		= policy_anything | ||||
|  | ||||
| # For the CA policy | ||||
| [ policy_match ] | ||||
| countryName		= match | ||||
| stateOrProvinceName	= match | ||||
| organizationName	= match | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| # For the 'anything' policy | ||||
| # At this point in time, you must list all acceptable 'object' | ||||
| # types. | ||||
| [ policy_anything ] | ||||
| countryName		= optional | ||||
| stateOrProvinceName	= optional | ||||
| localityName		= optional | ||||
| organizationName	= optional | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| #################################################################### | ||||
| [ req ] | ||||
| default_bits		= $ENV::KEY_SIZE | ||||
| default_keyfile 	= privkey.pem | ||||
| default_md		= sha256 | ||||
| distinguished_name	= req_distinguished_name | ||||
| attributes		= req_attributes | ||||
| x509_extensions	= v3_ca	# The extentions to add to the self signed cert | ||||
|  | ||||
| # Passwords for private keys if not present they will be prompted for | ||||
| # input_password = secret | ||||
| # output_password = secret | ||||
|  | ||||
| # This sets a mask for permitted string types. There are several options. | ||||
| # default: PrintableString, T61String, BMPString. | ||||
| # pkix	 : PrintableString, BMPString (PKIX recommendation after 2004). | ||||
| # utf8only: only UTF8Strings (PKIX recommendation after 2004). | ||||
| # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). | ||||
| # MASK:XXXX a literal mask value. | ||||
| string_mask = nombstr | ||||
|  | ||||
| # req_extensions = v3_req # The extensions to add to a certificate request | ||||
|  | ||||
| [ req_distinguished_name ] | ||||
| countryName			= Country Name (2 letter code) | ||||
| countryName_default		= $ENV::KEY_COUNTRY | ||||
| countryName_min			= 2 | ||||
| countryName_max			= 2 | ||||
|  | ||||
| stateOrProvinceName		= State or Province Name (full name) | ||||
| stateOrProvinceName_default	= $ENV::KEY_PROVINCE | ||||
|  | ||||
| localityName			= Locality Name (eg, city) | ||||
| localityName_default		= $ENV::KEY_CITY | ||||
|  | ||||
| 0.organizationName		= Organization Name (eg, company) | ||||
| 0.organizationName_default	= $ENV::KEY_ORG | ||||
|  | ||||
| # we can do this but it is not needed normally :-) | ||||
| #1.organizationName		= Second Organization Name (eg, company) | ||||
| #1.organizationName_default	= World Wide Web Pty Ltd | ||||
|  | ||||
| organizationalUnitName		= Organizational Unit Name (eg, section) | ||||
| #organizationalUnitName_default	= | ||||
|  | ||||
| commonName			= Common Name (eg, your name or your server\'s hostname) | ||||
| commonName_max			= 64 | ||||
|  | ||||
| name				= Name | ||||
| name_max			= 64 | ||||
|  | ||||
| emailAddress			= Email Address | ||||
| emailAddress_default		= $ENV::KEY_EMAIL | ||||
| emailAddress_max		= 40 | ||||
|  | ||||
| # JY -- added for batch mode | ||||
| organizationalUnitName_default = $ENV::KEY_OU | ||||
| commonName_default = $ENV::KEY_CN | ||||
| name_default = $ENV::KEY_NAME | ||||
|  | ||||
|  | ||||
| # SET-ex3			= SET extension number 3 | ||||
|  | ||||
| [ req_attributes ] | ||||
| challengePassword		= A challenge password | ||||
| challengePassword_min		= 4 | ||||
| challengePassword_max		= 20 | ||||
|  | ||||
| unstructuredName		= An optional company name | ||||
|  | ||||
| [ usr_cert ] | ||||
|  | ||||
| # These extensions are added when 'ca' signs a request. | ||||
|  | ||||
| # This goes against PKIX guidelines but some CAs do it and some software | ||||
| # requires this to avoid interpreting an end user certificate as a CA. | ||||
|  | ||||
| basicConstraints=CA:FALSE | ||||
|  | ||||
| # Here are some examples of the usage of nsCertType. If it is omitted | ||||
| # the certificate can be used for anything *except* object signing. | ||||
|  | ||||
| # This is OK for an SSL server. | ||||
| # nsCertType			= server | ||||
|  | ||||
| # For an object signing certificate this would be used. | ||||
| # nsCertType = objsign | ||||
|  | ||||
| # For normal client use this is typical | ||||
| # nsCertType = client, email | ||||
|  | ||||
| # and for everything including object signing: | ||||
| # nsCertType = client, email, objsign | ||||
|  | ||||
| # This is typical in keyUsage for a client certificate. | ||||
| # keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| # This will be displayed in Netscape's comment listbox. | ||||
| nsComment			= "Easy-RSA Generated Certificate" | ||||
|  | ||||
| # PKIX recommendations harmless if included in all certificates. | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=clientAuth | ||||
| keyUsage = digitalSignature | ||||
|  | ||||
|  | ||||
| # This stuff is for subjectAltName and issuerAltname. | ||||
| # Import the email address. | ||||
| # subjectAltName=email:copy | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| # Copy subject details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem | ||||
| #nsBaseUrl | ||||
| #nsRevocationUrl | ||||
| #nsRenewalUrl | ||||
| #nsCaPolicyUrl | ||||
| #nsSslServerName | ||||
|  | ||||
| [ server ] | ||||
|  | ||||
| # JY ADDED -- Make a cert with nsCertType set to "server" | ||||
| basicConstraints=CA:FALSE | ||||
| nsCertType                     = server | ||||
| nsComment                      = "Easy-RSA Generated Server Certificate" | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=serverAuth | ||||
| keyUsage = digitalSignature, keyEncipherment | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| [ v3_req ] | ||||
|  | ||||
| # Extensions to add to a certificate request | ||||
|  | ||||
| basicConstraints = CA:FALSE | ||||
| keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| [ v3_ca ] | ||||
|  | ||||
|  | ||||
| # Extensions for a typical CA | ||||
|  | ||||
|  | ||||
| # PKIX recommendation. | ||||
|  | ||||
| subjectKeyIdentifier=hash | ||||
|  | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| # This is what PKIX recommends but some broken software chokes on critical | ||||
| # extensions. | ||||
| #basicConstraints = critical,CA:true | ||||
| # So we do this instead. | ||||
| basicConstraints = CA:true | ||||
|  | ||||
| # Key usage: this is typical for a CA certificate. However since it will | ||||
| # prevent it being used as an test self-signed certificate it is best | ||||
| # left out by default. | ||||
| # keyUsage = cRLSign, keyCertSign | ||||
|  | ||||
| # Some might want this also | ||||
| # nsCertType = sslCA, emailCA | ||||
|  | ||||
| # Include email address in subject alt name: another PKIX recommendation | ||||
| # subjectAltName=email:copy | ||||
| # Copy issuer details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| # DER hex encoding of an extension: beware experts only! | ||||
| # obj=DER:02:03 | ||||
| # Where 'obj' is a standard or added object | ||||
| # You can even override a supported extension: | ||||
| # basicConstraints= critical, DER:30:03:01:01:FF | ||||
|  | ||||
| [ crl_ext ] | ||||
|  | ||||
| # CRL extensions. | ||||
| # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. | ||||
|  | ||||
| # issuerAltName=issuer:copy | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| [ engine_section ] | ||||
| # | ||||
| # If you are using PKCS#11 | ||||
| # Install engine_pkcs11 of opensc (www.opensc.org) | ||||
| # And uncomment the following | ||||
| # verify that dynamic_path points to the correct location | ||||
| # | ||||
| #pkcs11 = pkcs11_section | ||||
|  | ||||
| [ pkcs11_section ] | ||||
| engine_id = pkcs11 | ||||
| dynamic_path = /usr/lib/engines/engine_pkcs11.so | ||||
| MODULE_PATH = $ENV::PKCS11_MODULE_PATH | ||||
| PIN = $ENV::PKCS11_PIN | ||||
| init = 0 | ||||
							
								
								
									
										288
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-1.0.0.cnf.ORIG
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										288
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl-1.0.0.cnf.ORIG
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,288 @@ | ||||
| # For use with easy-rsa version 2.0 and OpenSSL 1.0.0* | ||||
|  | ||||
| # This definition stops the following lines choking if HOME isn't | ||||
| # defined. | ||||
| HOME			= . | ||||
| RANDFILE		= $ENV::HOME/.rnd | ||||
| openssl_conf		= openssl_init | ||||
|  | ||||
| [ openssl_init ] | ||||
| # Extra OBJECT IDENTIFIER info: | ||||
| #oid_file		= $ENV::HOME/.oid | ||||
| oid_section		= new_oids | ||||
| engines			= engine_section | ||||
|  | ||||
| # To use this configuration file with the "-extfile" option of the | ||||
| # "openssl x509" utility, name here the section containing the | ||||
| # X.509v3 extensions to use: | ||||
| # extensions		= | ||||
| # (Alternatively, use a configuration file that has only | ||||
| # X.509v3 extensions in its main [= default] section.) | ||||
|  | ||||
| [ new_oids ] | ||||
|  | ||||
| # We can add new OIDs in here for use by 'ca' and 'req'. | ||||
| # Add a simple OID like this: | ||||
| # testoid1=1.2.3.4 | ||||
| # Or use config file substitution like this: | ||||
| # testoid2=${testoid1}.5.6 | ||||
|  | ||||
| #################################################################### | ||||
| [ ca ] | ||||
| default_ca	= CA_default		# The default ca section | ||||
|  | ||||
| #################################################################### | ||||
| [ CA_default ] | ||||
|  | ||||
| dir		= $ENV::KEY_DIR		# Where everything is kept | ||||
| certs		= $dir			# Where the issued certs are kept | ||||
| crl_dir		= $dir			# Where the issued crl are kept | ||||
| database	= $dir/index.txt	# database index file. | ||||
| new_certs_dir	= $dir			# default place for new certs. | ||||
|  | ||||
| certificate	= $dir/ca.crt	 	# The CA certificate | ||||
| serial		= $dir/serial 		# The current serial number | ||||
| crl		= $dir/crl.pem 		# The current CRL | ||||
| private_key	= $dir/ca.key		# The private key | ||||
| RANDFILE	= $dir/.rand		# private random number file | ||||
|  | ||||
| x509_extensions	= usr_cert		# The extentions to add to the cert | ||||
|  | ||||
| # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs | ||||
| # so this is commented out by default to leave a V1 CRL. | ||||
| # crl_extensions	= crl_ext | ||||
|  | ||||
| default_days	= 3650			# how long to certify for | ||||
| default_crl_days= 30			# how long before next CRL | ||||
| default_md	= sha256		# use public key default MD | ||||
| preserve	= no			# keep passed DN ordering | ||||
|  | ||||
| # A few difference way of specifying how similar the request should look | ||||
| # For type CA, the listed attributes must be the same, and the optional | ||||
| # and supplied fields are just that :-) | ||||
| policy		= policy_anything | ||||
|  | ||||
| # For the CA policy | ||||
| [ policy_match ] | ||||
| countryName		= match | ||||
| stateOrProvinceName	= match | ||||
| organizationName	= match | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| # For the 'anything' policy | ||||
| # At this point in time, you must list all acceptable 'object' | ||||
| # types. | ||||
| [ policy_anything ] | ||||
| countryName		= optional | ||||
| stateOrProvinceName	= optional | ||||
| localityName		= optional | ||||
| organizationName	= optional | ||||
| organizationalUnitName	= optional | ||||
| commonName		= supplied | ||||
| name			= optional | ||||
| emailAddress		= optional | ||||
|  | ||||
| #################################################################### | ||||
| [ req ] | ||||
| default_bits		= $ENV::KEY_SIZE | ||||
| default_keyfile 	= privkey.pem | ||||
| default_md		= sha256 | ||||
| distinguished_name	= req_distinguished_name | ||||
| attributes		= req_attributes | ||||
| x509_extensions	= v3_ca	# The extentions to add to the self signed cert | ||||
|  | ||||
| # Passwords for private keys if not present they will be prompted for | ||||
| # input_password = secret | ||||
| # output_password = secret | ||||
|  | ||||
| # This sets a mask for permitted string types. There are several options. | ||||
| # default: PrintableString, T61String, BMPString. | ||||
| # pkix	 : PrintableString, BMPString (PKIX recommendation after 2004). | ||||
| # utf8only: only UTF8Strings (PKIX recommendation after 2004). | ||||
| # nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). | ||||
| # MASK:XXXX a literal mask value. | ||||
| string_mask = nombstr | ||||
|  | ||||
| # req_extensions = v3_req # The extensions to add to a certificate request | ||||
|  | ||||
| [ req_distinguished_name ] | ||||
| countryName			= Country Name (2 letter code) | ||||
| countryName_default		= $ENV::KEY_COUNTRY | ||||
| countryName_min			= 2 | ||||
| countryName_max			= 2 | ||||
|  | ||||
| stateOrProvinceName		= State or Province Name (full name) | ||||
| stateOrProvinceName_default	= $ENV::KEY_PROVINCE | ||||
|  | ||||
| localityName			= Locality Name (eg, city) | ||||
| localityName_default		= $ENV::KEY_CITY | ||||
|  | ||||
| 0.organizationName		= Organization Name (eg, company) | ||||
| 0.organizationName_default	= $ENV::KEY_ORG | ||||
|  | ||||
| # we can do this but it is not needed normally :-) | ||||
| #1.organizationName		= Second Organization Name (eg, company) | ||||
| #1.organizationName_default	= World Wide Web Pty Ltd | ||||
|  | ||||
| organizationalUnitName		= Organizational Unit Name (eg, section) | ||||
| #organizationalUnitName_default	= | ||||
|  | ||||
| commonName			= Common Name (eg, your name or your server\'s hostname) | ||||
| commonName_max			= 64 | ||||
|  | ||||
| name				= Name | ||||
| name_max			= 64 | ||||
|  | ||||
| emailAddress			= Email Address | ||||
| emailAddress_default		= $ENV::KEY_EMAIL | ||||
| emailAddress_max		= 40 | ||||
|  | ||||
| # JY -- added for batch mode | ||||
| organizationalUnitName_default = $ENV::KEY_OU | ||||
| commonName_default = $ENV::KEY_CN | ||||
| name_default = $ENV::KEY_NAME | ||||
|  | ||||
|  | ||||
| # SET-ex3			= SET extension number 3 | ||||
|  | ||||
| [ req_attributes ] | ||||
| challengePassword		= A challenge password | ||||
| challengePassword_min		= 4 | ||||
| challengePassword_max		= 20 | ||||
|  | ||||
| unstructuredName		= An optional company name | ||||
|  | ||||
| [ usr_cert ] | ||||
|  | ||||
| # These extensions are added when 'ca' signs a request. | ||||
|  | ||||
| # This goes against PKIX guidelines but some CAs do it and some software | ||||
| # requires this to avoid interpreting an end user certificate as a CA. | ||||
|  | ||||
| basicConstraints=CA:FALSE | ||||
|  | ||||
| # Here are some examples of the usage of nsCertType. If it is omitted | ||||
| # the certificate can be used for anything *except* object signing. | ||||
|  | ||||
| # This is OK for an SSL server. | ||||
| # nsCertType			= server | ||||
|  | ||||
| # For an object signing certificate this would be used. | ||||
| # nsCertType = objsign | ||||
|  | ||||
| # For normal client use this is typical | ||||
| # nsCertType = client, email | ||||
|  | ||||
| # and for everything including object signing: | ||||
| # nsCertType = client, email, objsign | ||||
|  | ||||
| # This is typical in keyUsage for a client certificate. | ||||
| # keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| # This will be displayed in Netscape's comment listbox. | ||||
| nsComment			= "Easy-RSA Generated Certificate" | ||||
|  | ||||
| # PKIX recommendations harmless if included in all certificates. | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=clientAuth | ||||
| keyUsage = digitalSignature | ||||
|  | ||||
|  | ||||
| # This stuff is for subjectAltName and issuerAltname. | ||||
| # Import the email address. | ||||
| # subjectAltName=email:copy | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| # Copy subject details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| #nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem | ||||
| #nsBaseUrl | ||||
| #nsRevocationUrl | ||||
| #nsRenewalUrl | ||||
| #nsCaPolicyUrl | ||||
| #nsSslServerName | ||||
|  | ||||
| [ server ] | ||||
|  | ||||
| # JY ADDED -- Make a cert with nsCertType set to "server" | ||||
| basicConstraints=CA:FALSE | ||||
| nsCertType                     = server | ||||
| nsComment                      = "Easy-RSA Generated Server Certificate" | ||||
| subjectKeyIdentifier=hash | ||||
| authorityKeyIdentifier=keyid,issuer:always | ||||
| extendedKeyUsage=serverAuth | ||||
| keyUsage = digitalSignature, keyEncipherment | ||||
| subjectAltName=$ENV::KEY_ALTNAMES | ||||
|  | ||||
| [ v3_req ] | ||||
|  | ||||
| # Extensions to add to a certificate request | ||||
|  | ||||
| basicConstraints = CA:FALSE | ||||
| keyUsage = nonRepudiation, digitalSignature, keyEncipherment | ||||
|  | ||||
| [ v3_ca ] | ||||
|  | ||||
|  | ||||
| # Extensions for a typical CA | ||||
|  | ||||
|  | ||||
| # PKIX recommendation. | ||||
|  | ||||
| subjectKeyIdentifier=hash | ||||
|  | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| # This is what PKIX recommends but some broken software chokes on critical | ||||
| # extensions. | ||||
| #basicConstraints = critical,CA:true | ||||
| # So we do this instead. | ||||
| basicConstraints = CA:true | ||||
|  | ||||
| # Key usage: this is typical for a CA certificate. However since it will | ||||
| # prevent it being used as an test self-signed certificate it is best | ||||
| # left out by default. | ||||
| # keyUsage = cRLSign, keyCertSign | ||||
|  | ||||
| # Some might want this also | ||||
| # nsCertType = sslCA, emailCA | ||||
|  | ||||
| # Include email address in subject alt name: another PKIX recommendation | ||||
| # subjectAltName=email:copy | ||||
| # Copy issuer details | ||||
| # issuerAltName=issuer:copy | ||||
|  | ||||
| # DER hex encoding of an extension: beware experts only! | ||||
| # obj=DER:02:03 | ||||
| # Where 'obj' is a standard or added object | ||||
| # You can even override a supported extension: | ||||
| # basicConstraints= critical, DER:30:03:01:01:FF | ||||
|  | ||||
| [ crl_ext ] | ||||
|  | ||||
| # CRL extensions. | ||||
| # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. | ||||
|  | ||||
| # issuerAltName=issuer:copy | ||||
| authorityKeyIdentifier=keyid:always,issuer:always | ||||
|  | ||||
| [ engine_section ] | ||||
| # | ||||
| # If you are using PKCS#11 | ||||
| # Install engine_pkcs11 of opensc (www.opensc.org) | ||||
| # And uncomment the following | ||||
| # verify that dynamic_path points to the correct location | ||||
| # | ||||
| #pkcs11 = pkcs11_section | ||||
|  | ||||
| [ pkcs11_section ] | ||||
| engine_id = pkcs11 | ||||
| dynamic_path = /usr/lib/engines/engine_pkcs11.so | ||||
| MODULE_PATH = $ENV::PKCS11_MODULE_PATH | ||||
| PIN = $ENV::PKCS11_PIN | ||||
| init = 0 | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl.cnf
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/openssl.cnf
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /etc/openvpn/gw-ckubu/easy-rsa/openssl-1.0.0.cnf | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/pkitool
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/pkitool
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/pkitool | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/revoke-full
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/revoke-full
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/revoke-full | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/sign-req
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/sign-req
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/sign-req | ||||
							
								
								
									
										96
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/vars
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										96
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/vars
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,96 @@ | ||||
| # easy-rsa parameter settings | ||||
|  | ||||
| # NOTE: If you installed from an RPM, | ||||
| # don't edit this file in place in | ||||
| # /usr/share/openvpn/easy-rsa -- | ||||
| # instead, you should copy the whole | ||||
| # easy-rsa directory to another location | ||||
| # (such as /etc/openvpn) so that your | ||||
| # edits will not be wiped out by a future | ||||
| # OpenVPN package upgrade. | ||||
|  | ||||
| # This variable should point to | ||||
| # the top level of the easy-rsa | ||||
| # tree. | ||||
| ##export EASY_RSA="`pwd`" | ||||
| export BASE_DIR="/etc/openvpn/gw-ckubu" | ||||
| export EASY_RSA="$BASE_DIR/easy-rsa" | ||||
|  | ||||
| # | ||||
| # This variable should point to | ||||
| # the requested executables | ||||
| # | ||||
| export OPENSSL="openssl" | ||||
| export PKCS11TOOL="pkcs11-tool" | ||||
| export GREP="grep" | ||||
|  | ||||
|  | ||||
| # This variable should point to | ||||
| # the openssl.cnf file included | ||||
| # with easy-rsa. | ||||
| export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA` | ||||
|  | ||||
| # Edit this variable to point to | ||||
| # your soon-to-be-created key | ||||
| # directory. | ||||
| # | ||||
| # WARNING: clean-all will do | ||||
| # a rm -rf on this directory | ||||
| # so make sure you define | ||||
| # it correctly! | ||||
| ##export KEY_DIR="$EASY_RSA/keys" | ||||
| export KEY_DIR="$BASE_DIR/keys" | ||||
|  | ||||
| # Issue rm -rf warning | ||||
| echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR | ||||
|  | ||||
| # PKCS11 fixes | ||||
| export PKCS11_MODULE_PATH="dummy" | ||||
| export PKCS11_PIN="dummy" | ||||
|  | ||||
| # Increase this to 2048 if you | ||||
| # are paranoid.  This will slow | ||||
| # down TLS negotiation performance | ||||
| # as well as the one-time DH parms | ||||
| # generation process. | ||||
| ##export KEY_SIZE=2048 | ||||
| export KEY_SIZE=4096 | ||||
|  | ||||
| # In how many days should the root CA key expire? | ||||
| ##export CA_EXPIRE=3650 | ||||
| export CA_EXPIRE=11688 | ||||
|  | ||||
| # In how many days should certificates expire? | ||||
| ##export KEY_EXPIRE=3650 | ||||
| export KEY_EXPIRE=7305 | ||||
|  | ||||
| # These are the default values for fields | ||||
| # which will be placed in the certificate. | ||||
| # Don't leave any of these fields blank. | ||||
| ##export KEY_COUNTRY="US" | ||||
| export KEY_COUNTRY="DE" | ||||
| ##export KEY_PROVINCE="CA" | ||||
| export KEY_PROVINCE="Berlin" | ||||
| ##export KEY_CITY="SanFrancisco" | ||||
| export KEY_CITY="Berlin" | ||||
| ##export KEY_ORG="Fort-Funston" | ||||
| export KEY_ORG="o.open" | ||||
| ##export KEY_EMAIL="me@myhost.mydomain" | ||||
| export KEY_EMAIL="argus@oopen.de" | ||||
| ##export KEY_OU="MyOrganizationalUnit" | ||||
| export KEY_OU="Network Services" | ||||
|  | ||||
| # X509 Subject Field | ||||
| ##export KEY_NAME="EasyRSA" | ||||
| export KEY_NAME="VPN AKB" | ||||
|  | ||||
| # PKCS11 Smart Card | ||||
| # export PKCS11_MODULE_PATH="/usr/lib/changeme.so" | ||||
| # export PKCS11_PIN=1234 | ||||
|  | ||||
| # If you'd like to sign all keys with the same Common Name, uncomment the KEY_CN export below | ||||
| # You will also need to make sure your OpenVPN server config has the duplicate-cn option set | ||||
| ## export KEY_CN="CommonName" | ||||
| export KEY_CN="VPN-AKB" | ||||
|  | ||||
| export KEY_ALTNAMES="VPN AKB" | ||||
							
								
								
									
										80
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/vars.2018-02-05-2126
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										80
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/vars.2018-02-05-2126
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,80 @@ | ||||
| # easy-rsa parameter settings | ||||
|  | ||||
| # NOTE: If you installed from an RPM, | ||||
| # don't edit this file in place in | ||||
| # /usr/share/openvpn/easy-rsa -- | ||||
| # instead, you should copy the whole | ||||
| # easy-rsa directory to another location | ||||
| # (such as /etc/openvpn) so that your | ||||
| # edits will not be wiped out by a future | ||||
| # OpenVPN package upgrade. | ||||
|  | ||||
| # This variable should point to | ||||
| # the top level of the easy-rsa | ||||
| # tree. | ||||
| export EASY_RSA="`pwd`" | ||||
|  | ||||
| # | ||||
| # This variable should point to | ||||
| # the requested executables | ||||
| # | ||||
| export OPENSSL="openssl" | ||||
| export PKCS11TOOL="pkcs11-tool" | ||||
| export GREP="grep" | ||||
|  | ||||
|  | ||||
| # This variable should point to | ||||
| # the openssl.cnf file included | ||||
| # with easy-rsa. | ||||
| export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA` | ||||
|  | ||||
| # Edit this variable to point to | ||||
| # your soon-to-be-created key | ||||
| # directory. | ||||
| # | ||||
| # WARNING: clean-all will do | ||||
| # a rm -rf on this directory | ||||
| # so make sure you define | ||||
| # it correctly! | ||||
| export KEY_DIR="$EASY_RSA/keys" | ||||
|  | ||||
| # Issue rm -rf warning | ||||
| echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR | ||||
|  | ||||
| # PKCS11 fixes | ||||
| export PKCS11_MODULE_PATH="dummy" | ||||
| export PKCS11_PIN="dummy" | ||||
|  | ||||
| # Increase this to 2048 if you | ||||
| # are paranoid.  This will slow | ||||
| # down TLS negotiation performance | ||||
| # as well as the one-time DH parms | ||||
| # generation process. | ||||
| export KEY_SIZE=2048 | ||||
|  | ||||
| # In how many days should the root CA key expire? | ||||
| export CA_EXPIRE=3650 | ||||
|  | ||||
| # In how many days should certificates expire? | ||||
| export KEY_EXPIRE=3650 | ||||
|  | ||||
| # These are the default values for fields | ||||
| # which will be placed in the certificate. | ||||
| # Don't leave any of these fields blank. | ||||
| export KEY_COUNTRY="US" | ||||
| export KEY_PROVINCE="CA" | ||||
| export KEY_CITY="SanFrancisco" | ||||
| export KEY_ORG="Fort-Funston" | ||||
| export KEY_EMAIL="me@myhost.mydomain" | ||||
| export KEY_OU="MyOrganizationalUnit" | ||||
|  | ||||
| # X509 Subject Field | ||||
| export KEY_NAME="EasyRSA" | ||||
|  | ||||
| # PKCS11 Smart Card | ||||
| # export PKCS11_MODULE_PATH="/usr/lib/changeme.so" | ||||
| # export PKCS11_PIN=1234 | ||||
|  | ||||
| # If you'd like to sign all keys with the same Common Name, uncomment the KEY_CN export below | ||||
| # You will also need to make sure your OpenVPN server config has the duplicate-cn option set | ||||
| # export KEY_CN="CommonName" | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/whichopensslcnf
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/easy-rsa/whichopensslcnf
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| /usr/share/easy-rsa/whichopensslcnf | ||||
							
								
								
									
										257
									
								
								AKB/openvpn/gw-ckubu/gw-ckubu.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										257
									
								
								AKB/openvpn/gw-ckubu/gw-ckubu.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,257 @@ | ||||
| ############################################## | ||||
| # Sample client-side OpenVPN 2.0 config file # | ||||
| # for connecting to multi-client server.     # | ||||
| #                                            # | ||||
| # This configuration can be used by multiple # | ||||
| # clients, however each client should have   # | ||||
| # its own cert and key files.                # | ||||
| #                                            # | ||||
| # On Windows, you might want to rename this  # | ||||
| # file so it has a .ovpn extension           # | ||||
| ############################################## | ||||
|  | ||||
| # Specify that we are a client and that we | ||||
| # will be pulling certain config file directives | ||||
| # from the server. | ||||
| client | ||||
|  | ||||
| # Use the same setting as you are using on | ||||
| # the server. | ||||
| # On most systems, the VPN will not function | ||||
| # unless you partially or fully disable | ||||
| # the firewall for the TUN/TAP interface. | ||||
| ;dev tap | ||||
| dev tun | ||||
|  | ||||
| # Are we connecting to a TCP or | ||||
| # UDP server?  Use the same setting as | ||||
| # on the server | ||||
| proto udp | ||||
|  | ||||
| # The hostname/IP and port of the server. | ||||
| # You can have multiple remote entries | ||||
| # to load balance between the servers. | ||||
| remote gw-akb.oopen.de 1195 | ||||
|  | ||||
| topology subnet | ||||
|  | ||||
| # Keep trying indefinitely to resolve the | ||||
| # host name of the OpenVPN server.  Very useful | ||||
| # on machines which are not permanently connected | ||||
| # to the internet such as laptops. | ||||
| resolv-retry infinite | ||||
|  | ||||
| # Most clients don't need to bind to | ||||
| # a specific local port number. | ||||
| nobind | ||||
|  | ||||
| # Try to preserve some state across restarts. | ||||
| persist-key | ||||
| persist-tun | ||||
|  | ||||
| # Server CA | ||||
| <ca> | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIGzDCCBLSgAwIBAgIJAJ2nraWZ6Z+uMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD | ||||
| VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV | ||||
| BAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMH | ||||
| VlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNA | ||||
| b29wZW4uZGUwIBcNMTgwMjA1MjAzMDM3WhgPMjA1MDAyMDUyMDMwMzdaMIGeMQsw | ||||
| CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN | ||||
| BgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UE | ||||
| AxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJn | ||||
| dXNAb29wZW4uZGUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDU3ELr | ||||
| 25xiRgZY6TlrEyKW4z26lI0B/f3q4NcgbZee+6XMU4mLyfbxMDowyfxs1QdhmVZX | ||||
| H4aFhfpge25w4V4XEgslYHV4Tx6fN9jlA5EAwusByayiq2YZ/ZrAqsaSK25atH/E | ||||
| US3tS/bthj4Tt1DGSmXJzVP2d89vDbfdk82lKTBdtlfbnL+zLG8NmL1NHeAGel+B | ||||
| kjHRMXo8m+04Zcq6xykBQZ2/lfS1jhqCUygCyub3moHTCTVmkfbKm9qWrqBMVTbn | ||||
| c5ld3G2TTjuRYVsYGzgnFHPrHtqMFgJOYgS5CIZ2mTsYgAaREt4IPDu5oIC+oe4X | ||||
| iErcIJoCO1NEsuHkuchvWhqRoSaqVOT1bRdVc+v/pfVkRVBb+VOeVQUG78LHRpDx | ||||
| LMx48QtN2P0HY2mdQK1FWZetFo0ncJvmjnFWqV3ZdWwWJmeXGCU+pNmokcP2wn6b | ||||
| zJ9lhtntS5IWqlAWUIUfJEXL+FbRbCCFG5reKcdSoNHFBewvcRfg5wPz6cMQDHXd | ||||
| B03168HJSVb8mB76bmBmc+zsLIFoCm7kepm+uzpY0//Uz0WXXXg6OI/zhBSECng6 | ||||
| hamvri9k6uAeoyVjKJVpG2tALMmYcC2ygxYuFi5mbYg41eAMfBwAtK6sWdLy99qz | ||||
| sLWze8fwl8wHJhfHlLTQrLpMz0lpnjDtVOyP1wIDAQABo4IBBzCCAQMwHQYDVR0O | ||||
| BBYEFHxCgucD6wWX5p49FMX/rCWhuAzoMIHTBgNVHSMEgcswgciAFHxCgucD6wWX | ||||
| 5p49FMX/rCWhuAzooYGkpIGhMIGeMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy | ||||
| bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ | ||||
| TmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBO | ||||
| IEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQCdp62lmemfrjAM | ||||
| BgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQBwmgxFIhkxilpGef3bjiAH | ||||
| yyP78nFOtrQb0lb640pySl07F/2xHTYOPb/TECNzQR8no9aNGZHQlvwEdgLdIrDE | ||||
| I96AwMfhvVqducsXtR7xjX5YV1Dpa7Yqvt10teuhuPtnXV/ClNaNnFMAlJtnw6bs | ||||
| +6cGDATRmizu/lZiHnuzG/ANr9AtMOp5R1yw3vPn/Fx6lQ/M4sKxJg0FrJDMvhDh | ||||
| sFbHA2T+u1Ke7z4BjSFAWb2tTDWfcffBuQhLRYdG0R3RgsZIVP9dtrdrKRAsdIHC | ||||
| FxL9IHr4mlS3VHqtcyXxFlVhOZsQ5KVt4hFUPgMzIEnFq+T+Q9YXnYM72g1An9d1 | ||||
| +Y5YBkhPZONrmUE2zDjdk4bSy58h9xdSCAyziRvKomtrqx0CDOTJyTqPYjWsLCFu | ||||
| xer7bvoWGw1bfC2+5TgcLlCqRtGbgeCj3NJ9xHcv5ZP4PVC5VhmewYJFsDiDEfw7 | ||||
| GOc8y5liXX/+YoJjEHrPwMS/QN7mDH60JdXngm7BafQa29mw3GQXwWlLvfFekMXe | ||||
| DtkRyz0a0FsplnwOScDCsuA0RrJD8T/iUNW6ecdXwwFY5vl8/NhZx2wBnchsBO+z | ||||
| /Aw8kwc9X87NVqIrJVh2i4UWBo/bAlKSTHY2/i+IeMZf2oXhc6yyleXk6jbZ4b2t | ||||
| KIajjnXU5P26nFWLP8IiIA== | ||||
| -----END CERTIFICATE----- | ||||
| </ca> | ||||
|  | ||||
| # Client Certificate | ||||
| <cert> | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIHLjCCBRagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUx | ||||
| DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w | ||||
| ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0Ix | ||||
| EDAOBgNVBCkTB1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRl | ||||
| MB4XDTE4MDIwNTIwNTQ1NVoXDTM4MDIwNTIwNTQ1NVowgacxCzAJBgNVBAYTAkRF | ||||
| MQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5v | ||||
| cGVuMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRkwFwYDVQQDExBWUE4tQUtC | ||||
| LWd3LWNrdWJ1MRAwDgYDVQQpEwdWUE4gQUtCMR0wGwYJKoZIhvcNAQkBFg5hcmd1 | ||||
| c0Bvb3Blbi5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKpSg7Om | ||||
| QQO8vMdmYcgOqYwpz3BSRDDjQJSnKwlNXanVLR8t5ZJQtJKLqUsKo8CC2jyBZQrN | ||||
| kusVwz5ecKbuyDPnDhl4ra6mCWTQnxKhUX2e9DtK7W0gc8HZ8TAa9tJt2tcKpX7S | ||||
| MNeEwYETPhQk9rUUxxkynIfr38n8nodyVdtFo/nhhlsqyZO4UHLPhC5Op/lPPvzh | ||||
| Ioz/I66GquHcwX+bfszWlOw3DJeAXw+qPMyjpOzQbsAzqEXHgDY84/4G+safqD2Z | ||||
| l4UsoAIbEpdSmHF+blkiuXllT9cZ7l3RIxP4pC4c+NoWZFe5Uve6dv11TdREAzhi | ||||
| PFI1og3c5wGIRbt757687oJ48Ou7w+MKfoGB/ErjrSrItX8CEMO3u17hgQzzGZ/u | ||||
| iK/zSR0jTUuTnf2hFByXnR89YqXrEWg5Uch755cZPXzx2phniffQndNzTJcPJOr+ | ||||
| LpxpndzInEqC31Q8ZDUgQ/1Xv0or6ePzpTuxt9VKiA16Zn83RzO8ZIR60lO1+VQP | ||||
| Uxc+oeZLp+AfbHBHO/yqNws0V4vYOo1XtUN/Uj3jFkYnfcaH0iQTXIR/aGUz6rMO | ||||
| tuA5e3Y9i8qBpwnDQrG7RlBtOr1Nrrue15yTaEhPHKzBpBYWhbsIyJuBwBdxh96X | ||||
| QkBgEyKRTYUAge0VS3DD9dkdLgsbst1Ed1ppAgMBAAGjggFqMIIBZjAJBgNVHRME | ||||
| AjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNh | ||||
| dGUwHQYDVR0OBBYEFOK0KTR2vda8ZJ/b0eqc0wAVmCA3MIHTBgNVHSMEgcswgciA | ||||
| FHxCgucD6wWX5p49FMX/rCWhuAzooYGkpIGhMIGeMQswCQYDVQQGEwJERTEPMA0G | ||||
| A1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZ | ||||
| MBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMHVlBOLUFLQjEQMA4G | ||||
| A1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQCd | ||||
| p62lmemfrjATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwEwYDVR0R | ||||
| BAwwCoIIZ3ctY2t1YnUwDQYJKoZIhvcNAQELBQADggIBABfYhzlm8VjYvuZwySkA | ||||
| 9mR1xblTWn/E/d8r0BR8E1ra9bi5jGqYrIzyoCNNFdL0yjvXGNHZIwN0sn22LlC1 | ||||
| 1ikhaWV3WcQhtAT91NJfcXr2tk8xOhmIeGlmHBPW8VwwLjl/6WnUEK0PB7skYjq9 | ||||
| iS+ftC5lFNXFCvaJpReC0HGEoo8nf17PKoktzKFWNb0m6UtS8i8QmHcm+SpqHW7b | ||||
| kbgGioVYbPrkjpySFigQVu3E4Siu2MO2Z9O8y7kutXzwhCom5zBPAkUrvYchl+IX | ||||
| AXF3MY/dFaxMezt+SubuTWpvH2cbxdfEusNFbG/bC5NywR+0wAKiM/gySb+TfeB+ | ||||
| 0NPEQSDYm6stuTCrC8bu20CevLnQhzI5QsBDi3xc+I0g0aER7uJCQ5ajUtjpM8qy | ||||
| 0Toph7IEzQP1JQnsroNlbdI4QI1anACziCYgToYTvLaDaUulMpzGOKMiP6lXDUfy | ||||
| nggOubzmWcei6syfxWizdkEJeAeHGrlcsJYMyza5PCExNodjuiUUOVrZGKZYLqsR | ||||
| 2kMysKxFO8x81EBhK7fSJ4wIvM/koKKKSDozTWDTbOA7cWjRYWPIAoA+c7sB7VKd | ||||
| bdGCHVQVH5/YUXHIEbjM24ZYVP7UX8hQWtfxDOYHL8gSRSncI6T9HXs0p1Mlh0eQ | ||||
| kJdQyX6Vs+d2zTzAbPqICNGM | ||||
| -----END CERTIFICATE----- | ||||
| </cert> | ||||
|  | ||||
| # Client Key | ||||
| <key> | ||||
| -----BEGIN ENCRYPTED PRIVATE KEY----- | ||||
| MIIJnDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIrroJRG8KWNgCAggA | ||||
| MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECADohDo0yZ+5BIIJSJ+akpQD4kl1 | ||||
| 0K+EMwYmNiqrlC1VpdMMFVEKYL34uhieaWkmhPdmlo5RXggBkdzsKb9V6veIiWBo | ||||
| i7kF8ywMBzR8xP9hqE/1V64vlsz2YOi0jS55CgAL/g/vtWV/lXHecgCjLgytlkrP | ||||
| Zsj/cb65XhpnEWP2fFilUAU14K2/5ecJce3kAWMbSBnms9fMXN6uIsdr+J39KaYn | ||||
| thsTaH7zOfOOeqhvc5g9hcTl248RgQhpDPzCsGqOvKvzdSiKbPPxFSveNE5L8Siv | ||||
| Zu0g7PvGincOw4AiNwizy1VgR2UTEagmQvqAiI1aBxP6jvePnn0CoG+DAnPlhyMk | ||||
| Ei2uQ76USFtC3DBFpzfg2NU5pubq90dq0Zgdc4LUz9czwE5XUFXShQ70BGqLHvYG | ||||
| clSMu3D0lodbQ0Cdg10hCKesNz4i+T7Z7xkvEERB1v7p564qGrn7NAb5tb6JmxlR | ||||
| wHwS6zsaLzAymNSdxh87hlpupXn688HUSn51KKwjVYnJxyYSAIzkNRQ1LVwzS4TJ | ||||
| R81J6GpPawKzFGZYnvdbLw72ohyLu8D6d7NMLR/Fc/pYT/QgoH801DeseSpaDd/h | ||||
| RFr0ax3EA7MDnFQfmv6m+I9OmhTX+qdhFHtRolW+NUGAdXHFun34+cuIy5hPP3OT | ||||
| FyW7vAE0gQN2zgllJcIUjz2Xd9PzoX/tsuh0/RTaj1sEAQhlENfhDfz5GFHSHYbS | ||||
| fTCLLHR7YISlqUwSH0TdzP2/vsh283iqaQJL+OLfwquTDONDekNtoiIG7HlB6dQr | ||||
| 9ni9wg9lO8fGRbFsN9DrJ1vJcJN5CmY+fE77BNJV2K6J/9EX1wOKp3PaTFTFOjqy | ||||
| tp2K/M4BTT+JVG6sC2gcDgHYg/2pGTc+YxaKyFVziP7rFQ0plzB1GqrFOGeaSDkH | ||||
| 7VfuUbwlTtohiToL+Fc7sbKV95bcjtug9o9bxdzTPikd5E0gAqOLwJ2bqgFBYZFl | ||||
| t/Ohm8BBwnKuJqKMJXSHvEDFTM9e6VaTVKD4r+7lI9Ng8h89ergjBUdRxB0I/4PE | ||||
| g7HvzcXm8Vru8U7LmfCR3KKBtfwNN3n0v9pFk4D24pMRX4o+SD+INDVaoZ/Dswqp | ||||
| sI75SngxgOXdvP5x9F6LiTklZ+jxciYsVzb5f3CqkjQ57990Dxyt/+EveQBO4yLb | ||||
| Hnzw9wYcunqsiRmhzKfkkHwHAYmGggtWWaZN7qhLPFgvmtt+Tkf6Ord6FWlEpr6y | ||||
| 5dzHds5tqH/v3Tv4NsTp8bLWqSACVoZ4tKbiv/AijVGar7hiHS4sJ+ty8q7TriNM | ||||
| 46TxQ/iyxQ+4ycfE0yv6MIYv3g135X8lZJfP0gK5wv5sdtgppUcHpySngJv1Se2+ | ||||
| KGS0WjQ9ZqlBFl2V2eJcSRzHRh4351BnoGYsogBrMxUUuFvHho9BkP+fPPkCna6V | ||||
| S8f7AKb1YuyfeNrq9dLW/5FjaSI/or6VGSv62LBUXXGflFQgu18IZ6eNkzgir0Bi | ||||
| bdPBiUjnYxTVbfEaxP2CGCuPyG4AQhkbjciyHj5fuQkXIq4e6x91u3FVRHu/LOwN | ||||
| zjWYs+JhgVzWlH1S2qTaO1LplMt1mG6TXFEouC+qkZ6Os+Tk8jPfUj71/ffh/p73 | ||||
| We9RMPEdvBnOQXRlIJQXa14QYQ218POC2LSD23aWqPdDsssIwpxOKBJHuRqBZWd2 | ||||
| 0VK6YpFubZtJW4Z6DKoc98exR+JU3y9ah2V2G7poE4m9V7Np/PjGJ5zLPtx4GhFO | ||||
| Xr2D6FK26IGUQlO9G+iErvIOeo6j1GJw85HfDY8+wGFNrPmYXXDbkbgwKhcg86Oq | ||||
| hBh9Zd6P4J7cvtps8A0+F/ROWalmb06TOSZ62lHrJZpnMuI4enSLh7fq3gfPLKgc | ||||
| MWbxw9Td9LxGt4So4sg8QT2uKlVDDpsP81Jaz1wK9H71GZ+cKhYs4nEQChSPGh2f | ||||
| XcpV0/CM855FsRTXOpbNHi9rj4jUWOYRkpF7nCdEiGxBDQ5mMdzQ2j+wWUpCl4XH | ||||
| oD39DVsEmDvRM4fIoYfiurZB+ByWfNwQ5uWcLqexapu+MzVgzEZd+UcejmmlLc0E | ||||
| BV3U/DgoRoI4zkpRMzKeRMdKFZ93HjHETrSISfqvulOqgA/FsWCoSt3OSxlYQ+vm | ||||
| bS8gFuF7FuadfQpZ+9wnsrVceNL4bgaZ8jB2wYLPJ+YGz16DtRkfp24gYPSfKfeU | ||||
| LuhWbKrRE3MLlMSsjtdrLMUW5nxttdDyxbOj9lBezA+LEiiQGP5Wv10wWyjaAFTg | ||||
| UCAfWr2oP1WH/lXmIqDYD6zgZEgb2rRmnpeZGbzB5xKYTp97YeKxg/kuPIl9Tf5t | ||||
| GKYUPp5wO6PEkiHDCyCC8cyzs54pAwMBZZkuNcMZ0vse1FcBFZ8YjEwuxRnVMHdJ | ||||
| 3ZEi1b/kHTWDgH1zvj9pHbT+p1DZmZakV6P+gPxkvcLyzb9Zkt4pWQ6PbmZa6q/c | ||||
| dYDQExeB/tEiGBn+nb5mYbjhGm8kkokK3lbRRuoqCG/cNBDeGYGNU8q6EabbrSGQ | ||||
| BU1s4Uda/kHzXXmHxphV8P6luvh/aI56RHPVzj3tDBhNBZXjsIm8vyLi1jd5Y/AD | ||||
| vzg1Vkhf0AAZpSA6w4uTj+/JCVR8ksitXuDNit2iEWcFHmz6vtuKw78lB8VkpI1s | ||||
| Y5WmXsZbdWsp66GNWcA5MmBRBb7vd1idSfbw9yRLuiZAhVAmlGpVbSUplfTe4wOi | ||||
| lDfAZLGVbfvdjWIR1fY5QzJBckfSe3QuuHPmsa+qTLlYbZxWeO01JfoWBADwIa28 | ||||
| otFSYOi9gLAIHOHuRTB4uGZZ1R2B1HjDOx+VFfkpuzUvevG3sA7VZGP7KlvtJ4TJ | ||||
| +f1KvxBkQoVK0e1dKOFJfqsUDUt+hADQt3fpSpw/x+AROybuynbtJV5oC9/VJG76 | ||||
| 7n3dkmZ/07ALJ1vATwMK3/XUW/JNVKjmS87/HkqvpPYlgHK1avwWvEf+Y/0LM6VM | ||||
| mfEi3ZGo6yGye9O1f5ISRdNpXkFRTYTpOpxGL7vGy7JnGE8ZEpkqHREbqptw34I9 | ||||
| I0DuWszHoohU/MNfXUYIIssmWi54iwN8DHDWoh3bNMmEtLEOzPFGk4016yGpXLea | ||||
| zrMG2XcHwgwX0S/qORDLR4N826diQqrd49V0yjBnqCyAtIlOrW0l7oAqaJK5eaeO | ||||
| k5E/xOQ9MK94fdI8ahT+Bw== | ||||
| -----END ENCRYPTED PRIVATE KEY----- | ||||
| </key> | ||||
|  | ||||
| # Verify server certificate by checking | ||||
| # that the certicate has the nsCertType | ||||
| # field set to "server".  This is an | ||||
| # important precaution to protect against | ||||
| # a potential attack discussed here: | ||||
| #  http://openvpn.net/howto.html#mitm | ||||
| # | ||||
| # To use this feature, you will need to generate | ||||
| # your server certificates with the nsCertType | ||||
| # field set to "server".  The build-key-serve | ||||
| ns-cert-type server | ||||
|  | ||||
| # If a tls-auth key is used on the server | ||||
| # then every client must also have the key. | ||||
| # | ||||
| # Don't forget to set the 'key-direction' Parameter if using | ||||
| # Inline Key. Usualy , sever has key direction '0', while client | ||||
| # has ke direction '1'. | ||||
| # | ||||
| key-direction 1 | ||||
| <tls-auth> | ||||
| -----BEGIN OpenVPN Static key V1----- | ||||
| ea4b0c3c2469d8119fba1b968f7a3ac1 | ||||
| 97af13fc4b4fd1d7e6e3aa6b6513ca98 | ||||
| 0acee9fba071da555f9ce14d6642e20a | ||||
| 452192aada6a80e73dc62c3103c780fe | ||||
| 8b5df3a054ba1e86d01bb880defbac93 | ||||
| f061ebe4cf87f5c123ec49ba82f50e1a | ||||
| e83290dfd4debeba063e3ca1c5f37bac | ||||
| 457184dea9a1a97a053ada58f63b7c1f | ||||
| 1de01ca49f3789716e8df654727e4ee4 | ||||
| 77d9b182ba174ef871d72ea2bf82d25b | ||||
| 8d02b7a783324263e03229c0852e712f | ||||
| 950c0528985bc1050145f6e1a2379466 | ||||
| 11058027d0373a920718c5a5b2f9177c | ||||
| 94365214e24022b2c34d51f25b008f02 | ||||
| 8a198e2ae5910e83120b533853bc47a6 | ||||
| 2a579fc8df42a997fa4e4854fcf1608a | ||||
| -----END OpenVPN Static key V1----- | ||||
| </tls-auth> | ||||
|  | ||||
| # Select a cryptographic cipher. | ||||
| # If the cipher option is used on the server | ||||
| # then you must also specify it here. | ||||
|  | ||||
| # Enable compression on the VPN link. | ||||
| # Don't enable this unless it is also | ||||
| # enabled in the server config file. | ||||
| comp-lzo | ||||
|  | ||||
| # Verbosity level. | ||||
| # 0 -- quiet except for fatal errors. | ||||
| # 1 -- mostly quiet, but display non-fatal network errors. | ||||
| # 3 -- medium output, good for normal operation. | ||||
| # 9 -- verbose, good for troubleshooting | ||||
| verb 1 | ||||
|  | ||||
| # Setting 'pull' on the client takes care to get the 'push' durectives | ||||
| # from the server | ||||
| pull | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/ipp.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/ipp.txt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| VPN-AKB-gw-ckubu,10.1.82.2 | ||||
							
								
								
									
										4
									
								
								AKB/openvpn/gw-ckubu/keys-created.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								AKB/openvpn/gw-ckubu/keys-created.txt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | ||||
|  | ||||
| key...............: gw-ckubu.key | ||||
| common name.......: VPN-AKB-gw-ckubu | ||||
| password..........: Boox9caegaijie4pihu7bu8gei0quo0h | ||||
							
								
								
									
										141
									
								
								AKB/openvpn/gw-ckubu/keys/01.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										141
									
								
								AKB/openvpn/gw-ckubu/keys/01.pem
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,141 @@ | ||||
| Certificate: | ||||
|     Data: | ||||
|         Version: 3 (0x2) | ||||
|         Serial Number: 1 (0x1) | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|         Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Validity | ||||
|             Not Before: Feb  5 20:44:53 2018 GMT | ||||
|             Not After : Feb  5 20:44:53 2038 GMT | ||||
|         Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB-server/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Subject Public Key Info: | ||||
|             Public Key Algorithm: rsaEncryption | ||||
|                 Public-Key: (4096 bit) | ||||
|                 Modulus: | ||||
|                     00:9c:18:9b:81:a2:15:07:04:d9:1d:c7:a9:5a:03: | ||||
|                     d4:a1:90:97:43:f2:6c:65:5f:da:44:77:df:a0:f9: | ||||
|                     6d:be:85:c0:3b:6c:08:b4:37:16:55:fb:47:0e:6e: | ||||
|                     93:de:5d:c2:f3:a5:09:d8:e9:a8:86:f7:ba:68:e6: | ||||
|                     94:7c:1a:7d:32:e7:44:e4:86:cb:8c:5e:5c:2e:7b: | ||||
|                     ed:f4:31:12:34:95:31:44:56:de:8e:df:3a:a1:09: | ||||
|                     b3:59:c5:b1:c9:a2:ca:7d:bf:b2:1f:a9:36:7c:70: | ||||
|                     6f:76:6e:75:9a:72:bc:80:19:50:88:ae:a6:fe:05: | ||||
|                     7d:31:df:ba:23:d3:fd:7a:3a:ce:56:a2:0f:72:33: | ||||
|                     0c:7d:3d:33:c5:a6:14:99:43:77:2e:e6:17:be:36: | ||||
|                     c2:57:b9:ff:fe:19:92:db:74:a0:e3:17:01:e4:0d: | ||||
|                     48:50:d7:a8:0b:be:46:fd:65:ba:aa:de:56:5d:9d: | ||||
|                     6a:c9:77:d1:f4:4f:69:f5:7a:7e:b6:77:79:6f:66: | ||||
|                     b9:e4:ce:e5:d4:25:52:d7:6b:f1:b2:23:e0:c2:08: | ||||
|                     be:32:a8:3c:b1:31:fa:cb:31:cc:de:8c:4b:0f:07: | ||||
|                     e4:40:95:c6:d0:73:8d:47:e0:43:2e:c3:a1:59:cc: | ||||
|                     d3:06:8a:80:cf:81:dc:78:04:67:66:bf:a7:d3:ac: | ||||
|                     4a:0e:ab:de:32:fb:98:fb:80:41:af:4d:66:39:ea: | ||||
|                     e0:3c:bd:bb:82:76:82:92:7a:f6:1e:78:64:f5:a0: | ||||
|                     24:be:ba:44:60:0f:be:b6:34:4b:6a:e9:3e:0a:87: | ||||
|                     63:c2:fa:87:14:cc:85:59:e7:33:c6:95:47:87:e3: | ||||
|                     d9:07:af:39:b7:89:68:5e:90:bc:ec:12:d1:f2:11: | ||||
|                     50:ce:90:bc:90:3a:9e:80:a9:55:66:51:e3:da:e3: | ||||
|                     18:1c:a1:5b:1f:ae:ed:95:96:01:eb:25:5a:9f:08: | ||||
|                     93:19:b7:92:0d:3d:f5:b4:db:f8:4b:3a:f7:24:fc: | ||||
|                     74:14:ce:1d:fd:2a:d8:37:fc:92:8a:c2:b8:38:f8: | ||||
|                     f8:86:6d:29:5f:41:3a:43:18:7d:dd:67:23:18:64: | ||||
|                     e6:68:21:a0:f2:0c:dc:03:eb:b1:52:dc:51:b5:c0: | ||||
|                     fa:8a:51:f6:52:21:b3:c8:91:53:31:b4:af:f2:dc: | ||||
|                     bb:5b:9d:c9:e5:20:be:fd:f0:08:c8:f7:f6:82:22: | ||||
|                     07:30:10:3c:74:3d:cc:d6:2d:0e:92:c3:c9:bb:78: | ||||
|                     d7:5e:61:14:42:04:59:c4:2c:94:d3:d4:3c:5c:54: | ||||
|                     36:03:0a:e9:fe:3d:51:1e:7f:40:9d:59:89:75:5f: | ||||
|                     df:a5:8e:63:18:d2:ff:2c:5f:a2:41:21:7f:31:84: | ||||
|                     8c:9d:5f | ||||
|                 Exponent: 65537 (0x10001) | ||||
|         X509v3 extensions: | ||||
|             X509v3 Basic Constraints:  | ||||
|                 CA:FALSE | ||||
|             Netscape Cert Type:  | ||||
|                 SSL Server | ||||
|             Netscape Comment:  | ||||
|                 Easy-RSA Generated Server Certificate | ||||
|             X509v3 Subject Key Identifier:  | ||||
|                 99:27:8E:30:AC:A5:B3:56:72:5C:80:3B:9A:53:D3:54:9B:B8:F7:0A | ||||
|             X509v3 Authority Key Identifier:  | ||||
|                 keyid:7C:42:82:E7:03:EB:05:97:E6:9E:3D:14:C5:FF:AC:25:A1:B8:0C:E8 | ||||
|                 DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|                 serial:9D:A7:AD:A5:99:E9:9F:AE | ||||
|  | ||||
|             X509v3 Extended Key Usage:  | ||||
|                 TLS Web Server Authentication | ||||
|             X509v3 Key Usage:  | ||||
|                 Digital Signature, Key Encipherment | ||||
|             X509v3 Subject Alternative Name:  | ||||
|                 DNS:server | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|          9e:b0:7a:60:42:08:29:e8:49:ae:5b:f1:72:c6:c0:64:4c:0e: | ||||
|          a0:d2:31:8d:7e:7b:b6:00:9a:6f:b7:07:43:23:54:ea:0a:63: | ||||
|          a0:68:30:54:c9:64:8b:e7:bf:58:08:fb:62:ee:fa:6f:8c:f1: | ||||
|          25:3c:6e:bb:32:2e:eb:59:19:36:94:df:a2:4d:37:71:51:db: | ||||
|          b7:02:1a:b1:b2:86:44:15:68:39:95:d1:67:81:da:ae:64:d4: | ||||
|          f8:05:d9:81:47:d0:f1:87:e6:c0:2d:fa:aa:19:ee:70:d4:29: | ||||
|          68:5e:67:d6:4d:b6:f8:cc:38:56:34:50:59:b4:4e:e5:4b:79: | ||||
|          81:f7:0e:62:83:3a:c1:b0:03:50:d5:27:f5:99:4d:01:92:b1: | ||||
|          70:9c:cd:95:62:6b:2c:b2:34:f0:b6:ad:d7:1e:f5:22:cb:eb: | ||||
|          eb:b6:2b:33:5e:8c:56:85:fe:38:c4:94:14:30:77:ee:cb:d8: | ||||
|          03:f9:3d:50:b6:92:9a:9e:59:0b:99:95:e6:83:de:5e:03:08: | ||||
|          e6:75:12:0c:89:d1:59:29:0d:db:6e:cf:9b:1a:b5:88:ba:d6: | ||||
|          d7:c3:ca:0e:31:33:3f:7a:64:ee:c7:80:09:c2:52:15:aa:1a: | ||||
|          d0:df:96:1f:c2:11:ea:6f:39:46:15:58:23:f0:d3:b8:a8:26: | ||||
|          41:ae:cb:1a:f8:43:6f:5f:2a:84:b6:d2:71:f3:b5:94:f4:6a: | ||||
|          c2:61:8f:9a:64:e2:71:43:06:c5:a4:b9:48:95:29:41:37:c1: | ||||
|          3e:9f:56:97:ca:81:dd:4d:0c:35:5e:fd:bd:4c:7c:30:3e:fa: | ||||
|          f1:24:70:8b:a9:f3:d0:d7:0d:04:b7:67:0f:b4:4f:e4:a9:96: | ||||
|          02:9a:6e:7a:9d:76:90:fb:9a:5b:f8:0d:7d:03:b4:94:39:9e: | ||||
|          a8:c6:65:b9:60:86:c5:99:4d:c3:74:08:1f:24:31:04:df:3e: | ||||
|          f3:e8:f3:1e:3b:bf:ac:bf:2a:43:f3:41:5d:27:5b:d3:9f:7a: | ||||
|          60:a1:60:a1:5e:01:a5:1d:42:38:38:1b:00:66:d1:6d:da:21: | ||||
|          a0:e3:27:da:8e:4d:1a:b3:33:ed:28:9a:62:b7:21:3b:fd:3d: | ||||
|          66:1e:50:b8:77:24:99:ca:0f:c9:0c:cb:22:17:60:63:e5:29: | ||||
|          cd:5b:c3:86:85:73:72:08:b3:6f:90:cd:9f:13:8f:8b:33:97: | ||||
|          f2:fe:e9:fd:fd:1d:33:6e:06:dd:dd:1a:36:6e:6a:63:3e:84: | ||||
|          20:5c:08:89:f8:bc:b1:84:b9:6c:70:ea:bb:6d:58:1a:db:a9: | ||||
|          cb:6c:2b:61:1b:ee:11:94:d8:6a:56:7f:23:ec:57:fd:38:df: | ||||
|          2c:7b:dd:b0:58:3b:7a:9d | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIHRDCCBSygAwIBAgIBATANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUx | ||||
| DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w | ||||
| ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0Ix | ||||
| EDAOBgNVBCkTB1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRl | ||||
| MB4XDTE4MDIwNTIwNDQ1M1oXDTM4MDIwNTIwNDQ1M1owgaUxCzAJBgNVBAYTAkRF | ||||
| MQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5v | ||||
| cGVuMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRcwFQYDVQQDEw5WUE4tQUtC | ||||
| LXNlcnZlcjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNA | ||||
| b29wZW4uZGUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCcGJuBohUH | ||||
| BNkdx6laA9ShkJdD8mxlX9pEd9+g+W2+hcA7bAi0NxZV+0cObpPeXcLzpQnY6aiG | ||||
| 97po5pR8Gn0y50TkhsuMXlwue+30MRI0lTFEVt6O3zqhCbNZxbHJosp9v7IfqTZ8 | ||||
| cG92bnWacryAGVCIrqb+BX0x37oj0/16Os5Wog9yMwx9PTPFphSZQ3cu5he+NsJX | ||||
| uf/+GZLbdKDjFwHkDUhQ16gLvkb9Zbqq3lZdnWrJd9H0T2n1en62d3lvZrnkzuXU | ||||
| JVLXa/GyI+DCCL4yqDyxMfrLMczejEsPB+RAlcbQc41H4EMuw6FZzNMGioDPgdx4 | ||||
| BGdmv6fTrEoOq94y+5j7gEGvTWY56uA8vbuCdoKSevYeeGT1oCS+ukRgD762NEtq | ||||
| 6T4Kh2PC+ocUzIVZ5zPGlUeH49kHrzm3iWhekLzsEtHyEVDOkLyQOp6AqVVmUePa | ||||
| 4xgcoVsfru2VlgHrJVqfCJMZt5INPfW02/hLOvck/HQUzh39Ktg3/JKKwrg4+PiG | ||||
| bSlfQTpDGH3dZyMYZOZoIaDyDNwD67FS3FG1wPqKUfZSIbPIkVMxtK/y3Ltbncnl | ||||
| IL798AjI9/aCIgcwEDx0PczWLQ6Sw8m7eNdeYRRCBFnELJTT1DxcVDYDCun+PVEe | ||||
| f0CdWYl1X9+ljmMY0v8sX6JBIX8xhIydXwIDAQABo4IBgjCCAX4wCQYDVR0TBAIw | ||||
| ADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVhc3ktUlNBIEdl | ||||
| bmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJknjjCspbNWclyA | ||||
| O5pT01SbuPcKMIHTBgNVHSMEgcswgciAFHxCgucD6wWX5p49FMX/rCWhuAzooYGk | ||||
| pIGhMIGeMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC | ||||
| ZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl | ||||
| czEQMA4GA1UEAxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3 | ||||
| DQEJARYOYXJndXNAb29wZW4uZGWCCQCdp62lmemfrjATBgNVHSUEDDAKBggrBgEF | ||||
| BQcDATALBgNVHQ8EBAMCBaAwEQYDVR0RBAowCIIGc2VydmVyMA0GCSqGSIb3DQEB | ||||
| CwUAA4ICAQCesHpgQggp6EmuW/FyxsBkTA6g0jGNfnu2AJpvtwdDI1TqCmOgaDBU | ||||
| yWSL579YCPti7vpvjPElPG67Mi7rWRk2lN+iTTdxUdu3AhqxsoZEFWg5ldFngdqu | ||||
| ZNT4BdmBR9Dxh+bALfqqGe5w1CloXmfWTbb4zDhWNFBZtE7lS3mB9w5igzrBsANQ | ||||
| 1Sf1mU0BkrFwnM2VYmsssjTwtq3XHvUiy+vrtiszXoxWhf44xJQUMHfuy9gD+T1Q | ||||
| tpKanlkLmZXmg95eAwjmdRIMidFZKQ3bbs+bGrWIutbXw8oOMTM/emTux4AJwlIV | ||||
| qhrQ35YfwhHqbzlGFVgj8NO4qCZBrssa+ENvXyqEttJx87WU9GrCYY+aZOJxQwbF | ||||
| pLlIlSlBN8E+n1aXyoHdTQw1Xv29THwwPvrxJHCLqfPQ1w0Et2cPtE/kqZYCmm56 | ||||
| nXaQ+5pb+A19A7SUOZ6oxmW5YIbFmU3DdAgfJDEE3z7z6PMeO7+svypD80FdJ1vT | ||||
| n3pgoWChXgGlHUI4OBsAZtFt2iGg4yfajk0aszPtKJpityE7/T1mHlC4dySZyg/J | ||||
| DMsiF2Bj5SnNW8OGhXNyCLNvkM2fE4+LM5fy/un9/R0zbgbd3Ro2bmpjPoQgXAiJ | ||||
| +LyxhLlscOq7bVga26nLbCthG+4RlNhqVn8j7Ff9ON8se92wWDt6nQ== | ||||
| -----END CERTIFICATE----- | ||||
							
								
								
									
										139
									
								
								AKB/openvpn/gw-ckubu/keys/02.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										139
									
								
								AKB/openvpn/gw-ckubu/keys/02.pem
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,139 @@ | ||||
| Certificate: | ||||
|     Data: | ||||
|         Version: 3 (0x2) | ||||
|         Serial Number: 2 (0x2) | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|         Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Validity | ||||
|             Not Before: Feb  5 20:54:55 2018 GMT | ||||
|             Not After : Feb  5 20:54:55 2038 GMT | ||||
|         Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB-gw-ckubu/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Subject Public Key Info: | ||||
|             Public Key Algorithm: rsaEncryption | ||||
|                 Public-Key: (4096 bit) | ||||
|                 Modulus: | ||||
|                     00:aa:52:83:b3:a6:41:03:bc:bc:c7:66:61:c8:0e: | ||||
|                     a9:8c:29:cf:70:52:44:30:e3:40:94:a7:2b:09:4d: | ||||
|                     5d:a9:d5:2d:1f:2d:e5:92:50:b4:92:8b:a9:4b:0a: | ||||
|                     a3:c0:82:da:3c:81:65:0a:cd:92:eb:15:c3:3e:5e: | ||||
|                     70:a6:ee:c8:33:e7:0e:19:78:ad:ae:a6:09:64:d0: | ||||
|                     9f:12:a1:51:7d:9e:f4:3b:4a:ed:6d:20:73:c1:d9: | ||||
|                     f1:30:1a:f6:d2:6d:da:d7:0a:a5:7e:d2:30:d7:84: | ||||
|                     c1:81:13:3e:14:24:f6:b5:14:c7:19:32:9c:87:eb: | ||||
|                     df:c9:fc:9e:87:72:55:db:45:a3:f9:e1:86:5b:2a: | ||||
|                     c9:93:b8:50:72:cf:84:2e:4e:a7:f9:4f:3e:fc:e1: | ||||
|                     22:8c:ff:23:ae:86:aa:e1:dc:c1:7f:9b:7e:cc:d6: | ||||
|                     94:ec:37:0c:97:80:5f:0f:aa:3c:cc:a3:a4:ec:d0: | ||||
|                     6e:c0:33:a8:45:c7:80:36:3c:e3:fe:06:fa:c6:9f: | ||||
|                     a8:3d:99:97:85:2c:a0:02:1b:12:97:52:98:71:7e: | ||||
|                     6e:59:22:b9:79:65:4f:d7:19:ee:5d:d1:23:13:f8: | ||||
|                     a4:2e:1c:f8:da:16:64:57:b9:52:f7:ba:76:fd:75: | ||||
|                     4d:d4:44:03:38:62:3c:52:35:a2:0d:dc:e7:01:88: | ||||
|                     45:bb:7b:e7:be:bc:ee:82:78:f0:eb:bb:c3:e3:0a: | ||||
|                     7e:81:81:fc:4a:e3:ad:2a:c8:b5:7f:02:10:c3:b7: | ||||
|                     bb:5e:e1:81:0c:f3:19:9f:ee:88:af:f3:49:1d:23: | ||||
|                     4d:4b:93:9d:fd:a1:14:1c:97:9d:1f:3d:62:a5:eb: | ||||
|                     11:68:39:51:c8:7b:e7:97:19:3d:7c:f1:da:98:67: | ||||
|                     89:f7:d0:9d:d3:73:4c:97:0f:24:ea:fe:2e:9c:69: | ||||
|                     9d:dc:c8:9c:4a:82:df:54:3c:64:35:20:43:fd:57: | ||||
|                     bf:4a:2b:e9:e3:f3:a5:3b:b1:b7:d5:4a:88:0d:7a: | ||||
|                     66:7f:37:47:33:bc:64:84:7a:d2:53:b5:f9:54:0f: | ||||
|                     53:17:3e:a1:e6:4b:a7:e0:1f:6c:70:47:3b:fc:aa: | ||||
|                     37:0b:34:57:8b:d8:3a:8d:57:b5:43:7f:52:3d:e3: | ||||
|                     16:46:27:7d:c6:87:d2:24:13:5c:84:7f:68:65:33: | ||||
|                     ea:b3:0e:b6:e0:39:7b:76:3d:8b:ca:81:a7:09:c3: | ||||
|                     42:b1:bb:46:50:6d:3a:bd:4d:ae:bb:9e:d7:9c:93: | ||||
|                     68:48:4f:1c:ac:c1:a4:16:16:85:bb:08:c8:9b:81: | ||||
|                     c0:17:71:87:de:97:42:40:60:13:22:91:4d:85:00: | ||||
|                     81:ed:15:4b:70:c3:f5:d9:1d:2e:0b:1b:b2:dd:44: | ||||
|                     77:5a:69 | ||||
|                 Exponent: 65537 (0x10001) | ||||
|         X509v3 extensions: | ||||
|             X509v3 Basic Constraints:  | ||||
|                 CA:FALSE | ||||
|             Netscape Comment:  | ||||
|                 Easy-RSA Generated Certificate | ||||
|             X509v3 Subject Key Identifier:  | ||||
|                 E2:B4:29:34:76:BD:D6:BC:64:9F:DB:D1:EA:9C:D3:00:15:98:20:37 | ||||
|             X509v3 Authority Key Identifier:  | ||||
|                 keyid:7C:42:82:E7:03:EB:05:97:E6:9E:3D:14:C5:FF:AC:25:A1:B8:0C:E8 | ||||
|                 DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|                 serial:9D:A7:AD:A5:99:E9:9F:AE | ||||
|  | ||||
|             X509v3 Extended Key Usage:  | ||||
|                 TLS Web Client Authentication | ||||
|             X509v3 Key Usage:  | ||||
|                 Digital Signature | ||||
|             X509v3 Subject Alternative Name:  | ||||
|                 DNS:gw-ckubu | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|          17:d8:87:39:66:f1:58:d8:be:e6:70:c9:29:00:f6:64:75:c5: | ||||
|          b9:53:5a:7f:c4:fd:df:2b:d0:14:7c:13:5a:da:f5:b8:b9:8c: | ||||
|          6a:98:ac:8c:f2:a0:23:4d:15:d2:f4:ca:3b:d7:18:d1:d9:23: | ||||
|          03:74:b2:7d:b6:2e:50:b5:d6:29:21:69:65:77:59:c4:21:b4: | ||||
|          04:fd:d4:d2:5f:71:7a:f6:b6:4f:31:3a:19:88:78:69:66:1c: | ||||
|          13:d6:f1:5c:30:2e:39:7f:e9:69:d4:10:ad:0f:07:bb:24:62: | ||||
|          3a:bd:89:2f:9f:b4:2e:65:14:d5:c5:0a:f6:89:a5:17:82:d0: | ||||
|          71:84:a2:8f:27:7f:5e:cf:2a:89:2d:cc:a1:56:35:bd:26:e9: | ||||
|          4b:52:f2:2f:10:98:77:26:f9:2a:6a:1d:6e:db:91:b8:06:8a: | ||||
|          85:58:6c:fa:e4:8e:9c:92:16:28:10:56:ed:c4:e1:28:ae:d8: | ||||
|          c3:b6:67:d3:bc:cb:b9:2e:b5:7c:f0:84:2a:26:e7:30:4f:02: | ||||
|          45:2b:bd:87:21:97:e2:17:01:71:77:31:8f:dd:15:ac:4c:7b: | ||||
|          3b:7e:4a:e6:ee:4d:6a:6f:1f:67:1b:c5:d7:c4:ba:c3:45:6c: | ||||
|          6f:db:0b:93:72:c1:1f:b4:c0:02:a2:33:f8:32:49:bf:93:7d: | ||||
|          e0:7e:d0:d3:c4:41:20:d8:9b:ab:2d:b9:30:ab:0b:c6:ee:db: | ||||
|          40:9e:bc:b9:d0:87:32:39:42:c0:43:8b:7c:5c:f8:8d:20:d1: | ||||
|          a1:11:ee:e2:42:43:96:a3:52:d8:e9:33:ca:b2:d1:3a:29:87: | ||||
|          b2:04:cd:03:f5:25:09:ec:ae:83:65:6d:d2:38:40:8d:5a:9c: | ||||
|          00:b3:88:26:20:4e:86:13:bc:b6:83:69:4b:a5:32:9c:c6:38: | ||||
|          a3:22:3f:a9:57:0d:47:f2:9e:08:0e:b9:bc:e6:59:c7:a2:ea: | ||||
|          cc:9f:c5:68:b3:76:41:09:78:07:87:1a:b9:5c:b0:96:0c:cb: | ||||
|          36:b9:3c:21:31:36:87:63:ba:25:14:39:5a:d9:18:a6:58:2e: | ||||
|          ab:11:da:43:32:b0:ac:45:3b:cc:7c:d4:40:61:2b:b7:d2:27: | ||||
|          8c:08:bc:cf:e4:a0:a2:8a:48:3a:33:4d:60:d3:6c:e0:3b:71: | ||||
|          68:d1:61:63:c8:02:80:3e:73:bb:01:ed:52:9d:6d:d1:82:1d: | ||||
|          54:15:1f:9f:d8:51:71:c8:11:b8:cc:db:86:58:54:fe:d4:5f: | ||||
|          c8:50:5a:d7:f1:0c:e6:07:2f:c8:12:45:29:dc:23:a4:fd:1d: | ||||
|          7b:34:a7:53:25:87:47:90:90:97:50:c9:7e:95:b3:e7:76:cd: | ||||
|          3c:c0:6c:fa:88:08:d1:8c | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIHLjCCBRagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUx | ||||
| DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w | ||||
| ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0Ix | ||||
| EDAOBgNVBCkTB1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRl | ||||
| MB4XDTE4MDIwNTIwNTQ1NVoXDTM4MDIwNTIwNTQ1NVowgacxCzAJBgNVBAYTAkRF | ||||
| MQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5v | ||||
| cGVuMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRkwFwYDVQQDExBWUE4tQUtC | ||||
| LWd3LWNrdWJ1MRAwDgYDVQQpEwdWUE4gQUtCMR0wGwYJKoZIhvcNAQkBFg5hcmd1 | ||||
| c0Bvb3Blbi5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKpSg7Om | ||||
| QQO8vMdmYcgOqYwpz3BSRDDjQJSnKwlNXanVLR8t5ZJQtJKLqUsKo8CC2jyBZQrN | ||||
| kusVwz5ecKbuyDPnDhl4ra6mCWTQnxKhUX2e9DtK7W0gc8HZ8TAa9tJt2tcKpX7S | ||||
| MNeEwYETPhQk9rUUxxkynIfr38n8nodyVdtFo/nhhlsqyZO4UHLPhC5Op/lPPvzh | ||||
| Ioz/I66GquHcwX+bfszWlOw3DJeAXw+qPMyjpOzQbsAzqEXHgDY84/4G+safqD2Z | ||||
| l4UsoAIbEpdSmHF+blkiuXllT9cZ7l3RIxP4pC4c+NoWZFe5Uve6dv11TdREAzhi | ||||
| PFI1og3c5wGIRbt757687oJ48Ou7w+MKfoGB/ErjrSrItX8CEMO3u17hgQzzGZ/u | ||||
| iK/zSR0jTUuTnf2hFByXnR89YqXrEWg5Uch755cZPXzx2phniffQndNzTJcPJOr+ | ||||
| LpxpndzInEqC31Q8ZDUgQ/1Xv0or6ePzpTuxt9VKiA16Zn83RzO8ZIR60lO1+VQP | ||||
| Uxc+oeZLp+AfbHBHO/yqNws0V4vYOo1XtUN/Uj3jFkYnfcaH0iQTXIR/aGUz6rMO | ||||
| tuA5e3Y9i8qBpwnDQrG7RlBtOr1Nrrue15yTaEhPHKzBpBYWhbsIyJuBwBdxh96X | ||||
| QkBgEyKRTYUAge0VS3DD9dkdLgsbst1Ed1ppAgMBAAGjggFqMIIBZjAJBgNVHRME | ||||
| AjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNh | ||||
| dGUwHQYDVR0OBBYEFOK0KTR2vda8ZJ/b0eqc0wAVmCA3MIHTBgNVHSMEgcswgciA | ||||
| FHxCgucD6wWX5p49FMX/rCWhuAzooYGkpIGhMIGeMQswCQYDVQQGEwJERTEPMA0G | ||||
| A1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZ | ||||
| MBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMHVlBOLUFLQjEQMA4G | ||||
| A1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQCd | ||||
| p62lmemfrjATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwEwYDVR0R | ||||
| BAwwCoIIZ3ctY2t1YnUwDQYJKoZIhvcNAQELBQADggIBABfYhzlm8VjYvuZwySkA | ||||
| 9mR1xblTWn/E/d8r0BR8E1ra9bi5jGqYrIzyoCNNFdL0yjvXGNHZIwN0sn22LlC1 | ||||
| 1ikhaWV3WcQhtAT91NJfcXr2tk8xOhmIeGlmHBPW8VwwLjl/6WnUEK0PB7skYjq9 | ||||
| iS+ftC5lFNXFCvaJpReC0HGEoo8nf17PKoktzKFWNb0m6UtS8i8QmHcm+SpqHW7b | ||||
| kbgGioVYbPrkjpySFigQVu3E4Siu2MO2Z9O8y7kutXzwhCom5zBPAkUrvYchl+IX | ||||
| AXF3MY/dFaxMezt+SubuTWpvH2cbxdfEusNFbG/bC5NywR+0wAKiM/gySb+TfeB+ | ||||
| 0NPEQSDYm6stuTCrC8bu20CevLnQhzI5QsBDi3xc+I0g0aER7uJCQ5ajUtjpM8qy | ||||
| 0Toph7IEzQP1JQnsroNlbdI4QI1anACziCYgToYTvLaDaUulMpzGOKMiP6lXDUfy | ||||
| nggOubzmWcei6syfxWizdkEJeAeHGrlcsJYMyza5PCExNodjuiUUOVrZGKZYLqsR | ||||
| 2kMysKxFO8x81EBhK7fSJ4wIvM/koKKKSDozTWDTbOA7cWjRYWPIAoA+c7sB7VKd | ||||
| bdGCHVQVH5/YUXHIEbjM24ZYVP7UX8hQWtfxDOYHL8gSRSncI6T9HXs0p1Mlh0eQ | ||||
| kJdQyX6Vs+d2zTzAbPqICNGM | ||||
| -----END CERTIFICATE----- | ||||
							
								
								
									
										39
									
								
								AKB/openvpn/gw-ckubu/keys/ca.crt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										39
									
								
								AKB/openvpn/gw-ckubu/keys/ca.crt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,39 @@ | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIGzDCCBLSgAwIBAgIJAJ2nraWZ6Z+uMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD | ||||
| VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV | ||||
| BAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMH | ||||
| VlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNA | ||||
| b29wZW4uZGUwIBcNMTgwMjA1MjAzMDM3WhgPMjA1MDAyMDUyMDMwMzdaMIGeMQsw | ||||
| CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN | ||||
| BgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UE | ||||
| AxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJn | ||||
| dXNAb29wZW4uZGUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDU3ELr | ||||
| 25xiRgZY6TlrEyKW4z26lI0B/f3q4NcgbZee+6XMU4mLyfbxMDowyfxs1QdhmVZX | ||||
| H4aFhfpge25w4V4XEgslYHV4Tx6fN9jlA5EAwusByayiq2YZ/ZrAqsaSK25atH/E | ||||
| US3tS/bthj4Tt1DGSmXJzVP2d89vDbfdk82lKTBdtlfbnL+zLG8NmL1NHeAGel+B | ||||
| kjHRMXo8m+04Zcq6xykBQZ2/lfS1jhqCUygCyub3moHTCTVmkfbKm9qWrqBMVTbn | ||||
| c5ld3G2TTjuRYVsYGzgnFHPrHtqMFgJOYgS5CIZ2mTsYgAaREt4IPDu5oIC+oe4X | ||||
| iErcIJoCO1NEsuHkuchvWhqRoSaqVOT1bRdVc+v/pfVkRVBb+VOeVQUG78LHRpDx | ||||
| LMx48QtN2P0HY2mdQK1FWZetFo0ncJvmjnFWqV3ZdWwWJmeXGCU+pNmokcP2wn6b | ||||
| zJ9lhtntS5IWqlAWUIUfJEXL+FbRbCCFG5reKcdSoNHFBewvcRfg5wPz6cMQDHXd | ||||
| B03168HJSVb8mB76bmBmc+zsLIFoCm7kepm+uzpY0//Uz0WXXXg6OI/zhBSECng6 | ||||
| hamvri9k6uAeoyVjKJVpG2tALMmYcC2ygxYuFi5mbYg41eAMfBwAtK6sWdLy99qz | ||||
| sLWze8fwl8wHJhfHlLTQrLpMz0lpnjDtVOyP1wIDAQABo4IBBzCCAQMwHQYDVR0O | ||||
| BBYEFHxCgucD6wWX5p49FMX/rCWhuAzoMIHTBgNVHSMEgcswgciAFHxCgucD6wWX | ||||
| 5p49FMX/rCWhuAzooYGkpIGhMIGeMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy | ||||
| bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ | ||||
| TmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBO | ||||
| IEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQCdp62lmemfrjAM | ||||
| BgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQBwmgxFIhkxilpGef3bjiAH | ||||
| yyP78nFOtrQb0lb640pySl07F/2xHTYOPb/TECNzQR8no9aNGZHQlvwEdgLdIrDE | ||||
| I96AwMfhvVqducsXtR7xjX5YV1Dpa7Yqvt10teuhuPtnXV/ClNaNnFMAlJtnw6bs | ||||
| +6cGDATRmizu/lZiHnuzG/ANr9AtMOp5R1yw3vPn/Fx6lQ/M4sKxJg0FrJDMvhDh | ||||
| sFbHA2T+u1Ke7z4BjSFAWb2tTDWfcffBuQhLRYdG0R3RgsZIVP9dtrdrKRAsdIHC | ||||
| FxL9IHr4mlS3VHqtcyXxFlVhOZsQ5KVt4hFUPgMzIEnFq+T+Q9YXnYM72g1An9d1 | ||||
| +Y5YBkhPZONrmUE2zDjdk4bSy58h9xdSCAyziRvKomtrqx0CDOTJyTqPYjWsLCFu | ||||
| xer7bvoWGw1bfC2+5TgcLlCqRtGbgeCj3NJ9xHcv5ZP4PVC5VhmewYJFsDiDEfw7 | ||||
| GOc8y5liXX/+YoJjEHrPwMS/QN7mDH60JdXngm7BafQa29mw3GQXwWlLvfFekMXe | ||||
| DtkRyz0a0FsplnwOScDCsuA0RrJD8T/iUNW6ecdXwwFY5vl8/NhZx2wBnchsBO+z | ||||
| /Aw8kwc9X87NVqIrJVh2i4UWBo/bAlKSTHY2/i+IeMZf2oXhc6yyleXk6jbZ4b2t | ||||
| KIajjnXU5P26nFWLP8IiIA== | ||||
| -----END CERTIFICATE----- | ||||
							
								
								
									
										52
									
								
								AKB/openvpn/gw-ckubu/keys/ca.key
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										52
									
								
								AKB/openvpn/gw-ckubu/keys/ca.key
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,52 @@ | ||||
| -----BEGIN PRIVATE KEY----- | ||||
| MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQDU3ELr25xiRgZY | ||||
| 6TlrEyKW4z26lI0B/f3q4NcgbZee+6XMU4mLyfbxMDowyfxs1QdhmVZXH4aFhfpg | ||||
| e25w4V4XEgslYHV4Tx6fN9jlA5EAwusByayiq2YZ/ZrAqsaSK25atH/EUS3tS/bt | ||||
| hj4Tt1DGSmXJzVP2d89vDbfdk82lKTBdtlfbnL+zLG8NmL1NHeAGel+BkjHRMXo8 | ||||
| m+04Zcq6xykBQZ2/lfS1jhqCUygCyub3moHTCTVmkfbKm9qWrqBMVTbnc5ld3G2T | ||||
| TjuRYVsYGzgnFHPrHtqMFgJOYgS5CIZ2mTsYgAaREt4IPDu5oIC+oe4XiErcIJoC | ||||
| O1NEsuHkuchvWhqRoSaqVOT1bRdVc+v/pfVkRVBb+VOeVQUG78LHRpDxLMx48QtN | ||||
| 2P0HY2mdQK1FWZetFo0ncJvmjnFWqV3ZdWwWJmeXGCU+pNmokcP2wn6bzJ9lhtnt | ||||
| S5IWqlAWUIUfJEXL+FbRbCCFG5reKcdSoNHFBewvcRfg5wPz6cMQDHXdB03168HJ | ||||
| SVb8mB76bmBmc+zsLIFoCm7kepm+uzpY0//Uz0WXXXg6OI/zhBSECng6hamvri9k | ||||
| 6uAeoyVjKJVpG2tALMmYcC2ygxYuFi5mbYg41eAMfBwAtK6sWdLy99qzsLWze8fw | ||||
| l8wHJhfHlLTQrLpMz0lpnjDtVOyP1wIDAQABAoICAFzgzwKDDLWEwHhDK56g9tLH | ||||
| zMOA1hYscYLvIG8x4pqoSyvgt3+bXHjZBksLl20VducLNTVGuDfCwgEfWo0+iQOg | ||||
| B+UDNb6NJ1tpzuX+rGKcqlZZXU6NYzusAL5YxdQ5xykk4SsUEOod31y82pFXx5L+ | ||||
| G3P2d9Bvbr+SSMwSFgUe98+sJKHav3q6xKo2H0Nq6blp5Apxc/NHl4KittuI7vCY | ||||
| vjeiHebe06v0mXSMPEUbq7QWYtdmiTp8Licx4islfyRPeml7c0wVRmqkFDHXPRxD | ||||
| pDjJH9tT1yCQ6eixtEXYhnNxYOvL0RG0HdWSEq1ob0S++1ihS6jJQOoAYND1DMMo | ||||
| j6O8rrlF7I7giSJsHh+N/dkwveXrSI2Vf96J5hHiR1CcYob9ITtGVJH5dFN/WVfq | ||||
| Iw5UBx2ZKqW4eo2EDPcUkEiEFQBI532nsPnLJ2yVLfz9Jul8hWOant4BAsNRSbri | ||||
| ayGRFj/YrgrL90Q7Uzw2tFjTbNLWbZZdsfbrnGsVa/FrbtTa0t2umXDEVZ2WXo2c | ||||
| WvbJ8vLb/9gu4UbJxzgZHXY6ISMWaX+jQLbh7kY/PpLj0r3F6VbxEztfqM3PBRv2 | ||||
| snKfyWl3/IC78AcumywJ+EPBBgNtkt0W7Fc9K5xWJNfxajmBEDZQMFo0uLSMV02a | ||||
| ev3Z0Be3YmVsdD1XZ3EhAoIBAQD3SsirCpVwQW3fka8eX/638wAI5lnEq+8Z6Ac3 | ||||
| uxlUXTkSZEB3eEu8p6EWNufrTr/xBTgrFBEbJZxTqV2DvMY94X496FhxY2xLKgg8 | ||||
| Vs78YqXi9kvTXQcoyqJd3kHvfSeo/GMfVeYzXEMQxYyXt2ZBvbpjO5SO/wXWVzdA | ||||
| syZQbqmyShiN7qfNqHtBa7navMDJFvTCbppyrBAI/15cP/ljyTEv/8D9jZ6HoaAz | ||||
| 7v4j9ps4kYKIZ9AsZT2Et1PukhdSXCkpmczHrAl7R6EoLED7q7XAAYKt9yt+emWu | ||||
| Og9Oo7/x5XYOGGoXxzRVGZDS2L+cirBcrXw4k/3juaSagtZLAoIBAQDcWxex3o0I | ||||
| jtJGM0VB/795pDWph0zh15bASgA8AfQfBUZEC7cxXrNr5R9VCK8H+pI5UhrwzUpD | ||||
| TqFSlk8LHOJWb4bmm6iG3DeOXP6CSGljS71GfB0YB4hxcjpZlrcUTUFD0sCQqpAE | ||||
| F+yf4C3iLc/6y+ZOgnlXze4GP7VPMqCtf71ESg86meuX5NBuol8sI+rW4KNjae/C | ||||
| 55rWRcFkKSALFTPkGr6PwLoXQjBtyj6y+NPr9KuFl0U4JX/JPef2i62P1kLlkjNR | ||||
| 3kbwvO5PZd+8i2BYpIAx85kIuCVg4lHBzP3l46sJ6JlZV/shwyx6LBIWYdemC968 | ||||
| 7xoqUasZaGUlAoIBAGDuznPFJUioTQI6n9MfO8AtH1FdwchGwOV9vv6Id2hLVmiw | ||||
| JVjvLXjYmFsV0Ji6+J/oNNkl94KVno5osABIiciN0CdCIRDpMPTRmALW4DGsFWw+ | ||||
| sQA70eeabkSvL1dJzrb9n3kT+bUeMCet1+tMd2fDkAD/xL68ljQrYbwZvSYACsKZ | ||||
| KsDP0LTbmtzM9kAYhtUMC4r/Qck7StnMB9fPN9l2brJq5OI+leqCX0KcJsBAFR36 | ||||
| Y5lGYCJW2ONh3SOB3mRpPbVR1SRbeif5ruEJX7uG1ipaLTg1z7W3Eo5VsdRYeY+/ | ||||
| KyRhS4zgh9HnwI31aj5ZWsIpOq0OzZFrHmt2Z7sCggEBALBzZSryWh7zNuAt6BSs | ||||
| dagzXSEujdr+5uF9oGhs7A33DEgq1Xv8KFKKu6c89+O8u2CZJaeTzBbPnRDj+dGd | ||||
| RIUQc4awOKgdKYOfZdHvqCxyFtOdSTLXvWOSo7TfoiTopA1qcvalDgOpILr5KeTG | ||||
| 6JcctYRCqGYuKZ7pXwdXNCEae/V2FHHJlUUhXeJptSpEbKW6ZjuSNgLtsShJ3U2W | ||||
| POmDBfVvkQ7NtnYvc1ZHMCPiati0KLEl67DFHmmIX/ol6UqXuSPaCaxSAJ5/u5jq | ||||
| q9lwBiuVNm5JcU7xHkVRlURKITn4MBsUHc/USu3DOxdtuOIhYSy+rpK+KEag9RC4 | ||||
| bt0CggEARAVJZMFc4F74aeHDeQtQYh8PHwuYPF33j5KTeyT59I5pmGKVZDsqc1ZY | ||||
| GxsLZmr8jR4AJomMgymrJIuFqdXfhj1lWu0fHh8mVG9Ja+Mh4WsO2SzMSysIoonR | ||||
| v1Ej+UfefyehzfmUT2tggbs/s7wqNy61C6LmH+HPqGGM4qihIVus8muAxP+9z/W/ | ||||
| KJ3jOsPOj8hx2LBw0RdkbD9WHCjk063Xdw4zXtnt1B3sQ5DJ+INilAXDmOKHyWW8 | ||||
| NM+cGCF5YV63mWBp9jkqICllJCTtPdCr7KhelzOpVHRvDDJDND/EKo+9QbtQkN/9 | ||||
| +p0YwaKXlRKVAXvf7Rqr/9IQ182VBA== | ||||
| -----END PRIVATE KEY----- | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/crl.pem
									
									
									
									
									
										Symbolic link
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/crl.pem
									
									
									
									
									
										Symbolic link
									
								
							| @@ -0,0 +1 @@ | ||||
| ../crl.pem | ||||
							
								
								
									
										13
									
								
								AKB/openvpn/gw-ckubu/keys/dh4096.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								AKB/openvpn/gw-ckubu/keys/dh4096.pem
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,13 @@ | ||||
| -----BEGIN DH PARAMETERS----- | ||||
| MIICCAKCAgEAgPDupjU4lg6zKwNObGKofektBBGNJE3270fvwK/EhRu63ZbQLsLn | ||||
| KL1oHP+CO0g+eD9VDNRpAlOxY6ug+RZm1gbrX7ffGlvC5W2ttOpc6ZugKmS/AYyl | ||||
| c1VJTyjDcOrCnkIlYBUjv4QYVMzek/Uc9doYEcl9WSVzsQ9IHrbOettMeoACkpSt | ||||
| B6cQonmYZyU8YQBD2Bk92vOCdkyFRoQHQlyhd0hUBj7iwUxKtqoSpomZ+cRETVQO | ||||
| HlCw9MsXMeeibD84pCVf2k91IeHt/n62qdP43jNAoFTCNUhO37gghnUSxYKOE83u | ||||
| NZf//i2iwAsc+sEIKbzau4JvZe4dLTHfKVzhyBT7hfiuFH0ZQect4oQp7jBMH2os | ||||
| QN2f//lJ1Hq5OSQSPFGtJi/zTKHE6+x3HtuxKkx2+KZedmt9ban0fggNR2dCUl8V | ||||
| qnHkvE0KTLhvDZJq76pM0Vvt/q9DqEpYlLywW1diV6nH8TdTG+9d57Ofv1pVsm/+ | ||||
| Nqmsq00J5bNLgJvcEo/64Rx84tzsQvdzwUD7UwGTnb6I1epBzPt/Fc4pX3aBUsnO | ||||
| 0vSmDbMN3a67RauEQqqhJ79kR1a+7XSO3s5vf2JVEvqttNx74ufw2t2I5O//Ji7m | ||||
| 0eFYTnDNOPe0TKjKhSTzqcxaQpfuUb3/WdE8o1VKdxz0G+PP2ymnS9sCAQI= | ||||
| -----END DH PARAMETERS----- | ||||
							
								
								
									
										139
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.crt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										139
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.crt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,139 @@ | ||||
| Certificate: | ||||
|     Data: | ||||
|         Version: 3 (0x2) | ||||
|         Serial Number: 2 (0x2) | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|         Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Validity | ||||
|             Not Before: Feb  5 20:54:55 2018 GMT | ||||
|             Not After : Feb  5 20:54:55 2038 GMT | ||||
|         Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB-gw-ckubu/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Subject Public Key Info: | ||||
|             Public Key Algorithm: rsaEncryption | ||||
|                 Public-Key: (4096 bit) | ||||
|                 Modulus: | ||||
|                     00:aa:52:83:b3:a6:41:03:bc:bc:c7:66:61:c8:0e: | ||||
|                     a9:8c:29:cf:70:52:44:30:e3:40:94:a7:2b:09:4d: | ||||
|                     5d:a9:d5:2d:1f:2d:e5:92:50:b4:92:8b:a9:4b:0a: | ||||
|                     a3:c0:82:da:3c:81:65:0a:cd:92:eb:15:c3:3e:5e: | ||||
|                     70:a6:ee:c8:33:e7:0e:19:78:ad:ae:a6:09:64:d0: | ||||
|                     9f:12:a1:51:7d:9e:f4:3b:4a:ed:6d:20:73:c1:d9: | ||||
|                     f1:30:1a:f6:d2:6d:da:d7:0a:a5:7e:d2:30:d7:84: | ||||
|                     c1:81:13:3e:14:24:f6:b5:14:c7:19:32:9c:87:eb: | ||||
|                     df:c9:fc:9e:87:72:55:db:45:a3:f9:e1:86:5b:2a: | ||||
|                     c9:93:b8:50:72:cf:84:2e:4e:a7:f9:4f:3e:fc:e1: | ||||
|                     22:8c:ff:23:ae:86:aa:e1:dc:c1:7f:9b:7e:cc:d6: | ||||
|                     94:ec:37:0c:97:80:5f:0f:aa:3c:cc:a3:a4:ec:d0: | ||||
|                     6e:c0:33:a8:45:c7:80:36:3c:e3:fe:06:fa:c6:9f: | ||||
|                     a8:3d:99:97:85:2c:a0:02:1b:12:97:52:98:71:7e: | ||||
|                     6e:59:22:b9:79:65:4f:d7:19:ee:5d:d1:23:13:f8: | ||||
|                     a4:2e:1c:f8:da:16:64:57:b9:52:f7:ba:76:fd:75: | ||||
|                     4d:d4:44:03:38:62:3c:52:35:a2:0d:dc:e7:01:88: | ||||
|                     45:bb:7b:e7:be:bc:ee:82:78:f0:eb:bb:c3:e3:0a: | ||||
|                     7e:81:81:fc:4a:e3:ad:2a:c8:b5:7f:02:10:c3:b7: | ||||
|                     bb:5e:e1:81:0c:f3:19:9f:ee:88:af:f3:49:1d:23: | ||||
|                     4d:4b:93:9d:fd:a1:14:1c:97:9d:1f:3d:62:a5:eb: | ||||
|                     11:68:39:51:c8:7b:e7:97:19:3d:7c:f1:da:98:67: | ||||
|                     89:f7:d0:9d:d3:73:4c:97:0f:24:ea:fe:2e:9c:69: | ||||
|                     9d:dc:c8:9c:4a:82:df:54:3c:64:35:20:43:fd:57: | ||||
|                     bf:4a:2b:e9:e3:f3:a5:3b:b1:b7:d5:4a:88:0d:7a: | ||||
|                     66:7f:37:47:33:bc:64:84:7a:d2:53:b5:f9:54:0f: | ||||
|                     53:17:3e:a1:e6:4b:a7:e0:1f:6c:70:47:3b:fc:aa: | ||||
|                     37:0b:34:57:8b:d8:3a:8d:57:b5:43:7f:52:3d:e3: | ||||
|                     16:46:27:7d:c6:87:d2:24:13:5c:84:7f:68:65:33: | ||||
|                     ea:b3:0e:b6:e0:39:7b:76:3d:8b:ca:81:a7:09:c3: | ||||
|                     42:b1:bb:46:50:6d:3a:bd:4d:ae:bb:9e:d7:9c:93: | ||||
|                     68:48:4f:1c:ac:c1:a4:16:16:85:bb:08:c8:9b:81: | ||||
|                     c0:17:71:87:de:97:42:40:60:13:22:91:4d:85:00: | ||||
|                     81:ed:15:4b:70:c3:f5:d9:1d:2e:0b:1b:b2:dd:44: | ||||
|                     77:5a:69 | ||||
|                 Exponent: 65537 (0x10001) | ||||
|         X509v3 extensions: | ||||
|             X509v3 Basic Constraints:  | ||||
|                 CA:FALSE | ||||
|             Netscape Comment:  | ||||
|                 Easy-RSA Generated Certificate | ||||
|             X509v3 Subject Key Identifier:  | ||||
|                 E2:B4:29:34:76:BD:D6:BC:64:9F:DB:D1:EA:9C:D3:00:15:98:20:37 | ||||
|             X509v3 Authority Key Identifier:  | ||||
|                 keyid:7C:42:82:E7:03:EB:05:97:E6:9E:3D:14:C5:FF:AC:25:A1:B8:0C:E8 | ||||
|                 DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|                 serial:9D:A7:AD:A5:99:E9:9F:AE | ||||
|  | ||||
|             X509v3 Extended Key Usage:  | ||||
|                 TLS Web Client Authentication | ||||
|             X509v3 Key Usage:  | ||||
|                 Digital Signature | ||||
|             X509v3 Subject Alternative Name:  | ||||
|                 DNS:gw-ckubu | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|          17:d8:87:39:66:f1:58:d8:be:e6:70:c9:29:00:f6:64:75:c5: | ||||
|          b9:53:5a:7f:c4:fd:df:2b:d0:14:7c:13:5a:da:f5:b8:b9:8c: | ||||
|          6a:98:ac:8c:f2:a0:23:4d:15:d2:f4:ca:3b:d7:18:d1:d9:23: | ||||
|          03:74:b2:7d:b6:2e:50:b5:d6:29:21:69:65:77:59:c4:21:b4: | ||||
|          04:fd:d4:d2:5f:71:7a:f6:b6:4f:31:3a:19:88:78:69:66:1c: | ||||
|          13:d6:f1:5c:30:2e:39:7f:e9:69:d4:10:ad:0f:07:bb:24:62: | ||||
|          3a:bd:89:2f:9f:b4:2e:65:14:d5:c5:0a:f6:89:a5:17:82:d0: | ||||
|          71:84:a2:8f:27:7f:5e:cf:2a:89:2d:cc:a1:56:35:bd:26:e9: | ||||
|          4b:52:f2:2f:10:98:77:26:f9:2a:6a:1d:6e:db:91:b8:06:8a: | ||||
|          85:58:6c:fa:e4:8e:9c:92:16:28:10:56:ed:c4:e1:28:ae:d8: | ||||
|          c3:b6:67:d3:bc:cb:b9:2e:b5:7c:f0:84:2a:26:e7:30:4f:02: | ||||
|          45:2b:bd:87:21:97:e2:17:01:71:77:31:8f:dd:15:ac:4c:7b: | ||||
|          3b:7e:4a:e6:ee:4d:6a:6f:1f:67:1b:c5:d7:c4:ba:c3:45:6c: | ||||
|          6f:db:0b:93:72:c1:1f:b4:c0:02:a2:33:f8:32:49:bf:93:7d: | ||||
|          e0:7e:d0:d3:c4:41:20:d8:9b:ab:2d:b9:30:ab:0b:c6:ee:db: | ||||
|          40:9e:bc:b9:d0:87:32:39:42:c0:43:8b:7c:5c:f8:8d:20:d1: | ||||
|          a1:11:ee:e2:42:43:96:a3:52:d8:e9:33:ca:b2:d1:3a:29:87: | ||||
|          b2:04:cd:03:f5:25:09:ec:ae:83:65:6d:d2:38:40:8d:5a:9c: | ||||
|          00:b3:88:26:20:4e:86:13:bc:b6:83:69:4b:a5:32:9c:c6:38: | ||||
|          a3:22:3f:a9:57:0d:47:f2:9e:08:0e:b9:bc:e6:59:c7:a2:ea: | ||||
|          cc:9f:c5:68:b3:76:41:09:78:07:87:1a:b9:5c:b0:96:0c:cb: | ||||
|          36:b9:3c:21:31:36:87:63:ba:25:14:39:5a:d9:18:a6:58:2e: | ||||
|          ab:11:da:43:32:b0:ac:45:3b:cc:7c:d4:40:61:2b:b7:d2:27: | ||||
|          8c:08:bc:cf:e4:a0:a2:8a:48:3a:33:4d:60:d3:6c:e0:3b:71: | ||||
|          68:d1:61:63:c8:02:80:3e:73:bb:01:ed:52:9d:6d:d1:82:1d: | ||||
|          54:15:1f:9f:d8:51:71:c8:11:b8:cc:db:86:58:54:fe:d4:5f: | ||||
|          c8:50:5a:d7:f1:0c:e6:07:2f:c8:12:45:29:dc:23:a4:fd:1d: | ||||
|          7b:34:a7:53:25:87:47:90:90:97:50:c9:7e:95:b3:e7:76:cd: | ||||
|          3c:c0:6c:fa:88:08:d1:8c | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIHLjCCBRagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUx | ||||
| DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w | ||||
| ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0Ix | ||||
| EDAOBgNVBCkTB1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRl | ||||
| MB4XDTE4MDIwNTIwNTQ1NVoXDTM4MDIwNTIwNTQ1NVowgacxCzAJBgNVBAYTAkRF | ||||
| MQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5v | ||||
| cGVuMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRkwFwYDVQQDExBWUE4tQUtC | ||||
| LWd3LWNrdWJ1MRAwDgYDVQQpEwdWUE4gQUtCMR0wGwYJKoZIhvcNAQkBFg5hcmd1 | ||||
| c0Bvb3Blbi5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKpSg7Om | ||||
| QQO8vMdmYcgOqYwpz3BSRDDjQJSnKwlNXanVLR8t5ZJQtJKLqUsKo8CC2jyBZQrN | ||||
| kusVwz5ecKbuyDPnDhl4ra6mCWTQnxKhUX2e9DtK7W0gc8HZ8TAa9tJt2tcKpX7S | ||||
| MNeEwYETPhQk9rUUxxkynIfr38n8nodyVdtFo/nhhlsqyZO4UHLPhC5Op/lPPvzh | ||||
| Ioz/I66GquHcwX+bfszWlOw3DJeAXw+qPMyjpOzQbsAzqEXHgDY84/4G+safqD2Z | ||||
| l4UsoAIbEpdSmHF+blkiuXllT9cZ7l3RIxP4pC4c+NoWZFe5Uve6dv11TdREAzhi | ||||
| PFI1og3c5wGIRbt757687oJ48Ou7w+MKfoGB/ErjrSrItX8CEMO3u17hgQzzGZ/u | ||||
| iK/zSR0jTUuTnf2hFByXnR89YqXrEWg5Uch755cZPXzx2phniffQndNzTJcPJOr+ | ||||
| LpxpndzInEqC31Q8ZDUgQ/1Xv0or6ePzpTuxt9VKiA16Zn83RzO8ZIR60lO1+VQP | ||||
| Uxc+oeZLp+AfbHBHO/yqNws0V4vYOo1XtUN/Uj3jFkYnfcaH0iQTXIR/aGUz6rMO | ||||
| tuA5e3Y9i8qBpwnDQrG7RlBtOr1Nrrue15yTaEhPHKzBpBYWhbsIyJuBwBdxh96X | ||||
| QkBgEyKRTYUAge0VS3DD9dkdLgsbst1Ed1ppAgMBAAGjggFqMIIBZjAJBgNVHRME | ||||
| AjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNh | ||||
| dGUwHQYDVR0OBBYEFOK0KTR2vda8ZJ/b0eqc0wAVmCA3MIHTBgNVHSMEgcswgciA | ||||
| FHxCgucD6wWX5p49FMX/rCWhuAzooYGkpIGhMIGeMQswCQYDVQQGEwJERTEPMA0G | ||||
| A1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZ | ||||
| MBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEQMA4GA1UEAxMHVlBOLUFLQjEQMA4G | ||||
| A1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQCd | ||||
| p62lmemfrjATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwEwYDVR0R | ||||
| BAwwCoIIZ3ctY2t1YnUwDQYJKoZIhvcNAQELBQADggIBABfYhzlm8VjYvuZwySkA | ||||
| 9mR1xblTWn/E/d8r0BR8E1ra9bi5jGqYrIzyoCNNFdL0yjvXGNHZIwN0sn22LlC1 | ||||
| 1ikhaWV3WcQhtAT91NJfcXr2tk8xOhmIeGlmHBPW8VwwLjl/6WnUEK0PB7skYjq9 | ||||
| iS+ftC5lFNXFCvaJpReC0HGEoo8nf17PKoktzKFWNb0m6UtS8i8QmHcm+SpqHW7b | ||||
| kbgGioVYbPrkjpySFigQVu3E4Siu2MO2Z9O8y7kutXzwhCom5zBPAkUrvYchl+IX | ||||
| AXF3MY/dFaxMezt+SubuTWpvH2cbxdfEusNFbG/bC5NywR+0wAKiM/gySb+TfeB+ | ||||
| 0NPEQSDYm6stuTCrC8bu20CevLnQhzI5QsBDi3xc+I0g0aER7uJCQ5ajUtjpM8qy | ||||
| 0Toph7IEzQP1JQnsroNlbdI4QI1anACziCYgToYTvLaDaUulMpzGOKMiP6lXDUfy | ||||
| nggOubzmWcei6syfxWizdkEJeAeHGrlcsJYMyza5PCExNodjuiUUOVrZGKZYLqsR | ||||
| 2kMysKxFO8x81EBhK7fSJ4wIvM/koKKKSDozTWDTbOA7cWjRYWPIAoA+c7sB7VKd | ||||
| bdGCHVQVH5/YUXHIEbjM24ZYVP7UX8hQWtfxDOYHL8gSRSncI6T9HXs0p1Mlh0eQ | ||||
| kJdQyX6Vs+d2zTzAbPqICNGM | ||||
| -----END CERTIFICATE----- | ||||
							
								
								
									
										29
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.csr
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.csr
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,29 @@ | ||||
| -----BEGIN CERTIFICATE REQUEST----- | ||||
| MIIE7TCCAtUCAQAwgacxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN | ||||
| BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBOZXR3b3Jr | ||||
| IFNlcnZpY2VzMRkwFwYDVQQDExBWUE4tQUtCLWd3LWNrdWJ1MRAwDgYDVQQpEwdW | ||||
| UE4gQUtCMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCAiIwDQYJKoZI | ||||
| hvcNAQEBBQADggIPADCCAgoCggIBAKpSg7OmQQO8vMdmYcgOqYwpz3BSRDDjQJSn | ||||
| KwlNXanVLR8t5ZJQtJKLqUsKo8CC2jyBZQrNkusVwz5ecKbuyDPnDhl4ra6mCWTQ | ||||
| nxKhUX2e9DtK7W0gc8HZ8TAa9tJt2tcKpX7SMNeEwYETPhQk9rUUxxkynIfr38n8 | ||||
| nodyVdtFo/nhhlsqyZO4UHLPhC5Op/lPPvzhIoz/I66GquHcwX+bfszWlOw3DJeA | ||||
| Xw+qPMyjpOzQbsAzqEXHgDY84/4G+safqD2Zl4UsoAIbEpdSmHF+blkiuXllT9cZ | ||||
| 7l3RIxP4pC4c+NoWZFe5Uve6dv11TdREAzhiPFI1og3c5wGIRbt757687oJ48Ou7 | ||||
| w+MKfoGB/ErjrSrItX8CEMO3u17hgQzzGZ/uiK/zSR0jTUuTnf2hFByXnR89YqXr | ||||
| EWg5Uch755cZPXzx2phniffQndNzTJcPJOr+LpxpndzInEqC31Q8ZDUgQ/1Xv0or | ||||
| 6ePzpTuxt9VKiA16Zn83RzO8ZIR60lO1+VQPUxc+oeZLp+AfbHBHO/yqNws0V4vY | ||||
| Oo1XtUN/Uj3jFkYnfcaH0iQTXIR/aGUz6rMOtuA5e3Y9i8qBpwnDQrG7RlBtOr1N | ||||
| rrue15yTaEhPHKzBpBYWhbsIyJuBwBdxh96XQkBgEyKRTYUAge0VS3DD9dkdLgsb | ||||
| st1Ed1ppAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAgEAAI+KsNCawI8jrFXfA8bU | ||||
| AxK3YQI9hvQ5Lg5+vmRWr2JXLiMmjYixyqnmsp8nGPCSXksdSSR8yHb7wgNAh5hI | ||||
| DVzmgnwJZ7G00OhmLJqeY/WjGbdzoFUd+tk5E0pTcK6eFtezSC8qpD6kDin4JFbh | ||||
| to63gV471877bW/wwi0GbgTxJE3BQKewF5OOOF/5WMLVzGt7ZwLcLCH9qXw+P87D | ||||
| FOllXcImVxIVeG4o2LADWvHsQ71sCI7jQd+U55yOd0GNF+ON9bCR8dTpUnbF3X0C | ||||
| WwF6g4NXnZy2hv8Q5DmHMkN2f/N5TtB9XQ+/iPTHdPM1UB/iNFS5ZwO+ycIWjJzy | ||||
| p5+7Ukhil1fMLTrbaVZ7XO5HzPy0vDxfs7oZi9cUrea8f/BUrqYapelzatoQ2Dce | ||||
| N1Opz6I84VVdQORzukRcISGssvdH9AJcBeReS/ndn8cJrbOdDS9LnaQ9dO66kpcH | ||||
| pXEKXOVh8qIiZA+FqCLQjPyhixdtnzCAO4B5qARh+BrmYgUsCPA3CNGl/YFN+5im | ||||
| fcIBJk9rMpY2tFfxMtIq7WRtE4UPFThRH28Jd/ITSl7efFG1Vtm2YfIBq1zGfwNH | ||||
| qPqkijoyUN7Emq+Hk5swTuHDtqYhzjTi4G6G+FRAWB3ZLqXE4Ni+cajcsQs8V5Ip | ||||
| um9yfA1CadmrIw6jcHcfpB4= | ||||
| -----END CERTIFICATE REQUEST----- | ||||
							
								
								
									
										54
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.key
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								AKB/openvpn/gw-ckubu/keys/gw-ckubu.key
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,54 @@ | ||||
| -----BEGIN ENCRYPTED PRIVATE KEY----- | ||||
| MIIJnDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIrroJRG8KWNgCAggA | ||||
| MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECADohDo0yZ+5BIIJSJ+akpQD4kl1 | ||||
| 0K+EMwYmNiqrlC1VpdMMFVEKYL34uhieaWkmhPdmlo5RXggBkdzsKb9V6veIiWBo | ||||
| i7kF8ywMBzR8xP9hqE/1V64vlsz2YOi0jS55CgAL/g/vtWV/lXHecgCjLgytlkrP | ||||
| Zsj/cb65XhpnEWP2fFilUAU14K2/5ecJce3kAWMbSBnms9fMXN6uIsdr+J39KaYn | ||||
| thsTaH7zOfOOeqhvc5g9hcTl248RgQhpDPzCsGqOvKvzdSiKbPPxFSveNE5L8Siv | ||||
| Zu0g7PvGincOw4AiNwizy1VgR2UTEagmQvqAiI1aBxP6jvePnn0CoG+DAnPlhyMk | ||||
| Ei2uQ76USFtC3DBFpzfg2NU5pubq90dq0Zgdc4LUz9czwE5XUFXShQ70BGqLHvYG | ||||
| clSMu3D0lodbQ0Cdg10hCKesNz4i+T7Z7xkvEERB1v7p564qGrn7NAb5tb6JmxlR | ||||
| wHwS6zsaLzAymNSdxh87hlpupXn688HUSn51KKwjVYnJxyYSAIzkNRQ1LVwzS4TJ | ||||
| R81J6GpPawKzFGZYnvdbLw72ohyLu8D6d7NMLR/Fc/pYT/QgoH801DeseSpaDd/h | ||||
| RFr0ax3EA7MDnFQfmv6m+I9OmhTX+qdhFHtRolW+NUGAdXHFun34+cuIy5hPP3OT | ||||
| FyW7vAE0gQN2zgllJcIUjz2Xd9PzoX/tsuh0/RTaj1sEAQhlENfhDfz5GFHSHYbS | ||||
| fTCLLHR7YISlqUwSH0TdzP2/vsh283iqaQJL+OLfwquTDONDekNtoiIG7HlB6dQr | ||||
| 9ni9wg9lO8fGRbFsN9DrJ1vJcJN5CmY+fE77BNJV2K6J/9EX1wOKp3PaTFTFOjqy | ||||
| tp2K/M4BTT+JVG6sC2gcDgHYg/2pGTc+YxaKyFVziP7rFQ0plzB1GqrFOGeaSDkH | ||||
| 7VfuUbwlTtohiToL+Fc7sbKV95bcjtug9o9bxdzTPikd5E0gAqOLwJ2bqgFBYZFl | ||||
| t/Ohm8BBwnKuJqKMJXSHvEDFTM9e6VaTVKD4r+7lI9Ng8h89ergjBUdRxB0I/4PE | ||||
| g7HvzcXm8Vru8U7LmfCR3KKBtfwNN3n0v9pFk4D24pMRX4o+SD+INDVaoZ/Dswqp | ||||
| sI75SngxgOXdvP5x9F6LiTklZ+jxciYsVzb5f3CqkjQ57990Dxyt/+EveQBO4yLb | ||||
| Hnzw9wYcunqsiRmhzKfkkHwHAYmGggtWWaZN7qhLPFgvmtt+Tkf6Ord6FWlEpr6y | ||||
| 5dzHds5tqH/v3Tv4NsTp8bLWqSACVoZ4tKbiv/AijVGar7hiHS4sJ+ty8q7TriNM | ||||
| 46TxQ/iyxQ+4ycfE0yv6MIYv3g135X8lZJfP0gK5wv5sdtgppUcHpySngJv1Se2+ | ||||
| KGS0WjQ9ZqlBFl2V2eJcSRzHRh4351BnoGYsogBrMxUUuFvHho9BkP+fPPkCna6V | ||||
| S8f7AKb1YuyfeNrq9dLW/5FjaSI/or6VGSv62LBUXXGflFQgu18IZ6eNkzgir0Bi | ||||
| bdPBiUjnYxTVbfEaxP2CGCuPyG4AQhkbjciyHj5fuQkXIq4e6x91u3FVRHu/LOwN | ||||
| zjWYs+JhgVzWlH1S2qTaO1LplMt1mG6TXFEouC+qkZ6Os+Tk8jPfUj71/ffh/p73 | ||||
| We9RMPEdvBnOQXRlIJQXa14QYQ218POC2LSD23aWqPdDsssIwpxOKBJHuRqBZWd2 | ||||
| 0VK6YpFubZtJW4Z6DKoc98exR+JU3y9ah2V2G7poE4m9V7Np/PjGJ5zLPtx4GhFO | ||||
| Xr2D6FK26IGUQlO9G+iErvIOeo6j1GJw85HfDY8+wGFNrPmYXXDbkbgwKhcg86Oq | ||||
| hBh9Zd6P4J7cvtps8A0+F/ROWalmb06TOSZ62lHrJZpnMuI4enSLh7fq3gfPLKgc | ||||
| MWbxw9Td9LxGt4So4sg8QT2uKlVDDpsP81Jaz1wK9H71GZ+cKhYs4nEQChSPGh2f | ||||
| XcpV0/CM855FsRTXOpbNHi9rj4jUWOYRkpF7nCdEiGxBDQ5mMdzQ2j+wWUpCl4XH | ||||
| oD39DVsEmDvRM4fIoYfiurZB+ByWfNwQ5uWcLqexapu+MzVgzEZd+UcejmmlLc0E | ||||
| BV3U/DgoRoI4zkpRMzKeRMdKFZ93HjHETrSISfqvulOqgA/FsWCoSt3OSxlYQ+vm | ||||
| bS8gFuF7FuadfQpZ+9wnsrVceNL4bgaZ8jB2wYLPJ+YGz16DtRkfp24gYPSfKfeU | ||||
| LuhWbKrRE3MLlMSsjtdrLMUW5nxttdDyxbOj9lBezA+LEiiQGP5Wv10wWyjaAFTg | ||||
| UCAfWr2oP1WH/lXmIqDYD6zgZEgb2rRmnpeZGbzB5xKYTp97YeKxg/kuPIl9Tf5t | ||||
| GKYUPp5wO6PEkiHDCyCC8cyzs54pAwMBZZkuNcMZ0vse1FcBFZ8YjEwuxRnVMHdJ | ||||
| 3ZEi1b/kHTWDgH1zvj9pHbT+p1DZmZakV6P+gPxkvcLyzb9Zkt4pWQ6PbmZa6q/c | ||||
| dYDQExeB/tEiGBn+nb5mYbjhGm8kkokK3lbRRuoqCG/cNBDeGYGNU8q6EabbrSGQ | ||||
| BU1s4Uda/kHzXXmHxphV8P6luvh/aI56RHPVzj3tDBhNBZXjsIm8vyLi1jd5Y/AD | ||||
| vzg1Vkhf0AAZpSA6w4uTj+/JCVR8ksitXuDNit2iEWcFHmz6vtuKw78lB8VkpI1s | ||||
| Y5WmXsZbdWsp66GNWcA5MmBRBb7vd1idSfbw9yRLuiZAhVAmlGpVbSUplfTe4wOi | ||||
| lDfAZLGVbfvdjWIR1fY5QzJBckfSe3QuuHPmsa+qTLlYbZxWeO01JfoWBADwIa28 | ||||
| otFSYOi9gLAIHOHuRTB4uGZZ1R2B1HjDOx+VFfkpuzUvevG3sA7VZGP7KlvtJ4TJ | ||||
| +f1KvxBkQoVK0e1dKOFJfqsUDUt+hADQt3fpSpw/x+AROybuynbtJV5oC9/VJG76 | ||||
| 7n3dkmZ/07ALJ1vATwMK3/XUW/JNVKjmS87/HkqvpPYlgHK1avwWvEf+Y/0LM6VM | ||||
| mfEi3ZGo6yGye9O1f5ISRdNpXkFRTYTpOpxGL7vGy7JnGE8ZEpkqHREbqptw34I9 | ||||
| I0DuWszHoohU/MNfXUYIIssmWi54iwN8DHDWoh3bNMmEtLEOzPFGk4016yGpXLea | ||||
| zrMG2XcHwgwX0S/qORDLR4N826diQqrd49V0yjBnqCyAtIlOrW0l7oAqaJK5eaeO | ||||
| k5E/xOQ9MK94fdI8ahT+Bw== | ||||
| -----END ENCRYPTED PRIVATE KEY----- | ||||
							
								
								
									
										2
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,2 @@ | ||||
| V	380205204453Z		01	unknown	/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB-server/name=VPN AKB/emailAddress=argus@oopen.de | ||||
| V	380205205455Z		02	unknown	/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB-gw-ckubu/name=VPN AKB/emailAddress=argus@oopen.de | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.attr
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.attr
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| unique_subject = yes | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.attr.old
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.attr.old
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| unique_subject = yes | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.old
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/index.txt.old
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| V	380205204453Z		01	unknown	/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB-server/name=VPN AKB/emailAddress=argus@oopen.de | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/serial
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/serial
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| 03 | ||||
							
								
								
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/serial.old
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								AKB/openvpn/gw-ckubu/keys/serial.old
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| 02 | ||||
							
								
								
									
										141
									
								
								AKB/openvpn/gw-ckubu/keys/server.crt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										141
									
								
								AKB/openvpn/gw-ckubu/keys/server.crt
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,141 @@ | ||||
| Certificate: | ||||
|     Data: | ||||
|         Version: 3 (0x2) | ||||
|         Serial Number: 1 (0x1) | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|         Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Validity | ||||
|             Not Before: Feb  5 20:44:53 2018 GMT | ||||
|             Not After : Feb  5 20:44:53 2038 GMT | ||||
|         Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=VPN-AKB-server/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|         Subject Public Key Info: | ||||
|             Public Key Algorithm: rsaEncryption | ||||
|                 Public-Key: (4096 bit) | ||||
|                 Modulus: | ||||
|                     00:9c:18:9b:81:a2:15:07:04:d9:1d:c7:a9:5a:03: | ||||
|                     d4:a1:90:97:43:f2:6c:65:5f:da:44:77:df:a0:f9: | ||||
|                     6d:be:85:c0:3b:6c:08:b4:37:16:55:fb:47:0e:6e: | ||||
|                     93:de:5d:c2:f3:a5:09:d8:e9:a8:86:f7:ba:68:e6: | ||||
|                     94:7c:1a:7d:32:e7:44:e4:86:cb:8c:5e:5c:2e:7b: | ||||
|                     ed:f4:31:12:34:95:31:44:56:de:8e:df:3a:a1:09: | ||||
|                     b3:59:c5:b1:c9:a2:ca:7d:bf:b2:1f:a9:36:7c:70: | ||||
|                     6f:76:6e:75:9a:72:bc:80:19:50:88:ae:a6:fe:05: | ||||
|                     7d:31:df:ba:23:d3:fd:7a:3a:ce:56:a2:0f:72:33: | ||||
|                     0c:7d:3d:33:c5:a6:14:99:43:77:2e:e6:17:be:36: | ||||
|                     c2:57:b9:ff:fe:19:92:db:74:a0:e3:17:01:e4:0d: | ||||
|                     48:50:d7:a8:0b:be:46:fd:65:ba:aa:de:56:5d:9d: | ||||
|                     6a:c9:77:d1:f4:4f:69:f5:7a:7e:b6:77:79:6f:66: | ||||
|                     b9:e4:ce:e5:d4:25:52:d7:6b:f1:b2:23:e0:c2:08: | ||||
|                     be:32:a8:3c:b1:31:fa:cb:31:cc:de:8c:4b:0f:07: | ||||
|                     e4:40:95:c6:d0:73:8d:47:e0:43:2e:c3:a1:59:cc: | ||||
|                     d3:06:8a:80:cf:81:dc:78:04:67:66:bf:a7:d3:ac: | ||||
|                     4a:0e:ab:de:32:fb:98:fb:80:41:af:4d:66:39:ea: | ||||
|                     e0:3c:bd:bb:82:76:82:92:7a:f6:1e:78:64:f5:a0: | ||||
|                     24:be:ba:44:60:0f:be:b6:34:4b:6a:e9:3e:0a:87: | ||||
|                     63:c2:fa:87:14:cc:85:59:e7:33:c6:95:47:87:e3: | ||||
|                     d9:07:af:39:b7:89:68:5e:90:bc:ec:12:d1:f2:11: | ||||
|                     50:ce:90:bc:90:3a:9e:80:a9:55:66:51:e3:da:e3: | ||||
|                     18:1c:a1:5b:1f:ae:ed:95:96:01:eb:25:5a:9f:08: | ||||
|                     93:19:b7:92:0d:3d:f5:b4:db:f8:4b:3a:f7:24:fc: | ||||
|                     74:14:ce:1d:fd:2a:d8:37:fc:92:8a:c2:b8:38:f8: | ||||
|                     f8:86:6d:29:5f:41:3a:43:18:7d:dd:67:23:18:64: | ||||
|                     e6:68:21:a0:f2:0c:dc:03:eb:b1:52:dc:51:b5:c0: | ||||
|                     fa:8a:51:f6:52:21:b3:c8:91:53:31:b4:af:f2:dc: | ||||
|                     bb:5b:9d:c9:e5:20:be:fd:f0:08:c8:f7:f6:82:22: | ||||
|                     07:30:10:3c:74:3d:cc:d6:2d:0e:92:c3:c9:bb:78: | ||||
|                     d7:5e:61:14:42:04:59:c4:2c:94:d3:d4:3c:5c:54: | ||||
|                     36:03:0a:e9:fe:3d:51:1e:7f:40:9d:59:89:75:5f: | ||||
|                     df:a5:8e:63:18:d2:ff:2c:5f:a2:41:21:7f:31:84: | ||||
|                     8c:9d:5f | ||||
|                 Exponent: 65537 (0x10001) | ||||
|         X509v3 extensions: | ||||
|             X509v3 Basic Constraints:  | ||||
|                 CA:FALSE | ||||
|             Netscape Cert Type:  | ||||
|                 SSL Server | ||||
|             Netscape Comment:  | ||||
|                 Easy-RSA Generated Server Certificate | ||||
|             X509v3 Subject Key Identifier:  | ||||
|                 99:27:8E:30:AC:A5:B3:56:72:5C:80:3B:9A:53:D3:54:9B:B8:F7:0A | ||||
|             X509v3 Authority Key Identifier:  | ||||
|                 keyid:7C:42:82:E7:03:EB:05:97:E6:9E:3D:14:C5:FF:AC:25:A1:B8:0C:E8 | ||||
|                 DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=Network Services/CN=VPN-AKB/name=VPN AKB/emailAddress=argus@oopen.de | ||||
|                 serial:9D:A7:AD:A5:99:E9:9F:AE | ||||
|  | ||||
|             X509v3 Extended Key Usage:  | ||||
|                 TLS Web Server Authentication | ||||
|             X509v3 Key Usage:  | ||||
|                 Digital Signature, Key Encipherment | ||||
|             X509v3 Subject Alternative Name:  | ||||
|                 DNS:server | ||||
|     Signature Algorithm: sha256WithRSAEncryption | ||||
|          9e:b0:7a:60:42:08:29:e8:49:ae:5b:f1:72:c6:c0:64:4c:0e: | ||||
|          a0:d2:31:8d:7e:7b:b6:00:9a:6f:b7:07:43:23:54:ea:0a:63: | ||||
|          a0:68:30:54:c9:64:8b:e7:bf:58:08:fb:62:ee:fa:6f:8c:f1: | ||||
|          25:3c:6e:bb:32:2e:eb:59:19:36:94:df:a2:4d:37:71:51:db: | ||||
|          b7:02:1a:b1:b2:86:44:15:68:39:95:d1:67:81:da:ae:64:d4: | ||||
|          f8:05:d9:81:47:d0:f1:87:e6:c0:2d:fa:aa:19:ee:70:d4:29: | ||||
|          68:5e:67:d6:4d:b6:f8:cc:38:56:34:50:59:b4:4e:e5:4b:79: | ||||
|          81:f7:0e:62:83:3a:c1:b0:03:50:d5:27:f5:99:4d:01:92:b1: | ||||
|          70:9c:cd:95:62:6b:2c:b2:34:f0:b6:ad:d7:1e:f5:22:cb:eb: | ||||
|          eb:b6:2b:33:5e:8c:56:85:fe:38:c4:94:14:30:77:ee:cb:d8: | ||||
|          03:f9:3d:50:b6:92:9a:9e:59:0b:99:95:e6:83:de:5e:03:08: | ||||
|          e6:75:12:0c:89:d1:59:29:0d:db:6e:cf:9b:1a:b5:88:ba:d6: | ||||
|          d7:c3:ca:0e:31:33:3f:7a:64:ee:c7:80:09:c2:52:15:aa:1a: | ||||
|          d0:df:96:1f:c2:11:ea:6f:39:46:15:58:23:f0:d3:b8:a8:26: | ||||
|          41:ae:cb:1a:f8:43:6f:5f:2a:84:b6:d2:71:f3:b5:94:f4:6a: | ||||
|          c2:61:8f:9a:64:e2:71:43:06:c5:a4:b9:48:95:29:41:37:c1: | ||||
|          3e:9f:56:97:ca:81:dd:4d:0c:35:5e:fd:bd:4c:7c:30:3e:fa: | ||||
|          f1:24:70:8b:a9:f3:d0:d7:0d:04:b7:67:0f:b4:4f:e4:a9:96: | ||||
|          02:9a:6e:7a:9d:76:90:fb:9a:5b:f8:0d:7d:03:b4:94:39:9e: | ||||
|          a8:c6:65:b9:60:86:c5:99:4d:c3:74:08:1f:24:31:04:df:3e: | ||||
|          f3:e8:f3:1e:3b:bf:ac:bf:2a:43:f3:41:5d:27:5b:d3:9f:7a: | ||||
|          60:a1:60:a1:5e:01:a5:1d:42:38:38:1b:00:66:d1:6d:da:21: | ||||
|          a0:e3:27:da:8e:4d:1a:b3:33:ed:28:9a:62:b7:21:3b:fd:3d: | ||||
|          66:1e:50:b8:77:24:99:ca:0f:c9:0c:cb:22:17:60:63:e5:29: | ||||
|          cd:5b:c3:86:85:73:72:08:b3:6f:90:cd:9f:13:8f:8b:33:97: | ||||
|          f2:fe:e9:fd:fd:1d:33:6e:06:dd:dd:1a:36:6e:6a:63:3e:84: | ||||
|          20:5c:08:89:f8:bc:b1:84:b9:6c:70:ea:bb:6d:58:1a:db:a9: | ||||
|          cb:6c:2b:61:1b:ee:11:94:d8:6a:56:7f:23:ec:57:fd:38:df: | ||||
|          2c:7b:dd:b0:58:3b:7a:9d | ||||
| -----BEGIN CERTIFICATE----- | ||||
| MIIHRDCCBSygAwIBAgIBATANBgkqhkiG9w0BAQsFADCBnjELMAkGA1UEBhMCREUx | ||||
| DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w | ||||
| ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxEDAOBgNVBAMTB1ZQTi1BS0Ix | ||||
| EDAOBgNVBCkTB1ZQTiBBS0IxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRl | ||||
| MB4XDTE4MDIwNTIwNDQ1M1oXDTM4MDIwNTIwNDQ1M1owgaUxCzAJBgNVBAYTAkRF | ||||
| MQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5v | ||||
| cGVuMRkwFwYDVQQLExBOZXR3b3JrIFNlcnZpY2VzMRcwFQYDVQQDEw5WUE4tQUtC | ||||
| LXNlcnZlcjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNA | ||||
| b29wZW4uZGUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCcGJuBohUH | ||||
| BNkdx6laA9ShkJdD8mxlX9pEd9+g+W2+hcA7bAi0NxZV+0cObpPeXcLzpQnY6aiG | ||||
| 97po5pR8Gn0y50TkhsuMXlwue+30MRI0lTFEVt6O3zqhCbNZxbHJosp9v7IfqTZ8 | ||||
| cG92bnWacryAGVCIrqb+BX0x37oj0/16Os5Wog9yMwx9PTPFphSZQ3cu5he+NsJX | ||||
| uf/+GZLbdKDjFwHkDUhQ16gLvkb9Zbqq3lZdnWrJd9H0T2n1en62d3lvZrnkzuXU | ||||
| JVLXa/GyI+DCCL4yqDyxMfrLMczejEsPB+RAlcbQc41H4EMuw6FZzNMGioDPgdx4 | ||||
| BGdmv6fTrEoOq94y+5j7gEGvTWY56uA8vbuCdoKSevYeeGT1oCS+ukRgD762NEtq | ||||
| 6T4Kh2PC+ocUzIVZ5zPGlUeH49kHrzm3iWhekLzsEtHyEVDOkLyQOp6AqVVmUePa | ||||
| 4xgcoVsfru2VlgHrJVqfCJMZt5INPfW02/hLOvck/HQUzh39Ktg3/JKKwrg4+PiG | ||||
| bSlfQTpDGH3dZyMYZOZoIaDyDNwD67FS3FG1wPqKUfZSIbPIkVMxtK/y3Ltbncnl | ||||
| IL798AjI9/aCIgcwEDx0PczWLQ6Sw8m7eNdeYRRCBFnELJTT1DxcVDYDCun+PVEe | ||||
| f0CdWYl1X9+ljmMY0v8sX6JBIX8xhIydXwIDAQABo4IBgjCCAX4wCQYDVR0TBAIw | ||||
| ADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVhc3ktUlNBIEdl | ||||
| bmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJknjjCspbNWclyA | ||||
| O5pT01SbuPcKMIHTBgNVHSMEgcswgciAFHxCgucD6wWX5p49FMX/rCWhuAzooYGk | ||||
| pIGhMIGeMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZC | ||||
| ZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNl | ||||
| czEQMA4GA1UEAxMHVlBOLUFLQjEQMA4GA1UEKRMHVlBOIEFLQjEdMBsGCSqGSIb3 | ||||
| DQEJARYOYXJndXNAb29wZW4uZGWCCQCdp62lmemfrjATBgNVHSUEDDAKBggrBgEF | ||||
| BQcDATALBgNVHQ8EBAMCBaAwEQYDVR0RBAowCIIGc2VydmVyMA0GCSqGSIb3DQEB | ||||
| CwUAA4ICAQCesHpgQggp6EmuW/FyxsBkTA6g0jGNfnu2AJpvtwdDI1TqCmOgaDBU | ||||
| yWSL579YCPti7vpvjPElPG67Mi7rWRk2lN+iTTdxUdu3AhqxsoZEFWg5ldFngdqu | ||||
| ZNT4BdmBR9Dxh+bALfqqGe5w1CloXmfWTbb4zDhWNFBZtE7lS3mB9w5igzrBsANQ | ||||
| 1Sf1mU0BkrFwnM2VYmsssjTwtq3XHvUiy+vrtiszXoxWhf44xJQUMHfuy9gD+T1Q | ||||
| tpKanlkLmZXmg95eAwjmdRIMidFZKQ3bbs+bGrWIutbXw8oOMTM/emTux4AJwlIV | ||||
| qhrQ35YfwhHqbzlGFVgj8NO4qCZBrssa+ENvXyqEttJx87WU9GrCYY+aZOJxQwbF | ||||
| pLlIlSlBN8E+n1aXyoHdTQw1Xv29THwwPvrxJHCLqfPQ1w0Et2cPtE/kqZYCmm56 | ||||
| nXaQ+5pb+A19A7SUOZ6oxmW5YIbFmU3DdAgfJDEE3z7z6PMeO7+svypD80FdJ1vT | ||||
| n3pgoWChXgGlHUI4OBsAZtFt2iGg4yfajk0aszPtKJpityE7/T1mHlC4dySZyg/J | ||||
| DMsiF2Bj5SnNW8OGhXNyCLNvkM2fE4+LM5fy/un9/R0zbgbd3Ro2bmpjPoQgXAiJ | ||||
| +LyxhLlscOq7bVga26nLbCthG+4RlNhqVn8j7Ff9ON8se92wWDt6nQ== | ||||
| -----END CERTIFICATE----- | ||||
							
								
								
									
										29
									
								
								AKB/openvpn/gw-ckubu/keys/server.csr
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								AKB/openvpn/gw-ckubu/keys/server.csr
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,29 @@ | ||||
| -----BEGIN CERTIFICATE REQUEST----- | ||||
| MIIE6zCCAtMCAQAwgaUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN | ||||
| BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBOZXR3b3Jr | ||||
| IFNlcnZpY2VzMRcwFQYDVQQDEw5WUE4tQUtCLXNlcnZlcjEQMA4GA1UEKRMHVlBO | ||||
| IEFLQjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwggIiMA0GCSqGSIb3 | ||||
| DQEBAQUAA4ICDwAwggIKAoICAQCcGJuBohUHBNkdx6laA9ShkJdD8mxlX9pEd9+g | ||||
| +W2+hcA7bAi0NxZV+0cObpPeXcLzpQnY6aiG97po5pR8Gn0y50TkhsuMXlwue+30 | ||||
| MRI0lTFEVt6O3zqhCbNZxbHJosp9v7IfqTZ8cG92bnWacryAGVCIrqb+BX0x37oj | ||||
| 0/16Os5Wog9yMwx9PTPFphSZQ3cu5he+NsJXuf/+GZLbdKDjFwHkDUhQ16gLvkb9 | ||||
| Zbqq3lZdnWrJd9H0T2n1en62d3lvZrnkzuXUJVLXa/GyI+DCCL4yqDyxMfrLMcze | ||||
| jEsPB+RAlcbQc41H4EMuw6FZzNMGioDPgdx4BGdmv6fTrEoOq94y+5j7gEGvTWY5 | ||||
| 6uA8vbuCdoKSevYeeGT1oCS+ukRgD762NEtq6T4Kh2PC+ocUzIVZ5zPGlUeH49kH | ||||
| rzm3iWhekLzsEtHyEVDOkLyQOp6AqVVmUePa4xgcoVsfru2VlgHrJVqfCJMZt5IN | ||||
| PfW02/hLOvck/HQUzh39Ktg3/JKKwrg4+PiGbSlfQTpDGH3dZyMYZOZoIaDyDNwD | ||||
| 67FS3FG1wPqKUfZSIbPIkVMxtK/y3LtbncnlIL798AjI9/aCIgcwEDx0PczWLQ6S | ||||
| w8m7eNdeYRRCBFnELJTT1DxcVDYDCun+PVEef0CdWYl1X9+ljmMY0v8sX6JBIX8x | ||||
| hIydXwIDAQABoAAwDQYJKoZIhvcNAQELBQADggIBACMc1JUuWsLOlrru5FqpNDz3 | ||||
| CeU0hDzv24axKVmHvyfUJO5PT2mGAsogEaH2+x2UJrowiuTUwV+nKjOY7XKkNHHA | ||||
| eLISihwKa/vjVcftGA6PsXV6bDEIFvyE1y/3TTDpAtoiaBp5BsCePeAlPjVTS9dn | ||||
| kxTGdEHfHovv8/NAu1xLcyeqN12oAZkNzupQn/at2F0ylOAd0+RUbayIUMYpOJGe | ||||
| Wcj8CkQUBjJgUdr4JfOBr+7m4zhxBwdkB7IhCXLPEoPsSIE7pHE33jFMMXop2tCr | ||||
| XJZD/mqlvgUG3AaIclypxGPNiLgSyFDeoULzDOhgX6obdrnd2yG/eFb6lGdyFKtH | ||||
| 3TngupjW5o8+R9cW0IfR8wEL3rMGig0CrV3JB56PWUSj7xgbe5M31NvgLgoo5Cnd | ||||
| gjaGxJfk4jS7XeGiLsM1QSPp/hb1oj43m42QdWtwIXGv4xjROQ4ay5fcns8yrZt9 | ||||
| 5ZLfHoCiUU0P0Lpz58EsS2y4zqckjxE43ZQk01xgYBbZ/1hoygZBHgrLlGKKHGF0 | ||||
| UicoDLj6XNAo8nDrAmE6cX6THDXmgZiXZx40JapP/egHsEkCdvJkvycGLF8grvx7 | ||||
| InRIMujTeM+s/o/4s07iWNBD0b7qJ6QoSE6EPKVU/QDTukMp/hqiF0Uuj6EVFT1Y | ||||
| 1agUHxFN19HxccZtz7kE | ||||
| -----END CERTIFICATE REQUEST----- | ||||
							
								
								
									
										52
									
								
								AKB/openvpn/gw-ckubu/keys/server.key
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										52
									
								
								AKB/openvpn/gw-ckubu/keys/server.key
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,52 @@ | ||||
| -----BEGIN PRIVATE KEY----- | ||||
| MIIJRAIBADANBgkqhkiG9w0BAQEFAASCCS4wggkqAgEAAoICAQCcGJuBohUHBNkd | ||||
| x6laA9ShkJdD8mxlX9pEd9+g+W2+hcA7bAi0NxZV+0cObpPeXcLzpQnY6aiG97po | ||||
| 5pR8Gn0y50TkhsuMXlwue+30MRI0lTFEVt6O3zqhCbNZxbHJosp9v7IfqTZ8cG92 | ||||
| bnWacryAGVCIrqb+BX0x37oj0/16Os5Wog9yMwx9PTPFphSZQ3cu5he+NsJXuf/+ | ||||
| GZLbdKDjFwHkDUhQ16gLvkb9Zbqq3lZdnWrJd9H0T2n1en62d3lvZrnkzuXUJVLX | ||||
| a/GyI+DCCL4yqDyxMfrLMczejEsPB+RAlcbQc41H4EMuw6FZzNMGioDPgdx4BGdm | ||||
| v6fTrEoOq94y+5j7gEGvTWY56uA8vbuCdoKSevYeeGT1oCS+ukRgD762NEtq6T4K | ||||
| h2PC+ocUzIVZ5zPGlUeH49kHrzm3iWhekLzsEtHyEVDOkLyQOp6AqVVmUePa4xgc | ||||
| oVsfru2VlgHrJVqfCJMZt5INPfW02/hLOvck/HQUzh39Ktg3/JKKwrg4+PiGbSlf | ||||
| QTpDGH3dZyMYZOZoIaDyDNwD67FS3FG1wPqKUfZSIbPIkVMxtK/y3LtbncnlIL79 | ||||
| 8AjI9/aCIgcwEDx0PczWLQ6Sw8m7eNdeYRRCBFnELJTT1DxcVDYDCun+PVEef0Cd | ||||
| WYl1X9+ljmMY0v8sX6JBIX8xhIydXwIDAQABAoICAQCWFGa3bcHv3K5vnn9qJ5Kx | ||||
| wFZfot6rXUx7VhHyML9eVjSsLUP1GZ3lD1KTQqfzPYzqOvzLzGQXWGmm4ENVSxai | ||||
| 8Y7gdeWQ0Uyp+MehZ+jMG8GhpjAXh/NT0ALbxmMYreconj3BiSz02hmg8bUqyTQJ | ||||
| qc0vjVTLmTV01VmfhvwIIDAxRWG6d/CDHWwAlZzqet5Ffj7HyNh0BkZl5eq4C1uA | ||||
| 26cav9aOu7o7iDey/LNMA7dgDLEWgZig4BXNSng4MYjVHhyPLIn2vef3bTaWAz7e | ||||
| 8A8Gn5CzAY3S/c+vDY5BJmJD4n2j/+WPfMS7WqZws6kVeec9G+uAjSNpu829i8Iq | ||||
| 9pfRsnYWIIim+ydLDbg63ZwhkthwI2PVrd62NsRNv5y1WcE8r+6UeI2hNykWVRiv | ||||
| giGvEyO+Ldb2h7QKZxh4M4XEx+c+nOQ0SWeDKCDhFjje271QiVzffoftErmu7Ht3 | ||||
| 502FDzrzS85yRrmuJZhF5z1GcROtBb2SNfUtORooi6wQh79eZuJT0gcGX1B9dtZB | ||||
| 2tALxwrjkyA7paYnyYU8LD6efm1sMoHZKW7eLk0AKhyi3g6RP4cas9Ospfd58CLQ | ||||
| 9dtxkNII0VkAfO8LSwVumIcxGCnHiv0NPb2QbVdNxgAttjsQH//Bk3iisU9UJejK | ||||
| fGmgf5tdY6SyGXvOUsBq0QKCAQEAyBRN0kM8/V35Q/ZAPxB5YjdMx4MxwJuGbi4z | ||||
| rZ6eAPhR0FSKrjhkdLo4uIkMm7svGVVnGle9aejWimh5RcqnENVePf8XstaPVeWJ | ||||
| g8EHt22LBVnVg0G79aeFG4I4YqQcNQey8FHQxNMvCKNiVra0381nzR8yuwKHiYLv | ||||
| 7anmLaL+EtYUkTN1mckUMAOykGL8w6x1xvlAPmUTU4d1Ksm5hiTCvXiMJ8GGVaI2 | ||||
| 0hTDuOh7rUAqHpDy8zMiUOCCbvbn0qy+t0g2PavZWW/YHoA8FmA/PuS33g1MbxdP | ||||
| dtvGVbXqyQzYVb3pfKLSal9C0L+Ek/VrfzFRoRJCib7a7Hb4RwKCAQEAx7lNNEGv | ||||
| D+Om8LsCjWV8iSQ5yHR1jOdVHWixY7s0u720Oxbr+yqsTCFlQWD/XqAyDXUd0VRO | ||||
| Gav9YbN4SyNgp3NjNF0umLpERFLMHHtfNKuGdcSQBTHd4GvDSd6RhhtgUQJLfoSV | ||||
| mh0AvEQ69diVUp1c1wAEYtp9WQ1VPyIymUat3lmODpa3/MjfJ3+BLl8Wu/RLcQBh | ||||
| 6H3sdOXIugjQP0t6Y7X0Cms482Z6nvn8cMJ5/4fOmrjUS+K59HNs2lL8p69GqKOY | ||||
| 8LYZu81FepJ2cU66Fi03iKsfG3zVdVIDIrARuxT7P8psCR66gCD/W+LMrLcOKrnT | ||||
| MQ85xDgHU7FWKQKCAQEAtxVtSNRiQO73I2t4yryGdotn5MF2i2tFjhkVDPCyYOzZ | ||||
| 4Ksb4+SSeAXX1XUDZpXYuXPezsou93UqrKiBII4aZlr4y/5bbzjLHKzYMwo1x3Gj | ||||
| 3xefO2axWk8ajFuSwSCu9w++fA5B3Xnp9hub5wF1bb4GGDtOLrZX1EtOxcnMaUJX | ||||
| AGGJnHzcRgcsQ+t+QIV0CpILjDGUygOvtaWkX60L6WZGFR70EYUTKdUwGPkLSG7k | ||||
| jVrDsAivaEAITL3EXUnuRGfydMDNcY2JbD/eIbryQP99oE2muriskpNgEcF2MgQv | ||||
| fh4U8BDCUVyk8tWMzHwUE1hmL5OvwJZ28JkGt47+DQKCAQAKVL13nIYvrjjubt38 | ||||
| 7mj4txT+F3gVJ8oxUT8Lx508sN1nyRG/1j8/WOLh9OCAxoyQQaSfNVss3MaojR4F | ||||
| 1Pik8MUK6l8Eq23oktfYCVGtacn0wYwpmKC/gROC+K5SX4wl5JZ/HuCWLjXhhy39 | ||||
| lYxzz4wD2w5fBqpBNv1X3K79WriXrc45VvaBbuqMIn5OJcEJS+OzHq/x1MGsck5l | ||||
| wRr0izTzf2/2MgGqJXzmSEwUkRq6aw321uS0YC/6QxY4XN6Q1fIzuvKoUOMX4dBc | ||||
| PMM/rTDXANPEkAV16IkqHmnnG3BvWvB8Jj5cYmiHRC2xVRP9QyLKdv5DpWP5kGRg | ||||
| oeWxAoIBAQDFn5mGMpU6a2ltfMOix7yQrhTOweAuM8ArTiCx8/JZCgljzDMjLXk5 | ||||
| gaXuQPupiEtaluwsJUYmeSoIVou70u4vbp5iamSRYjmTNAcPG1LcY1IXW7jurlzl | ||||
| ADg9bP2BdRff4s1MrmFxSePIEIHekAkeit1CrU57QrqHDrUoLczIjWFka7vaP8wG | ||||
| bvc6MYpC+8Hz22N9UhJfycNQzmjm61EYCn3pUcgKNNQzBu0bU/yRNpT8I4+BoHmw | ||||
| Gixw+enBljA3vG9ZNSAB+OV+V1RDnkOHGuaOQot+SAxUiVdHRBU07UkcWnapve8w | ||||
| fHQesE/RjABrmDIPh120VQRmoENL/NnW | ||||
| -----END PRIVATE KEY----- | ||||
							
								
								
									
										21
									
								
								AKB/openvpn/gw-ckubu/keys/ta.key
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								AKB/openvpn/gw-ckubu/keys/ta.key
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,21 @@ | ||||
| # | ||||
| # 2048 bit OpenVPN static key | ||||
| # | ||||
| -----BEGIN OpenVPN Static key V1----- | ||||
| ea4b0c3c2469d8119fba1b968f7a3ac1 | ||||
| 97af13fc4b4fd1d7e6e3aa6b6513ca98 | ||||
| 0acee9fba071da555f9ce14d6642e20a | ||||
| 452192aada6a80e73dc62c3103c780fe | ||||
| 8b5df3a054ba1e86d01bb880defbac93 | ||||
| f061ebe4cf87f5c123ec49ba82f50e1a | ||||
| e83290dfd4debeba063e3ca1c5f37bac | ||||
| 457184dea9a1a97a053ada58f63b7c1f | ||||
| 1de01ca49f3789716e8df654727e4ee4 | ||||
| 77d9b182ba174ef871d72ea2bf82d25b | ||||
| 8d02b7a783324263e03229c0852e712f | ||||
| 950c0528985bc1050145f6e1a2379466 | ||||
| 11058027d0373a920718c5a5b2f9177c | ||||
| 94365214e24022b2c34d51f25b008f02 | ||||
| 8a198e2ae5910e83120b533853bc47a6 | ||||
| 2a579fc8df42a997fa4e4854fcf1608a | ||||
| -----END OpenVPN Static key V1----- | ||||
		Reference in New Issue
	
	Block a user