Initial commit
This commit is contained in:
7
OPP/openvpn/ccd/README
Normal file
7
OPP/openvpn/ccd/README
Normal file
@ -0,0 +1,7 @@
|
||||
|
||||
## !! der name der user konfigurationsdatei muss gleich ##
|
||||
## dem "common name" des zugehorigen zertifikats sein ##
|
||||
## ##
|
||||
## Show certificate fields: ##
|
||||
## openssl x509 -in <cert.crt> -text ##
|
||||
## !! ##
|
5
OPP/openvpn/ccd/server-gw-ckubu/OPP-Vpn-gw-ckubu
Normal file
5
OPP/openvpn/ccd/server-gw-ckubu/OPP-Vpn-gw-ckubu
Normal file
@ -0,0 +1,5 @@
|
||||
ifconfig-push 10.1.62.2 255.255.255.0
|
||||
push "route 192.168.62.0 255.255.255.0 10.1.62.1"
|
||||
push "route 172.16.62.0 255.255.255.0 10.1.62.1"
|
||||
iroute 192.168.63.0 255.255.255.0
|
||||
iroute 192.168.64.0 255.255.255.0
|
2
OPP/openvpn/ccd/server-home/OPP-Vpn-chris
Normal file
2
OPP/openvpn/ccd/server-home/OPP-Vpn-chris
Normal file
@ -0,0 +1,2 @@
|
||||
ifconfig-push 10.0.62.2 255.255.255.0
|
||||
#push "route 192.168.62.0 255.255.255.0 10.0.62.1"
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-chris_win
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-chris_win
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.3 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-dominique
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-dominique
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.4 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-gesa
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-gesa
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.5 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-johanna
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-johanna
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.6 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-jonas
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-jonas
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.7 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-judith
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-judith
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.8 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-melanie
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-melanie
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.9 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-opp3
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-opp3
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.10 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-rene
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-rene
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.11 255.255.255.0
|
1
OPP/openvpn/ccd/server-home/OPP-Vpn-tobias
Normal file
1
OPP/openvpn/ccd/server-home/OPP-Vpn-tobias
Normal file
@ -0,0 +1 @@
|
||||
ifconfig-push 10.0.62.12 255.255.255.0
|
7
OPP/openvpn/ccd/server-home/README
Normal file
7
OPP/openvpn/ccd/server-home/README
Normal file
@ -0,0 +1,7 @@
|
||||
|
||||
## !! der name der user konfigurationsdatei muss gleich ##
|
||||
## dem "common name" des zugehorigen zertifikats sein ##
|
||||
## ##
|
||||
## Show certificate fields: ##
|
||||
## openssl x509 -in <cert.crt> -text ##
|
||||
## !! ##
|
182
OPP/openvpn/client-configs/chris.conf
Normal file
182
OPP/openvpn/client-configs/chris.conf
Normal file
@ -0,0 +1,182 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1194
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBAjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTEzMTkx
|
||||
MFoXDTE4MDUxNzEzMTkxMFowgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1jaHJpczEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKZ8ei4OsN/qAkPpipXs
|
||||
M9KpuihqNi9m1dzT1LEAMxg80aBNzKXHIgeFDzp94CAqDRdKEHPGLDR+rB+LHG4x
|
||||
Gzvx7vRqMelaPTFPW7qOuMegYyOzfkrIzzxuTzV0loiUNm1Xqp+gcW2WLRkSZrzr
|
||||
xXmSCi8uwDeScuBvYGjde+GfAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUNBKw7jurj9fRbOw5po4SKu4CDQswgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AAZIwXWsEwIwbt4Rj45EBVl22JwjV+dTlyrFoY4RPMAoV8h92Umrh//+cuvMVzPT
|
||||
hwrGUzcjFlFNKrm5U2kEmfG9nhgViCvqKo16aj5lnF7H+nTlteFa/XYw814Q+RKi
|
||||
rDAsrJfwVMOfZAEsDEdr/Lmscuh9ZPphej5rZIRxnCFB
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIICXQIBAAKBgQCmfHouDrDf6gJD6YqV7DPSqbooajYvZtXc09SxADMYPNGgTcyl
|
||||
xyIHhQ86feAgKg0XShBzxiw0fqwfixxuMRs78e70ajHpWj0xT1u6jrjHoGMjs35K
|
||||
yM88bk81dJaIlDZtV6qfoHFtli0ZEma868V5kgovLsA3knLgb2Bo3XvhnwIDAQAB
|
||||
AoGAOdvYuljwr2CsGN35A9Fq0TObNqBy5FZgzLXxnPHsz+eTEpr3HEXwVZywhito
|
||||
0MTMd+ONhC7C/htnxi6aWtFGHSdr2xpVS/WUzSgBIlskb5XzJhMf54tbG+PN1dpA
|
||||
UG1S2wSRa5rQC2ifX6t3m0UwpMlymtimVxzH5YR7/cwD08ECQQDZ0OG1DqjdYQfH
|
||||
PJKH+xat7HI55FV9aWhjH/t2KJcT72wnoKJfjzG5aW8ePAXMX++J6PP28s1HQcXB
|
||||
/R3vrQczAkEAw6wG8tFazT0+hNBcT63VsoAW7FxsZp0ME1kFNdceZbbcPMH2SDdR
|
||||
QXFLarBCcYnvKthwO9Xeyz93J6k5ZQXL5QJAKf1kpZzP3O2JrFT3ApPbCWhdlN95
|
||||
w5WAdCuENIEartMnDHShGL7oHRBARZnYnE+aRAHOljq0bBo332/GR6AZlQJBAKQS
|
||||
Vk07AOGBzi99qzngsISZZR9SLE8qtppulbDcrY9qcme72DAbulWekzdljoE3wMTz
|
||||
ccCqh8Nzdw1Zl1e/MYUCQQC+p3L5N0j/lC17/jCDWQ424UKCo9Kml9obBcKXW32X
|
||||
s2V6x1PgpLcouXzVAgXjlNwbcIRJMEivDYTr3frW9sUT
|
||||
-----END RSA PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
202
OPP/openvpn/client-configs/jenny.conf
Normal file
202
OPP/openvpn/client-configs/jenny.conf
Normal file
@ -0,0 +1,202 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1194
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBLDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDIyODIzNTI0
|
||||
MFoXDTM4MDIyODIzNTI0MFowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWplbm55MRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMMY7okQO+8IO7QsNXV27LOJeejIy6Pt
|
||||
QesB+86pV6MgD0E6sRg1nfNSMcfL4YLD5qIHGu9fI24iG+51eGNZtwnm11uafwOm
|
||||
nB2NRezuc2uzNkQxmla03sSLTG+UWstfLwzocJjCev4WVbv79XYdpfvbTCOrK3y8
|
||||
qNm3euJ39zT136j/68hu8GEp29Kg3/IN+M5/cnlsWsnPnDy76EBTshLPXH/XgIQ9
|
||||
sspuSxIP3c3xjKwAenkS3yZNIQB252+fOscAoS8ad+poGKyC+8UiMMyYAiOJv/kz
|
||||
wPSofV3ncxBdeK2ZAXn3WNNndxszOFZNeaPD5A4T+ZqDsgvtlqmY8tMCAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQURxib0KicE0d0jkEkKDwikV5xpnUw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVqZW5ueTANBgkqhkiG9w0BAQsFAAOBgQBsrcotHRmOTMrGCT3FQ2d+tEJ2
|
||||
oAojPknBpmwDopbZ/cyncCrHCW82WeH1UaoRHjXztI0g8HCrAjs+ipYhwFcrlyAW
|
||||
FWMYrNanGWzMfP9vuC+4zArojqo5oqQ88oX9jDZpOScfP6IUeXdNxgI4f5FzneD9
|
||||
wWnFsSS/PcuWPpPyXQ==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIS7C0EfAOtV8CAggA
|
||||
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECBZSzA/4v2DJBIIEyPuxNdmVDWIk
|
||||
SNpc3sF+WU8cUcOyqiQT854zZNfULzcuQDMaYLxYTDJcJPlrwMkSrXh/W417b6XY
|
||||
aOSkS2GqkbSrpVRCUY3e0nuBMYolT8nVgcZINw+x6ZtM2pHPOAGHGYRIg5CBIW7c
|
||||
ZGySvj8MXzQDFFf0XnfSDqpviQv6WDBzM/Ekoculh151+gj94CkVd2VsCN6czfNQ
|
||||
s6S6n4XFlCO4cehDjekqURCRZ7cB+1tdUlO1Fx0sFvbpJdvCndlizrsgw0TGrYiH
|
||||
imgx4qvFJ1YmpKUv3M8/P2ywMSGuukvaUfmZLon82wGD6dtn/Javgq2x32bcqUwf
|
||||
helR6VVz9luxkk7DlbcANTn2N1QE8jsbsCCUDPS7TKy7XHZaxKUR1DwroDLf9BNG
|
||||
eoxC5T9obpRigECvmmZvwmtZmq+Xscly6w5eICDzN/yquRswQII3kkHHi2K5bMs/
|
||||
F2KKf2wheNljvYHgfyzZRM28iDUq7qnpZv1oh/zuwmk3bHVIVtSujFiqDaD4h8uh
|
||||
TDt+Ou82VSjlkHMGxkJ5bbMOxEHujZGfQvx77yUEctQi/uhgdhdJYRiLrw6UTIql
|
||||
rQ+tPbOqRyiKuv2WRSm0G8uswe4P38mesIbsMKHXT+sRjbJfmjzDCi0rNZlyNfLN
|
||||
xUdMLD7mRyiundsXVekSPy5sA7we7Sg/TyPdMuWrHzgU6OzIedLTXpBqQAgFRXhG
|
||||
6CmM8CzEcmsSnSCKBedzy6jYH7XaCVG7q+D7n/WEc3YgVilkafiNZWtTgdR5w8Bf
|
||||
/Ww5WorrQpB9lwX+Rn4hI7m46pl5mVpNuYNJTrRj+pb3biLMPYpKRQY0tc4HkvrM
|
||||
RS9qA1Y1YWwh5ScyxwknGEqqLBsWEyAZcCKagt+SoK7QYSfodm1gQSdUDMNC/4iE
|
||||
EsTMipAB9TppMAKMOvkNgOP8m3cr8nm7l8Rwbm2PBRmPCoANNxAKewwh5ZJ26Kiu
|
||||
IRZfPptyJu9kSIfRmOjNGyvH13fhaTffwXr5UKZqWB2i/tsRo5d1xj2UIsfXs/2p
|
||||
4s4AAfI8qn3jtsi9RDXxws/l0oIHuYbdXN99AwqoN5ZzysO24ieY81IoNjyfayca
|
||||
Ymzl6al9BaBaRzgqDpQzKJZxVUrQJFq0MrdS+KHFSc094gbHdi/e/wKkuV7e6sss
|
||||
RhSDD/PtUT5BmWiS2Ch9JgglQDYmzuDSC2wLfVARwXBgwpXjlnjUKOtacSQ4T/Zw
|
||||
UZJAuxUMPO1rQeR8aUZF4yYZ8xMD0vTyp27BKIPiQDUyLsfjTO9fgVXXOYNc2CKX
|
||||
EoWoqnZWrROZ/qoGJHW+0YTFGDYENZfdDxaGFDyaBcd+uXf97nh+6bQmtgqNpqGT
|
||||
575/JZ0KRsAfmVLxXhwaYWkRg4Usl7dAqUOslkhHlcuTU209iydTHmTPRKS8GmIC
|
||||
dBVFoJDdIIh+/R+euLOb2MQ2A719YRYZjmjsxLpezrXmJOppp6aUBWs6SKrNABah
|
||||
8GEumCrKAjWUVoFT85rCm8dlAiXEZhTnVkrAwvsioXx4j6xcRC1OCi0d56wMODai
|
||||
RY7dizBLIukqzHmsQaXSVM2jYHE+cbixqgaIW9LgZ28a9M2vWNetbnZV/5DK2kWr
|
||||
rKWZ097uKHSd78Ta9/W5yg==
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
202
OPP/openvpn/client-configs/laptop-opp1.conf
Normal file
202
OPP/openvpn/client-configs/laptop-opp1.conf
Normal file
@ -0,0 +1,202 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1195
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTExNDAyMzg0
|
||||
NloXDTM3MTExNDAyMzg0NlowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAxMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMVtoq8Nm7zrdwjTwdp5zprQ
|
||||
J3TSXs5oUjXqcmOmuqjVR0GVENVW/AfCJE4oBgT1dEMFUoY2hvmPecVzDqjC51t+
|
||||
CHkCoqghWW71GcZZbJZm3CTDHBjgCeRuLDMzxDetvwaTk6zfmIqTEYxrydg53WYB
|
||||
2IDtq0Iegngu4KKYPbM5uEcagUuk6cMvshB6q7plc44KI1SdPktPCZX3b8gzOq5j
|
||||
hx+6Z/YDAmLFIpu2lzbrEfcTYvMcebEisbjy+e1XDFRQaUnOpuNN8jlBToocMqqH
|
||||
nrDekzeHNLYeypTSSApQMcXAQXh7LsGLdZVEEAaRIDlUqVA2tJUvaXshzBOjOC0C
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUgqI6aUjw3mBYjMZ1vcFU
|
||||
T5mjPFAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMTANBgkqhkiG9w0BAQsFAAOBgQATpNUsLFk/
|
||||
n++sNtQhpVrZ874TCfVTn+kt4iWccvCmu4oSbZ34HGSNudtYwWtJugbrRWkxjSIp
|
||||
VUrLLE8Nxsev5JrBRzQuh28bDYgJPtvggpaNzbhmBqftoC/l1vCr59uOC1uB5BYt
|
||||
gwgKxTNOJ5bKYIg7TIDrr0XVWaLwMc8wUg==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIvHFbhmmWccUCAggA
|
||||
MBQGCCqGSIb3DQMHBAg3Iz/FqmdZ7wSCBMjNGSrcP1d2uS3KGvLQAIHxIcTJado+
|
||||
ORafYeIi3yI1Ymw0NuJTBkED7ht6uIHPZObMFvSz6FPKXW4AgJ61bUrUO02FMFWS
|
||||
b8dSYOVhNXYUmyUdR0a1Ocq+LWQQehVFckgZoZuWKnSJntLDFlL7rbNj3FQrpS5P
|
||||
fjUv7dy/fv9H56EJjsREt7N3IGz3zf5apjFhLFi5G6cvvo0wIZr4TzunkO3/LGRq
|
||||
J2GUASJEvYs0U99HpK2wYUN3IJqYI6UfvT+I6Ra57oYMBQsTiJtAsWkiRpxIE3Vw
|
||||
/UfrKwp4PnVcw0TAEeZ/uc4HLGWY4YoQueBeagnIZeJcQTpd/Mf9iIGeGWa4Mpp+
|
||||
kLEDgS4uyZvgYEQ9iN9I6KykUrHZKgVv+wwC1RlYtQANXkff0RRMIrSKSnxnk2tn
|
||||
TncaccDEAlXwB6yQLUdCPzEfa4X7QsM7hSOXPN369qqaM4mwg66Qt2AmWq4c87Ta
|
||||
CWITdQ/ko0B6fLrenvY25g1e+NpszjGfDw4MqPE7j8ieXy6BFdlPAdqr2gHGxlwO
|
||||
LS2Zt+zbffhNmlq8xQA+b/lU+UpoxzSZzT88I15jFeeT3OsWIHNM66wk1PAKRhPQ
|
||||
gj1NAC9zyLftGoJei+B9ZNkF9b/a72rPNac3X5FQzFdVQ20AAsKeEBFgtmwWc/KT
|
||||
10206UCSGm9hau63yWv7uOrwnFG/t2pJcA+C8pnHwEMFbNzX7jYJgAG1WwmQNTsJ
|
||||
RALHfQkvJwgXlOv0bHntSvOHBhDjVmhDilrqJLjJTlZ1nhFy4U8ziSNWCHTvSXyO
|
||||
f95faLJUEdIOFKIdvKvvzkBqTB829EmbkFsJMVJ1vC566jX3IulNzkpO0eP+oRQs
|
||||
xBIUipGDFwy8qMaPOW4TC3edjhvBuTGfrriIZfsUaQHuqtD8HDA6tM2BJppjMvfi
|
||||
zVPtZB/0LaHjRNqJB5paSws+Q8Rd9ENJIUI8u7aLkOU8foO+17pQZ4msSzUCVd4E
|
||||
mWiJ+TAFM8hmlQ2u6NznM9RABBpsGrzmhC1XhkwU9V41KHcKMdRAkrPvixX8qthp
|
||||
cG7EoyVXcl2lC8emr6sbGwhKmOCTz0gSm/REnoQZpnIMpSIsTqw6gPzHvK9vVRP4
|
||||
nZUt4SCEaVqGrykgj/GzEfiAQyyDqNZDeqJwJnjkcs3qeR7Arr7wlL88Bk14TmHu
|
||||
DBoWxkjPxmGD7ZdE2C6yqETNNyMHQVxHDafraOc51WQz8w0HUGl/9OjDt7jZBtdN
|
||||
PbtiDFxhZLvHpo6CNKsPTwNgdIfgg/NRRWpjoDnf8prY0m6DVbvwqm4BxKxA5r3E
|
||||
k1YreW2evOFP6nOU31ptY58vWlaWTJAv61Xp2N3J4fzydc1sJQckQG/XWdORb7Bl
|
||||
FBNona7NPY6y+RGWYhfkzHqoAY4QEpZcjSPEN+Z5ULbxfL1tCN5i145vv9FRDu5A
|
||||
MTCCd7XIc5WIKKz2AfIR3H9LSJGEY231VGtPOJkCqkzUF4NHRwcPOnrvRqHwlfOZ
|
||||
7h7OGOQsj1FPANBRj4upEM4/WNeyT9fQNWguYR5kNCwLkryO965AqHNCOHeFL7K6
|
||||
+0+NPEOF9qLxM6dSxnP6HkH2dodVmqiUbDeypPnmrh71ncrgBKMtJ75THEBA5k4Q
|
||||
8UQ=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
202
OPP/openvpn/client-configs/laptop-opp2.conf
Normal file
202
OPP/openvpn/client-configs/laptop-opp2.conf
Normal file
@ -0,0 +1,202 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1195
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKjANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTIzNDIy
|
||||
MVoXDTM3MTIxMTIzNDIyMVowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAyMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL7iPPaeJzTmsK05kNWd1xS7
|
||||
MF//l5D0baIAbmoYbtoJ6AIzALMfoeLigt5clkmsSNbERO2XdmuN1+05QtfaXUZo
|
||||
SqV/18Pfoe+NGI8tlMS4IewD5WCGWLkm8akn2AigxUYc92lhRLpZHWu1k5NSjHc+
|
||||
Mzgi8QIgIpb7/gjbgFoKnIR5dJy6WLoTke+pDSB7JM73ZXiHuiwT2/MqQ7Clb7e6
|
||||
K74yoM5rBZPdgvLbPkRRaaAHg9x15UnmucdQ09Ny3hJ6MAJzao+tOpEQqitrGfzi
|
||||
m5yFFIxNLAI1YVnUSHTGcQGAloBJby7o0rTTTIZuQYEGBSozf2F4U8bRJ/3vn98C
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUmgpK2Gop3E6rlrU38NZL
|
||||
UnaRhXAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMjANBgkqhkiG9w0BAQsFAAOBgQBuOP7fJrTK
|
||||
ntl8UBuMT6garKT95ZO8ZvXNEhwxhE6Pd7PcLaHlRV/R6f1MQmDjm6PakOswo8aX
|
||||
KX0ENM+Bv9cPVOM4/iHpsMo3rVGsJjFxGQmjPYqzBKnhp7scnZe+5fdj31OpB4Qj
|
||||
4QyH8FlYvZ4atU7Aao2pSaUprjduTGkg2Q==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIQGWwJ/0e9vkCAggA
|
||||
MBQGCCqGSIb3DQMHBAgYCqryO9FhewSCBMj8TDpUkZHLx1K//VFwpVIB18bMXyhF
|
||||
DErbYLXoUeqYPIiZ+Scu1HsHPpVq3whDybcSRDFLL/cKsHRmJzbowHakxI5KABJG
|
||||
iW+nxWHmeL75GTOGOexv+WmyjFce0LNTSuoQrLPg5JKZl6sTiq55+0uaU8MqxrXN
|
||||
nGv98J/s8AR8u5PVpkbta79gKQEgkQQhd/0FNDLF/2zvrJ4eZAekHwwXBairatWK
|
||||
NSu18vJuqX6LzHfxS6d/boexCVsPgp1GfQQP3pQsvafCpUWd5pdrSPaaKEUNPLrt
|
||||
39uoybJUMHJLBaAE1VukBXHQUIrhzjYO3cEU07UUJH/91+MNMjFjN5W+FtaIHyuy
|
||||
BGlg06x/lVEuuXWXoBw6z9ucIkVsbXo4KsXJWjrCmMyCKpSg2NUY/X6OcjX/oe/M
|
||||
FUg08ZoRuE5cWuE00Xc4dGfAaQ0ILlfZr32rBzsCLGE1QaV6qwncWVO9uyK1eIF/
|
||||
ekVytBuYRxqNI3zaNG338gDNB5SZZnYlnYqx9BeTenYJXuZp6tqiK1QrL2+Da2m8
|
||||
GrL2U9pbihl1QfOURKZMmSY4kiDlyFq6Gg+1YkHKGmc8kx2hGH8VEo9O0nlQ2Dd6
|
||||
xPSmio9yHSfkBte+rcPCc35DggBDOd1ZFIgs/m9d8xrxPx8Fn0f//duFbfqdKmty
|
||||
hyFksx7ToXRNQamOedaegSxyQ/62okzuQHLhgAQb368asVjfYnlb/o2CBkVLT/t3
|
||||
3wyV8waSK1Wlm8aEG33TUBb1QA46qY8Xl3JEdPRLxrSO9BAaU5AlNvhXcg1yvAml
|
||||
nvS/2aF/5VHHeh7F2eq2WhFR5CBbOSC20Oxx/PeHcgORxxNzDsbsUWVKhLvB8V6O
|
||||
fqz9hsQ6uGG4foFAfEXHA5p/RLXzJT+N2lwAlmq4awyTrddDOptOjnHiUFTcrt0Q
|
||||
3AA6QZN6Poi7wTPfdW71/NqwJbxSoW+ZwD5gc6KPc9LGJ4aoTv6hUleK7oVPYlhP
|
||||
Nu5ql85bVe3f2FWuYA1pt2uP80OgLy0Sfyx8zrkDLB5IlA7N7krc3BDW4fOuezow
|
||||
tYzPypdjhIgUtQEe9+g7UyuK9GQmolakAptcznIgAdpyANuxm6ZzTFZeCnbj5gji
|
||||
Bwft3pWz91KUJ9puK8NhgYLK0kX6/1tkzWN1HAJ7EuUVEVDZa84sG18TzP8qA7CV
|
||||
S44VmC+G3naDsAhiUkElbOzs9Mon8cMy4WRO5bozwMyPnk2GQAthGI99g+PA7ZJj
|
||||
Nnlc9DCxRHhT3sCVw9Hrg6fe/fi2Eecvq94rSHVM5duVlVug0ah9Q1/acA/bmPuE
|
||||
h+jIhieD0oduPJ0n0nFRh/m4mRqqVsT981xK+tXOznB2AIlikX/Clb1rWlaWNvO/
|
||||
RqnY123/TsAD+fsRVfS0UZY5y4SujSJr6swGuURSpnJnrNR7mRBLVvmOEmknoLRO
|
||||
5eLFkWJ2+G1k6nUDcmoVOzicndpPrk87MXFXFA/75UdNLpg+iJv00n5X6oTwokwR
|
||||
Cz61T0uYO/R+8eBvIym4ym4ks2H5fZ/tCxzyGrUcCT5Zd9nQ5oQBzaoxfcCqwZlF
|
||||
Oxq3/4xNfvrv1KMPUVYDj7zMUDv4Au775yIGBomhayCmDZDzsB6wZL4pMsWZFedB
|
||||
5Co=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
202
OPP/openvpn/client-configs/laptop-opp3.conf
Normal file
202
OPP/openvpn/client-configs/laptop-opp3.conf
Normal file
@ -0,0 +1,202 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1195
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTE4MzA0
|
||||
OFoXDTM3MTIxMTE4MzA0OFowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAzMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOY+T33t6+MGoC2ZVVucGMp9
|
||||
Bz12/5TsG1oh1L47K1CLckhVM3pUKWvYuxHPmn+cIGn9bnohrBlG2y4YNm1PkTvk
|
||||
pWozI8YGYsXVKMPEKD44FuYDZJUYExmV4craQaYcmVYW6/JwwGfcDN3YvG9hB30C
|
||||
dsMs9IBMQuhVl6Cg6ngecYq7e7+1LVWmoTQNOg7UAjKTKzyztIEfYznI5irprE+T
|
||||
vSptv7N3m9h6Jw2yRNnkuQ/MsCdb+zKieXdV2LbQY8eYxURHT01nIuJAmOAKD7yV
|
||||
RtdLNwvppxGo/Qf4GG1ZjVQR/J4jYhRkYs8NSV1BlcTT7NQD5i5pFWs/NhVmWMEC
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU5+o1f7cxB1BbVCp8NffX
|
||||
QMqfsNowgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMzANBgkqhkiG9w0BAQsFAAOBgQBGTCJBsP42
|
||||
28Lml/xQ/3QmQg4fD9x2jOo8JLmy04/iWhlXuxXITun6BrhhHWXpRirGz1XFGoF6
|
||||
yw8uXWq8VXqo33oWYmp1nd4ZdQ1YKj2Swbx5UrjfGSSsY/2wzoxlEsUDyWLnFIXs
|
||||
OiBrkyXKN3tdOn2y8hTP5szeXqrVKaL8Bw==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIPc/olWb82e8CAggA
|
||||
MBQGCCqGSIb3DQMHBAjhtAZshhbq9ASCBMhnZCLp5esIptXvS4mIfbJfO1lRdMwz
|
||||
cCUUw5htYnETJZ6E8f2oisM0pYKCkKEXY/C/G0lXpQYduzIDYv3dK2t1pfHbebp+
|
||||
KHWWojuMmoXxcE7I4cxrf61dnz7huYHJsUGzJR43IlV9i/VFWvqcPA4ei5Ir1PLG
|
||||
3Vn6IlYJlw6BhOWH5Dh7ay080rsqOuQ4rXSqhodKJ4XMal3XCLzhCUm2NyK+bgTX
|
||||
kM16O+4QVhG+X8Rq+zUkyLXFuxgc/GEdOGJejHOp4u14ojVkPRD7oj2CPZjnNpen
|
||||
3BvxV40lCv7XLXeeTonmWTEsdYnbGeNhFG92TCVvLA/FVo8QaIUUL9OgxIPg2Y0Q
|
||||
+ui6kUZW97Q1tICvkNC5ZBWv24OXPPELJfxFvNlibw0J6osQ0HJEOxGCFUeJ6e6w
|
||||
eW28vof72aW5mtaq74KBlcIfOvdC2sylKxAVIpVGV8SICz928CA16oad9nvnqSTZ
|
||||
PLvDwwkQyQL2UoafxovxSHFCH2FdTDPScjfmd+M68TpVZWOpWQFnW5PDIF8ipNla
|
||||
nZvWvv8826LY08YNgAUDHtXEGQWUeqB22uel1QEkFWqoVADqmGW7VANvEbuORhMG
|
||||
yCbQ66wUbOmaSiAMUX965eXNBPOg7ZWoHEvAxtid94eJK8g9cXKPwKg+ggUx4CYu
|
||||
Dexga2P8jYIdZfK8mfFoLuz+A5buCm/nwpEnORPIhoO9NzvGzfUeSy+BJZeM0Ol4
|
||||
5eN4NuHzhSiSi6PdIf5oTOS3+lxCQe53OULsRfSZ87jF/bGTMFIR58fLCgte2JYC
|
||||
6Z7C09L07+BP/c2yRrI5qiRdYf3xgjsQdQqYgYQCuIu3a/gcvGpneJH/hSTiS/Or
|
||||
G5suQ56fjkh6BnPcQ/KRCtsHeR0RaZe66UR+ilI3DRSzBG5BM/+cHI2ZvETu5dsX
|
||||
JsPfmvRqcZ5h/GkJ69Sw9h/6DMYvNfZ/7ABwWgS80vX879JCC/G1epjTsI584PXy
|
||||
0HcWXe1ZbTECpgZE2D7dnd9yYTFlYJIdCAhdUK3MfML+rLwL6voY5Wi0+OmiAGhP
|
||||
9u4jrJpY9lSnD8okZXPyeqX4zDH2F+o5NQ+6lL7rCviaLbBSsAHj255yS/FYH+Wl
|
||||
4MV6uprLf1VW97Lk8KU9/uEJfBsKLls7i0zHQJcWHmiyciX7R62KTyKwzyuHdC/Y
|
||||
SGy9KEUesA8281oBeIQEPQSGmJJrn90BoDu/Y8zeNOkPma0wRtSUhg8ybncHlHU9
|
||||
T8cvY+ZYeHMqOUMzji4FvALqtVSzrxwmRkPhHN9CCJyY4zS2PtuyzKLUKNiL1JF/
|
||||
qk5oxoaoEcC6y/eb9Z5WwjNUguvAFjzulzqZ28g47hWQ2o7blkGWv6q1EHY5H8LC
|
||||
kBGvrZpXRmysDJnQs17DZi9/AxT9REtPsHSy8zXxk3b5SBBlziiPbta9UQVdas1g
|
||||
u4VMXRioJ1AOoSTx9VeOKyp+3AVf8Fbrt189+ea8Hvdx74YTn97O5LFYxyYom5Yd
|
||||
eKMH/s62EM+YTE0Px/7MEkXS5ShHGymp3OnmWJ5WA3Go/iBT9SWnPPVExeskhCCd
|
||||
PXpHe50srF4NQXISqPWHrGdwil/TDaNbgHv9vloOqpziKAQID92C7I1beeNJ15QC
|
||||
e64=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
185
OPP/openvpn/client-configs/marcus.conf
Normal file
185
OPP/openvpn/client-configs/marcus.conf
Normal file
@ -0,0 +1,185 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1194
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBGDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEyMTIyMzAyMjEx
|
||||
OFoXDTIyMTIyMTAyMjExOFowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi1tYXJjdXMxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYjd4rAReGsVYhl9Q+
|
||||
9JpnXLI9kXTqvpPPijklpsXggo/u+F1lWiC8Ti07xl7vAAhag3ha/FTqjWGDYa2X
|
||||
l/LPYS3AzeFr76rdJe3PToxLAFZrmgCXOGZBCXhjHMpBX9XG7KVno9ccmXhRxBk0
|
||||
QqYH3wPM5nt5jSf+eQXsNLjuaQIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFMF+61oxtK9x4AUQlfqRWUOVSflyMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQChe4cGuoK3Y9dyUPct+jhLKAUGeSDqIgwgSLah4vpd6SNKPFMklapbAENAi8d2
|
||||
u0C7ZCY9sY+17f7NCqSvzs5crPxGgXhLxFDg+uWfBDHYbnqnMvGJ5N7KUye1gF7F
|
||||
ypHHq6STIdjGaqx2ZunhqlM7tX4jmtyrzpkaVdrtuv79LA==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
Proc-Type: 4,ENCRYPTED
|
||||
DEK-Info: DES-EDE3-CBC,17B9907A94C0924E
|
||||
|
||||
krHc1xE84ce/mYSlw95UdKuic+wC1J1cAIMq170+Lez43232Qy9/evNW8lVl7BXS
|
||||
9fs9ayCX8Xdr5lyCOxWukZQ6Lk2tySBCkdTFnhDQgUXjwx9tNqLmMkajF/GrGyJ0
|
||||
Tn+LQG5r6Z05ogE+4naWH12iE9OMqGNNIebbNbmTc1jYMUtKgWIuQkpe+9DMWBN+
|
||||
PhKHM7BA420Z9E74KmkhmAJYdHgSle7U7Ca27IY/u9gXUoa+MxLsET+KTY665NJq
|
||||
KP8+H9Hsw3zVQmu2XR9s/UfayOFYcMJBEATI9K7dBDB3zTblcYHmFfXSxpAW7AZz
|
||||
bbFHmpitgkzC657Xw6d/TRktYGQbNbi6Zwsc2dcQuyHtpiF443fN77m5N4g/7IgQ
|
||||
MghSlTImS+K9r357UQN43cXRIpgEoKk+22H/fLGtxVDlkYmx9MNzXnmGNooJFIkS
|
||||
FcV164sSr3FOSZ6oQANsRNIJtHy79gUyh0fgPzng7kKrNwsQCVsTzsdglZEXDCLt
|
||||
BbKpiAB8JcB/EHHR/vx0xj0LJPWskVj8v07GKwQCvW8mD0oKnm9OuDAzXUvR/bj+
|
||||
mv0yYA2ZRvJeC7ZFYIanzmmMH5EuoKLsFzvp+79+beKDD24x8xbQVjxi5cmfzH6s
|
||||
pfXY6suLB4wtzVbj+TzMPuP+W12V5oShO2Q0ifUuBMkgUNEyem593l72yy1CERcf
|
||||
O9gR8hUpP0yHCFRhds00EkllKDvb9FixL8EWO9JGVLZhLuYead5yOcop0tdT2aXT
|
||||
v8kWDFBcGdNg9u7HgjapeTKjBnI1bYNsC5knB1TugR41PcJUN5qCRw==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
202
OPP/openvpn/client-configs/oezge.conf
Normal file
202
OPP/openvpn/client-configs/oezge.conf
Normal file
@ -0,0 +1,202 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1195
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBKzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDExNTE0NDE1
|
||||
NVoXDTM4MDExNTE0NDE1NVowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLW9lemdlMRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBALmEvhRYDUvByjUngr8Nn/VcioUI+cFV
|
||||
C9ihDBHOMCDdNQGYi5jZkSmMboF/KJRg5UeZNz0ZjxTZfunYvxZPjdGuPUbOtcs2
|
||||
t7xwsi1Isuckdnt/a099uhGx34S4yWOIPY/stw7zs+fVZfnmsIH6I/uWXvL5kvdz
|
||||
abAqdsp9j74QYrDC1n/ApdakD3xHnL4X7FD6VgAsC+Yx0gHGaZ8ad8sFTn9+LryI
|
||||
dumPyEMamzSn39SeUk74dxC15R3Z8Y091U5xCkrjwaQtDVBfbanLYPhHZpC4oG6N
|
||||
jus/iOvS+QZtBa6g+nsE71GxOh5eXz++Tekcxqpr5AVjLYytJ5+uQ20CAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAi7CtRdjoxft1/BxZ7ukuHolxygw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVvZXpnZTANBgkqhkiG9w0BAQsFAAOBgQCqbhrn5H8GWGbn6+V7GLK1Ti0I
|
||||
TMmqU7xaO7lbTquxFUzMQ/uCtIHbIkH7fYD5ZGiH4PTSjrGmLcQhHFirRche/+EA
|
||||
XJVrbVCGdJjbwypI94H0+uv5tijsC+bWSmzfdLYcWYAtVTL0bbakCYWq/dqe4FsB
|
||||
6hJRbeRHBqcNKVSJDA==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQInZcrDe1GppMCAggA
|
||||
MBQGCCqGSIb3DQMHBAjoFMe8YudLQgSCBMja856e0ws511Wcto3qmJ3FNYtvYaty
|
||||
TFHOaVjXcDqbEyLOv5PztBV+P3kWE8LukwBnlrtcmxuEbsL2yZYmuKOeifZY+87N
|
||||
JLyqa6v/3HbmELSn1Zqf8xlgjjr6mmcyJDnORVN8j4lqK0NR2KAAG+2XDXV62EyV
|
||||
Umk5TD5LKzsSVvrUJzH0Ve2d/WklNJXJGqB021mJ5f1k1nRxcKW87eqSPMnEy6h/
|
||||
6m8moFa8YuFgljw0bnhRo4nP0rL2uIVtQhYXVc2pMc+Jg5TmUI6fyOR2j+FWcvgq
|
||||
R1SaHkNaV3Y+1Bb+ujvx5tlnVtiIrSXt7fKUa3NX/3ayAt6PSsWAWbM3hF1oRTsX
|
||||
yu7+s/S3sOk1cwOJOYEZMMSb4BOTBnR89dAFQYZl2XmClM1oJW1/01QL8Z3KANf4
|
||||
vETbDD03CbGiU7FsKxVjAGUpaI9dvbHNY9L+G2crH4fl+Vqx0Y9XN4Ql7N4xT1LR
|
||||
PMTAmkE7msA5QIRpVnqIq1QPa8nR7lSeMQR4yYjMcAEdVykHFJzAifJ/QI9vwzpJ
|
||||
5ndp4vvGmHmx0nRCRcwWWLdEdlkL6nfAddW/zrBtVOXX6QzH6G3ab1D8EhrzMe1c
|
||||
UJ0dswBz1/nWl/eOdznkddGgu97SQun2wrsvFrkvpaZSSlLMrP+BhoBcWp7wHfWO
|
||||
z3cyzbsga9lxT275lYeN3aEL29y/riQ/fgNqi7P3S8CtFo3oG3CICAeLZIzJiHlE
|
||||
IoK7tpeGaUgwh6zA3X5p51I8u3WEcq9H8jUhmujSoKkD5RLGSPsh8ZL3S20b8lLW
|
||||
CVUBh0Z21jWpCsqA6gPuYcBtIg5NYGvinOvvIpSwEOXYOiTM9cfiQWwqJjBaA1gr
|
||||
GAtJwel9lg44D2V8owCKKrvtTS8TYsD+6pKZMWQnhNSQvQg/3pKWlCklQpKKLFsz
|
||||
yM3Ga4hCMT3y5XIzIo+Rosd/4m77E02NMO8o/ijCuELUNjQEBFEvESRU4N9DfEqh
|
||||
nSPEjh9ADJZzAg5wbEIWSvBBZNlqrir6R6s5ncU8tYNsnrpbUyOnY5QMkyBjfxZQ
|
||||
GnQLpy1SmShTpDvqglJjS34HPIJPNCsOd2vjxrMHmgMovjC+8uXIijKbHRTSYENy
|
||||
MXJOW2S2ThEZeIHdTxS0NZkeuyxENSeqS7sXtq2nWPMXn4U8bTiVC0EHX3Qz7Afo
|
||||
1dzNc76vplz+SrVC+ukKnFA6JkHotxro5jUelzcWw9AV3y+Yv9PnRDCuvcQOmoLS
|
||||
rha8PvaEElZ+pUyueUzzTsLaBTO+eMIy4XagEPrYX89YDzHyVG0aHj5eTAofl5gb
|
||||
6tKKBmMiTP5mwSpxInU4BxF2BHr/9FTfBwDFTpvagGE9EA7q7CGMjlpQcSGIcIPN
|
||||
Mc8a/8O8jhP3DPcKzwBdw2XphM8ffuplX+wZEmxJwVlDBWiW9iODgnC3XeLAmyAp
|
||||
BOurcNIk5yI9Lyh31cTN/krn49L9JMVpqpHihN0PhUe+iHlYit3JvzBiNFT6xVco
|
||||
S+JWNZeKmc5t6Kx/piuGHvb5iXeCROjW9vDyTIRaqEudb6Mrhu4ZMp+2x0ZtER9g
|
||||
m9NpKZrJMz2CUgfs9WXyU5bK56OeFs2NSMnXFsXA3LT/27CeT5q6LBZYcmxfowiV
|
||||
Bf0=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-serve
|
||||
ns-cert-type server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
214
OPP/openvpn/client-configs/tine.conf
Normal file
214
OPP/openvpn/client-configs/tine.conf
Normal file
@ -0,0 +1,214 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote gw-opp.oopen.de 1194
|
||||
|
||||
topology subnet
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Server CA
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
|
||||
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
|
||||
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
|
||||
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
|
||||
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
|
||||
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
|
||||
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
|
||||
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
|
||||
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
|
||||
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
|
||||
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
|
||||
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
|
||||
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
|
||||
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
|
||||
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
|
||||
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
|
||||
Y/hjEv3y78V8QA==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
|
||||
# Client Certificate
|
||||
<cert>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEhzCCA/CgAwIBAgIBLTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDMyODExMTYy
|
||||
MFoXDTM4MDMyODExMTYyMFowgaMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRUwEwYDVQQDEwxPUFAtVnBuLXRpbmUxEDAOBgNVBCkT
|
||||
B09QUC1WcG4xHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIIBIjANBgkq
|
||||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA50omlH/EGN/wsMPXSLcKnjcGPkfYDW0b
|
||||
VJz7gECICBxbXPVRbdtoxKTjv8agwtdjQAWnz/QQdwkxkkFedQfZTmyoosefS9BH
|
||||
CYgQ8Qi2Ecsn82tsv+UqsGG9JAToOAxBQ3pRh5miMP7W3ZXtn/czkZLFktQcaEg/
|
||||
nsg1nyruueJKVTfDKz4EeC3NfEAFAC4pkoWMJWABCXxSfSinPiItxrQVaRTPFBz/
|
||||
gZc7+Se2xmp8KYZm0oZs10Fo4Gij10HsJXKFi1+xONo5pDWTWPRupLLwkWVqAe/U
|
||||
+198AT9CbMkXEyRVKh3IvEMpYInAfsibhR1+i6RD+6QUCmH6daly7wIDAQABo4IB
|
||||
VzCCAVMwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJh
|
||||
dGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSYxQH+ro6ZoC5i6w6LN3taxROr+DCB
|
||||
xAYDVR0jBIG8MIG5gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkG
|
||||
A1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYD
|
||||
VQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMT
|
||||
Ck9QUC1WcG4tY2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QU
|
||||
i1Wj34gwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQI
|
||||
MAaCBHRpbmUwDQYJKoZIhvcNAQELBQADgYEAibRKSFGTe5RySYDZ2js5DfR8vSLa
|
||||
itT3m6c+/cAMXw3gbsFWkS7sWDnbIITTjtGKbCOBqvzFSWAjXN7RPStYWZ2Vgnbj
|
||||
EFYYsqwRnUZ2oQAkaqb4EWOK388QzcHalJEje59sqL50HbuivjCsvooWxDgf86A1
|
||||
adoBSkjcWSDYTII=
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
|
||||
# Client Key
|
||||
<key>
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIF/vrJSsqA4MCAggA
|
||||
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECBEetYsU2fdyBIIEyB5TzrKMZaI/
|
||||
+apP3cyZt/GY3fTquGzdfxuZtc4PiFVEsbPrFAen+TZPPw9RITvOTJOJBBwGWgYN
|
||||
QtKmGSw5ns4/xM44pVS3jI2CkP5XxNiFTQYwQ+9xiSUjsxzKLn2EbsBhuLVB+8oE
|
||||
3MAomBNdLBVaiL1Pb5sKG5IfTprKnPCg6B0/CL5i6woH0cTw9usSuY1p2m8fMsKn
|
||||
00mP71V/RP0WzLkbdhUI5pYNe1OLlo6IEp32L1Df4iILbdqMhIhOfZgG9ODGa0rP
|
||||
2yPOaU8YHYdTvXwtr9Tdcu4Gh3aKppz1v5UA4McbAbs2TG5org7vLqg8BKx/ne0t
|
||||
+9K3oRZEA7dIwIOnmO/jowrMngQsldKUSS7GktObSn4pu5E3ElPjdRzJAZvbM5qe
|
||||
aKv0zAt2L7zEATPJ4p5bOhAHseYTm2Nf9rzYV3zppQHKPXllrmli0IWoaUIWvdYD
|
||||
0DMWg+OBevcF7azfE+AhbvVQ2WMmtqrgvN31MtenwaBrWh2U6FP+ctCe/026EqAO
|
||||
2hj5wqgOWA7n09+IswTRM6ApNFI/2bNqWIDXlAjhH8PVDa6UMxTf/2t9zmfP4fT1
|
||||
f0i2fNMetLAznhX3N5BawXLHXvFC1C7Lf4vuptJS/oHQevocq7Ke03XEjIB00KAR
|
||||
XI5G22x+FIoPMWgY65AWsLT4UgttWODdUc6h37pKthBaZR3wqhKNN5XhJut6kbRG
|
||||
X8o1YdunTRvNp77wAA0aaRbeLGS4B7gTZ7EBIZ8OTDn0onYB7Ra/pJFkEizgnbQn
|
||||
qKwZadSBBUN7KSdMDQepU8zwnQ5S9uLmlY/YF0a9M+mhyqt270kxGhi5Z0EoNaOz
|
||||
NG/20/FZshZ07CzzGhWNCotVrQCsSpT7QSYbVlC4w/VPDUiAdZDS66sQ65lNKL6A
|
||||
+2ILYcBaB2Z2lZ1pf0h07csMa+XHhoAZvzOw2iHmXl0rJkDmZSpqe6tWAQagbRS9
|
||||
Gz77j8UimJpf1WxOpvCHUEqv6baTQE/NhN7iuz4ZSmN4n/yjXyeAlYZNB1oxuKtv
|
||||
LQUG7fMel7hwT5Mzkw16v8VD4q/ZVytPho8+VqvAthCxkEJKoJui0SHk4KzqBsaQ
|
||||
jFf2eaR4lPDkywd01weBb14kcqXxEDnZ4heeqRcytZPrw2BlHdhcDF7bDYlISxNH
|
||||
b+dACg43JmQCVYpDDBOKafB5lSTHKV1zDHmChqq+MCEUyW1gGkNK/DOcbMToQ9lQ
|
||||
4WjxvPCWwIcOwrGtgYfakkfIsK+CbFdR1kQ1uUBzpSpRUzwMdndC3+cZ6YoMvl1o
|
||||
ICu0oF7af23JYo0iiCcTpVmuU2tKm2psRcjjUiVabLDRVj4Uk6sw8v0HyznHDwWC
|
||||
Y8pHgeQhQx5SSpy2p/w7gbxHKxlrwpwfxZNvRDmx9SMZgbUlM/MNjx171ORaDr+V
|
||||
eGDUKsqE5p7pYkWrSWp4oK1wX8dA4qzm2bu6tNpANYdJghxrsgGMeO03AX1kQOSr
|
||||
uwv5e/PX4COqN2Tk+9B7k0i8FWUf0DuRlLfVuUZ23Cj2b7APhBFS/OH09IN9U7w5
|
||||
lvMTHgLRr3u41KKfDwFOS9srKqvL3ZVAxa/nuGoVNGBhY/GXMoxXL2KF8GLBTMsO
|
||||
S3Z9EBDJyV3qcr98xfQdbw==
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
||||
</key>
|
||||
|
||||
# Verify server certificate by checking
|
||||
# that the certicate has the nsCertType
|
||||
# field set to "server". This is an
|
||||
# important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the nsCertType
|
||||
# field set to "server". The build-key-server
|
||||
# script in the easy-rsa folder will do this.
|
||||
#
|
||||
# Note!
|
||||
# The option "ns-cert-type" has been deprecated since
|
||||
# version 2.4 and will be removed from later distributions.
|
||||
#
|
||||
# Use the modern equivalent "remote-cert-tls"
|
||||
#
|
||||
;ns-cert-type server
|
||||
remote-cert-tls server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
#
|
||||
# Don't forget to set the 'key-direction' Parameter if using
|
||||
# Inline Key. Usualy , sever has key direction '0', while client
|
||||
# has ke direction '1'.
|
||||
#
|
||||
key-direction 1
|
||||
<tls-auth>
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
ff2b7b56af351769ba703f874d389327
|
||||
2e8fed8405df740d51d58eff3eb25af3
|
||||
d6de19376333a9b05aa72f8b90124bbf
|
||||
5ea3085029070d28952a1fe9baa392fc
|
||||
4865bd5dbc58a4ccfc373d2ce772a217
|
||||
17f099df7d2354e404ae7690cbc50002
|
||||
151667c2af583705bd3896327917327a
|
||||
a8b2c9073e58b7deabb3ad04336170b9
|
||||
6fcce57b50827b0f393b7d1f0a7f6299
|
||||
d15140e46f6108983234eb53b0a6d56c
|
||||
6ce3815bc7f5ec9f52bc7eb680562b4f
|
||||
1241f1378b774491ca817b56f1d5ba09
|
||||
c25e8a4dff3610c60e4f9f3c306c15af
|
||||
8a70829075343f2ab24d61560804c78a
|
||||
dda39ceb12e11a0079b59dcb607166e5
|
||||
567cbf1dc83c2f32f8ce1cb4576c12df
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-auth>
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
;cipher BF-CBC # Blowfish (default)
|
||||
;cipher AES-128-CBC # AES
|
||||
;cipher DES-EDE3-CBC # Triple-DES
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
comp-lzo
|
||||
|
||||
# Verbosity level.
|
||||
# 0 -- quiet except for fatal errors.
|
||||
# 1 -- mostly quiet, but display non-fatal network errors.
|
||||
# 3 -- medium output, good for normal operation.
|
||||
# 9 -- verbose, good for troubleshooting
|
||||
verb 1
|
||||
|
||||
# Setting 'pull' on the client takes care to get the 'push' durectives
|
||||
# from the server
|
||||
pull
|
1
OPP/openvpn/crl.pem
Symbolic link
1
OPP/openvpn/crl.pem
Symbolic link
@ -0,0 +1 @@
|
||||
keys/crl.pem
|
1
OPP/openvpn/easy-rsa/build-ca
Symbolic link
1
OPP/openvpn/easy-rsa/build-ca
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-ca
|
1
OPP/openvpn/easy-rsa/build-dh
Symbolic link
1
OPP/openvpn/easy-rsa/build-dh
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-dh
|
1
OPP/openvpn/easy-rsa/build-inter
Symbolic link
1
OPP/openvpn/easy-rsa/build-inter
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-inter
|
1
OPP/openvpn/easy-rsa/build-key
Symbolic link
1
OPP/openvpn/easy-rsa/build-key
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key
|
1
OPP/openvpn/easy-rsa/build-key-pass
Symbolic link
1
OPP/openvpn/easy-rsa/build-key-pass
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-pass
|
1
OPP/openvpn/easy-rsa/build-key-pkcs12
Symbolic link
1
OPP/openvpn/easy-rsa/build-key-pkcs12
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-pkcs12
|
1
OPP/openvpn/easy-rsa/build-key-server
Symbolic link
1
OPP/openvpn/easy-rsa/build-key-server
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-key-server
|
1
OPP/openvpn/easy-rsa/build-req
Symbolic link
1
OPP/openvpn/easy-rsa/build-req
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-req
|
1
OPP/openvpn/easy-rsa/build-req-pass
Symbolic link
1
OPP/openvpn/easy-rsa/build-req-pass
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/build-req-pass
|
1
OPP/openvpn/easy-rsa/clean-all
Symbolic link
1
OPP/openvpn/easy-rsa/clean-all
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/clean-all
|
1
OPP/openvpn/easy-rsa/inherit-inter
Symbolic link
1
OPP/openvpn/easy-rsa/inherit-inter
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/inherit-inter
|
1
OPP/openvpn/easy-rsa/list-crl
Symbolic link
1
OPP/openvpn/easy-rsa/list-crl
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/list-crl
|
268
OPP/openvpn/easy-rsa/openssl-0.9.6.cnf
Normal file
268
OPP/openvpn/easy-rsa/openssl-0.9.6.cnf
Normal file
@ -0,0 +1,268 @@
|
||||
# For use with easy-rsa version 2.0
|
||||
|
||||
#
|
||||
# OpenSSL example configuration file.
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
default_crl_days= 30 # how long before next CRL
|
||||
default_md = sha256 # which md to use.
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString.
|
||||
# utf8only: only UTF8Strings.
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||
# so use this option with caution!
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
293
OPP/openvpn/easy-rsa/openssl-0.9.8.cnf
Normal file
293
OPP/openvpn/easy-rsa/openssl-0.9.8.cnf
Normal file
@ -0,0 +1,293 @@
|
||||
# For use with easy-rsa version 2.0
|
||||
|
||||
#
|
||||
# OpenSSL example configuration file.
|
||||
# This is mostly being used for generation of certificate requests.
|
||||
#
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
openssl_conf = openssl_init
|
||||
|
||||
[ openssl_init ]
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
engines = engine_section
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
default_crl_days= 30 # how long before next CRL
|
||||
default_md = sha256 # which md to use.
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString.
|
||||
# utf8only: only UTF8Strings.
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||
# so use this option with caution!
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
name = Name
|
||||
name_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
name_default = $ENV::KEY_NAME
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
[ engine_section ]
|
||||
#
|
||||
# If you are using PKCS#11
|
||||
# Install engine_pkcs11 of opensc (www.opensc.org)
|
||||
# And uncomment the following
|
||||
# verify that dynamic_path points to the correct location
|
||||
#
|
||||
#pkcs11 = pkcs11_section
|
||||
|
||||
[ pkcs11_section ]
|
||||
engine_id = pkcs11
|
||||
dynamic_path = /usr/lib/engines/engine_pkcs11.so
|
||||
MODULE_PATH = $ENV::PKCS11_MODULE_PATH
|
||||
PIN = $ENV::PKCS11_PIN
|
||||
init = 0
|
288
OPP/openvpn/easy-rsa/openssl-1.0.0.cnf
Normal file
288
OPP/openvpn/easy-rsa/openssl-1.0.0.cnf
Normal file
@ -0,0 +1,288 @@
|
||||
# For use with easy-rsa version 2.0 and OpenSSL 1.0.0*
|
||||
|
||||
# This definition stops the following lines choking if HOME isn't
|
||||
# defined.
|
||||
HOME = .
|
||||
RANDFILE = $ENV::HOME/.rnd
|
||||
openssl_conf = openssl_init
|
||||
|
||||
[ openssl_init ]
|
||||
# Extra OBJECT IDENTIFIER info:
|
||||
#oid_file = $ENV::HOME/.oid
|
||||
oid_section = new_oids
|
||||
engines = engine_section
|
||||
|
||||
# To use this configuration file with the "-extfile" option of the
|
||||
# "openssl x509" utility, name here the section containing the
|
||||
# X.509v3 extensions to use:
|
||||
# extensions =
|
||||
# (Alternatively, use a configuration file that has only
|
||||
# X.509v3 extensions in its main [= default] section.)
|
||||
|
||||
[ new_oids ]
|
||||
|
||||
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||
# Add a simple OID like this:
|
||||
# testoid1=1.2.3.4
|
||||
# Or use config file substitution like this:
|
||||
# testoid2=${testoid1}.5.6
|
||||
|
||||
####################################################################
|
||||
[ ca ]
|
||||
default_ca = CA_default # The default ca section
|
||||
|
||||
####################################################################
|
||||
[ CA_default ]
|
||||
|
||||
dir = $ENV::KEY_DIR # Where everything is kept
|
||||
certs = $dir # Where the issued certs are kept
|
||||
crl_dir = $dir # Where the issued crl are kept
|
||||
database = $dir/index.txt # database index file.
|
||||
new_certs_dir = $dir # default place for new certs.
|
||||
|
||||
certificate = $dir/ca.crt # The CA certificate
|
||||
serial = $dir/serial # The current serial number
|
||||
crl = $dir/crl.pem # The current CRL
|
||||
private_key = $dir/ca.key # The private key
|
||||
RANDFILE = $dir/.rand # private random number file
|
||||
|
||||
x509_extensions = usr_cert # The extentions to add to the cert
|
||||
|
||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||
# so this is commented out by default to leave a V1 CRL.
|
||||
# crl_extensions = crl_ext
|
||||
|
||||
default_days = 3650 # how long to certify for
|
||||
default_crl_days= 3650 # how long before next CRL
|
||||
default_md = sha256 # use public key default MD
|
||||
preserve = no # keep passed DN ordering
|
||||
|
||||
# A few difference way of specifying how similar the request should look
|
||||
# For type CA, the listed attributes must be the same, and the optional
|
||||
# and supplied fields are just that :-)
|
||||
policy = policy_anything
|
||||
|
||||
# For the CA policy
|
||||
[ policy_match ]
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
# For the 'anything' policy
|
||||
# At this point in time, you must list all acceptable 'object'
|
||||
# types.
|
||||
[ policy_anything ]
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
name = optional
|
||||
emailAddress = optional
|
||||
|
||||
####################################################################
|
||||
[ req ]
|
||||
default_bits = $ENV::KEY_SIZE
|
||||
default_keyfile = privkey.pem
|
||||
default_md = sha256
|
||||
distinguished_name = req_distinguished_name
|
||||
attributes = req_attributes
|
||||
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||
|
||||
# Passwords for private keys if not present they will be prompted for
|
||||
# input_password = secret
|
||||
# output_password = secret
|
||||
|
||||
# This sets a mask for permitted string types. There are several options.
|
||||
# default: PrintableString, T61String, BMPString.
|
||||
# pkix : PrintableString, BMPString (PKIX recommendation after 2004).
|
||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||
# MASK:XXXX a literal mask value.
|
||||
string_mask = nombstr
|
||||
|
||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||
|
||||
[ req_distinguished_name ]
|
||||
countryName = Country Name (2 letter code)
|
||||
countryName_default = $ENV::KEY_COUNTRY
|
||||
countryName_min = 2
|
||||
countryName_max = 2
|
||||
|
||||
stateOrProvinceName = State or Province Name (full name)
|
||||
stateOrProvinceName_default = $ENV::KEY_PROVINCE
|
||||
|
||||
localityName = Locality Name (eg, city)
|
||||
localityName_default = $ENV::KEY_CITY
|
||||
|
||||
0.organizationName = Organization Name (eg, company)
|
||||
0.organizationName_default = $ENV::KEY_ORG
|
||||
|
||||
# we can do this but it is not needed normally :-)
|
||||
#1.organizationName = Second Organization Name (eg, company)
|
||||
#1.organizationName_default = World Wide Web Pty Ltd
|
||||
|
||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||
#organizationalUnitName_default =
|
||||
|
||||
commonName = Common Name (eg, your name or your server\'s hostname)
|
||||
commonName_max = 64
|
||||
|
||||
name = Name
|
||||
name_max = 64
|
||||
|
||||
emailAddress = Email Address
|
||||
emailAddress_default = $ENV::KEY_EMAIL
|
||||
emailAddress_max = 40
|
||||
|
||||
# JY -- added for batch mode
|
||||
organizationalUnitName_default = $ENV::KEY_OU
|
||||
commonName_default = $ENV::KEY_CN
|
||||
name_default = $ENV::KEY_NAME
|
||||
|
||||
|
||||
# SET-ex3 = SET extension number 3
|
||||
|
||||
[ req_attributes ]
|
||||
challengePassword = A challenge password
|
||||
challengePassword_min = 4
|
||||
challengePassword_max = 20
|
||||
|
||||
unstructuredName = An optional company name
|
||||
|
||||
[ usr_cert ]
|
||||
|
||||
# These extensions are added when 'ca' signs a request.
|
||||
|
||||
# This goes against PKIX guidelines but some CAs do it and some software
|
||||
# requires this to avoid interpreting an end user certificate as a CA.
|
||||
|
||||
basicConstraints=CA:FALSE
|
||||
|
||||
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||
# the certificate can be used for anything *except* object signing.
|
||||
|
||||
# This is OK for an SSL server.
|
||||
# nsCertType = server
|
||||
|
||||
# For an object signing certificate this would be used.
|
||||
# nsCertType = objsign
|
||||
|
||||
# For normal client use this is typical
|
||||
# nsCertType = client, email
|
||||
|
||||
# and for everything including object signing:
|
||||
# nsCertType = client, email, objsign
|
||||
|
||||
# This is typical in keyUsage for a client certificate.
|
||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
# This will be displayed in Netscape's comment listbox.
|
||||
nsComment = "Easy-RSA Generated Certificate"
|
||||
|
||||
# PKIX recommendations harmless if included in all certificates.
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=clientAuth
|
||||
keyUsage = digitalSignature
|
||||
|
||||
|
||||
# This stuff is for subjectAltName and issuerAltname.
|
||||
# Import the email address.
|
||||
# subjectAltName=email:copy
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
# Copy subject details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||
#nsBaseUrl
|
||||
#nsRevocationUrl
|
||||
#nsRenewalUrl
|
||||
#nsCaPolicyUrl
|
||||
#nsSslServerName
|
||||
|
||||
[ server ]
|
||||
|
||||
# JY ADDED -- Make a cert with nsCertType set to "server"
|
||||
basicConstraints=CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "Easy-RSA Generated Server Certificate"
|
||||
subjectKeyIdentifier=hash
|
||||
authorityKeyIdentifier=keyid,issuer:always
|
||||
extendedKeyUsage=serverAuth
|
||||
keyUsage = digitalSignature, keyEncipherment
|
||||
subjectAltName=$ENV::KEY_ALTNAMES
|
||||
|
||||
[ v3_req ]
|
||||
|
||||
# Extensions to add to a certificate request
|
||||
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
|
||||
[ v3_ca ]
|
||||
|
||||
|
||||
# Extensions for a typical CA
|
||||
|
||||
|
||||
# PKIX recommendation.
|
||||
|
||||
subjectKeyIdentifier=hash
|
||||
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
# This is what PKIX recommends but some broken software chokes on critical
|
||||
# extensions.
|
||||
#basicConstraints = critical,CA:true
|
||||
# So we do this instead.
|
||||
basicConstraints = CA:true
|
||||
|
||||
# Key usage: this is typical for a CA certificate. However since it will
|
||||
# prevent it being used as an test self-signed certificate it is best
|
||||
# left out by default.
|
||||
# keyUsage = cRLSign, keyCertSign
|
||||
|
||||
# Some might want this also
|
||||
# nsCertType = sslCA, emailCA
|
||||
|
||||
# Include email address in subject alt name: another PKIX recommendation
|
||||
# subjectAltName=email:copy
|
||||
# Copy issuer details
|
||||
# issuerAltName=issuer:copy
|
||||
|
||||
# DER hex encoding of an extension: beware experts only!
|
||||
# obj=DER:02:03
|
||||
# Where 'obj' is a standard or added object
|
||||
# You can even override a supported extension:
|
||||
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||
|
||||
[ crl_ext ]
|
||||
|
||||
# CRL extensions.
|
||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||
|
||||
# issuerAltName=issuer:copy
|
||||
authorityKeyIdentifier=keyid:always,issuer:always
|
||||
|
||||
[ engine_section ]
|
||||
#
|
||||
# If you are using PKCS#11
|
||||
# Install engine_pkcs11 of opensc (www.opensc.org)
|
||||
# And uncomment the following
|
||||
# verify that dynamic_path points to the correct location
|
||||
#
|
||||
#pkcs11 = pkcs11_section
|
||||
|
||||
[ pkcs11_section ]
|
||||
engine_id = pkcs11
|
||||
dynamic_path = /usr/lib/engines/engine_pkcs11.so
|
||||
MODULE_PATH = $ENV::PKCS11_MODULE_PATH
|
||||
PIN = $ENV::PKCS11_PIN
|
||||
init = 0
|
1
OPP/openvpn/easy-rsa/openssl.cnf
Symbolic link
1
OPP/openvpn/easy-rsa/openssl.cnf
Symbolic link
@ -0,0 +1 @@
|
||||
openssl-1.0.0.cnf
|
1
OPP/openvpn/easy-rsa/pkitool
Symbolic link
1
OPP/openvpn/easy-rsa/pkitool
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/pkitool
|
1
OPP/openvpn/easy-rsa/revoke-full
Symbolic link
1
OPP/openvpn/easy-rsa/revoke-full
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/revoke-full
|
1
OPP/openvpn/easy-rsa/sign-req
Symbolic link
1
OPP/openvpn/easy-rsa/sign-req
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/sign-req
|
95
OPP/openvpn/easy-rsa/vars
Normal file
95
OPP/openvpn/easy-rsa/vars
Normal file
@ -0,0 +1,95 @@
|
||||
# easy-rsa parameter settings
|
||||
|
||||
# NOTE: If you installed from an RPM,
|
||||
# don't edit this file in place in
|
||||
# /usr/share/openvpn/easy-rsa --
|
||||
# instead, you should copy the whole
|
||||
# easy-rsa directory to another location
|
||||
# (such as /etc/openvpn) so that your
|
||||
# edits will not be wiped out by a future
|
||||
# OpenVPN package upgrade.
|
||||
|
||||
# This variable should point to
|
||||
# the top level of the easy-rsa
|
||||
# tree.
|
||||
#export EASY_RSA="`pwd`"
|
||||
BASE_DIR=/etc/openvpn
|
||||
export EASY_RSA=${BASE_DIR}/easy-rsa
|
||||
|
||||
#
|
||||
# This variable should point to
|
||||
# the requested executables
|
||||
#
|
||||
export OPENSSL="openssl"
|
||||
export PKCS11TOOL="pkcs11-tool"
|
||||
export GREP="grep"
|
||||
|
||||
|
||||
# This variable should point to
|
||||
# the openssl.cnf file included
|
||||
# with easy-rsa.
|
||||
export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`
|
||||
#export KEY_CONFIG="$EASY_RSA/openssl.cnf"
|
||||
|
||||
# Edit this variable to point to
|
||||
# your soon-to-be-created key
|
||||
# directory.
|
||||
#
|
||||
# WARNING: clean-all will do
|
||||
# a rm -rf on this directory
|
||||
# so make sure you define
|
||||
# it correctly!
|
||||
#export KEY_DIR="$EASY_RSA/keys"
|
||||
export KEY_DIR="${BASE_DIR}/keys"
|
||||
|
||||
# Issue rm -rf warning
|
||||
echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR
|
||||
|
||||
# PKCS11 fixes
|
||||
export PKCS11_MODULE_PATH="dummy"
|
||||
export PKCS11_PIN="dummy"
|
||||
|
||||
# Increase this to 2048 if you
|
||||
# are paranoid. This will slow
|
||||
# down TLS negotiation performance
|
||||
# as well as the one-time DH parms
|
||||
# generation process.
|
||||
export KEY_SIZE=2048
|
||||
|
||||
# In how many days should the root CA key expire?
|
||||
#export CA_EXPIRE=3650
|
||||
export CA_EXPIRE=10957
|
||||
|
||||
# In how many days should certificates expire?
|
||||
#export KEY_EXPIRE=3650
|
||||
export KEY_EXPIRE=7305
|
||||
|
||||
# These are the default values for fields
|
||||
# which will be placed in the certificate.
|
||||
# Don't leave any of these fields blank.
|
||||
#export KEY_COUNTRY="US"
|
||||
#export KEY_PROVINCE="CA"
|
||||
#export KEY_CITY="SanFrancisco"
|
||||
#export KEY_ORG="Fort-Funston"
|
||||
#export KEY_EMAIL="me@myhost.mydomain"
|
||||
#export KEY_OU="MyOrganizationalUnit"
|
||||
|
||||
export KEY_COUNTRY=DE
|
||||
export KEY_PROVINCE=Berlin
|
||||
export KEY_CITY=Berlin
|
||||
export KEY_ORG="o.open"
|
||||
export KEY_EMAIL="argus@oopen.de"
|
||||
export KEY_OU="network services"
|
||||
|
||||
export KEY_ALTNAMES="VPN OPP"
|
||||
|
||||
# X509 Subject Field
|
||||
export KEY_NAME="OPP-Vpn"
|
||||
|
||||
# PKCS11 Smart Card
|
||||
# export PKCS11_MODULE_PATH="/usr/lib/changeme.so"
|
||||
# export PKCS11_PIN=1234
|
||||
|
||||
# If you'd like to sign all keys with the same Common Name, uncomment the KEY_CN export below
|
||||
# You will also need to make sure your OpenVPN server config has the duplicate-cn option set
|
||||
# export KEY_CN="CommonName"
|
1
OPP/openvpn/easy-rsa/whichopensslcnf
Symbolic link
1
OPP/openvpn/easy-rsa/whichopensslcnf
Symbolic link
@ -0,0 +1 @@
|
||||
/usr/share/easy-rsa/whichopensslcnf
|
20
OPP/openvpn/ipaddresses.txt
Normal file
20
OPP/openvpn/ipaddresses.txt
Normal file
@ -0,0 +1,20 @@
|
||||
10.0.62.1 openvpn server
|
||||
10.0.62.2 -- frei --
|
||||
10.0.62.3 chris
|
||||
10.0.62.4 rene
|
||||
10.0.62.5 -- frei --
|
||||
10.0.62.6 -- frei --
|
||||
10.0.62.7 -- frei --
|
||||
10.0.62.8 -- frei --
|
||||
10.0.62.9 chris_win
|
||||
10.0.62.10 -- reserviert --
|
||||
10.0.62.11 gesa
|
||||
10.0.62.12 johanna
|
||||
10.0.62.13 melanie
|
||||
10.0.62.14 dominique
|
||||
10.0.62.15 judith
|
||||
10.0.62.16 jonas
|
||||
10.0.62.17 ulf
|
||||
10.0.62.18 antje
|
||||
10.0.62.19 tobias
|
||||
10.0.62.20 anne
|
4
OPP/openvpn/ipp.txt
Normal file
4
OPP/openvpn/ipp.txt
Normal file
@ -0,0 +1,4 @@
|
||||
OPP-Vpn-ingmar,10.0.62.2
|
||||
OPP-Vpn-jenny,10.0.62.3
|
||||
OPP-Vpn-oezge,10.0.62.4
|
||||
OPP-Vpn-cristina,10.0.62.5
|
24
OPP/openvpn/keys-created.txt
Normal file
24
OPP/openvpn/keys-created.txt
Normal file
@ -0,0 +1,24 @@
|
||||
|
||||
key...............: laptop-opp1.key
|
||||
common name.......: OPP-Vpn-laptop-opp1
|
||||
password..........: KhhT3CtjkCx4
|
||||
|
||||
key...............: laptop-opp3.key
|
||||
common name.......: OPP-Vpn-laptop-opp3
|
||||
password..........: ncW7fh44L97f
|
||||
|
||||
key...............: laptop-opp2.key
|
||||
common name.......: OPP-Vpn-laptop-opp2
|
||||
password..........: 7NXL9T4cq4Xb
|
||||
|
||||
key...............: oezge.key
|
||||
common name.......: OPP-Vpn-oezge
|
||||
password..........: VNm3LXg9RTrH
|
||||
|
||||
key...............: jenny.key
|
||||
common name.......: OPP-Vpn-jenny
|
||||
password..........: jXzRxb44RnhN
|
||||
|
||||
key...............: tine.key
|
||||
common name.......: OPP-Vpn-tine
|
||||
password..........: Lfj9fWMf9d%g
|
70
OPP/openvpn/keys/01.pem
Normal file
70
OPP/openvpn/keys/01.pem
Normal file
@ -0,0 +1,70 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 1 (0x1)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 13:17:18 2008 GMT
|
||||
Not After : May 17 13:17:18 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-server/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:dc:bc:9a:57:b7:b0:ab:5a:cf:38:2f:0b:2a:94:
|
||||
29:d7:20:98:67:3c:fc:f7:1c:9f:fb:75:12:c3:0b:
|
||||
87:ab:a8:e2:d8:07:67:2b:9a:4c:51:33:2a:4e:e7:
|
||||
df:f6:be:32:98:15:62:42:d6:38:f1:fc:0f:34:87:
|
||||
b4:c1:1a:67:e8:b8:2a:b8:fb:f7:ed:d0:a6:54:0a:
|
||||
30:ea:ab:32:d1:52:01:d5:1d:f7:8d:2a:63:79:65:
|
||||
ff:cc:40:ae:75:68:b8:32:2f:0a:57:4d:3c:71:35:
|
||||
af:48:14:f0:b5:b5:73:5c:e7:e4:6e:6c:fc:7a:3e:
|
||||
47:b6:8c:87:b0:28:55:1b:b5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Cert Type:
|
||||
SSL Server
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Server Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
02:6B:50:96:D0:73:B9:16:DC:FE:F0:90:50:EE:C2:00:68:2B:14:97
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
1c:e9:c7:6b:54:79:2e:c7:d0:89:0c:c3:ba:54:67:d0:e5:4f:
|
||||
a3:5f:af:3d:39:74:4b:af:25:25:e1:20:be:af:1f:5b:94:26:
|
||||
b3:95:69:8e:1c:8f:cc:b0:ce:3a:52:07:e1:8c:24:5e:f8:df:
|
||||
d5:db:83:12:85:04:16:05:84:9f:c5:c9:12:a6:0d:da:30:ee:
|
||||
6d:bb:92:dd:b5:24:98:61:e1:ec:d0:db:cc:c4:7e:3e:da:91:
|
||||
a2:73:67:b1:60:10:16:e7:e8:d2:1a:e2:b0:75:a3:43:fd:29:
|
||||
a3:c9:34:5c:19:03:cf:0d:39:2e:9f:a3:9c:f5:1f:6c:14:bd:
|
||||
3c:a1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDyDCCAzGgAwIBAgIBATANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTEzMTcx
|
||||
OFoXDTE4MDUxNzEzMTcxOFowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi1zZXJ2ZXIxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDcvJpXt7CrWs84Lwsq
|
||||
lCnXIJhnPPz3HJ/7dRLDC4erqOLYB2crmkxRMypO59/2vjKYFWJC1jjx/A80h7TB
|
||||
GmfouCq4+/ft0KZUCjDqqzLRUgHVHfeNKmN5Zf/MQK51aLgyLwpXTTxxNa9IFPC1
|
||||
tXNc5+RubPx6Pke2jIewKFUbtQIDAQABo4IBPTCCATkwCQYDVR0TBAIwADARBglg
|
||||
hkgBhvhCAQEEBAMCBkAwMwYJYIZIAYb4QgENBCYWJE9wZW5TU0wgR2VuZXJhdGVk
|
||||
IFNlcnZlciBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAmtQltBzuRbc/vCQUO7CAGgr
|
||||
FJcwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8x
|
||||
CzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEP
|
||||
MA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYD
|
||||
VQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJ
|
||||
ANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GBABzpx2tUeS7H0IkMw7pUZ9DlT6Nf
|
||||
rz05dEuvJSXhIL6vH1uUJrOVaY4cj8ywzjpSB+GMJF7439XbgxKFBBYFhJ/FyRKm
|
||||
Ddow7m27kt21JJhh4ezQ28zEfj7akaJzZ7FgEBbn6NIa4rB1o0P9KaPJNFwZA88N
|
||||
OS6fo5z1H2wUvTyh
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/02.pem
Normal file
67
OPP/openvpn/keys/02.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 2 (0x2)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 13:19:10 2008 GMT
|
||||
Not After : May 17 13:19:10 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-chris/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:a6:7c:7a:2e:0e:b0:df:ea:02:43:e9:8a:95:ec:
|
||||
33:d2:a9:ba:28:6a:36:2f:66:d5:dc:d3:d4:b1:00:
|
||||
33:18:3c:d1:a0:4d:cc:a5:c7:22:07:85:0f:3a:7d:
|
||||
e0:20:2a:0d:17:4a:10:73:c6:2c:34:7e:ac:1f:8b:
|
||||
1c:6e:31:1b:3b:f1:ee:f4:6a:31:e9:5a:3d:31:4f:
|
||||
5b:ba:8e:b8:c7:a0:63:23:b3:7e:4a:c8:cf:3c:6e:
|
||||
4f:35:74:96:88:94:36:6d:57:aa:9f:a0:71:6d:96:
|
||||
2d:19:12:66:bc:eb:c5:79:92:0a:2f:2e:c0:37:92:
|
||||
72:e0:6f:60:68:dd:7b:e1:9f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
34:12:B0:EE:3B:AB:8F:D7:D1:6C:EC:39:A6:8E:12:2A:EE:02:0D:0B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
06:48:c1:75:ac:13:02:30:6e:de:11:8f:8e:44:05:59:76:d8:
|
||||
9c:23:57:e7:53:97:2a:c5:a1:8e:11:3c:c0:28:57:c8:7d:d9:
|
||||
49:ab:87:ff:fe:72:eb:cc:57:33:d3:87:0a:c6:53:37:23:16:
|
||||
51:4d:2a:b9:b9:53:69:04:99:f1:bd:9e:18:15:88:2b:ea:2a:
|
||||
8d:7a:6a:3e:65:9c:5e:c7:fa:74:e5:b5:e1:5a:fd:76:30:f3:
|
||||
5e:10:f9:12:a2:ac:30:2c:ac:97:f0:54:c3:9f:64:01:2c:0c:
|
||||
47:6b:fc:b9:ac:72:e8:7d:64:fa:61:7a:3e:6b:64:84:71:9c:
|
||||
21:41
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBAjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTEzMTkx
|
||||
MFoXDTE4MDUxNzEzMTkxMFowgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1jaHJpczEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKZ8ei4OsN/qAkPpipXs
|
||||
M9KpuihqNi9m1dzT1LEAMxg80aBNzKXHIgeFDzp94CAqDRdKEHPGLDR+rB+LHG4x
|
||||
Gzvx7vRqMelaPTFPW7qOuMegYyOzfkrIzzxuTzV0loiUNm1Xqp+gcW2WLRkSZrzr
|
||||
xXmSCi8uwDeScuBvYGjde+GfAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUNBKw7jurj9fRbOw5po4SKu4CDQswgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AAZIwXWsEwIwbt4Rj45EBVl22JwjV+dTlyrFoY4RPMAoV8h92Umrh//+cuvMVzPT
|
||||
hwrGUzcjFlFNKrm5U2kEmfG9nhgViCvqKo16aj5lnF7H+nTlteFa/XYw814Q+RKi
|
||||
rDAsrJfwVMOfZAEsDEdr/Lmscuh9ZPphej5rZIRxnCFB
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/03.pem
Normal file
67
OPP/openvpn/keys/03.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 3 (0x3)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 13:55:46 2008 GMT
|
||||
Not After : May 17 13:55:46 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-jonas/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:cb:9c:0c:a4:23:e7:df:db:2b:2e:2d:37:9d:61:
|
||||
cb:27:8d:ed:9f:1c:e9:b9:2d:83:3f:2f:1a:2a:90:
|
||||
e7:1c:8b:41:28:a0:2f:3a:c2:67:a9:5a:e8:0a:a5:
|
||||
fc:3e:38:e8:fb:a6:5e:e4:14:3e:8e:70:ec:49:d6:
|
||||
20:81:f5:96:69:8e:8f:82:c1:d2:d7:fa:4b:e8:be:
|
||||
3c:20:05:41:f9:05:9f:8e:2f:38:a8:f7:d8:fe:1e:
|
||||
65:3c:68:0c:b0:db:74:57:fe:35:3f:70:ac:f9:fd:
|
||||
e0:9b:31:e5:32:18:ea:eb:87:06:d1:8d:03:fe:de:
|
||||
ed:17:77:c1:e7:07:92:20:f3
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
33:08:DF:6E:0D:57:08:50:3C:7F:87:8F:29:3E:1A:EF:64:69:30:CD
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
1d:1b:07:ad:33:48:cf:b8:59:30:fb:5f:6f:ea:15:37:9f:12:
|
||||
b6:03:30:2a:93:46:47:d4:42:2b:99:d2:a1:c8:ca:20:58:e3:
|
||||
71:9c:fa:a1:ff:53:85:41:5a:dd:df:80:6c:ca:f5:ca:75:56:
|
||||
5b:9f:ff:90:06:07:a4:8b:4f:c1:58:fd:02:ad:d8:1b:6c:6e:
|
||||
bd:4f:6a:40:1e:43:47:3b:b6:cb:45:be:f1:68:9f:9f:05:b9:
|
||||
3b:b9:7f:4a:0c:0f:53:c3:ab:15:54:cc:93:f1:4d:a7:88:7b:
|
||||
f1:e5:59:9e:ac:4f:f6:9e:cb:05:e7:bd:fc:33:27:53:0d:07:
|
||||
c0:07
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTEzNTU0
|
||||
NloXDTE4MDUxNzEzNTU0NlowgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1qb25hczEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMucDKQj59/bKy4tN51h
|
||||
yyeN7Z8c6bktgz8vGiqQ5xyLQSigLzrCZ6la6Aql/D446PumXuQUPo5w7EnWIIH1
|
||||
lmmOj4LB0tf6S+i+PCAFQfkFn44vOKj32P4eZTxoDLDbdFf+NT9wrPn94Jsx5TIY
|
||||
6uuHBtGNA/7e7Rd3wecHkiDzAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUMwjfbg1XCFA8f4ePKT4a72RpMM0wgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AB0bB60zSM+4WTD7X2/qFTefErYDMCqTRkfUQiuZ0qHIyiBY43Gc+qH/U4VBWt3f
|
||||
gGzK9cp1Vluf/5AGB6SLT8FY/QKt2Btsbr1PakAeQ0c7tstFvvFon58FuTu5f0oM
|
||||
D1PDqxVUzJPxTaeIe/HlWZ6sT/aeywXnvfwzJ1MNB8AH
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/04.pem
Normal file
67
OPP/openvpn/keys/04.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 4 (0x4)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:10:25 2008 GMT
|
||||
Not After : May 17 14:10:25 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-anne/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:a9:01:86:b4:76:7b:0e:42:cc:95:2c:97:8d:c8:
|
||||
5b:a2:7d:a0:8b:8e:06:97:e7:f3:48:5c:a4:90:1f:
|
||||
67:3e:ae:43:1d:c0:01:29:c9:f8:3d:b9:a4:42:d7:
|
||||
2a:18:53:64:22:3b:88:70:62:3b:7c:6f:e1:50:6e:
|
||||
86:6d:e1:31:13:f7:d3:42:20:d0:b2:83:fb:71:f3:
|
||||
72:a5:ae:b2:cd:3b:da:c2:61:eb:7f:e8:67:72:83:
|
||||
de:50:a3:ad:17:ad:e4:b8:a0:09:63:09:9d:8c:5b:
|
||||
47:a7:fb:9e:51:32:9a:95:2f:81:98:19:c1:94:46:
|
||||
f9:cd:78:99:41:fe:27:4b:fb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
16:84:EC:50:65:D5:87:51:13:EB:A5:5E:6A:00:8E:4D:1E:80:52:C4
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
35:b0:0a:3e:43:aa:72:39:8a:03:e6:77:36:f3:84:b1:18:dc:
|
||||
b1:45:9c:f9:c6:b5:49:4c:51:ec:e2:ba:c7:39:0f:cd:f6:3f:
|
||||
ed:c6:86:a3:3c:39:82:bb:cb:27:8b:b4:c7:f8:07:a3:ee:d2:
|
||||
9a:8f:fa:34:81:de:a0:68:f0:b3:2b:6e:30:b2:96:5f:84:48:
|
||||
21:25:2e:3a:69:36:49:4d:bc:40:98:5a:56:58:98:d3:22:94:
|
||||
b6:13:33:c6:4b:3c:30:22:04:91:e4:1b:f9:f4:e1:ed:0d:d4:
|
||||
32:05:e7:ab:b9:8b:b7:15:16:97:6d:2a:2a:f4:07:dc:54:be:
|
||||
a4:26
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrDCCAxWgAwIBAgIBBDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTAy
|
||||
NVoXDTE4MDUxNzE0MTAyNVowgYAxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEV
|
||||
MBMGA1UEAxMMT1BQLVZwbi1hbm5lMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Bl
|
||||
bi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqQGGtHZ7DkLMlSyXjchb
|
||||
on2gi44Gl+fzSFykkB9nPq5DHcABKcn4PbmkQtcqGFNkIjuIcGI7fG/hUG6GbeEx
|
||||
E/fTQiDQsoP7cfNypa6yzTvawmHrf+hncoPeUKOtF63kuKAJYwmdjFtHp/ueUTKa
|
||||
lS+BmBnBlEb5zXiZQf4nS/sCAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZI
|
||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||
BBQWhOxQZdWHURPrpV5qAI5NHoBSxDCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexay
|
||||
zG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5l
|
||||
dHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0B
|
||||
CQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEA
|
||||
NbAKPkOqcjmKA+Z3NvOEsRjcsUWc+ca1SUxR7OK6xzkPzfY/7caGozw5grvLJ4u0
|
||||
x/gHo+7Smo/6NIHeoGjwsytuMLKWX4RIISUuOmk2SU28QJhaVliY0yKUthMzxks8
|
||||
MCIEkeQb+fTh7Q3UMgXnq7mLtxUWl20qKvQH3FS+pCY=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/05.pem
Normal file
67
OPP/openvpn/keys/05.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 5 (0x5)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:11:07 2008 GMT
|
||||
Not After : May 17 14:11:07 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-antje/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d9:af:d5:10:fd:3d:66:4a:1f:86:43:3a:eb:9d:
|
||||
c3:3d:eb:9a:fd:c9:ac:76:79:b4:8b:62:3a:b0:22:
|
||||
92:70:ef:dc:b4:90:08:af:0e:69:c1:e1:41:42:f1:
|
||||
5a:9a:34:28:c1:4b:73:9f:cb:48:8d:e8:4e:fc:ae:
|
||||
98:aa:87:7a:a0:09:77:6c:d2:db:51:f9:0b:a1:93:
|
||||
37:57:4d:71:ed:5a:07:2b:0e:29:6c:c1:2c:79:e7:
|
||||
82:6c:f2:49:fd:1f:44:18:df:07:3b:4a:9e:53:49:
|
||||
b7:29:1c:17:ed:28:0a:72:64:3e:3d:98:ab:ce:0b:
|
||||
99:19:a4:36:7d:12:dd:6a:af
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
DD:6A:35:36:EE:4B:F6:AE:4C:80:30:12:74:49:60:87:44:FA:09:D6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
ad:af:8f:8a:fa:30:43:ce:95:ff:9d:39:65:a9:da:1e:49:dc:
|
||||
df:10:63:4a:76:74:5f:46:e6:2a:e6:be:ca:de:99:1a:84:07:
|
||||
53:f4:ec:1b:27:ae:3d:f5:21:b5:9c:27:5f:18:f8:3b:fa:39:
|
||||
6c:3a:d8:2a:01:2d:61:22:a1:36:4e:21:0a:48:e1:46:57:98:
|
||||
43:fa:f6:b1:6a:32:75:5a:b6:15:f6:3e:5b:61:8d:73:de:ff:
|
||||
cd:3c:90:8a:ca:41:88:55:97:eb:e8:92:d8:89:96:34:99:9f:
|
||||
eb:e7:4e:37:01:3d:33:dd:32:17:c6:d2:0c:1d:9e:ee:72:37:
|
||||
a6:85
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBBTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTEw
|
||||
N1oXDTE4MDUxNzE0MTEwN1owgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1hbnRqZTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANmv1RD9PWZKH4ZDOuud
|
||||
wz3rmv3JrHZ5tItiOrAiknDv3LSQCK8OacHhQULxWpo0KMFLc5/LSI3oTvyumKqH
|
||||
eqAJd2zS21H5C6GTN1dNce1aBysOKWzBLHnngmzySf0fRBjfBztKnlNJtykcF+0o
|
||||
CnJkPj2Yq84LmRmkNn0S3WqvAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQU3Wo1Nu5L9q5MgDASdElgh0T6CdYwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AK2vj4r6MEPOlf+dOWWp2h5J3N8QY0p2dF9G5irmvsremRqEB1P07Bsnrj31IbWc
|
||||
J18Y+Dv6OWw62CoBLWEioTZOIQpI4UZXmEP69rFqMnVathX2PlthjXPe/808kIrK
|
||||
QYhVl+voktiJljSZn+vnTjcBPTPdMhfG0gwdnu5yN6aF
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/06.pem
Normal file
67
OPP/openvpn/keys/06.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 6 (0x6)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:11:52 2008 GMT
|
||||
Not After : May 17 14:11:52 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-dominique/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:c1:38:3f:b0:d4:de:b8:36:d8:39:59:f5:e7:f0:
|
||||
90:30:28:ea:08:8f:89:22:a6:20:ab:30:cd:fd:6d:
|
||||
05:49:a8:75:44:5b:2a:8c:d0:f2:7a:ad:8e:2d:f8:
|
||||
61:3a:ca:96:6b:f7:fa:8f:9e:cf:b6:1f:05:28:0f:
|
||||
17:7b:30:72:38:b4:d7:2e:11:7d:4e:bd:0e:34:f5:
|
||||
73:b8:fc:96:bf:dc:08:b4:42:5c:28:79:c9:13:21:
|
||||
41:56:8b:46:b4:22:3a:ce:67:7e:ee:22:e4:0d:6b:
|
||||
2a:6d:5e:20:1a:cd:bb:00:98:e6:a8:c5:40:e6:cf:
|
||||
64:5e:73:c3:5c:07:64:67:4b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E4:85:C4:03:74:D3:5B:17:7C:9A:8A:F7:CE:62:23:56:CE:45:14:80
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
23:5f:8b:84:36:8f:5c:85:64:4c:13:36:df:64:4f:6e:15:b3:
|
||||
21:2e:1c:3f:90:d4:9c:03:2e:1d:c8:6d:54:d7:19:03:46:b5:
|
||||
e9:50:eb:92:7c:cf:14:5d:b4:0c:58:3e:8d:e8:a0:19:aa:16:
|
||||
43:b5:c5:9b:4e:4e:1c:4b:a3:80:78:43:c8:77:79:6e:ac:13:
|
||||
28:c8:5d:c1:a2:b2:dd:1f:ca:ad:c5:7b:81:3f:8d:15:43:6e:
|
||||
e4:39:73:a9:07:85:4c:a7:ad:34:73:80:06:1f:97:63:38:53:
|
||||
77:db:e0:5f:ea:0b:40:a8:55:9a:d2:68:75:20:ca:29:0f:7f:
|
||||
67:e5
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDsTCCAxqgAwIBAgIBBjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTE1
|
||||
MloXDTE4MDUxNzE0MTE1MlowgYUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEa
|
||||
MBgGA1UEAxMRT1BQLVZwbi1kb21pbmlxdWUxHTAbBgkqhkiG9w0BCQEWDmFyZ3Vz
|
||||
QG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDBOD+w1N64Ntg5
|
||||
WfXn8JAwKOoIj4kipiCrMM39bQVJqHVEWyqM0PJ6rY4t+GE6ypZr9/qPns+2HwUo
|
||||
Dxd7MHI4tNcuEX1OvQ409XO4/Ja/3Ai0QlwoeckTIUFWi0a0IjrOZ37uIuQNaypt
|
||||
XiAazbsAmOaoxUDmz2Rec8NcB2RnSwIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAs
|
||||
BglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYD
|
||||
VR0OBBYEFOSFxAN001sXfJqK985iI1bORRSAMIHEBgNVHSMEgbwwgbmAFOFNw2v0
|
||||
fIF7FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMG
|
||||
QmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UE
|
||||
CxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqG
|
||||
SIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQF
|
||||
AAOBgQAjX4uENo9chWRMEzbfZE9uFbMhLhw/kNScAy4dyG1U1xkDRrXpUOuSfM8U
|
||||
XbQMWD6N6KAZqhZDtcWbTk4cS6OAeEPId3lurBMoyF3BorLdH8qtxXuBP40VQ27k
|
||||
OXOpB4VMp600c4AGH5djOFN32+Bf6gtAqFWa0mh1IMopD39n5Q==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/07.pem
Normal file
67
OPP/openvpn/keys/07.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 7 (0x7)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:12:31 2008 GMT
|
||||
Not After : May 17 14:12:31 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-gesa/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:dd:3f:12:ed:6e:50:5f:83:73:b2:02:06:39:79:
|
||||
4c:8f:5c:1a:cf:24:8b:48:ad:26:30:5e:33:dc:97:
|
||||
ee:8a:01:4b:4c:be:78:0e:6c:a7:04:5b:2d:12:bd:
|
||||
2e:c1:7f:71:6d:84:52:b5:19:e8:b2:6c:57:bd:54:
|
||||
4b:9d:97:ca:12:a4:9e:7b:d6:b3:26:88:b2:f9:ee:
|
||||
e8:92:27:1a:50:e1:8e:44:ba:a8:81:db:c6:03:9b:
|
||||
8e:92:a6:f5:28:61:d9:a8:9b:6c:74:41:e4:3d:a2:
|
||||
2e:98:75:9f:3f:37:6f:79:84:44:ff:53:39:cf:96:
|
||||
31:b4:82:54:dd:46:b8:8c:85
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
20:D1:BD:E0:49:1C:2D:5C:06:98:E8:85:E7:B4:9B:34:0F:23:DB:21
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
69:8a:2e:2b:93:da:48:7a:0a:3a:8d:84:0e:f9:16:d7:23:c6:
|
||||
29:e2:75:67:e8:59:f2:21:2b:31:7f:15:94:10:0b:49:5a:a4:
|
||||
4c:7f:ef:3e:02:ad:04:d5:be:f7:10:03:cd:77:73:bb:b4:93:
|
||||
03:c8:27:51:0e:1a:27:91:51:e6:6f:43:ad:cd:91:be:ab:3c:
|
||||
5c:ba:54:e8:4f:b5:07:22:d4:46:b1:e6:41:34:cc:56:84:3b:
|
||||
f2:bf:eb:b9:a5:d8:43:95:b5:42:67:3a:08:99:f9:d9:3d:9e:
|
||||
fa:2d:e3:a8:da:4c:de:3e:00:cc:92:8c:56:92:d0:da:47:b0:
|
||||
fa:eb
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrDCCAxWgAwIBAgIBBzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTIz
|
||||
MVoXDTE4MDUxNzE0MTIzMVowgYAxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEV
|
||||
MBMGA1UEAxMMT1BQLVZwbi1nZXNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Bl
|
||||
bi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3T8S7W5QX4NzsgIGOXlM
|
||||
j1wazySLSK0mMF4z3JfuigFLTL54DmynBFstEr0uwX9xbYRStRnosmxXvVRLnZfK
|
||||
EqSee9azJoiy+e7okicaUOGORLqogdvGA5uOkqb1KGHZqJtsdEHkPaIumHWfPzdv
|
||||
eYRE/1M5z5YxtIJU3Ua4jIUCAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZI
|
||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||
BBQg0b3gSRwtXAaY6IXntJs0DyPbITCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexay
|
||||
zG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5l
|
||||
dHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0B
|
||||
CQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEA
|
||||
aYouK5PaSHoKOo2EDvkW1yPGKeJ1Z+hZ8iErMX8VlBALSVqkTH/vPgKtBNW+9xAD
|
||||
zXdzu7STA8gnUQ4aJ5FR5m9Drc2Rvqs8XLpU6E+1ByLURrHmQTTMVoQ78r/ruaXY
|
||||
Q5W1Qmc6CJn52T2e+i3jqNpM3j4AzJKMVpLQ2kew+us=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/08.pem
Normal file
67
OPP/openvpn/keys/08.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 8 (0x8)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:13:18 2008 GMT
|
||||
Not After : May 17 14:13:18 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-johanna/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:f7:70:f2:cb:57:2c:4b:57:2f:44:0f:26:39:41:
|
||||
ac:8c:0b:5b:3b:17:9a:f0:9f:1e:3a:9f:43:83:65:
|
||||
ce:78:1d:ca:33:9b:e8:79:a0:64:d9:2a:3f:37:75:
|
||||
09:bc:2c:60:78:d0:fe:90:c3:4e:91:70:4d:e4:f7:
|
||||
a4:df:c5:55:94:10:8c:91:ed:0e:41:22:61:20:67:
|
||||
f9:87:84:8d:a2:84:95:a2:86:04:49:d2:f5:3e:cf:
|
||||
54:22:e9:30:90:d5:e0:12:f3:94:39:9a:f4:6a:27:
|
||||
82:89:d6:a1:2b:f6:41:ca:7b:07:a0:96:cb:bf:7d:
|
||||
b0:22:66:b0:ae:13:bb:23:81
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
32:7C:8F:D3:1A:02:D7:62:07:F0:D2:64:DD:4A:56:76:38:58:6A:3F
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
6b:6d:1d:fb:22:51:80:dd:c0:d0:45:cd:51:f7:2e:d8:0c:e9:
|
||||
b9:63:62:30:25:8c:37:ae:95:90:2f:e7:d0:a2:fe:08:18:f2:
|
||||
1b:a3:cb:54:36:b3:9e:33:56:7e:fe:68:70:ab:51:0e:0c:30:
|
||||
1d:3a:bc:5f:e3:32:9b:81:2e:87:4c:23:dc:24:70:ac:9e:f1:
|
||||
f1:75:ee:9c:b1:a8:b8:58:23:7d:37:0b:be:43:8d:30:b1:40:
|
||||
e3:72:90:56:40:38:d7:27:d9:1a:58:88:ba:58:a0:7c:16:91:
|
||||
b5:fe:a5:68:55:a8:e7:88:a7:09:1f:28:c0:21:b6:4a:05:95:
|
||||
ae:14
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrzCCAxigAwIBAgIBCDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTMx
|
||||
OFoXDTE4MDUxNzE0MTMxOFowgYMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEY
|
||||
MBYGA1UEAxMPT1BQLVZwbi1qb2hhbm5hMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
|
||||
b3Blbi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA93Dyy1csS1cvRA8m
|
||||
OUGsjAtbOxea8J8eOp9Dg2XOeB3KM5voeaBk2So/N3UJvCxgeND+kMNOkXBN5Pek
|
||||
38VVlBCMke0OQSJhIGf5h4SNooSVooYESdL1Ps9UIukwkNXgEvOUOZr0aieCidah
|
||||
K/ZBynsHoJbLv32wImawrhO7I4ECAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJ
|
||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
|
||||
DgQWBBQyfI/TGgLXYgfw0mTdSlZ2OFhqPzCBxAYDVR0jBIG8MIG5gBThTcNr9HyB
|
||||
exayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJl
|
||||
cmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsT
|
||||
EG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG
|
||||
9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQAD
|
||||
gYEAa20d+yJRgN3A0EXNUfcu2AzpuWNiMCWMN66VkC/n0KL+CBjyG6PLVDaznjNW
|
||||
fv5ocKtRDgwwHTq8X+Mym4Euh0wj3CRwrJ7x8XXunLGouFgjfTcLvkONMLFA43KQ
|
||||
VkA41yfZGliIuligfBaRtf6laFWo54inCR8owCG2SgWVrhQ=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/09.pem
Normal file
67
OPP/openvpn/keys/09.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 9 (0x9)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:14:03 2008 GMT
|
||||
Not After : May 17 14:14:03 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-judith/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d9:e7:c6:8e:af:9e:0e:c7:3e:12:5b:e2:4a:a2:
|
||||
45:7f:50:56:14:13:d7:c8:01:22:b5:56:7d:88:a5:
|
||||
c6:a8:18:21:e3:bc:9d:b6:2a:28:08:8e:1c:14:ca:
|
||||
13:0d:22:fc:ba:cf:cb:39:8c:6f:b2:0f:de:41:a0:
|
||||
ba:23:05:13:aa:11:35:3c:0d:51:ef:a5:03:45:8c:
|
||||
50:d6:91:79:6a:dd:86:1b:87:be:5b:62:89:06:f7:
|
||||
da:2c:20:3f:ae:59:e0:2f:f5:e3:69:f1:a4:6d:c5:
|
||||
b0:fb:8f:e9:92:c7:81:2e:a9:d7:44:9d:2f:d5:4f:
|
||||
78:e4:7c:38:4f:8d:ea:06:47
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
B4:C2:63:23:F6:B4:BE:2C:28:A2:BE:0F:96:77:80:E5:CC:9D:9B:F6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
62:64:75:56:6e:13:fe:0f:42:1e:99:83:35:fb:f3:5e:06:84:
|
||||
62:82:33:54:8f:d4:0f:08:a5:1d:6c:ea:b3:64:81:43:80:16:
|
||||
46:d4:9b:e2:ac:10:4c:6a:eb:b5:a9:b5:15:05:0d:80:74:fe:
|
||||
e3:33:89:39:67:47:3b:45:4e:9b:5e:5e:0a:07:8b:a7:bb:e7:
|
||||
0a:4e:e9:31:8b:cc:a9:43:26:79:dd:00:b5:e5:8f:f9:8f:93:
|
||||
36:3e:45:ea:df:63:35:69:f0:8c:1e:1f:09:a6:da:07:04:30:
|
||||
51:eb:df:4a:c1:9a:95:1d:dd:9e:eb:29:2d:86:10:6a:03:cb:
|
||||
14:3a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBCTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTQw
|
||||
M1oXDTE4MDUxNzE0MTQwM1owgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi1qdWRpdGgxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDZ58aOr54Oxz4SW+JK
|
||||
okV/UFYUE9fIASK1Vn2IpcaoGCHjvJ22KigIjhwUyhMNIvy6z8s5jG+yD95BoLoj
|
||||
BROqETU8DVHvpQNFjFDWkXlq3YYbh75bYokG99osID+uWeAv9eNp8aRtxbD7j+mS
|
||||
x4EuqddEnS/VT3jkfDhPjeoGRwIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFLTCYyP2tL4sKKK+D5Z3gOXMnZv2MIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQBiZHVWbhP+D0IemYM1+/NeBoRigjNUj9QPCKUdbOqzZIFDgBZG1JvirBBMauu1
|
||||
qbUVBQ2AdP7jM4k5Z0c7RU6bXl4KB4unu+cKTukxi8ypQyZ53QC15Y/5j5M2PkXq
|
||||
32M1afCMHh8JptoHBDBR699KwZqVHd2e6ykthhBqA8sUOg==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0A.pem
Normal file
67
OPP/openvpn/keys/0A.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 10 (0xa)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:14:45 2008 GMT
|
||||
Not After : May 17 14:14:45 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-melanie/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b2:b8:c9:51:71:56:49:22:c5:0b:cf:66:3c:64:
|
||||
78:95:e7:b3:58:25:4f:31:fa:25:ed:bc:e5:69:e4:
|
||||
58:84:ca:86:3c:7a:94:39:ae:66:f5:99:7b:36:3c:
|
||||
f9:84:92:ca:24:e6:1b:f8:9c:f6:81:ca:fe:c7:db:
|
||||
70:2d:bf:2b:dc:ce:cb:63:1c:e5:79:66:46:83:45:
|
||||
5b:70:2c:69:3f:cd:0b:5b:95:e5:b2:ca:b9:17:7f:
|
||||
45:74:e0:0f:d9:f8:12:57:45:9f:2e:c3:85:af:bf:
|
||||
13:f4:80:e1:67:44:8d:04:80:17:a7:aa:0d:f5:be:
|
||||
54:6f:11:99:94:76:ec:f4:6f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
C1:FB:C0:38:B2:6D:8B:92:3F:3F:78:3D:5E:E5:17:67:1D:25:B7:4E
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
8b:78:28:3d:87:71:36:a1:e7:66:cd:07:6f:1c:f5:43:80:7f:
|
||||
cf:67:dd:5f:14:b4:e3:33:05:53:36:e0:53:62:e3:16:d7:ca:
|
||||
85:b0:d4:64:72:57:15:fd:c5:54:ac:d8:98:98:5d:43:e5:a8:
|
||||
f8:bf:cb:f9:79:ed:8e:6e:8d:4e:5c:3a:1e:ec:e3:ad:ac:c5:
|
||||
ec:5a:91:7d:2d:9d:c2:6e:51:38:55:6a:0f:27:1b:b6:a7:9d:
|
||||
78:fc:bf:29:d7:a8:93:83:cf:72:62:5f:51:39:5e:f6:f2:e0:
|
||||
59:09:f0:96:4c:25:02:03:21:22:0a:d2:2b:4e:26:53:b4:e6:
|
||||
ab:68
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrzCCAxigAwIBAgIBCjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTQ0
|
||||
NVoXDTE4MDUxNzE0MTQ0NVowgYMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEY
|
||||
MBYGA1UEAxMPT1BQLVZwbi1tZWxhbmllMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
|
||||
b3Blbi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsrjJUXFWSSLFC89m
|
||||
PGR4leezWCVPMfol7bzlaeRYhMqGPHqUOa5m9Zl7Njz5hJLKJOYb+Jz2gcr+x9tw
|
||||
Lb8r3M7LYxzleWZGg0VbcCxpP80LW5Xlssq5F39FdOAP2fgSV0WfLsOFr78T9IDh
|
||||
Z0SNBIAXp6oN9b5UbxGZlHbs9G8CAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJ
|
||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
|
||||
DgQWBBTB+8A4sm2Lkj8/eD1e5RdnHSW3TjCBxAYDVR0jBIG8MIG5gBThTcNr9HyB
|
||||
exayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJl
|
||||
cmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsT
|
||||
EG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG
|
||||
9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQAD
|
||||
gYEAi3goPYdxNqHnZs0Hbxz1Q4B/z2fdXxS04zMFUzbgU2LjFtfKhbDUZHJXFf3F
|
||||
VKzYmJhdQ+Wo+L/L+Xntjm6NTlw6HuzjrazF7FqRfS2dwm5ROFVqDycbtqedePy/
|
||||
Kdeok4PPcmJfUTle9vLgWQnwlkwlAgMhIgrSK04mU7Tmq2g=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0B.pem
Normal file
67
OPP/openvpn/keys/0B.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 11 (0xb)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:15:20 2008 GMT
|
||||
Not After : May 17 14:15:20 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-nadja/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:bb:cb:0e:5b:38:8b:77:6a:4d:33:ff:b5:cc:13:
|
||||
55:6e:7c:b1:94:26:88:65:bd:e3:52:c5:cf:26:ad:
|
||||
0a:f2:81:7a:e1:ea:5a:9e:f8:e8:3f:07:4d:a0:c5:
|
||||
0a:16:a9:a0:57:fc:b9:e9:36:f2:51:8f:0a:da:8f:
|
||||
80:d1:cf:4c:b2:20:20:42:e8:54:b9:1f:47:e9:dd:
|
||||
d6:20:40:1b:70:cd:13:d8:b1:d1:80:81:2c:b3:a0:
|
||||
bb:14:f3:ce:90:63:06:42:62:db:64:96:7b:8e:b1:
|
||||
4b:bd:fb:69:f3:ff:28:d4:f2:31:95:d8:20:d2:1a:
|
||||
ea:42:75:37:b9:0f:62:45:49
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E4:1C:21:CA:A4:EA:2B:E7:DC:08:74:EE:52:64:02:66:34:F6:E6:3E
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
a5:59:81:da:2c:3b:ea:72:23:29:1a:6a:61:0b:a2:f9:d5:ee:
|
||||
6e:cd:3b:6f:c6:c7:8a:75:60:cd:89:1a:a2:dc:e8:b2:85:91:
|
||||
d9:8a:eb:f4:eb:c4:eb:31:3a:35:c1:e0:88:2d:3d:e5:09:ab:
|
||||
dc:22:e4:57:23:2e:38:42:24:b7:9d:41:ae:3c:57:76:dc:17:
|
||||
e7:44:a1:ab:8b:95:c4:64:d2:91:c3:61:73:df:9f:a8:6f:b4:
|
||||
a7:46:09:93:fe:32:51:d9:bd:f5:aa:fa:e6:f3:bc:f2:f9:de:
|
||||
fb:20:97:a5:89:51:3f:e3:92:32:c0:69:4f:0d:ba:8a:4a:90:
|
||||
48:8a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBCzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTUy
|
||||
MFoXDTE4MDUxNzE0MTUyMFowgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1uYWRqYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALvLDls4i3dqTTP/tcwT
|
||||
VW58sZQmiGW941LFzyatCvKBeuHqWp746D8HTaDFChapoFf8uek28lGPCtqPgNHP
|
||||
TLIgIELoVLkfR+nd1iBAG3DNE9ix0YCBLLOguxTzzpBjBkJi22SWe46xS737afP/
|
||||
KNTyMZXYINIa6kJ1N7kPYkVJAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQU5BwhyqTqK+fcCHTuUmQCZjT25j4wgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AKVZgdosO+pyIykaamELovnV7m7NO2/Gx4p1YM2JGqLc6LKFkdmK6/TrxOsxOjXB
|
||||
4IgtPeUJq9wi5FcjLjhCJLedQa48V3bcF+dEoauLlcRk0pHDYXPfn6hvtKdGCZP+
|
||||
MlHZvfWq+ubzvPL53vsgl6WJUT/jkjLAaU8NuopKkEiK
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0C.pem
Normal file
67
OPP/openvpn/keys/0C.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 12 (0xc)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:15:56 2008 GMT
|
||||
Not After : May 17 14:15:56 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-tobias/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:e2:c7:d7:e1:53:0f:08:cf:5d:41:91:b9:c4:66:
|
||||
5c:bc:75:31:47:c4:17:81:51:d3:be:c2:ee:6f:59:
|
||||
08:50:80:f7:8a:fa:44:fb:b6:8b:2d:d2:1f:45:61:
|
||||
7e:de:78:de:b8:6a:59:5b:1b:6a:51:26:cf:9b:42:
|
||||
d5:03:30:84:e7:0b:0a:51:65:26:9e:f6:9e:c1:3d:
|
||||
52:1e:74:17:1b:17:b6:19:ba:70:dc:12:79:71:83:
|
||||
02:e6:fd:62:f2:60:12:56:fb:ec:99:38:b1:88:72:
|
||||
16:a2:c7:96:bb:e8:74:6e:7e:98:61:49:a9:0e:15:
|
||||
71:7e:f4:f1:20:1c:c3:77:ed
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
4C:E4:08:62:13:05:07:76:96:1E:FC:03:C3:A5:BF:5B:E1:F3:0B:A5
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
81:38:ca:a2:c9:6e:c4:dc:ce:4c:a3:0a:93:35:d3:21:da:97:
|
||||
d2:d6:cb:4a:91:e1:6f:d8:59:04:60:6f:4d:b2:3f:21:a1:c8:
|
||||
89:11:6b:5f:43:69:88:52:08:09:2e:5c:a0:d4:f8:e5:6f:44:
|
||||
d9:b1:60:16:6e:94:27:b3:3b:90:d1:d1:3f:c8:49:2d:f6:63:
|
||||
bd:f6:57:17:d1:d8:4c:ca:d8:de:bb:47:14:c4:b4:3c:5e:89:
|
||||
a5:60:0e:d1:47:bd:77:ad:ad:c4:1f:99:12:5d:e8:af:ab:8a:
|
||||
07:cc:12:e7:9a:49:dd:71:85:d0:4e:a5:d6:6d:f5:75:ef:12:
|
||||
aa:7d
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBDDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTU1
|
||||
NloXDTE4MDUxNzE0MTU1NlowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi10b2JpYXMxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDix9fhUw8Iz11BkbnE
|
||||
Zly8dTFHxBeBUdO+wu5vWQhQgPeK+kT7tost0h9FYX7eeN64allbG2pRJs+bQtUD
|
||||
MITnCwpRZSae9p7BPVIedBcbF7YZunDcEnlxgwLm/WLyYBJW++yZOLGIchaix5a7
|
||||
6HRufphhSakOFXF+9PEgHMN37QIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFEzkCGITBQd2lh78A8Olv1vh8wulMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQCBOMqiyW7E3M5MowqTNdMh2pfS1stKkeFv2FkEYG9Nsj8hociJEWtfQ2mIUggJ
|
||||
Llyg1Pjlb0TZsWAWbpQnszuQ0dE/yEkt9mO99lcX0dhMytjeu0cUxLQ8XomlYA7R
|
||||
R713ra3EH5kSXeivq4oHzBLnmkndcYXQTqXWbfV17xKqfQ==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0D.pem
Normal file
67
OPP/openvpn/keys/0D.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 13 (0xd)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:16:40 2008 GMT
|
||||
Not After : May 17 14:16:40 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ulf/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:f3:98:dd:19:8d:1d:be:4d:b2:e2:5a:ea:a2:50:
|
||||
5e:5e:c0:e7:96:12:8e:6e:aa:17:b5:ac:d0:e9:87:
|
||||
dc:0b:3f:72:6c:10:40:ff:cb:6e:cb:7c:d1:b5:05:
|
||||
28:77:ac:f6:c1:f9:13:b0:75:0b:4d:ff:3f:f6:52:
|
||||
5e:a3:e4:04:6f:62:05:d8:4b:65:60:33:d4:1e:df:
|
||||
d5:c1:fb:eb:36:6a:4b:f2:a3:19:d0:01:ec:2b:95:
|
||||
bf:b6:c7:c2:5a:e6:87:a7:3b:b2:7f:b9:00:c6:70:
|
||||
c6:f0:69:96:02:c3:aa:ef:d3:94:af:69:f1:05:17:
|
||||
a8:8a:7f:9e:b0:f3:04:53:c1
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
41:7F:25:CF:1F:B3:E1:DD:A8:D0:C3:CE:38:F3:0D:BC:5B:67:0B:67
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
04:05:3c:f7:be:51:55:46:ee:3b:4f:78:f8:d0:65:ac:78:a1:
|
||||
5c:25:97:f2:a2:0c:e7:c6:95:5d:bf:02:72:d9:6e:f2:7a:26:
|
||||
ef:50:e4:b4:19:c0:31:02:00:9f:0b:85:cf:f9:32:d8:17:ab:
|
||||
fb:58:fa:70:18:78:6a:d7:68:9f:14:2a:80:4d:75:81:e0:24:
|
||||
da:22:e8:82:cc:49:a9:57:87:49:36:ae:54:1f:35:68:13:33:
|
||||
26:7f:92:45:a2:83:54:01:fe:c6:25:21:6a:26:52:88:db:12:
|
||||
d8:b4:b8:94:43:6c:f2:e2:36:1b:96:ec:e2:2c:8d:f3:fd:b6:
|
||||
8f:70
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDqjCCAxOgAwIBAgIBDTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTY0
|
||||
MFoXDTE4MDUxNzE0MTY0MFowfzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRQw
|
||||
EgYDVQQDEwtPUFAtVnBuLXVsZjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4u
|
||||
ZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPOY3RmNHb5NsuJa6qJQXl7A
|
||||
55YSjm6qF7Ws0OmH3As/cmwQQP/Lbst80bUFKHes9sH5E7B1C03/P/ZSXqPkBG9i
|
||||
BdhLZWAz1B7f1cH76zZqS/KjGdAB7CuVv7bHwlrmh6c7sn+5AMZwxvBplgLDqu/T
|
||||
lK9p8QUXqIp/nrDzBFPBAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCGSAGG
|
||||
+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU
|
||||
QX8lzx+z4d2o0MPOOPMNvFtnC2cwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxt
|
||||
JGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4x
|
||||
DzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3
|
||||
b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkB
|
||||
Fg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GBAAQF
|
||||
PPe+UVVG7jtPePjQZax4oVwll/KiDOfGlV2/AnLZbvJ6Ju9Q5LQZwDECAJ8Lhc/5
|
||||
MtgXq/tY+nAYeGrXaJ8UKoBNdYHgJNoi6ILMSalXh0k2rlQfNWgTMyZ/kkWig1QB
|
||||
/sYlIWomUojbEti0uJRDbPLiNhuW7OIsjfP9to9w
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0E.pem
Normal file
67
OPP/openvpn/keys/0E.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 14 (0xe)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 4 11:43:45 2008 GMT
|
||||
Not After : Nov 2 11:43:45 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-nadja/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b0:66:79:ce:2a:e3:aa:4e:0c:c2:0d:ef:57:1e:
|
||||
c2:86:7a:b0:7f:6c:f7:99:de:ae:d9:37:88:68:2e:
|
||||
08:85:cc:1d:b9:dc:be:82:92:cd:2c:02:e2:3b:65:
|
||||
75:34:cf:9d:58:8f:f2:d6:16:a0:78:44:41:a8:fa:
|
||||
59:eb:9c:7d:96:ed:56:9b:0a:0e:02:30:c9:95:96:
|
||||
d9:f5:75:2b:40:91:96:35:85:da:26:74:1c:75:5b:
|
||||
bc:1c:64:64:3d:ac:88:6f:d4:ce:19:76:02:f3:b8:
|
||||
6a:ba:1c:78:f4:c9:51:e3:0a:76:e6:88:89:42:5e:
|
||||
67:ef:f1:49:ca:27:3d:be:8b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
7A:EA:DF:B3:C9:13:AC:8A:27:EA:7D:9A:44:EE:10:A6:0D:80:D2:85
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
98:03:4b:16:65:fa:f9:c5:72:8c:1a:dc:c6:58:b7:a5:b6:2b:
|
||||
c6:fd:30:ba:7f:8c:df:17:e7:3d:ca:a8:e9:9b:14:85:ff:55:
|
||||
52:9c:c5:a0:b6:99:18:42:fd:43:f3:8e:37:db:ec:a7:5b:ed:
|
||||
8a:e7:40:8b:17:92:dc:e8:ee:58:d3:c1:07:49:45:86:b9:8a:
|
||||
55:d6:81:e9:d2:42:58:b8:8b:6e:fe:2b:49:43:cb:14:a2:ff:
|
||||
6f:a7:d8:55:13:bf:92:16:8e:69:cf:26:1a:5a:51:cf:9d:5c:
|
||||
fd:e8:78:9b:0f:dc:32:df:08:21:06:e9:48:f5:b8:4d:b1:d7:
|
||||
e3:af
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBDjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MTEwNDExNDM0
|
||||
NVoXDTE4MTEwMjExNDM0NVowgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1uYWRqYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALBmec4q46pODMIN71ce
|
||||
woZ6sH9s95nertk3iGguCIXMHbncvoKSzSwC4jtldTTPnViP8tYWoHhEQaj6Weuc
|
||||
fZbtVpsKDgIwyZWW2fV1K0CRljWF2iZ0HHVbvBxkZD2siG/Uzhl2AvO4arocePTJ
|
||||
UeMKduaIiUJeZ+/xSconPb6LAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUeurfs8kTrIon6n2aRO4Qpg2A0oUwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AJgDSxZl+vnFcowa3MZYt6W2K8b9MLp/jN8X5z3KqOmbFIX/VVKcxaC2mRhC/UPz
|
||||
jjfb7Kdb7YrnQIsXktzo7ljTwQdJRYa5ilXWgenSQli4i27+K0lDyxSi/2+n2FUT
|
||||
v5IWjmnPJhpaUc+dXP3oeJsP3DLfCCEG6Uj1uE2x1+Ov
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/0F.pem
Normal file
67
OPP/openvpn/keys/0F.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 15 (0xf)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 4 11:59:44 2008 GMT
|
||||
Not After : Nov 2 11:59:44 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ausstellung/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:af:cc:6f:d9:4b:11:29:17:6c:44:9c:39:8d:99:
|
||||
65:fc:1e:8d:84:72:62:68:2c:e0:13:89:4f:60:82:
|
||||
4a:77:40:49:7c:31:84:11:60:83:07:97:4f:a1:49:
|
||||
56:a4:d4:b0:af:97:93:a7:a0:5e:97:b5:81:0e:fa:
|
||||
37:00:41:29:77:f8:35:22:65:85:da:ac:af:72:c2:
|
||||
01:25:31:5f:3d:53:d0:bb:84:33:00:ad:b2:31:0e:
|
||||
f2:f3:2f:8b:63:ba:a1:f4:16:0b:e2:f0:60:e8:53:
|
||||
32:f0:80:14:b9:53:7e:4b:ee:f4:f1:e8:31:44:ba:
|
||||
6b:d3:9c:18:c0:67:5b:80:5b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
12:DD:3C:18:90:7F:33:F6:DA:97:DC:56:27:89:FA:29:67:03:74:F7
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
72:82:37:cd:78:d7:77:98:aa:5b:e8:64:77:0c:48:8e:c4:fc:
|
||||
a0:1b:5d:ef:c6:c2:32:2b:74:5d:de:9b:f7:69:8e:46:d1:e2:
|
||||
18:df:eb:d0:2f:2c:50:d2:d4:c6:87:39:df:be:c3:7c:f1:5e:
|
||||
93:c6:92:8d:df:e9:ec:17:0a:02:f7:80:08:f0:3b:b3:0e:c2:
|
||||
22:2d:24:d5:07:d5:d4:45:68:35:82:ad:46:b5:41:56:65:0a:
|
||||
a7:3f:06:4d:72:33:db:0c:14:fa:3d:4e:ad:1f:6e:3b:51:6a:
|
||||
51:ff:b3:6a:62:64:48:95:5e:0b:ee:28:91:56:63:64:51:9d:
|
||||
56:be
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDszCCAxygAwIBAgIBDzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MTEwNDExNTk0
|
||||
NFoXDTE4MTEwMjExNTk0NFowgYcxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEc
|
||||
MBoGA1UEAxMTT1BQLVZwbi1hdXNzdGVsbHVuZzEdMBsGCSqGSIb3DQEJARYOYXJn
|
||||
dXNAb29wZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK/Mb9lLESkX
|
||||
bEScOY2ZZfwejYRyYmgs4BOJT2CCSndASXwxhBFggweXT6FJVqTUsK+Xk6egXpe1
|
||||
gQ76NwBBKXf4NSJlhdqsr3LCASUxXz1T0LuEMwCtsjEO8vMvi2O6ofQWC+LwYOhT
|
||||
MvCAFLlTfkvu9PHoMUS6a9OcGMBnW4BbAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAA
|
||||
MCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAd
|
||||
BgNVHQ4EFgQUEt08GJB/M/bal9xWJ4n6KWcDdPcwgcQGA1UdIwSBvDCBuYAU4U3D
|
||||
a/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQI
|
||||
EwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYD
|
||||
VQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJ
|
||||
KoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEB
|
||||
BAUAA4GBAHKCN81413eYqlvoZHcMSI7E/KAbXe/GwjIrdF3em/dpjkbR4hjf69Av
|
||||
LFDS1MaHOd++w3zxXpPGko3f6ewXCgL3gAjwO7MOwiItJNUH1dRFaDWCrUa1QVZl
|
||||
Cqc/Bk1yM9sMFPo9Tq0fbjtRalH/s2piZEiVXgvuKJFWY2RRnVa+
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/10.pem
Normal file
67
OPP/openvpn/keys/10.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 16 (0x10)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 7 13:29:53 2008 GMT
|
||||
Not After : Nov 5 13:29:53 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-jule/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:e2:d7:c4:d1:97:c4:d5:cf:56:d0:36:72:e7:32:
|
||||
8f:b2:82:83:a1:2a:e8:97:2a:63:c2:dd:29:69:47:
|
||||
8a:fe:0c:61:fb:7f:02:08:e1:e9:8a:87:86:2d:95:
|
||||
74:c4:2c:59:c6:43:09:42:32:38:0f:f8:6c:0a:38:
|
||||
e9:3a:d7:36:fa:ef:d0:79:a1:ff:f1:fc:31:dd:c2:
|
||||
03:9e:db:7c:93:9a:90:aa:d7:a6:51:77:bc:48:8b:
|
||||
fc:a1:16:9f:78:bf:ac:1b:a8:30:f1:a9:e2:a1:26:
|
||||
3c:e0:54:a6:a4:04:16:78:3e:a6:e1:ad:02:66:08:
|
||||
a6:7d:16:0f:f1:56:b5:38:1f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
F0:6E:18:39:08:58:5F:92:A5:44:04:9F:87:2A:63:EB:FF:7F:E0:1A
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
42:9a:06:bd:da:97:4d:13:1e:a9:e7:4a:15:fa:12:7f:d6:90:
|
||||
03:68:af:8e:73:1a:3a:66:3f:61:49:69:02:89:be:ba:47:fc:
|
||||
d0:5c:c8:51:b4:6e:ed:31:a8:13:86:24:51:a8:f2:9e:56:d8:
|
||||
43:fd:f2:42:df:7c:41:c4:7c:ad:87:06:b6:92:29:f2:2f:2a:
|
||||
f1:9f:7a:3c:a4:76:ba:d4:99:b7:8f:de:99:98:f0:e9:01:f7:
|
||||
6c:31:36:77:6f:85:2f:cc:5f:a3:59:0a:96:84:a2:98:b3:83:
|
||||
6e:02:ef:d8:50:c6:81:0e:ee:b2:cb:20:e7:0f:71:ed:7e:9a:
|
||||
c7:fd
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrDCCAxWgAwIBAgIBEDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MTEwNzEzMjk1
|
||||
M1oXDTE4MTEwNTEzMjk1M1owgYAxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEV
|
||||
MBMGA1UEAxMMT1BQLVZwbi1qdWxlMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Bl
|
||||
bi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4tfE0ZfE1c9W0DZy5zKP
|
||||
soKDoSrolypjwt0paUeK/gxh+38CCOHpioeGLZV0xCxZxkMJQjI4D/hsCjjpOtc2
|
||||
+u/QeaH/8fwx3cIDntt8k5qQqtemUXe8SIv8oRafeL+sG6gw8anioSY84FSmpAQW
|
||||
eD6m4a0CZgimfRYP8Va1OB8CAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZI
|
||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||
BBTwbhg5CFhfkqVEBJ+HKmPr/3/gGjCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexay
|
||||
zG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5l
|
||||
dHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0B
|
||||
CQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEA
|
||||
QpoGvdqXTRMeqedKFfoSf9aQA2ivjnMaOmY/YUlpAom+ukf80FzIUbRu7TGoE4Yk
|
||||
UajynlbYQ/3yQt98QcR8rYcGtpIp8i8q8Z96PKR2utSZt4/emZjw6QH3bDE2d2+F
|
||||
L8xfo1kKloSimLODbgLv2FDGgQ7usssg5w9x7X6ax/0=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/11.pem
Normal file
67
OPP/openvpn/keys/11.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 17 (0x11)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 7 13:30:38 2008 GMT
|
||||
Not After : Nov 5 13:30:38 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-toffke/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:ef:f5:b4:77:f3:e4:5b:38:04:e2:9c:08:10:68:
|
||||
03:dc:e1:db:e5:c7:54:31:3e:c7:86:9e:27:17:35:
|
||||
e5:b7:4b:e4:1e:f6:bc:4b:8e:0a:3c:82:19:2e:0d:
|
||||
1a:ef:70:00:e2:73:61:12:b0:5c:5b:6c:3f:2e:41:
|
||||
09:ac:4a:59:bb:df:42:f7:38:72:6c:85:e3:b6:f5:
|
||||
8c:cb:d6:8f:09:45:0c:6e:7e:03:2f:e4:8c:a1:9f:
|
||||
60:7f:66:66:7d:83:f7:d7:78:2c:a5:56:cb:88:14:
|
||||
9b:36:ac:52:6c:11:bf:0d:f8:03:c1:97:23:25:c5:
|
||||
4d:62:58:3d:e1:c7:d8:dc:65
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
7C:76:BD:BF:AF:36:15:E8:E4:15:F9:E8:2B:A3:6B:08:F2:4E:91:F6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
0a:a5:71:55:d0:97:02:cb:75:7e:09:f0:7b:89:99:44:2b:39:
|
||||
62:31:7b:21:32:48:38:97:56:9a:0c:ec:0b:fd:4a:44:92:b7:
|
||||
13:a4:77:ce:7f:c9:09:d2:78:15:c2:6c:8f:f5:2f:3b:5e:5f:
|
||||
20:fe:b4:d6:d2:b1:2e:68:9d:75:0d:87:66:67:d5:f7:28:32:
|
||||
b7:19:2e:21:00:92:c6:2d:a0:89:a6:31:85:a8:5c:a4:b9:81:
|
||||
28:c1:68:7b:46:7f:29:67:48:de:c3:00:e2:07:6e:c0:84:3b:
|
||||
65:00:a1:87:c2:66:99:10:0f:76:ce:fa:31:fd:96:b9:47:b5:
|
||||
d9:81
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBETANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MTEwNzEzMzAz
|
||||
OFoXDTE4MTEwNTEzMzAzOFowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi10b2Zma2UxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDv9bR38+RbOATinAgQ
|
||||
aAPc4dvlx1QxPseGnicXNeW3S+Qe9rxLjgo8ghkuDRrvcADic2ESsFxbbD8uQQms
|
||||
Slm730L3OHJsheO29YzL1o8JRQxufgMv5Iyhn2B/ZmZ9g/fXeCylVsuIFJs2rFJs
|
||||
Eb8N+APBlyMlxU1iWD3hx9jcZQIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFHx2vb+vNhXo5BX56CujawjyTpH2MIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQAKpXFV0JcCy3V+CfB7iZlEKzliMXshMkg4l1aaDOwL/UpEkrcTpHfOf8kJ0ngV
|
||||
wmyP9S87Xl8g/rTW0rEuaJ11DYdmZ9X3KDK3GS4hAJLGLaCJpjGFqFykuYEowWh7
|
||||
Rn8pZ0jewwDiB27AhDtlAKGHwmaZEA92zvox/Za5R7XZgQ==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/12.pem
Normal file
67
OPP/openvpn/keys/12.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 18 (0x12)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Jan 18 13:14:56 2009 GMT
|
||||
Not After : Jan 16 13:14:56 2019 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-opp3/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d4:8f:de:a8:96:80:98:40:7a:d8:c9:bb:aa:2e:
|
||||
65:01:91:74:b0:ad:93:6a:c5:fa:e0:a6:e1:b2:9e:
|
||||
f1:8b:6f:a4:5d:e1:24:2c:47:f3:29:73:62:31:d2:
|
||||
59:86:8e:33:4f:b9:96:68:aa:1f:e8:45:a6:c7:d5:
|
||||
e5:df:9b:32:2e:96:12:82:cf:9a:3a:9d:cf:8c:fd:
|
||||
3b:7b:a8:e1:ec:77:ee:cd:c6:e7:2b:c7:c2:bd:fb:
|
||||
d3:54:e6:9e:4e:67:71:d9:bf:b6:39:9f:90:38:39:
|
||||
9a:fc:6f:ed:41:ca:5a:4e:02:2d:5a:33:80:ae:4d:
|
||||
f5:4f:cf:93:e3:7d:1d:64:ef
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E2:81:B6:2F:B4:D7:DA:A1:5F:ED:C0:73:DC:B3:08:87:DC:BB:06:75
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
47:b7:b9:a7:85:e6:f6:48:98:04:8d:17:23:17:c2:08:65:c8:
|
||||
8d:6f:80:99:99:86:49:90:38:be:1e:9b:ca:82:4a:6e:b0:48:
|
||||
81:b0:39:07:5d:7b:f2:e4:f1:9f:ee:65:97:ac:55:23:c3:8a:
|
||||
ca:95:03:59:e4:3c:79:90:fa:56:44:0d:6b:53:74:51:32:33:
|
||||
98:23:67:c0:b6:d6:f6:07:7e:e4:cd:13:08:18:f9:4f:a2:50:
|
||||
1c:a9:13:05:c9:0a:87:bd:fe:35:ea:5d:a2:03:70:de:91:90:
|
||||
80:82:b7:35:66:3f:d7:4a:29:eb:59:78:d6:ba:47:a7:92:73:
|
||||
38:d3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrDCCAxWgAwIBAgIBEjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA5MDExODEzMTQ1
|
||||
NloXDTE5MDExNjEzMTQ1NlowgYAxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEV
|
||||
MBMGA1UEAxMMT1BQLVZwbi1vcHAzMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Bl
|
||||
bi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA1I/eqJaAmEB62Mm7qi5l
|
||||
AZF0sK2TasX64Kbhsp7xi2+kXeEkLEfzKXNiMdJZho4zT7mWaKof6EWmx9Xl35sy
|
||||
LpYSgs+aOp3PjP07e6jh7HfuzcbnK8fCvfvTVOaeTmdx2b+2OZ+QODma/G/tQcpa
|
||||
TgItWjOArk31T8+T430dZO8CAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZI
|
||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||
BBTigbYvtNfaoV/twHPcswiH3LsGdTCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexay
|
||||
zG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5l
|
||||
dHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0B
|
||||
CQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEA
|
||||
R7e5p4Xm9kiYBI0XIxfCCGXIjW+AmZmGSZA4vh6byoJKbrBIgbA5B1178uTxn+5l
|
||||
l6xVI8OKypUDWeQ8eZD6VkQNa1N0UTIzmCNnwLbW9gd+5M0TCBj5T6JQHKkTBckK
|
||||
h73+NepdogNw3pGQgIK3NWY/10op61l41rpHp5JzONM=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/13.pem
Normal file
67
OPP/openvpn/keys/13.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 19 (0x13)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 01:28:34 2009 GMT
|
||||
Not After : May 17 01:28:34 2019 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-mb/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b6:88:ff:06:65:6f:07:f5:4f:0d:39:54:49:cc:
|
||||
a7:d1:78:6d:2d:33:b2:8a:1c:0d:38:28:59:ce:e0:
|
||||
f8:c9:89:f4:4e:8d:50:1b:49:02:3d:be:29:54:d7:
|
||||
11:e1:28:aa:bc:58:21:59:83:ca:d5:ac:22:17:82:
|
||||
78:4d:1f:b6:b3:bf:07:74:b1:2c:6d:0c:2a:76:8c:
|
||||
20:f8:f5:fd:6e:22:05:21:11:ec:fa:d4:36:43:23:
|
||||
17:28:a9:2f:e2:58:43:77:c3:ec:6a:4a:95:03:82:
|
||||
68:48:3c:e2:67:35:32:96:d9:13:f1:4d:f2:3a:b4:
|
||||
d5:95:66:df:66:8c:2a:92:31
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
15:34:0E:3A:7A:CE:4E:CA:4C:D5:21:93:9D:C6:A3:FE:EA:FB:13:79
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
8d:04:f9:93:dd:95:23:39:c1:c2:e5:d7:24:99:eb:fc:83:7a:
|
||||
c5:26:b9:82:73:cf:f4:30:ab:9b:77:0a:75:93:a7:18:1a:c5:
|
||||
cd:05:3f:47:90:c6:0b:90:70:d5:7f:93:c8:d2:a0:42:f9:53:
|
||||
45:9c:0a:68:0f:f6:31:57:11:ae:c1:3a:ef:c7:de:3e:76:ce:
|
||||
b7:92:e4:0d:33:9c:59:3a:4f:3f:b8:d1:0e:76:47:0d:c5:1a:
|
||||
dc:18:2d:f0:e4:e8:c6:9d:c0:1c:f2:84:58:ea:ed:4e:e7:5b:
|
||||
f3:c8:01:b8:e9:d0:23:2d:d7:bb:1e:f4:84:ab:ca:e4:b3:dc:
|
||||
fb:a0
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDqTCCAxKgAwIBAgIBEzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA5MDUxOTAxMjgz
|
||||
NFoXDTE5MDUxNzAxMjgzNFowfjELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLW1iMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtoj/BmVvB/VPDTlUScyn0Xht
|
||||
LTOyihwNOChZzuD4yYn0To1QG0kCPb4pVNcR4SiqvFghWYPK1awiF4J4TR+2s78H
|
||||
dLEsbQwqdowg+PX9biIFIRHs+tQ2QyMXKKkv4lhDd8PsakqVA4JoSDziZzUyltkT
|
||||
8U3yOrTVlWbfZowqkjECAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZIAYb4
|
||||
QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQV
|
||||
NA46es5OykzVIZOdxqP+6vsTeTCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexayzG0k
|
||||
bMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEP
|
||||
MA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5ldHdv
|
||||
cmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0BCQEW
|
||||
DmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEAjQT5
|
||||
k92VIznBwuXXJJnr/IN6xSa5gnPP9DCrm3cKdZOnGBrFzQU/R5DGC5Bw1X+TyNKg
|
||||
QvlTRZwKaA/2MVcRrsE678fePnbOt5LkDTOcWTpPP7jRDnZHDcUa3Bgt8OToxp3A
|
||||
HPKEWOrtTudb88gBuOnQIy3Xux70hKvK5LPc+6A=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/14.pem
Normal file
67
OPP/openvpn/keys/14.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 20 (0x14)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 8 16:15:57 2011 GMT
|
||||
Not After : Nov 5 16:15:57 2021 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ulrike/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b9:50:b1:41:be:17:37:01:65:58:fd:0b:73:17:
|
||||
02:ac:ac:bf:0a:22:47:f1:d4:fb:ae:73:94:c7:1c:
|
||||
10:54:92:d5:5b:e8:86:4f:72:82:b8:85:5a:a0:49:
|
||||
19:b3:94:af:c5:40:30:4e:c9:b2:12:fe:76:2d:02:
|
||||
51:76:16:ab:1c:c8:49:af:fe:c4:0c:f2:01:94:4f:
|
||||
3d:23:79:67:a3:7f:08:54:57:51:1f:f9:6e:70:19:
|
||||
bd:7f:ad:c1:17:85:30:1d:64:4e:b7:ec:7b:28:3d:
|
||||
7d:8f:28:f3:0b:92:fb:3a:bf:f4:1c:fd:1a:37:15:
|
||||
8d:ac:17:c5:73:d7:8a:66:05
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
73:7C:52:24:78:49:97:4C:29:A5:02:19:5D:E8:C0:69:62:AD:AC:C7
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
a5:95:fb:a8:52:15:0c:01:75:ba:c4:42:e3:d0:f4:46:8d:e7:
|
||||
7d:a1:e6:74:f7:22:b1:da:e4:43:cc:cb:41:62:28:8d:ef:0d:
|
||||
b9:e7:d9:39:dd:2e:e0:6f:a6:2d:8c:9f:48:87:60:06:24:9c:
|
||||
e9:d8:9a:77:5c:7d:a9:87:c0:53:3a:d1:4e:4d:2a:a4:9e:e0:
|
||||
a2:4e:19:1f:a6:b1:4c:09:19:3c:6b:9f:19:99:27:28:b3:bf:
|
||||
50:96:e5:1f:44:69:9f:cc:c0:b6:30:73:cc:eb:c5:82:d7:e7:
|
||||
f9:f6:bd:6d:20:22:8d:b0:73:f6:42:eb:c0:af:d8:86:f2:e0:
|
||||
c4:28
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBFDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTExMTEwODE2MTU1
|
||||
N1oXDTIxMTEwNTE2MTU1N1owgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi11bHJpa2UxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5ULFBvhc3AWVY/Qtz
|
||||
FwKsrL8KIkfx1Puuc5THHBBUktVb6IZPcoK4hVqgSRmzlK/FQDBOybIS/nYtAlF2
|
||||
FqscyEmv/sQM8gGUTz0jeWejfwhUV1Ef+W5wGb1/rcEXhTAdZE637HsoPX2PKPML
|
||||
kvs6v/Qc/Ro3FY2sF8Vz14pmBQIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFHN8UiR4SZdMKaUCGV3owGlirazHMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQCllfuoUhUMAXW6xELj0PRGjed9oeZ09yKx2uRDzMtBYiiN7w2559k53S7gb6Yt
|
||||
jJ9Ih2AGJJzp2Jp3XH2ph8BTOtFOTSqknuCiThkfprFMCRk8a58ZmScos79QluUf
|
||||
RGmfzMC2MHPM68WC1+f59r1tICKNsHP2QuvAr9iG8uDEKA==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/15.pem
Normal file
67
OPP/openvpn/keys/15.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 21 (0x15)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Apr 18 14:04:54 2012 GMT
|
||||
Not After : Apr 16 14:04:54 2022 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-veronika/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d7:99:ea:01:61:56:a4:d9:13:bf:2a:35:9f:92:
|
||||
21:74:38:8e:2f:3f:56:9c:35:dc:6d:c5:e3:db:1f:
|
||||
84:7e:a7:b0:05:14:a0:53:f2:fe:bc:d2:86:ac:42:
|
||||
89:bd:6b:19:5a:27:fc:4f:24:c5:b0:0a:2a:5b:e5:
|
||||
70:c0:e9:ef:da:63:58:21:8a:dd:7d:f3:c0:63:67:
|
||||
f0:95:ec:5e:8c:c8:c3:c0:66:46:77:9d:d0:21:bf:
|
||||
0e:c3:ac:6e:c1:ce:68:bd:10:df:a3:de:28:f2:6a:
|
||||
04:a8:bd:0c:23:84:c1:6b:80:5e:b4:3f:d6:4c:57:
|
||||
36:63:4e:3f:05:22:11:bf:e3
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
31:10:F7:AD:C7:5A:D8:33:B6:7C:7E:A6:C8:67:87:31:AF:FD:03:A7
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
a9:47:66:69:06:7c:73:fb:5c:11:61:21:64:78:81:34:28:fc:
|
||||
b8:b7:f9:9e:70:ed:8d:56:23:9a:8b:d7:ea:73:da:4d:d5:bc:
|
||||
57:9a:84:b3:5f:97:83:cb:18:42:f2:8d:6d:af:c6:32:44:5b:
|
||||
71:37:9b:0a:fc:86:cb:ed:62:9d:87:33:e3:f9:57:ce:27:f6:
|
||||
cc:ae:f0:c1:17:4f:4e:94:53:f1:7a:01:de:3c:a6:ed:44:e8:
|
||||
50:67:14:4b:27:0b:ba:20:e5:3c:35:51:47:ee:6b:18:2c:80:
|
||||
2a:33:4e:d7:51:05:73:73:2b:4f:1b:3f:6e:61:be:19:0b:93:
|
||||
7c:08
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDsDCCAxmgAwIBAgIBFTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEyMDQxODE0MDQ1
|
||||
NFoXDTIyMDQxNjE0MDQ1NFowgYQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEZ
|
||||
MBcGA1UEAxMQT1BQLVZwbi12ZXJvbmlrYTEdMBsGCSqGSIb3DQEJARYOYXJndXNA
|
||||
b29wZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANeZ6gFhVqTZE78q
|
||||
NZ+SIXQ4ji8/Vpw13G3F49sfhH6nsAUUoFPy/rzShqxCib1rGVon/E8kxbAKKlvl
|
||||
cMDp79pjWCGK3X3zwGNn8JXsXozIw8BmRned0CG/DsOsbsHOaL0Q36PeKPJqBKi9
|
||||
DCOEwWuAXrQ/1kxXNmNOPwUiEb/jAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwG
|
||||
CWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNV
|
||||
HQ4EFgQUMRD3rcda2DO2fH6myGeHMa/9A6cwgcQGA1UdIwSBvDCBuYAU4U3Da/R8
|
||||
gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZC
|
||||
ZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQL
|
||||
ExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZI
|
||||
hvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUA
|
||||
A4GBAKlHZmkGfHP7XBFhIWR4gTQo/Li3+Z5w7Y1WI5qL1+pz2k3VvFeahLNfl4PL
|
||||
GELyjW2vxjJEW3E3mwr8hsvtYp2HM+P5V84n9syu8MEXT06UU/F6Ad48pu1E6FBn
|
||||
FEsnC7og5Tw1UUfuaxgsgCozTtdRBXNzK08bP25hvhkLk3wI
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/16.pem
Normal file
67
OPP/openvpn/keys/16.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 22 (0x16)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Aug 1 14:02:27 2012 GMT
|
||||
Not After : Jul 30 14:02:27 2022 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-sofia/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b3:5b:f6:01:e3:b7:65:18:c4:94:d9:2f:b6:62:
|
||||
34:60:56:ac:9f:eb:82:2c:8d:55:73:84:a2:88:26:
|
||||
21:69:a0:74:f5:4a:78:f7:e5:d5:6a:91:a1:5d:e0:
|
||||
f1:90:e4:83:38:89:e2:e7:ae:b2:87:c9:e5:a6:0e:
|
||||
6b:4c:d2:eb:31:61:ff:54:86:60:71:da:3d:66:07:
|
||||
c2:7d:a2:fc:ac:c7:af:a3:b8:cf:03:cb:07:11:cf:
|
||||
b3:d1:a9:c5:39:f3:a6:b2:9c:c4:61:28:45:ec:c9:
|
||||
25:70:c4:1d:d7:6b:4b:d9:12:97:b3:7d:72:95:34:
|
||||
cb:fc:7e:b7:ab:68:cd:ae:2b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
12:5F:9A:F8:64:79:18:84:33:21:B9:D2:60:7A:D7:08:AC:77:3C:E5
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
94:7c:24:63:0b:88:4b:76:4a:66:57:39:3c:e8:4b:f1:17:0c:
|
||||
26:ec:87:93:4b:c1:af:a5:78:86:a4:a8:88:1b:ea:39:e7:c1:
|
||||
e7:da:c8:13:c8:26:04:ed:bb:b2:b2:10:2d:0f:3f:86:52:45:
|
||||
bf:f6:6c:c2:fa:d9:3c:a1:57:b0:07:24:b3:2e:8a:c6:b6:88:
|
||||
9e:a9:ed:6e:59:1d:36:70:44:90:b2:9d:dc:86:a1:cf:1a:1f:
|
||||
cd:66:be:fa:fe:f3:a1:c9:e6:58:71:d3:a3:d1:4b:95:f3:4b:
|
||||
a7:93:c7:3a:a4:7d:bc:fc:e9:77:86:bd:62:9a:eb:b3:49:68:
|
||||
17:27
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBFjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEyMDgwMTE0MDIy
|
||||
N1oXDTIyMDczMDE0MDIyN1owgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1zb2ZpYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALNb9gHjt2UYxJTZL7Zi
|
||||
NGBWrJ/rgiyNVXOEoogmIWmgdPVKePfl1WqRoV3g8ZDkgziJ4ueusofJ5aYOa0zS
|
||||
6zFh/1SGYHHaPWYHwn2i/KzHr6O4zwPLBxHPs9GpxTnzprKcxGEoRezJJXDEHddr
|
||||
S9kSl7N9cpU0y/x+t6toza4rAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUEl+a+GR5GIQzIbnSYHrXCKx3POUwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AJR8JGMLiEt2SmZXOTzoS/EXDCbsh5NLwa+leIakqIgb6jnnwefayBPIJgTtu7Ky
|
||||
EC0PP4ZSRb/2bML62TyhV7AHJLMuisa2iJ6p7W5ZHTZwRJCyndyGoc8aH81mvvr+
|
||||
86HJ5lhx06PRS5XzS6eTxzqkfbz86XeGvWKa67NJaBcn
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/17.pem
Normal file
67
OPP/openvpn/keys/17.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 23 (0x17)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 17 14:30:55 2012 GMT
|
||||
Not After : Dec 15 14:30:55 2022 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-hannes/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:ae:8d:8d:a7:f9:c5:46:c8:ae:8a:a9:15:82:bf:
|
||||
b3:2c:82:ba:1d:cd:84:0b:6c:77:b1:2e:0c:9a:7d:
|
||||
f2:38:3a:93:ea:bd:8c:4a:be:78:44:50:53:84:3f:
|
||||
a5:04:75:a9:d0:49:01:ab:cc:9d:51:e0:b4:2b:d1:
|
||||
1a:85:a6:2b:67:ac:70:db:56:a3:66:c7:19:e5:91:
|
||||
8c:85:de:12:5a:21:4b:0f:63:0a:12:8f:ea:ad:21:
|
||||
1a:8a:9d:c3:b6:30:47:78:ef:2e:25:46:7b:e3:98:
|
||||
ca:70:03:eb:bc:cd:3f:d5:97:f3:bf:f0:51:16:18:
|
||||
a2:06:12:31:65:94:29:82:c5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
09:6B:59:54:82:8F:0E:23:0E:26:A7:1B:DE:2B:26:FA:C6:7E:F3:D6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
96:e3:8d:05:0c:bf:85:81:36:5e:19:9b:e6:38:69:d4:46:f2:
|
||||
3f:56:ef:b8:7c:a6:db:5f:1b:17:32:b9:f6:89:0a:fe:69:c8:
|
||||
a7:c9:9d:12:0b:aa:cf:cb:94:ea:1a:82:b0:3e:0a:d1:8d:15:
|
||||
e6:79:e2:21:30:76:fe:59:d4:9d:2c:81:79:6c:b3:1e:43:9e:
|
||||
65:7d:fe:7f:74:60:01:f0:f3:6f:50:68:5b:41:dc:15:92:2d:
|
||||
63:98:ad:1c:75:10:71:4d:04:d0:91:7b:22:0a:49:e8:83:b1:
|
||||
3d:7e:4c:b5:c9:bd:15:1f:f9:28:a4:5e:4a:49:cb:de:96:bd:
|
||||
cf:85
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBFzANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEyMTIxNzE0MzA1
|
||||
NVoXDTIyMTIxNTE0MzA1NVowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi1oYW5uZXMxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCujY2n+cVGyK6KqRWC
|
||||
v7MsgrodzYQLbHexLgyaffI4OpPqvYxKvnhEUFOEP6UEdanQSQGrzJ1R4LQr0RqF
|
||||
pitnrHDbVqNmxxnlkYyF3hJaIUsPYwoSj+qtIRqKncO2MEd47y4lRnvjmMpwA+u8
|
||||
zT/Vl/O/8FEWGKIGEjFllCmCxQIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFAlrWVSCjw4jDianG94rJvrGfvPWMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQCW440FDL+FgTZeGZvmOGnURvI/Vu+4fKbbXxsXMrn2iQr+acinyZ0SC6rPy5Tq
|
||||
GoKwPgrRjRXmeeIhMHb+WdSdLIF5bLMeQ55lff5/dGAB8PNvUGhbQdwVki1jmK0c
|
||||
dRBxTQTQkXsiCknog7E9fky1yb0VH/kopF5KScvelr3PhQ==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/18.pem
Normal file
67
OPP/openvpn/keys/18.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 24 (0x18)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 23 02:21:18 2012 GMT
|
||||
Not After : Dec 21 02:21:18 2022 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-marcus/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:98:8d:de:2b:01:17:86:b1:56:21:97:d4:3e:f4:
|
||||
9a:67:5c:b2:3d:91:74:ea:be:93:cf:8a:39:25:a6:
|
||||
c5:e0:82:8f:ee:f8:5d:65:5a:20:bc:4e:2d:3b:c6:
|
||||
5e:ef:00:08:5a:83:78:5a:fc:54:ea:8d:61:83:61:
|
||||
ad:97:97:f2:cf:61:2d:c0:cd:e1:6b:ef:aa:dd:25:
|
||||
ed:cf:4e:8c:4b:00:56:6b:9a:00:97:38:66:41:09:
|
||||
78:63:1c:ca:41:5f:d5:c6:ec:a5:67:a3:d7:1c:99:
|
||||
78:51:c4:19:34:42:a6:07:df:03:cc:e6:7b:79:8d:
|
||||
27:fe:79:05:ec:34:b8:ee:69
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
C1:7E:EB:5A:31:B4:AF:71:E0:05:10:95:FA:91:59:43:95:49:F9:72
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
a1:7b:87:06:ba:82:b7:63:d7:72:50:f7:2d:fa:38:4b:28:05:
|
||||
06:79:20:ea:22:0c:20:48:b6:a1:e2:fa:5d:e9:23:4a:3c:53:
|
||||
24:95:aa:5b:00:43:40:8b:c7:76:bb:40:bb:64:26:3d:b1:8f:
|
||||
b5:ed:fe:cd:0a:a4:af:ce:ce:5c:ac:fc:46:81:78:4b:c4:50:
|
||||
e0:fa:e5:9f:04:31:d8:6e:7a:a7:32:f1:89:e4:de:ca:53:27:
|
||||
b5:80:5e:c5:ca:91:c7:ab:a4:93:21:d8:c6:6a:ac:76:66:e9:
|
||||
e1:aa:53:3b:b5:7e:23:9a:dc:ab:ce:99:1a:55:da:ed:ba:fe:
|
||||
fd:2c
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrjCCAxegAwIBAgIBGDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEyMTIyMzAyMjEx
|
||||
OFoXDTIyMTIyMTAyMjExOFowgYIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEX
|
||||
MBUGA1UEAxMOT1BQLVZwbi1tYXJjdXMxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
|
||||
cGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYjd4rAReGsVYhl9Q+
|
||||
9JpnXLI9kXTqvpPPijklpsXggo/u+F1lWiC8Ti07xl7vAAhag3ha/FTqjWGDYa2X
|
||||
l/LPYS3AzeFr76rdJe3PToxLAFZrmgCXOGZBCXhjHMpBX9XG7KVno9ccmXhRxBk0
|
||||
QqYH3wPM5nt5jSf+eQXsNLjuaQIDAQABo4IBIzCCAR8wCQYDVR0TBAIwADAsBglg
|
||||
hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFMF+61oxtK9x4AUQlfqRWUOVSflyMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDANBgkqhkiG9w0BAQQFAAOB
|
||||
gQChe4cGuoK3Y9dyUPct+jhLKAUGeSDqIgwgSLah4vpd6SNKPFMklapbAENAi8d2
|
||||
u0C7ZCY9sY+17f7NCqSvzs5crPxGgXhLxFDg+uWfBDHYbnqnMvGJ5N7KUye1gF7F
|
||||
ypHHq6STIdjGaqx2ZunhqlM7tX4jmtyrzpkaVdrtuv79LA==
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/19.pem
Normal file
67
OPP/openvpn/keys/19.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 25 (0x19)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Feb 8 01:18:41 2013 GMT
|
||||
Not After : Feb 6 01:18:41 2023 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-kathrin/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:ac:8a:ca:6c:41:fe:b9:52:8f:b6:d8:41:8f:ac:
|
||||
e3:17:57:59:0c:df:bb:4f:2d:f8:09:1a:4c:ba:25:
|
||||
d1:68:a4:15:69:06:25:33:aa:28:f1:39:01:b7:a2:
|
||||
51:1b:1e:9f:e0:8f:9a:b1:e1:e3:01:62:b2:ff:fc:
|
||||
e5:43:cf:0a:1c:31:86:ce:82:62:f5:d1:42:bb:93:
|
||||
fd:e8:75:99:77:a8:8e:e3:95:35:2d:be:f9:bf:dd:
|
||||
a0:72:e1:2b:b0:21:b4:ee:ee:f0:c4:eb:9b:ac:0d:
|
||||
03:81:10:b4:26:60:72:bf:f5:b7:a3:15:7a:52:dd:
|
||||
43:5e:37:e6:63:92:2e:5f:4b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
D6:AE:B3:AB:C4:5D:22:A6:55:4B:0B:87:B5:3F:79:6B:6D:ED:5C:0C
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
2c:37:3d:00:a7:e3:f9:2a:66:9f:73:0c:06:33:a2:b7:2c:cc:
|
||||
6f:e3:02:98:72:a0:5c:be:da:9c:99:bf:c6:2d:c2:23:4f:84:
|
||||
fe:64:00:81:07:d9:21:7a:05:e5:b9:d8:58:a8:a8:0d:34:38:
|
||||
f4:53:bf:cb:d6:0b:76:4a:ef:8a:46:ca:70:97:02:c9:6e:d2:
|
||||
36:b1:1a:83:a6:12:44:19:06:41:e0:e6:05:70:b6:cc:13:2a:
|
||||
a5:05:40:e1:24:11:60:61:05:e1:97:f9:74:9a:d5:3d:3b:7b:
|
||||
99:09:74:21:98:02:55:3c:f4:64:6a:20:66:1e:14:2b:a3:c1:
|
||||
4e:a4
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrzCCAxigAwIBAgIBGTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEzMDIwODAxMTg0
|
||||
MVoXDTIzMDIwNjAxMTg0MVowgYMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEY
|
||||
MBYGA1UEAxMPT1BQLVZwbi1rYXRocmluMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
|
||||
b3Blbi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArIrKbEH+uVKPtthB
|
||||
j6zjF1dZDN+7Ty34CRpMuiXRaKQVaQYlM6oo8TkBt6JRGx6f4I+aseHjAWKy//zl
|
||||
Q88KHDGGzoJi9dFCu5P96HWZd6iO45U1Lb75v92gcuErsCG07u7wxOubrA0DgRC0
|
||||
JmByv/W3oxV6Ut1DXjfmY5IuX0sCAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJ
|
||||
YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud
|
||||
DgQWBBTWrrOrxF0iplVLC4e1P3lrbe1cDDCBxAYDVR0jBIG8MIG5gBThTcNr9HyB
|
||||
exayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJl
|
||||
cmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsT
|
||||
EG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG
|
||||
9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQAD
|
||||
gYEALDc9AKfj+Spmn3MMBjOityzMb+MCmHKgXL7anJm/xi3CI0+E/mQAgQfZIXoF
|
||||
5bnYWKioDTQ49FO/y9YLdkrvikbKcJcCyW7SNrEag6YSRBkGQeDmBXC2zBMqpQVA
|
||||
4SQRYGEF4Zf5dJrVPTt7mQl0IZgCVTz0ZGogZh4UK6PBTqQ=
|
||||
-----END CERTIFICATE-----
|
67
OPP/openvpn/keys/1A.pem
Normal file
67
OPP/openvpn/keys/1A.pem
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 26 (0x1a)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Apr 4 00:01:13 2013 GMT
|
||||
Not After : Apr 2 00:01:13 2023 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-beate/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d7:49:86:90:70:f0:10:50:69:a7:cd:a0:a5:8e:
|
||||
e9:c3:92:1b:8f:ad:90:2c:66:04:65:3b:15:ea:2e:
|
||||
a5:cf:0d:18:06:f3:01:cc:db:9c:13:6a:c9:89:68:
|
||||
a6:f6:ef:9d:b6:9e:8d:24:c3:cd:ba:8b:55:be:99:
|
||||
3e:21:b8:73:a0:b2:18:71:5b:8a:7f:5f:91:b4:5f:
|
||||
b1:81:2a:17:18:88:3d:be:41:53:b6:92:3e:4c:06:
|
||||
d7:dc:ec:68:70:12:82:0d:81:66:bf:c1:88:37:1e:
|
||||
da:fb:02:aa:f3:9f:77:5b:c8:31:44:d9:10:89:2d:
|
||||
d2:4c:1d:9c:6f:fa:45:f9:43
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
5C:22:3B:90:D8:EF:5D:D2:8C:16:A1:9A:CD:82:EE:26:ED:93:C8:EA
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
66:86:dd:6c:b5:31:25:5e:56:3d:a7:7c:f7:27:11:8e:66:97:
|
||||
b4:ef:80:1b:6a:7f:89:98:9c:46:b7:82:87:ce:45:0d:39:ee:
|
||||
89:54:08:25:d3:5d:32:02:03:d0:6e:3b:f8:ce:a1:40:27:d6:
|
||||
3f:b4:6c:4e:75:60:0d:aa:c0:78:c3:db:40:c9:7f:89:93:b9:
|
||||
d5:a6:fb:7b:f9:53:6f:bb:00:a7:13:d1:ef:5a:fe:ec:91:d5:
|
||||
6e:4f:2e:db:3e:79:83:f9:4e:5c:a0:a0:b2:44:41:50:a3:2f:
|
||||
5a:6f:5c:cd:a0:13:6f:e4:07:3c:a6:8a:1c:bd:3c:95:70:73:
|
||||
22:06
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBGjANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEzMDQwNDAwMDEx
|
||||
M1oXDTIzMDQwMjAwMDExM1owgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1iZWF0ZTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANdJhpBw8BBQaafNoKWO
|
||||
6cOSG4+tkCxmBGU7Feoupc8NGAbzAczbnBNqyYlopvbvnbaejSTDzbqLVb6ZPiG4
|
||||
c6CyGHFbin9fkbRfsYEqFxiIPb5BU7aSPkwG19zsaHASgg2BZr/BiDce2vsCqvOf
|
||||
d1vIMUTZEIkt0kwdnG/6RflDAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQUXCI7kNjvXdKMFqGazYLuJu2TyOowgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AGaG3Wy1MSVeVj2nfPcnEY5ml7TvgBtqf4mYnEa3gofORQ057olUCCXTXTICA9Bu
|
||||
O/jOoUAn1j+0bE51YA2qwHjD20DJf4mTudWm+3v5U2+7AKcT0e9a/uyR1W5PLts+
|
||||
eYP5TlygoLJEQVCjL1pvXM2gE2/kBzymihy9PJVwcyIG
|
||||
-----END CERTIFICATE-----
|
73
OPP/openvpn/keys/1B.pem
Normal file
73
OPP/openvpn/keys/1B.pem
Normal file
@ -0,0 +1,73 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 27 (0x1b)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Sep 20 11:41:43 2013 GMT
|
||||
Not After : Sep 18 11:41:43 2023 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-gw-ckubu/name=VPN OPP/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:97:a7:33:b6:32:9c:b4:75:af:7a:7e:54:53:25:
|
||||
cc:06:7b:f9:e0:93:3f:2f:9d:83:d2:ce:49:27:ed:
|
||||
da:35:19:fc:a2:40:67:52:db:8e:ba:42:42:13:74:
|
||||
73:00:eb:97:12:ad:e0:5f:8e:de:59:ff:c9:d6:8c:
|
||||
27:a1:95:28:0e:06:5e:ae:49:29:3e:97:60:3a:76:
|
||||
b4:f0:e4:11:0f:c6:07:fa:e5:42:0d:e8:82:d0:71:
|
||||
38:a0:07:a6:aa:20:45:7e:d9:78:2e:66:53:8c:10:
|
||||
77:44:e8:49:57:50:5c:33:85:b0:88:61:1d:64:aa:
|
||||
4f:0c:bc:b2:1b:b0:5c:6d:cb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
3F:A4:2B:57:0D:33:62:CA:48:8B:87:19:C6:1E:15:A6:31:A6:FE:6B
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
20:73:fd:0e:d1:64:95:60:ef:19:ae:dc:e6:e0:38:c8:f4:aa:
|
||||
fe:1b:89:a6:ff:ed:b2:36:ec:1a:38:08:5f:53:61:c6:b8:7e:
|
||||
c8:fd:82:6d:69:b3:92:bf:ad:40:4e:7e:d1:b3:c4:21:5c:d6:
|
||||
6e:eb:ea:64:51:e2:3a:49:d0:4b:49:dd:ca:9d:4b:ab:a5:b1:
|
||||
1a:82:ff:7b:0d:44:10:91:1a:11:db:ae:8f:2a:88:8f:d9:ce:
|
||||
a9:56:e6:da:8a:ba:27:0d:44:4b:2f:70:da:c9:34:cd:c8:19:
|
||||
79:93:d5:45:16:49:7b:53:7a:83:3c:14:6b:09:71:bc:5c:58:
|
||||
e8:cf
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID9jCCA1+gAwIBAgIBGzANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEzMDkyMDExNDE0
|
||||
M1oXDTIzMDkxODExNDE0M1owgacxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRkwFwYDVQQDExBPUFAtVnBuLWd3LWNrdWJ1MRAwDgYD
|
||||
VQQpEwdWUE4gT1BQMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCBnzAN
|
||||
BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAl6cztjKctHWven5UUyXMBnv54JM/L52D
|
||||
0s5JJ+3aNRn8okBnUtuOukJCE3RzAOuXEq3gX47eWf/J1ownoZUoDgZerkkpPpdg
|
||||
Ona08OQRD8YH+uVCDeiC0HE4oAemqiBFftl4LmZTjBB3ROhJV1BcM4WwiGEdZKpP
|
||||
DLyyG7BcbcsCAwEAAaOCAUYwggFCMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAW
|
||||
HkVhc3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUP6QrVw0z
|
||||
YspIi4cZxh4VpjGm/mswgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuT
|
||||
U+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNV
|
||||
BAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNl
|
||||
cnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1
|
||||
c0Bvb3Blbi5kZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1Ud
|
||||
DwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAgc/0O0WSVYO8Zrtzm4DjI9Kr+G4mm
|
||||
/+2yNuwaOAhfU2HGuH7I/YJtabOSv61ATn7Rs8QhXNZu6+pkUeI6SdBLSd3KnUur
|
||||
pbEagv97DUQQkRoR266PKoiP2c6pVubaironDURLL3DayTTNyBl5k9VFFkl7U3qD
|
||||
PBRrCXG8XFjozw==
|
||||
-----END CERTIFICATE-----
|
73
OPP/openvpn/keys/1C.pem
Normal file
73
OPP/openvpn/keys/1C.pem
Normal file
@ -0,0 +1,73 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 28 (0x1c)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Oct 11 15:12:49 2013 GMT
|
||||
Not After : Oct 9 15:12:49 2023 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-katja/name=VPN Opferperspektive/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d9:e2:21:55:b2:cb:8b:c8:d3:c6:09:ed:7c:c0:
|
||||
ca:64:9e:87:7b:54:e4:14:b6:cb:3e:b8:74:3e:df:
|
||||
8c:73:69:0e:b2:22:65:37:1d:24:cc:77:d8:0e:fd:
|
||||
cc:88:44:95:e7:97:e2:2a:05:cc:de:3e:90:e5:af:
|
||||
d5:1a:05:be:9f:5e:5a:c5:22:48:55:d6:de:33:4f:
|
||||
ce:50:f0:f0:ce:16:f0:3d:f4:71:c5:b0:be:ad:06:
|
||||
ca:5e:05:15:85:74:a7:21:16:28:8d:b3:36:06:bb:
|
||||
d3:48:8c:99:4f:9e:d7:de:6d:ff:82:82:35:b4:43:
|
||||
04:ca:af:78:bf:12:27:ef:0f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
35:A3:D6:E8:69:F1:4A:4E:5D:BC:46:48:D4:29:E1:B3:DD:0F:0E:21
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a4:33:fd:04:b8:eb:4f:94:8e:7d:e0:67:ea:d5:cf:fb:3e:c4:
|
||||
91:dc:5a:4a:28:a1:05:46:d1:20:fa:e2:99:8f:57:cf:24:8d:
|
||||
f5:b1:86:17:cd:ee:8d:60:df:30:d3:48:61:d0:65:48:73:43:
|
||||
38:37:0b:fb:a0:9c:d8:e3:b5:dd:8e:2d:18:93:19:af:7c:dd:
|
||||
1f:5d:42:36:ff:df:db:2f:dd:89:2d:3d:75:7d:90:74:33:e0:
|
||||
f5:e5:0b:2d:aa:ed:02:a5:b2:2a:2c:e4:70:f5:f0:bd:66:d2:
|
||||
b8:3a:0e:7d:6c:47:55:8f:89:f6:22:c2:05:07:ce:f6:4e:9e:
|
||||
18:a1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEADCCA2mgAwIBAgIBHDANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTEzMTAxMTE1MTI0
|
||||
OVoXDTIzMTAwOTE1MTI0OVowgbExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWthdGphMR0wGwYDVQQp
|
||||
ExRWUE4gT3BmZXJwZXJzcGVrdGl2ZTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANniIVWyy4vI08YJ7XzA
|
||||
ymSeh3tU5BS2yz64dD7fjHNpDrIiZTcdJMx32A79zIhEleeX4ioFzN4+kOWv1RoF
|
||||
vp9eWsUiSFXW3jNPzlDw8M4W8D30ccWwvq0Gyl4FFYV0pyEWKI2zNga700iMmU+e
|
||||
195t/4KCNbRDBMqveL8SJ+8PAgMBAAGjggFGMIIBQjAJBgNVHRMEAjAAMC0GCWCG
|
||||
SAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
|
||||
BBYEFDWj1uhp8UpOXbxGSNQp4bPdDw4hMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7
|
||||
FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVy
|
||||
bGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQ
|
||||
bmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3
|
||||
DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSLVaPfiDATBgNVHSUEDDAKBggrBgEF
|
||||
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEApDP9BLjrT5SOfeBn
|
||||
6tXP+z7EkdxaSiihBUbRIPrimY9XzySN9bGGF83ujWDfMNNIYdBlSHNDODcL+6Cc
|
||||
2OO13Y4tGJMZr3zdH11CNv/f2y/diS09dX2QdDPg9eULLartAqWyKizkcPXwvWbS
|
||||
uDoOfWxHVY+J9iLCBQfO9k6eGKE=
|
||||
-----END CERTIFICATE-----
|
73
OPP/openvpn/keys/1D.pem
Normal file
73
OPP/openvpn/keys/1D.pem
Normal file
@ -0,0 +1,73 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 29 (0x1d)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Feb 26 13:41:01 2015 GMT
|
||||
Not After : Feb 23 13:41:01 2025 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=Network Services, CN=OPP-Vpn-martin/name=Martin/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:bd:c2:d1:06:7f:d6:33:69:5a:69:4c:19:a3:83:
|
||||
5d:99:6c:14:c2:5e:38:c7:5e:50:b2:df:30:ff:9f:
|
||||
25:3d:dd:d0:71:64:4a:07:ab:28:e5:79:09:bd:b2:
|
||||
e1:ca:86:81:ef:e4:de:78:3f:b5:8c:fb:d4:02:83:
|
||||
28:48:c5:35:bc:75:b1:73:d7:6c:b5:e2:93:5e:ab:
|
||||
34:ad:f8:70:f5:21:80:8d:f2:05:15:2a:95:e6:d0:
|
||||
7e:aa:72:d3:83:54:0d:c1:47:54:e7:d8:bc:0c:4a:
|
||||
23:ae:7c:45:51:a2:80:54:e5:5e:e7:71:7c:0f:8f:
|
||||
2a:c2:fb:d7:ca:2e:b9:1f:cd
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
27:90:98:28:41:A9:F8:4A:C6:A4:C3:2E:7E:4E:A8:3F:14:6F:08:F6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
52:fe:14:82:ed:e1:68:51:06:22:42:96:07:66:45:5c:dc:84:
|
||||
ce:ad:cc:f7:48:55:83:53:c8:49:08:ea:45:1a:d7:98:42:38:
|
||||
11:4c:c6:2c:d4:c8:e0:f8:9a:e1:0d:42:4f:30:3b:fe:97:fd:
|
||||
c1:57:6c:07:b9:5e:41:6b:10:37:b2:a3:ce:0e:2f:44:30:6d:
|
||||
3a:2e:8b:d0:d7:35:62:20:cc:d4:f9:94:08:dd:48:e7:e4:af:
|
||||
ff:cf:ab:1b:d8:21:fb:47:c9:6f:e5:eb:4b:07:1a:b4:7c:f1:
|
||||
19:1b:85:27:fb:66:b6:69:2b:d9:e2:b7:40:15:2e:3d:ad:0f:
|
||||
57:fc
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID8zCCA1ygAwIBAgIBHTANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE1MDIyNjEzNDEw
|
||||
MVoXDTI1MDIyMzEzNDEwMVowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBO
|
||||
ZXR3b3JrIFNlcnZpY2VzMRcwFQYDVQQDEw5PUFAtVnBuLW1hcnRpbjEPMA0GA1UE
|
||||
KRMGTWFydGluMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCBnzANBgkq
|
||||
hkiG9w0BAQEFAAOBjQAwgYkCgYEAvcLRBn/WM2laaUwZo4NdmWwUwl44x15Qst8w
|
||||
/58lPd3QcWRKB6so5XkJvbLhyoaB7+TeeD+1jPvUAoMoSMU1vHWxc9dsteKTXqs0
|
||||
rfhw9SGAjfIFFSqV5tB+qnLTg1QNwUdU59i8DEojrnxFUaKAVOVe53F8D48qwvvX
|
||||
yi65H80CAwEAAaOCAUYwggFCMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVh
|
||||
c3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUJ5CYKEGp+ErG
|
||||
pMMufk6oPxRvCPYwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+Oh
|
||||
gZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcT
|
||||
BkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZp
|
||||
Y2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
|
||||
b3Blbi5kZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQE
|
||||
AwIHgDANBgkqhkiG9w0BAQUFAAOBgQBS/hSC7eFoUQYiQpYHZkVc3ITOrcz3SFWD
|
||||
U8hJCOpFGteYQjgRTMYs1Mjg+JrhDUJPMDv+l/3BV2wHuV5BaxA3sqPODi9EMG06
|
||||
LovQ1zViIMzU+ZQI3Ujn5K//z6sb2CH7R8lv5etLBxq0fPEZG4Un+2a2aSvZ4rdA
|
||||
FS49rQ9X/A==
|
||||
-----END CERTIFICATE-----
|
73
OPP/openvpn/keys/1E.pem
Normal file
73
OPP/openvpn/keys/1E.pem
Normal file
@ -0,0 +1,73 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 30 (0x1e)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Apr 1 17:02:21 2015 GMT
|
||||
Not After : Mar 29 17:02:21 2025 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-joaschka/name=joaschka/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:ba:2e:80:49:cd:26:0c:a4:46:11:69:b7:1b:bf:
|
||||
5b:31:db:33:94:69:dd:8d:ae:53:86:77:8a:fc:2e:
|
||||
9f:81:fc:bb:fd:b5:b2:b7:ba:0c:dc:ef:53:b8:be:
|
||||
48:1c:4d:a0:1e:e2:ed:f2:30:7e:82:e4:78:2b:18:
|
||||
1d:dc:f4:4f:93:ad:ac:7f:bc:53:92:a3:56:36:4b:
|
||||
2f:9d:24:89:d8:d3:47:18:d3:7f:a0:e5:47:a6:34:
|
||||
a9:2f:38:a4:16:f9:2e:3d:68:24:e6:e9:5a:f0:28:
|
||||
ae:7d:e3:97:ef:b9:e4:b6:14:59:72:77:c6:77:54:
|
||||
da:05:22:2b:fb:b7:74:82:39
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
18:72:39:E2:A4:01:00:85:6F:D1:77:8E:1E:86:DC:2D:FD:44:F3:94
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
5d:f4:28:a9:8f:36:1a:4a:52:ad:50:20:48:ca:90:47:24:3b:
|
||||
04:4a:49:b6:56:e8:9e:1c:2b:ea:26:4a:ea:8f:34:c4:7a:46:
|
||||
ab:ca:ff:6c:bc:33:fd:df:bf:f1:94:47:65:ac:9d:0a:18:d0:
|
||||
ef:37:b5:64:55:e8:c6:5a:b7:51:14:92:3b:eb:99:ac:e8:e8:
|
||||
fe:9c:9a:a4:c0:0f:24:e1:7c:bb:c0:09:d3:0a:5c:f5:8f:dc:
|
||||
df:ed:e6:22:7a:a6:bd:37:28:8e:53:bf:63:15:84:49:10:2d:
|
||||
3c:e9:06:2f:b7:e2:c8:c6:7c:18:d6:88:e4:9a:29:1f:1a:cd:
|
||||
d2:5c
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID9zCCA2CgAwIBAgIBHjANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE1MDQwMTE3MDIy
|
||||
MVoXDTI1MDMyOTE3MDIyMVowgagxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRkwFwYDVQQDExBPUFAtVnBuLWpvYXNjaGthMREwDwYD
|
||||
VQQpEwhqb2FzY2hrYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwgZ8w
|
||||
DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALougEnNJgykRhFptxu/WzHbM5Rp3Y2u
|
||||
U4Z3ivwun4H8u/21sre6DNzvU7i+SBxNoB7i7fIwfoLkeCsYHdz0T5OtrH+8U5Kj
|
||||
VjZLL50kidjTRxjTf6DlR6Y0qS84pBb5Lj1oJObpWvAorn3jl++55LYUWXJ3xndU
|
||||
2gUiK/u3dII5AgMBAAGjggFGMIIBQjAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQg
|
||||
Fh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFBhyOeKk
|
||||
AQCFb9F3jh6G3C39RPOUMIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7FrLMbSRsyt2b
|
||||
k1PjoYGVpIGSMIGPMQswCQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYD
|
||||
VQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBz
|
||||
ZXJ2aWNlczETMBEGA1UEAxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJn
|
||||
dXNAb29wZW4uZGWCCQDXRBSLVaPfiDATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNV
|
||||
HQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAXfQoqY82GkpSrVAgSMqQRyQ7BEpJ
|
||||
tlbonhwr6iZK6o80xHpGq8r/bLwz/d+/8ZRHZaydChjQ7ze1ZFXoxlq3URSSO+uZ
|
||||
rOjo/pyapMAPJOF8u8AJ0wpc9Y/c3+3mInqmvTcojlO/YxWESRAtPOkGL7fiyMZ8
|
||||
GNaI5JopHxrN0lw=
|
||||
-----END CERTIFICATE-----
|
72
OPP/openvpn/keys/1F.pem
Normal file
72
OPP/openvpn/keys/1F.pem
Normal file
@ -0,0 +1,72 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 31 (0x1f)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Apr 2 10:01:18 2015 GMT
|
||||
Not After : Mar 30 10:01:18 2025 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-opp1/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:a9:12:a5:21:18:02:98:06:6c:da:dd:90:23:a2:
|
||||
f1:a7:23:c7:a3:2e:06:84:b0:56:17:3a:db:7f:7a:
|
||||
8a:7e:c9:f7:0a:55:a0:36:13:55:f0:d9:c9:2d:a6:
|
||||
65:fb:83:a7:7e:8c:21:aa:9b:d9:2b:4b:a5:64:35:
|
||||
e9:71:71:8f:db:f8:7e:e4:1e:ab:2f:bb:33:56:e2:
|
||||
bf:fb:92:d9:0b:a6:30:e6:56:d1:5b:cd:c1:0e:73:
|
||||
b0:e2:d9:8a:db:8e:de:13:1a:95:7f:b6:0b:84:f3:
|
||||
29:ab:af:79:88:b2:cf:b3:db:46:59:60:53:fc:df:
|
||||
d3:24:d7:2f:03:e9:7b:8b:23
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E7:A2:6C:EE:FF:91:F4:68:02:C1:04:D1:17:D5:B4:6A:28:CC:05:F4
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
05:4f:19:5e:7f:45:60:aa:5d:73:1f:4b:d7:ac:fb:4b:92:d8:
|
||||
02:83:62:fa:0a:b4:27:ae:2b:2f:b3:c3:58:d6:78:8c:1e:12:
|
||||
e1:7d:b5:99:43:17:e1:43:97:6f:dc:ee:0f:99:97:b6:1c:30:
|
||||
6a:d8:ee:c4:c3:33:34:91:0e:79:19:28:65:f2:08:f1:51:26:
|
||||
1e:15:77:ae:6e:13:c9:b0:f3:a0:f0:89:46:d3:d6:6d:df:a0:
|
||||
8c:0d:52:cf:b4:eb:db:c2:a4:57:d7:e2:d0:c9:60:45:aa:bf:
|
||||
9c:f4:63:c1:c2:7e:4e:79:02:74:bc:e1:f2:dc:a4:3a:ee:51:
|
||||
dd:8e
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID4DCCA0mgAwIBAgIBHzANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE1MDQwMjEwMDEx
|
||||
OFoXDTI1MDMzMDEwMDExOFowgZExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRUwEwYDVQQDEwxPUFAtVnBuLW9wcDExHTAbBgkqhkiG
|
||||
9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
|
||||
gQCpEqUhGAKYBmza3ZAjovGnI8ejLgaEsFYXOtt/eop+yfcKVaA2E1Xw2cktpmX7
|
||||
g6d+jCGqm9krS6VkNelxcY/b+H7kHqsvuzNW4r/7ktkLpjDmVtFbzcEOc7Di2Yrb
|
||||
jt4TGpV/tguE8ymrr3mIss+z20ZZYFP839Mk1y8D6XuLIwIDAQABo4IBRjCCAUIw
|
||||
CQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVkIENl
|
||||
cnRpZmljYXRlMB0GA1UdDgQWBBTnomzu/5H0aALBBNEX1bRqKMwF9DCBxAYDVR0j
|
||||
BIG8MIG5gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMC
|
||||
REUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZv
|
||||
Lm9wZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1W
|
||||
cG4tY2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gw
|
||||
EwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUA
|
||||
A4GBAAVPGV5/RWCqXXMfS9es+0uS2AKDYvoKtCeuKy+zw1jWeIweEuF9tZlDF+FD
|
||||
l2/c7g+Zl7YcMGrY7sTDMzSRDnkZKGXyCPFRJh4Vd65uE8mw86DwiUbT1m3foIwN
|
||||
Us+069vCpFfX4tDJYEWqv5z0Y8HCfk55AnS84fLcpDruUd2O
|
||||
-----END CERTIFICATE-----
|
73
OPP/openvpn/keys/20.pem
Normal file
73
OPP/openvpn/keys/20.pem
Normal file
@ -0,0 +1,73 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 32 (0x20)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 7 17:28:13 2015 GMT
|
||||
Not After : May 4 17:28:13 2025 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-levan/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:aa:dd:c2:b4:70:21:3e:f0:67:5d:11:fc:51:03:
|
||||
ff:82:dd:7a:21:af:9f:0f:c2:2c:a3:4e:d1:5b:a0:
|
||||
67:d8:a6:02:0e:9f:e9:77:76:4e:d5:85:26:4d:03:
|
||||
28:66:72:4c:50:51:18:e6:e0:e4:bc:a2:7d:49:a6:
|
||||
55:0e:f6:32:7f:d3:97:53:99:00:70:74:3a:24:d6:
|
||||
d2:7d:13:60:ee:30:d3:1b:92:81:8a:38:e7:67:dc:
|
||||
20:68:7e:c7:2b:8e:3c:5e:87:c4:a9:ce:bd:fc:29:
|
||||
50:06:ce:f1:fc:0e:1a:f6:d3:e0:35:cc:b7:99:fb:
|
||||
19:ef:5c:b0:56:32:b6:c0:df
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
4E:EF:C7:3D:3F:C3:39:B7:BB:3F:4A:C4:65:38:12:1A:F6:52:28:80
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
26:c4:4a:04:f5:14:97:b4:73:91:97:86:10:53:5c:5f:c4:d3:
|
||||
61:cc:b8:38:f3:f5:1a:6b:a7:7e:49:c8:76:0d:0d:a9:ca:55:
|
||||
c2:de:17:33:3b:76:d8:93:11:79:cf:f4:37:82:1e:c7:fd:c9:
|
||||
38:82:5c:2c:7a:42:bf:40:8e:db:56:fd:a3:a1:73:f9:84:c4:
|
||||
60:7f:4b:f0:36:80:b4:da:67:18:e2:85:91:6c:6e:18:c6:e0:
|
||||
34:4e:5c:8d:21:ed:cc:3b:3e:33:9f:74:9e:dd:52:76:3a:6e:
|
||||
a2:44:ff:fc:ea:1f:b0:71:dc:9e:7f:a3:f4:b8:c9:e7:5e:18:
|
||||
c9:98
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID8zCCA1ygAwIBAgIBIDANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE1MDUwNzE3Mjgx
|
||||
M1oXDTI1MDUwNDE3MjgxM1owgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWxldmFuMRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCBnzANBgkq
|
||||
hkiG9w0BAQEFAAOBjQAwgYkCgYEAqt3CtHAhPvBnXRH8UQP/gt16Ia+fD8Iso07R
|
||||
W6Bn2KYCDp/pd3ZO1YUmTQMoZnJMUFEY5uDkvKJ9SaZVDvYyf9OXU5kAcHQ6JNbS
|
||||
fRNg7jDTG5KBijjnZ9wgaH7HK448XofEqc69/ClQBs7x/A4a9tPgNcy3mfsZ71yw
|
||||
VjK2wN8CAwEAAaOCAUYwggFCMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVh
|
||||
c3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUTu/HPT/DObe7
|
||||
P0rEZTgSGvZSKIAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+Oh
|
||||
gZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcT
|
||||
BkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZp
|
||||
Y2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
|
||||
b3Blbi5kZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQE
|
||||
AwIHgDANBgkqhkiG9w0BAQUFAAOBgQAmxEoE9RSXtHORl4YQU1xfxNNhzLg48/Ua
|
||||
a6d+Sch2DQ2pylXC3hczO3bYkxF5z/Q3gh7H/ck4glwsekK/QI7bVv2joXP5hMRg
|
||||
f0vwNoC02mcY4oWRbG4YxuA0TlyNIe3MOz4zn3Se3VJ2Om6iRP/86h+wcdyef6P0
|
||||
uMnnXhjJmA==
|
||||
-----END CERTIFICATE-----
|
72
OPP/openvpn/keys/21.pem
Normal file
72
OPP/openvpn/keys/21.pem
Normal file
@ -0,0 +1,72 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 33 (0x21)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 22 22:55:53 2015 GMT
|
||||
Not After : May 19 22:55:53 2025 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-katrin-priv/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (1024 bit)
|
||||
Modulus:
|
||||
00:be:4f:1e:d3:bd:2b:84:57:03:b7:6e:64:fc:bb:
|
||||
94:70:a4:28:37:80:4c:49:a3:90:1d:8e:09:53:40:
|
||||
8a:e2:97:9e:9e:e1:cd:32:0d:e4:04:a2:da:87:8a:
|
||||
4f:3d:13:df:f6:87:59:83:04:65:68:23:e7:2f:3c:
|
||||
c0:25:68:2f:bf:07:cc:fe:b0:9e:fa:30:9d:6e:21:
|
||||
eb:12:fd:c3:a7:fe:cd:c9:40:bf:14:db:e5:83:4c:
|
||||
f9:7d:44:12:74:80:bc:38:82:1f:81:ed:49:5e:3a:
|
||||
a3:35:ca:12:5b:32:f7:6d:2a:bb:e8:5f:ac:22:d7:
|
||||
59:7c:d5:e1:92:62:57:0a:fb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
CC:F4:5A:3A:2D:0A:78:23:19:14:F2:39:46:24:0F:6F:B0:14:AC:C2
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
84:10:b0:e9:2e:86:74:09:f1:47:9c:56:d4:ff:b4:c4:1a:18:
|
||||
b1:2d:9d:9b:ff:dd:d8:f8:fc:5f:d4:4d:18:0f:b9:ba:28:38:
|
||||
e3:aa:49:66:2a:77:3d:3c:5c:d0:7a:fc:25:d8:5f:a5:ba:67:
|
||||
77:50:9a:46:4c:14:b2:fb:6f:e6:d0:fa:19:1b:43:24:64:8f:
|
||||
c6:7b:b8:4b:ea:62:66:51:dc:6e:a7:df:be:4d:f0:c7:c9:7c:
|
||||
08:08:9f:11:47:90:dc:13:3d:1d:9d:11:24:91:06:60:26:1c:
|
||||
e5:1f:00:d9:57:b0:fe:5d:f9:be:89:0f:ef:24:ae:3e:24:de:
|
||||
80:46
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIID5zCCA1CgAwIBAgIBITANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE1MDUyMjIyNTU1
|
||||
M1oXDTI1MDUxOTIyNTU1M1owgZgxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWthdHJpbi1wcml2MR0w
|
||||
GwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCBnzANBgkqhkiG9w0BAQEFAAOB
|
||||
jQAwgYkCgYEAvk8e070rhFcDt25k/LuUcKQoN4BMSaOQHY4JU0CK4peenuHNMg3k
|
||||
BKLah4pPPRPf9odZgwRlaCPnLzzAJWgvvwfM/rCe+jCdbiHrEv3Dp/7NyUC/FNvl
|
||||
g0z5fUQSdIC8OIIfge1JXjqjNcoSWzL3bSq76F+sItdZfNXhkmJXCvsCAwEAAaOC
|
||||
AUYwggFCMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUzPRaOi0KeCMZFPI5RiQPb7AUrMIw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG
|
||||
9w0BAQUFAAOBgQCEELDpLoZ0CfFHnFbU/7TEGhixLZ2b/93Y+Pxf1E0YD7m6KDjj
|
||||
qklmKnc9PFzQevwl2F+lumd3UJpGTBSy+2/m0PoZG0MkZI/Ge7hL6mJmUdxup9++
|
||||
TfDHyXwICJ8RR5DcEz0dnREkkQZgJhzlHwDZV7D+Xfm+iQ/vJK4+JN6ARg==
|
||||
-----END CERTIFICATE-----
|
84
OPP/openvpn/keys/22.pem
Normal file
84
OPP/openvpn/keys/22.pem
Normal file
@ -0,0 +1,84 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 34 (0x22)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 27 20:33:43 2016 GMT
|
||||
Not After : Dec 25 20:33:43 2026 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-hannes/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b6:d5:54:2c:c2:b5:0f:1a:36:92:52:a0:be:aa:
|
||||
22:41:4f:fb:27:86:a7:11:78:53:7f:80:69:99:a9:
|
||||
a4:81:95:b9:5b:40:4f:25:d6:40:14:2b:cc:1a:62:
|
||||
a0:40:79:82:af:f9:ab:fc:22:b8:0b:c8:35:83:d5:
|
||||
98:f2:7b:08:d1:38:f2:c3:3b:39:a0:97:7a:04:0d:
|
||||
e6:6c:cb:b8:2e:2a:f8:a5:79:96:8d:c6:e9:0f:22:
|
||||
2c:fd:e7:50:61:b2:f7:bb:ba:20:05:1a:85:27:d9:
|
||||
94:82:74:06:39:91:42:fa:1f:c2:dc:e0:f0:c7:70:
|
||||
03:46:4d:52:44:f1:0e:c9:4e:e2:a3:11:50:23:4d:
|
||||
0a:dc:2f:13:e3:a3:f7:5f:14:64:a3:03:08:e2:d6:
|
||||
83:af:46:ac:68:43:ef:5c:12:0e:cf:ab:37:ab:6c:
|
||||
8d:91:25:dc:91:73:18:18:76:7e:53:4a:b7:54:5e:
|
||||
2d:80:eb:6c:cc:8e:18:1b:4d:29:51:72:68:4e:4d:
|
||||
7c:7e:8b:00:17:40:a8:43:02:33:bc:83:72:40:d0:
|
||||
49:f8:44:1b:88:8f:37:c4:f6:4f:28:28:5f:3b:cd:
|
||||
e0:14:fc:fc:6a:20:23:45:13:b3:da:ac:b6:d9:e5:
|
||||
d7:49:8c:21:87:7b:88:a1:38:23:7b:45:62:ac:9b:
|
||||
65:ab
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
34:BB:16:9D:D8:4B:1C:E1:52:EA:4C:3B:47:5E:0C:4F:B6:E4:A2:0A
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
a6:c3:00:02:cc:53:bc:07:5e:75:ca:a9:99:72:e6:39:91:82:
|
||||
91:55:ca:17:c5:d8:48:c0:62:83:1a:84:23:52:9a:42:ec:6e:
|
||||
fd:56:d7:39:79:d2:5c:a6:27:88:93:50:fe:20:26:e5:38:0c:
|
||||
c4:b1:8b:ce:4f:96:6d:b2:14:0b:88:a3:47:a1:ec:03:51:71:
|
||||
f8:09:57:71:2a:99:89:69:71:87:2d:2e:a6:fb:b5:ae:a0:25:
|
||||
91:8e:7f:2f:9c:bb:87:c1:a5:2c:8a:e5:5f:b9:cf:bf:b3:93:
|
||||
01:05:5c:b7:56:f6:99:79:c9:fd:dd:28:2a:33:d9:81:46:dc:
|
||||
22:d6
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEeDCCA+GgAwIBAgIBIjANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE2MTIyNzIwMzM0
|
||||
M1oXDTI2MTIyNTIwMzM0M1owgaUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRcwFQYDVQQDEw5PUFAtVnBuLWhhbm5lczEQMA4GA1UE
|
||||
KRMHT1BQLVZwbjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC21VQswrUPGjaSUqC+qiJBT/snhqcR
|
||||
eFN/gGmZqaSBlblbQE8l1kAUK8waYqBAeYKv+av8IrgLyDWD1ZjyewjROPLDOzmg
|
||||
l3oEDeZsy7guKvileZaNxukPIiz951Bhsve7uiAFGoUn2ZSCdAY5kUL6H8Lc4PDH
|
||||
cANGTVJE8Q7JTuKjEVAjTQrcLxPjo/dfFGSjAwji1oOvRqxoQ+9cEg7PqzerbI2R
|
||||
JdyRcxgYdn5TSrdUXi2A62zMjhgbTSlRcmhOTXx+iwAXQKhDAjO8g3JA0En4RBuI
|
||||
jzfE9k8oKF87zeAU/PxqICNFE7ParLbZ5ddJjCGHe4ihOCN7RWKsm2WrAgMBAAGj
|
||||
ggFGMIIBQjAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDS7Fp3YSxzhUupMO0deDE+25KIK
|
||||
MIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UE
|
||||
AxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQDX
|
||||
RBSLVaPfiDATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZI
|
||||
hvcNAQEFBQADgYEApsMAAsxTvAdedcqpmXLmOZGCkVXKF8XYSMBigxqEI1KaQuxu
|
||||
/VbXOXnSXKYniJNQ/iAm5TgMxLGLzk+WbbIUC4ijR6HsA1Fx+AlXcSqZiWlxhy0u
|
||||
pvu1rqAlkY5/L5y7h8GlLIrlX7nPv7OTAQVct1b2mXnJ/d0oKjPZgUbcItY=
|
||||
-----END CERTIFICATE-----
|
84
OPP/openvpn/keys/23.pem
Normal file
84
OPP/openvpn/keys/23.pem
Normal file
@ -0,0 +1,84 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 35 (0x23)
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 27 20:39:45 2016 GMT
|
||||
Not After : Dec 25 20:39:45 2026 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ingmar/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b5:bd:72:97:9d:5e:72:39:c8:0f:b8:c6:85:06:
|
||||
9a:e3:ec:7b:7f:1f:49:72:f9:c9:fe:de:4d:21:ac:
|
||||
78:bf:13:f8:43:e3:48:5e:28:f0:b4:55:dc:46:6b:
|
||||
ee:47:16:9d:e8:5d:a9:89:b4:02:59:5d:f0:e7:6e:
|
||||
41:89:2c:b2:4c:18:54:3a:dc:72:d2:3d:4c:bf:0d:
|
||||
ca:79:0a:79:57:83:49:7d:9c:49:84:c5:74:ef:7e:
|
||||
9a:1e:40:38:e4:f8:b9:55:c5:c8:99:fc:c2:88:e5:
|
||||
d9:bc:f0:2f:7b:ea:b1:1b:77:b8:3b:91:05:a2:d5:
|
||||
77:3b:ca:e9:11:f2:67:75:1d:6f:ee:59:2b:fb:4a:
|
||||
17:6d:42:6e:dd:59:17:cc:bd:81:95:25:f3:47:b0:
|
||||
fb:4a:25:7c:0c:8d:70:cf:7b:ea:83:df:04:8c:8c:
|
||||
6e:4c:de:38:33:bb:2a:99:4a:dc:db:fc:eb:17:7d:
|
||||
45:63:d9:e4:c2:8f:98:52:03:36:22:63:58:9e:f4:
|
||||
47:41:ab:57:8d:69:77:9b:83:67:a3:0e:c2:94:03:
|
||||
68:cc:ba:2b:3f:4a:85:52:cb:91:c6:6c:95:ef:3d:
|
||||
01:e6:68:42:10:00:43:15:a6:bb:97:88:b5:3b:fd:
|
||||
1e:56:53:b9:25:bb:0d:5f:43:9f:78:69:6d:e6:71:
|
||||
20:53
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
DE:29:18:64:B7:D1:DC:F4:8D:F4:86:36:40:DE:36:4F:C4:01:6C:16
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
84:f7:3e:16:32:37:24:58:24:64:98:8b:22:bd:c6:43:31:78:
|
||||
87:aa:45:ca:9c:32:19:c2:04:27:5e:e2:f9:2c:e2:cb:ee:7a:
|
||||
75:9e:2f:3a:c5:18:bd:fd:66:72:6e:15:23:c8:48:45:8a:2c:
|
||||
e9:9a:62:c9:58:8e:b7:9d:bf:a0:9b:dc:dd:21:2c:53:e6:dc:
|
||||
15:68:1c:fc:01:1f:50:7b:65:57:e0:09:c4:41:a9:3f:4e:f5:
|
||||
73:85:73:d5:5a:f3:2e:4c:93:37:f9:cc:75:a0:69:08:a2:9c:
|
||||
bb:4f:1b:f5:63:26:01:a2:fa:8f:4d:40:13:f5:d5:59:dc:91:
|
||||
a5:d1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEeDCCA+GgAwIBAgIBIzANBgkqhkiG9w0BAQUFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE2MTIyNzIwMzk0
|
||||
NVoXDTI2MTIyNTIwMzk0NVowgaUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRcwFQYDVQQDEw5PUFAtVnBuLWluZ21hcjEQMA4GA1UE
|
||||
KRMHT1BQLVZwbjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwggEiMA0G
|
||||
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1vXKXnV5yOcgPuMaFBprj7Ht/H0ly
|
||||
+cn+3k0hrHi/E/hD40heKPC0VdxGa+5HFp3oXamJtAJZXfDnbkGJLLJMGFQ63HLS
|
||||
PUy/Dcp5CnlXg0l9nEmExXTvfpoeQDjk+LlVxciZ/MKI5dm88C976rEbd7g7kQWi
|
||||
1Xc7yukR8md1HW/uWSv7ShdtQm7dWRfMvYGVJfNHsPtKJXwMjXDPe+qD3wSMjG5M
|
||||
3jgzuyqZStzb/OsXfUVj2eTCj5hSAzYiY1ie9EdBq1eNaXebg2ejDsKUA2jMuis/
|
||||
SoVSy5HGbJXvPQHmaEIQAEMVpruXiLU7/R5WU7kluw1fQ594aW3mcSBTAgMBAAGj
|
||||
ggFGMIIBQjAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5l
|
||||
cmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFN4pGGS30dz0jfSGNkDeNk/EAWwW
|
||||
MIHEBgNVHSMEgbwwgbmAFOFNw2v0fIF7FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQsw
|
||||
CQYDVQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzAN
|
||||
BgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UE
|
||||
AxMKT1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQDX
|
||||
RBSLVaPfiDATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZI
|
||||
hvcNAQEFBQADgYEAhPc+FjI3JFgkZJiLIr3GQzF4h6pFypwyGcIEJ17i+Sziy+56
|
||||
dZ4vOsUYvf1mcm4VI8hIRYos6ZpiyViOt52/oJvc3SEsU+bcFWgc/AEfUHtlV+AJ
|
||||
xEGpP071c4Vz1VrzLkyTN/nMdaBpCKKcu08b9WMmAaL6j01AE/XVWdyRpdE=
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/24.pem
Normal file
87
OPP/openvpn/keys/24.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 36 (0x24)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Jan 14 14:55:55 2017 GMT
|
||||
Not After : Jan 14 14:55:55 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ines/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c2:99:2e:75:fe:2b:ea:c1:45:0a:45:58:96:f6:
|
||||
63:e8:26:2d:90:1a:0c:1f:4d:3c:27:4c:c8:0f:15:
|
||||
7a:c3:c1:d3:fb:b5:ee:8d:dd:e5:8c:04:a4:75:61:
|
||||
a7:28:24:83:a8:a0:b6:fa:d6:b8:88:d7:d5:b6:21:
|
||||
ee:9a:7a:4b:6f:11:d5:77:5b:4a:c1:b6:08:6e:33:
|
||||
31:1e:1f:c1:1c:b3:17:d2:5d:8b:6a:8b:8b:a4:dc:
|
||||
cf:33:39:49:92:3e:9e:55:1e:ea:79:87:ff:d7:e4:
|
||||
ed:0a:98:60:7a:95:05:76:b1:8f:f9:2c:19:15:0c:
|
||||
df:6e:71:d1:78:71:c6:c4:9e:c3:32:d8:59:25:1e:
|
||||
5e:2b:2f:83:de:6f:de:c1:40:6d:0b:09:ec:ab:c6:
|
||||
c1:1b:88:c8:8b:72:50:98:8b:c6:5b:7d:86:d4:f2:
|
||||
f4:3e:f8:82:2e:f5:bd:6e:08:4e:d2:38:0c:86:17:
|
||||
86:39:5c:09:de:15:ef:b9:67:e9:e9:0b:ae:dd:68:
|
||||
7c:f5:be:e8:57:96:07:02:88:d1:78:ea:f2:20:64:
|
||||
cd:6f:98:6b:5b:d9:82:bd:34:11:ae:aa:4e:b7:27:
|
||||
81:f8:37:1e:f6:81:96:c8:1f:48:87:5d:8b:72:74:
|
||||
e5:77:b1:54:49:11:6c:a8:95:37:7d:6b:9b:b7:00:
|
||||
94:b1
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
4C:7D:52:81:5E:B1:46:7E:B6:30:73:51:25:69:10:63:30:BA:73:BC
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:ines
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
7a:53:b1:3f:53:41:a0:62:bc:fa:ad:fd:cf:b3:b5:a2:40:d0:
|
||||
8d:10:77:39:eb:71:91:1c:a3:b1:c9:4b:8d:cb:6f:d0:b1:b0:
|
||||
67:31:8a:87:4e:72:0c:01:e3:ef:e4:f6:89:5b:c7:1e:a8:a8:
|
||||
73:39:9c:49:78:04:df:e1:8a:9a:e6:ce:50:c8:ca:70:ab:f1:
|
||||
01:43:08:4e:bd:38:ca:6c:cf:40:e9:dd:4e:7e:fe:d1:56:49:
|
||||
6c:69:77:90:54:73:97:dd:0c:c0:33:cc:24:45:7c:c1:b1:d6:
|
||||
8d:c4:85:50:b3:19:4a:49:fa:29:e2:19:ec:e0:68:56:e5:76:
|
||||
aa:bb
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEhzCCA/CgAwIBAgIBJDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MDExNDE0NTU1
|
||||
NVoXDTM3MDExNDE0NTU1NVowgaMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRUwEwYDVQQDEwxPUFAtVnBuLWluZXMxEDAOBgNVBCkT
|
||||
B09QUC1WcG4xHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIIBIjANBgkq
|
||||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwpkudf4r6sFFCkVYlvZj6CYtkBoMH008
|
||||
J0zIDxV6w8HT+7Xujd3ljASkdWGnKCSDqKC2+ta4iNfVtiHumnpLbxHVd1tKwbYI
|
||||
bjMxHh/BHLMX0l2LaouLpNzPMzlJkj6eVR7qeYf/1+TtCphgepUFdrGP+SwZFQzf
|
||||
bnHReHHGxJ7DMthZJR5eKy+D3m/ewUBtCwnsq8bBG4jIi3JQmIvGW32G1PL0PviC
|
||||
LvW9bghO0jgMhheGOVwJ3hXvuWfp6Quu3Wh89b7oV5YHAojReOryIGTNb5hrW9mC
|
||||
vTQRrqpOtyeB+Dce9oGWyB9Ih12LcnTld7FUSRFsqJU3fWubtwCUsQIDAQABo4IB
|
||||
VzCCAVMwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJh
|
||||
dGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRMfVKBXrFGfrYwc1ElaRBjMLpzvDCB
|
||||
xAYDVR0jBIG8MIG5gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkG
|
||||
A1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYD
|
||||
VQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMT
|
||||
Ck9QUC1WcG4tY2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QU
|
||||
i1Wj34gwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQI
|
||||
MAaCBGluZXMwDQYJKoZIhvcNAQELBQADgYEAelOxP1NBoGK8+q39z7O1okDQjRB3
|
||||
OetxkRyjsclLjctv0LGwZzGKh05yDAHj7+T2iVvHHqioczmcSXgE3+GKmubOUMjK
|
||||
cKvxAUMITr04ymzPQOndTn7+0VZJbGl3kFRzl90MwDPMJEV8wbHWjcSFULMZSkn6
|
||||
KeIZ7OBoVuV2qrs=
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/25.pem
Normal file
87
OPP/openvpn/keys/25.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 37 (0x25)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Feb 2 11:42:51 2017 GMT
|
||||
Not After : Feb 2 11:42:51 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-eli/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:d4:cd:55:f6:92:f2:6d:9b:49:d4:39:34:88:6e:
|
||||
fb:d8:00:32:3a:f1:56:dc:47:ab:95:e1:94:22:29:
|
||||
b2:1d:d9:57:3d:dc:4c:40:f2:d9:8b:0d:24:05:5f:
|
||||
03:c0:ae:14:f9:5b:7b:2d:3f:33:c3:73:c7:a9:46:
|
||||
e6:72:f0:f8:22:be:98:a1:55:0a:14:d7:30:62:89:
|
||||
af:6e:9d:cb:1a:4a:ba:df:81:16:3e:28:c3:71:95:
|
||||
d9:a3:c9:4f:c8:44:e8:4f:06:ee:18:1a:d3:d4:26:
|
||||
12:7d:c1:74:28:77:39:e6:c4:cf:2c:5f:4f:0c:10:
|
||||
7e:22:5c:10:87:4e:49:46:a2:b2:08:b3:75:92:b0:
|
||||
ec:f8:90:28:23:53:35:5b:cc:e8:19:69:3a:77:e1:
|
||||
11:d2:3e:19:8b:5c:c0:5e:be:52:62:0e:60:21:d5:
|
||||
ef:ef:81:8b:71:f4:c3:64:64:8a:e2:e0:7c:71:c1:
|
||||
57:fa:78:ba:6d:ea:e3:d9:bb:14:01:6d:26:03:6e:
|
||||
0e:9b:02:b8:25:87:30:5d:0b:63:e0:fc:3b:cb:d5:
|
||||
76:a5:4c:9e:9c:8d:41:18:f3:bf:8b:e1:c8:a1:ae:
|
||||
eb:47:c7:90:94:03:41:8f:19:87:ef:72:4a:2e:5d:
|
||||
05:1f:83:61:00:86:4f:ba:b6:2f:54:7e:3f:e1:76:
|
||||
4c:8f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
79:1D:DE:0C:92:00:9F:55:5F:53:27:81:B9:C2:DF:DB:3C:86:75:1E
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:eli
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
69:08:44:10:57:57:3b:a1:e4:a2:65:a2:c3:2b:85:9b:5c:0b:
|
||||
d7:5e:d8:3c:79:a4:b1:58:b8:c0:8c:be:6a:00:4d:fb:73:64:
|
||||
c6:ff:eb:0d:35:7e:33:f1:81:eb:84:e4:e3:19:16:52:2f:33:
|
||||
fb:aa:4a:27:5e:9c:7d:4f:e5:49:0d:6e:9c:6d:84:cb:4f:a8:
|
||||
41:27:1d:71:4c:8f:ff:dc:88:96:70:c1:39:ac:35:b7:bd:a7:
|
||||
cf:aa:09:8d:ec:8c:52:4c:a1:b5:3d:00:80:38:af:0b:b6:1b:
|
||||
87:ca:ba:a9:d3:8b:3a:39:44:07:57:ee:bb:fa:6e:56:74:80:
|
||||
fc:cd
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEhTCCA+6gAwIBAgIBJTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MDIwMjExNDI1
|
||||
MVoXDTM3MDIwMjExNDI1MVowgaIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRQwEgYDVQQDEwtPUFAtVnBuLWVsaTEQMA4GA1UEKRMH
|
||||
T1BQLVZwbjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwggEiMA0GCSqG
|
||||
SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDUzVX2kvJtm0nUOTSIbvvYADI68VbcR6uV
|
||||
4ZQiKbId2Vc93ExA8tmLDSQFXwPArhT5W3stPzPDc8epRuZy8PgivpihVQoU1zBi
|
||||
ia9uncsaSrrfgRY+KMNxldmjyU/IROhPBu4YGtPUJhJ9wXQodznmxM8sX08MEH4i
|
||||
XBCHTklGorIIs3WSsOz4kCgjUzVbzOgZaTp34RHSPhmLXMBevlJiDmAh1e/vgYtx
|
||||
9MNkZIri4HxxwVf6eLpt6uPZuxQBbSYDbg6bArglhzBdC2Pg/DvL1XalTJ6cjUEY
|
||||
87+L4cihrutHx5CUA0GPGYfvckouXQUfg2EAhk+6ti9Ufj/hdkyPAgMBAAGjggFW
|
||||
MIIBUjAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0
|
||||
ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFHkd3gySAJ9VX1MngbnC39s8hnUeMIHE
|
||||
BgNVHSMEgbwwgbmAFOFNw2v0fIF7FrLMbSRsyt2bk1PjoYGVpIGSMIGPMQswCQYD
|
||||
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
|
||||
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
|
||||
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQDXRBSL
|
||||
VaPfiDATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDgYDVR0RBAcw
|
||||
BYIDZWxpMA0GCSqGSIb3DQEBCwUAA4GBAGkIRBBXVzuh5KJlosMrhZtcC9de2Dx5
|
||||
pLFYuMCMvmoATftzZMb/6w01fjPxgeuE5OMZFlIvM/uqSidenH1P5UkNbpxthMtP
|
||||
qEEnHXFMj//ciJZwwTmsNbe9p8+qCY3sjFJMobU9AIA4rwu2G4fKuqnTizo5RAdX
|
||||
7rv6blZ0gPzN
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/26.pem
Normal file
87
OPP/openvpn/keys/26.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 38 (0x26)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 15 01:22:04 2017 GMT
|
||||
Not After : May 15 01:22:04 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-cristina/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:a0:34:ab:d6:98:48:9b:5c:84:c7:27:2d:d7:d4:
|
||||
45:b5:e7:d7:b5:4d:99:4a:a5:38:a2:95:a0:d7:78:
|
||||
5d:3e:de:0e:4f:4e:3d:9c:af:fb:cb:2f:a5:4e:25:
|
||||
19:f5:84:4f:a3:f8:98:db:77:58:42:7e:c1:16:f1:
|
||||
c7:09:2f:9a:ca:a5:e5:f3:1e:8d:9c:5f:54:8a:71:
|
||||
50:43:b5:e0:41:1a:ee:b4:69:32:f2:ab:7c:17:52:
|
||||
96:d1:7a:51:27:6f:83:44:2b:18:12:da:f9:9a:90:
|
||||
d4:c6:78:39:02:25:5c:86:d6:95:a1:81:77:54:2d:
|
||||
45:32:f8:c5:11:f5:75:d0:c2:3e:73:42:00:ba:d2:
|
||||
ef:a3:f0:52:0c:e7:6a:1a:2a:fd:c6:c4:54:3b:b7:
|
||||
f0:1f:f8:f6:3c:a2:bf:16:da:3b:fd:31:bd:b4:ec:
|
||||
16:da:03:78:be:ef:9c:9b:9e:c3:d0:4c:8e:53:2f:
|
||||
b6:87:cb:5d:b5:98:db:b3:9e:aa:46:09:cf:e0:f0:
|
||||
b0:35:dd:0a:ee:9a:15:7d:68:19:db:ea:84:42:97:
|
||||
4b:93:e1:7d:81:c0:d0:08:8a:01:04:23:89:0d:5f:
|
||||
e1:61:71:73:b6:e6:a0:3f:99:2f:f2:b3:5f:2b:fe:
|
||||
29:8a:69:d8:51:56:6c:6a:5e:46:25:16:96:cc:0e:
|
||||
57:97
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
75:75:D5:F4:C5:31:31:04:BB:9A:F7:7A:77:07:B1:18:73:27:54:18
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:cristina
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
53:31:84:22:c1:63:1d:0a:9b:34:4a:9e:d3:78:a5:46:62:87:
|
||||
33:e6:eb:23:72:aa:c6:f0:9c:0b:b2:26:49:0a:f5:bb:de:89:
|
||||
c3:9d:79:1f:d6:2d:79:99:42:04:ff:ad:d8:44:b2:f8:81:b4:
|
||||
a1:84:ca:72:ba:a8:86:ac:bb:fc:8d:a1:26:c2:95:0a:76:55:
|
||||
54:e5:34:b9:57:ce:2c:9a:01:5c:ec:79:ca:0e:2d:f6:80:70:
|
||||
13:bb:c7:d4:cc:cc:d9:ac:26:5c:57:aa:14:9f:ea:da:c2:ca:
|
||||
ef:1c:c3:1d:50:82:f3:5e:34:7d:73:fd:40:2b:db:0d:e1:83:
|
||||
1b:39
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEjzCCA/igAwIBAgIBJjANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MDUxNTAxMjIw
|
||||
NFoXDTM3MDUxNTAxMjIwNFowgacxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRkwFwYDVQQDExBPUFAtVnBuLWNyaXN0aW5hMRAwDgYD
|
||||
VQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIw
|
||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKA0q9aYSJtchMcnLdfURbXn17VN
|
||||
mUqlOKKVoNd4XT7eDk9OPZyv+8svpU4lGfWET6P4mNt3WEJ+wRbxxwkvmsql5fMe
|
||||
jZxfVIpxUEO14EEa7rRpMvKrfBdSltF6USdvg0QrGBLa+ZqQ1MZ4OQIlXIbWlaGB
|
||||
d1QtRTL4xRH1ddDCPnNCALrS76PwUgznahoq/cbEVDu38B/49jyivxbaO/0xvbTs
|
||||
FtoDeL7vnJuew9BMjlMvtofLXbWY27OeqkYJz+DwsDXdCu6aFX1oGdvqhEKXS5Ph
|
||||
fYHA0AiKAQQjiQ1f4WFxc7bmoD+ZL/KzXyv+KYpp2FFWbGpeRiUWlswOV5cCAwEA
|
||||
AaOCAVswggFXMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdl
|
||||
bmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUdXXV9MUxMQS7mvd6dwexGHMn
|
||||
VBgwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8x
|
||||
CzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEP
|
||||
MA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYD
|
||||
VQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJ
|
||||
ANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDATBgNV
|
||||
HREEDDAKgghjcmlzdGluYTANBgkqhkiG9w0BAQsFAAOBgQBTMYQiwWMdCps0Sp7T
|
||||
eKVGYocz5usjcqrG8JwLsiZJCvW73onDnXkf1i15mUIE/63YRLL4gbShhMpyuqiG
|
||||
rLv8jaEmwpUKdlVU5TS5V84smgFc7HnKDi32gHATu8fUzMzZrCZcV6oUn+rawsrv
|
||||
HMMdUILzXjR9c/1AK9sN4YMbOQ==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/27.pem
Normal file
87
OPP/openvpn/keys/27.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 39 (0x27)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Sep 17 22:15:42 2017 GMT
|
||||
Not After : Sep 17 22:15:42 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-amine/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ce:c6:12:91:aa:6a:5f:86:c8:ab:f0:cb:34:1d:
|
||||
8f:f5:5e:78:ec:85:b0:d9:6b:1e:2a:c4:70:f5:57:
|
||||
cd:f0:fb:bc:22:1a:d9:b1:7b:92:a4:83:b0:b3:f7:
|
||||
96:29:a3:49:81:5c:37:03:85:45:60:70:0e:e3:71:
|
||||
58:c2:02:5a:19:a1:96:9d:78:69:46:b0:fa:b0:34:
|
||||
29:8a:56:12:81:7b:00:1e:75:38:e6:09:02:b3:46:
|
||||
1d:44:5e:c3:44:b5:a7:83:e4:42:c1:75:8f:ec:ee:
|
||||
0e:62:95:0b:c6:72:3c:20:b3:ff:41:d0:7f:04:e6:
|
||||
53:1e:d1:47:09:b0:cd:e8:fe:81:f8:9d:4c:e5:bc:
|
||||
68:32:45:ed:b4:74:c0:28:fa:60:2d:86:79:6a:eb:
|
||||
30:86:07:42:04:b1:0e:a5:3b:fd:74:42:0c:50:99:
|
||||
4a:e0:29:05:4f:5c:d5:c5:42:e0:98:7a:9e:e3:49:
|
||||
47:1d:26:6e:98:70:3e:ac:52:fd:04:e3:24:13:43:
|
||||
ec:a7:92:74:d2:58:8b:89:46:f0:33:ff:a3:f0:67:
|
||||
8e:b0:d5:45:0d:43:0c:40:09:86:c6:5d:cc:ad:45:
|
||||
9e:18:a1:83:12:4c:f8:38:4c:99:cf:90:8b:e1:f1:
|
||||
39:09:fc:0a:47:8c:71:a5:9b:7b:a1:53:8d:63:44:
|
||||
0c:2b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
95:F1:35:CE:66:8F:B1:48:2E:54:66:83:5C:FB:E8:3A:0F:F2:78:60
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:amine
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
05:c8:92:b4:40:e7:19:42:6f:43:71:86:59:be:43:9a:6d:45:
|
||||
de:2e:e1:c6:3f:49:3b:62:b2:0d:c8:fc:6c:2c:8a:eb:d3:af:
|
||||
51:46:41:64:ef:39:cd:d3:8f:79:2d:1d:d5:06:1d:81:dc:0c:
|
||||
45:52:67:c0:68:03:15:75:eb:4a:6c:f8:83:97:86:00:8e:b4:
|
||||
a9:ee:d7:45:32:41:23:29:da:d0:57:f7:15:52:98:5f:12:90:
|
||||
2e:ea:ee:3c:34:70:f5:a0:be:02:fb:25:65:34:08:96:1b:84:
|
||||
cb:3f:3c:2e:8b:7b:13:e0:d0:46:f7:0f:a0:16:bc:8d:62:03:
|
||||
8d:3c
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBJzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MDkxNzIyMTU0
|
||||
MloXDTM3MDkxNzIyMTU0MlowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWFtaW5lMRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAM7GEpGqal+GyKvwyzQdj/VeeOyFsNlr
|
||||
HirEcPVXzfD7vCIa2bF7kqSDsLP3limjSYFcNwOFRWBwDuNxWMICWhmhlp14aUaw
|
||||
+rA0KYpWEoF7AB51OOYJArNGHURew0S1p4PkQsF1j+zuDmKVC8ZyPCCz/0HQfwTm
|
||||
Ux7RRwmwzej+gfidTOW8aDJF7bR0wCj6YC2GeWrrMIYHQgSxDqU7/XRCDFCZSuAp
|
||||
BU9c1cVC4Jh6nuNJRx0mbphwPqxS/QTjJBND7KeSdNJYi4lG8DP/o/BnjrDVRQ1D
|
||||
DEAJhsZdzK1FnhihgxJM+DhMmc+Qi+HxOQn8CkeMcaWbe6FTjWNEDCsCAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlfE1zmaPsUguVGaDXPvoOg/yeGAw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVhbWluZTANBgkqhkiG9w0BAQsFAAOBgQAFyJK0QOcZQm9DcYZZvkOabUXe
|
||||
LuHGP0k7YrINyPxsLIrr069RRkFk7znN0495LR3VBh2B3AxFUmfAaAMVdetKbPiD
|
||||
l4YAjrSp7tdFMkEjKdrQV/cVUphfEpAu6u48NHD1oL4C+yVlNAiWG4TLPzwui3sT
|
||||
4NBG9w+gFryNYgONPA==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/28.pem
Normal file
87
OPP/openvpn/keys/28.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 40 (0x28)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Nov 14 02:38:46 2017 GMT
|
||||
Not After : Nov 14 02:38:46 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-laptop-opp1/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c5:6d:a2:af:0d:9b:bc:eb:77:08:d3:c1:da:79:
|
||||
ce:9a:d0:27:74:d2:5e:ce:68:52:35:ea:72:63:a6:
|
||||
ba:a8:d5:47:41:95:10:d5:56:fc:07:c2:24:4e:28:
|
||||
06:04:f5:74:43:05:52:86:36:86:f9:8f:79:c5:73:
|
||||
0e:a8:c2:e7:5b:7e:08:79:02:a2:a8:21:59:6e:f5:
|
||||
19:c6:59:6c:96:66:dc:24:c3:1c:18:e0:09:e4:6e:
|
||||
2c:33:33:c4:37:ad:bf:06:93:93:ac:df:98:8a:93:
|
||||
11:8c:6b:c9:d8:39:dd:66:01:d8:80:ed:ab:42:1e:
|
||||
82:78:2e:e0:a2:98:3d:b3:39:b8:47:1a:81:4b:a4:
|
||||
e9:c3:2f:b2:10:7a:ab:ba:65:73:8e:0a:23:54:9d:
|
||||
3e:4b:4f:09:95:f7:6f:c8:33:3a:ae:63:87:1f:ba:
|
||||
67:f6:03:02:62:c5:22:9b:b6:97:36:eb:11:f7:13:
|
||||
62:f3:1c:79:b1:22:b1:b8:f2:f9:ed:57:0c:54:50:
|
||||
69:49:ce:a6:e3:4d:f2:39:41:4e:8a:1c:32:aa:87:
|
||||
9e:b0:de:93:37:87:34:b6:1e:ca:94:d2:48:0a:50:
|
||||
31:c5:c0:41:78:7b:2e:c1:8b:75:95:44:10:06:91:
|
||||
20:39:54:a9:50:36:b4:95:2f:69:7b:21:cc:13:a3:
|
||||
38:2d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
82:A2:3A:69:48:F0:DE:60:58:8C:C6:75:BD:C1:54:4F:99:A3:3C:50
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:laptop-opp1
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
13:a4:d5:2c:2c:59:3f:9f:ef:ac:36:d4:21:a5:5a:d9:f3:be:
|
||||
13:09:f5:53:9f:e9:2d:e2:25:9c:72:f0:a6:bb:8a:12:6d:9d:
|
||||
f8:1c:64:8d:b9:db:58:c1:6b:49:ba:06:eb:45:69:31:8d:22:
|
||||
29:55:4a:cb:2c:4f:0d:c6:c7:af:e4:9a:c1:47:34:2e:87:6f:
|
||||
1b:0d:88:09:3e:db:e0:82:96:8d:cd:b8:66:06:a7:ed:a0:2f:
|
||||
e5:d6:f0:ab:e7:db:8e:0b:5b:81:e4:16:2d:83:08:0a:c5:33:
|
||||
4e:27:96:ca:60:88:3b:4c:80:eb:af:45:d5:59:a2:f0:31:cf:
|
||||
30:52
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTExNDAyMzg0
|
||||
NloXDTM3MTExNDAyMzg0NlowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAxMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMVtoq8Nm7zrdwjTwdp5zprQ
|
||||
J3TSXs5oUjXqcmOmuqjVR0GVENVW/AfCJE4oBgT1dEMFUoY2hvmPecVzDqjC51t+
|
||||
CHkCoqghWW71GcZZbJZm3CTDHBjgCeRuLDMzxDetvwaTk6zfmIqTEYxrydg53WYB
|
||||
2IDtq0Iegngu4KKYPbM5uEcagUuk6cMvshB6q7plc44KI1SdPktPCZX3b8gzOq5j
|
||||
hx+6Z/YDAmLFIpu2lzbrEfcTYvMcebEisbjy+e1XDFRQaUnOpuNN8jlBToocMqqH
|
||||
nrDekzeHNLYeypTSSApQMcXAQXh7LsGLdZVEEAaRIDlUqVA2tJUvaXshzBOjOC0C
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUgqI6aUjw3mBYjMZ1vcFU
|
||||
T5mjPFAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMTANBgkqhkiG9w0BAQsFAAOBgQATpNUsLFk/
|
||||
n++sNtQhpVrZ874TCfVTn+kt4iWccvCmu4oSbZ34HGSNudtYwWtJugbrRWkxjSIp
|
||||
VUrLLE8Nxsev5JrBRzQuh28bDYgJPtvggpaNzbhmBqftoC/l1vCr59uOC1uB5BYt
|
||||
gwgKxTNOJ5bKYIg7TIDrr0XVWaLwMc8wUg==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/29.pem
Normal file
87
OPP/openvpn/keys/29.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 41 (0x29)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 11 18:30:48 2017 GMT
|
||||
Not After : Dec 11 18:30:48 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-laptop-opp3/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e6:3e:4f:7d:ed:eb:e3:06:a0:2d:99:55:5b:9c:
|
||||
18:ca:7d:07:3d:76:ff:94:ec:1b:5a:21:d4:be:3b:
|
||||
2b:50:8b:72:48:55:33:7a:54:29:6b:d8:bb:11:cf:
|
||||
9a:7f:9c:20:69:fd:6e:7a:21:ac:19:46:db:2e:18:
|
||||
36:6d:4f:91:3b:e4:a5:6a:33:23:c6:06:62:c5:d5:
|
||||
28:c3:c4:28:3e:38:16:e6:03:64:95:18:13:19:95:
|
||||
e1:ca:da:41:a6:1c:99:56:16:eb:f2:70:c0:67:dc:
|
||||
0c:dd:d8:bc:6f:61:07:7d:02:76:c3:2c:f4:80:4c:
|
||||
42:e8:55:97:a0:a0:ea:78:1e:71:8a:bb:7b:bf:b5:
|
||||
2d:55:a6:a1:34:0d:3a:0e:d4:02:32:93:2b:3c:b3:
|
||||
b4:81:1f:63:39:c8:e6:2a:e9:ac:4f:93:bd:2a:6d:
|
||||
bf:b3:77:9b:d8:7a:27:0d:b2:44:d9:e4:b9:0f:cc:
|
||||
b0:27:5b:fb:32:a2:79:77:55:d8:b6:d0:63:c7:98:
|
||||
c5:44:47:4f:4d:67:22:e2:40:98:e0:0a:0f:bc:95:
|
||||
46:d7:4b:37:0b:e9:a7:11:a8:fd:07:f8:18:6d:59:
|
||||
8d:54:11:fc:9e:23:62:14:64:62:cf:0d:49:5d:41:
|
||||
95:c4:d3:ec:d4:03:e6:2e:69:15:6b:3f:36:15:66:
|
||||
58:c1
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
E7:EA:35:7F:B7:31:07:50:5B:54:2A:7C:35:F7:D7:40:CA:9F:B0:DA
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:laptop-opp3
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
46:4c:22:41:b0:fe:36:db:c2:e6:97:fc:50:ff:74:26:42:0e:
|
||||
1f:0f:dc:76:8c:ea:3c:24:b9:b2:d3:8f:e2:5a:19:57:bb:15:
|
||||
c8:4e:e9:fa:06:b8:61:1d:65:e9:46:2a:c6:cf:55:c5:1a:81:
|
||||
7a:cb:0f:2e:5d:6a:bc:55:7a:a8:df:7a:16:62:6a:75:9d:de:
|
||||
19:75:0d:58:2a:3d:92:c1:bc:79:52:b8:df:19:24:ac:63:fd:
|
||||
b0:ce:8c:65:12:c5:03:c9:62:e7:14:85:ec:3a:20:6b:93:25:
|
||||
ca:37:7b:5d:3a:7d:b2:f2:14:cf:e6:cc:de:5e:aa:d5:29:a2:
|
||||
fc:07
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTE4MzA0
|
||||
OFoXDTM3MTIxMTE4MzA0OFowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAzMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOY+T33t6+MGoC2ZVVucGMp9
|
||||
Bz12/5TsG1oh1L47K1CLckhVM3pUKWvYuxHPmn+cIGn9bnohrBlG2y4YNm1PkTvk
|
||||
pWozI8YGYsXVKMPEKD44FuYDZJUYExmV4craQaYcmVYW6/JwwGfcDN3YvG9hB30C
|
||||
dsMs9IBMQuhVl6Cg6ngecYq7e7+1LVWmoTQNOg7UAjKTKzyztIEfYznI5irprE+T
|
||||
vSptv7N3m9h6Jw2yRNnkuQ/MsCdb+zKieXdV2LbQY8eYxURHT01nIuJAmOAKD7yV
|
||||
RtdLNwvppxGo/Qf4GG1ZjVQR/J4jYhRkYs8NSV1BlcTT7NQD5i5pFWs/NhVmWMEC
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU5+o1f7cxB1BbVCp8NffX
|
||||
QMqfsNowgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMzANBgkqhkiG9w0BAQsFAAOBgQBGTCJBsP42
|
||||
28Lml/xQ/3QmQg4fD9x2jOo8JLmy04/iWhlXuxXITun6BrhhHWXpRirGz1XFGoF6
|
||||
yw8uXWq8VXqo33oWYmp1nd4ZdQ1YKj2Swbx5UrjfGSSsY/2wzoxlEsUDyWLnFIXs
|
||||
OiBrkyXKN3tdOn2y8hTP5szeXqrVKaL8Bw==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/2A.pem
Normal file
87
OPP/openvpn/keys/2A.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 42 (0x2a)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Dec 11 23:42:21 2017 GMT
|
||||
Not After : Dec 11 23:42:21 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-laptop-opp2/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:be:e2:3c:f6:9e:27:34:e6:b0:ad:39:90:d5:9d:
|
||||
d7:14:bb:30:5f:ff:97:90:f4:6d:a2:00:6e:6a:18:
|
||||
6e:da:09:e8:02:33:00:b3:1f:a1:e2:e2:82:de:5c:
|
||||
96:49:ac:48:d6:c4:44:ed:97:76:6b:8d:d7:ed:39:
|
||||
42:d7:da:5d:46:68:4a:a5:7f:d7:c3:df:a1:ef:8d:
|
||||
18:8f:2d:94:c4:b8:21:ec:03:e5:60:86:58:b9:26:
|
||||
f1:a9:27:d8:08:a0:c5:46:1c:f7:69:61:44:ba:59:
|
||||
1d:6b:b5:93:93:52:8c:77:3e:33:38:22:f1:02:20:
|
||||
22:96:fb:fe:08:db:80:5a:0a:9c:84:79:74:9c:ba:
|
||||
58:ba:13:91:ef:a9:0d:20:7b:24:ce:f7:65:78:87:
|
||||
ba:2c:13:db:f3:2a:43:b0:a5:6f:b7:ba:2b:be:32:
|
||||
a0:ce:6b:05:93:dd:82:f2:db:3e:44:51:69:a0:07:
|
||||
83:dc:75:e5:49:e6:b9:c7:50:d3:d3:72:de:12:7a:
|
||||
30:02:73:6a:8f:ad:3a:91:10:aa:2b:6b:19:fc:e2:
|
||||
9b:9c:85:14:8c:4d:2c:02:35:61:59:d4:48:74:c6:
|
||||
71:01:80:96:80:49:6f:2e:e8:d2:b4:d3:4c:86:6e:
|
||||
41:81:06:05:2a:33:7f:61:78:53:c6:d1:27:fd:ef:
|
||||
9f:df
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
9A:0A:4A:D8:6A:29:DC:4E:AB:96:B5:37:F0:D6:4B:52:76:91:85:70
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:laptop-opp2
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
6e:38:fe:df:26:b4:ca:9e:d9:7c:50:1b:8c:4f:a8:1a:ac:a4:
|
||||
fd:e5:93:bc:66:f5:cd:12:1c:31:84:4e:8f:77:b3:dc:2d:a1:
|
||||
e5:45:5f:d1:e9:fd:4c:42:60:e3:9b:a3:da:90:eb:30:a3:c6:
|
||||
97:29:7d:04:34:cf:81:bf:d7:0f:54:e3:38:fe:21:e9:b0:ca:
|
||||
37:ad:51:ac:26:31:71:19:09:a3:3d:8a:b3:04:a9:e1:a7:bb:
|
||||
1c:9d:97:be:e5:f7:63:df:53:a9:07:84:23:e1:0c:87:f0:59:
|
||||
58:bd:9e:1a:b5:4e:c0:6a:8d:a9:49:a5:29:ae:37:6e:4c:69:
|
||||
20:d9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIElTCCA/6gAwIBAgIBKjANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTIzNDIy
|
||||
MVoXDTM3MTIxMTIzNDIyMVowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAyMRAw
|
||||
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
|
||||
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL7iPPaeJzTmsK05kNWd1xS7
|
||||
MF//l5D0baIAbmoYbtoJ6AIzALMfoeLigt5clkmsSNbERO2XdmuN1+05QtfaXUZo
|
||||
SqV/18Pfoe+NGI8tlMS4IewD5WCGWLkm8akn2AigxUYc92lhRLpZHWu1k5NSjHc+
|
||||
Mzgi8QIgIpb7/gjbgFoKnIR5dJy6WLoTke+pDSB7JM73ZXiHuiwT2/MqQ7Clb7e6
|
||||
K74yoM5rBZPdgvLbPkRRaaAHg9x15UnmucdQ09Ny3hJ6MAJzao+tOpEQqitrGfzi
|
||||
m5yFFIxNLAI1YVnUSHTGcQGAloBJby7o0rTTTIZuQYEGBSozf2F4U8bRJ/3vn98C
|
||||
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
|
||||
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUmgpK2Gop3E6rlrU38NZL
|
||||
UnaRhXAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
|
||||
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
|
||||
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
|
||||
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
|
||||
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
|
||||
BgNVHREEDzANggtsYXB0b3Atb3BwMjANBgkqhkiG9w0BAQsFAAOBgQBuOP7fJrTK
|
||||
ntl8UBuMT6garKT95ZO8ZvXNEhwxhE6Pd7PcLaHlRV/R6f1MQmDjm6PakOswo8aX
|
||||
KX0ENM+Bv9cPVOM4/iHpsMo3rVGsJjFxGQmjPYqzBKnhp7scnZe+5fdj31OpB4Qj
|
||||
4QyH8FlYvZ4atU7Aao2pSaUprjduTGkg2Q==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/2B.pem
Normal file
87
OPP/openvpn/keys/2B.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 43 (0x2b)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Jan 15 14:41:55 2018 GMT
|
||||
Not After : Jan 15 14:41:55 2038 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-oezge/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b9:84:be:14:58:0d:4b:c1:ca:35:27:82:bf:0d:
|
||||
9f:f5:5c:8a:85:08:f9:c1:55:0b:d8:a1:0c:11:ce:
|
||||
30:20:dd:35:01:98:8b:98:d9:91:29:8c:6e:81:7f:
|
||||
28:94:60:e5:47:99:37:3d:19:8f:14:d9:7e:e9:d8:
|
||||
bf:16:4f:8d:d1:ae:3d:46:ce:b5:cb:36:b7:bc:70:
|
||||
b2:2d:48:b2:e7:24:76:7b:7f:6b:4f:7d:ba:11:b1:
|
||||
df:84:b8:c9:63:88:3d:8f:ec:b7:0e:f3:b3:e7:d5:
|
||||
65:f9:e6:b0:81:fa:23:fb:96:5e:f2:f9:92:f7:73:
|
||||
69:b0:2a:76:ca:7d:8f:be:10:62:b0:c2:d6:7f:c0:
|
||||
a5:d6:a4:0f:7c:47:9c:be:17:ec:50:fa:56:00:2c:
|
||||
0b:e6:31:d2:01:c6:69:9f:1a:77:cb:05:4e:7f:7e:
|
||||
2e:bc:88:76:e9:8f:c8:43:1a:9b:34:a7:df:d4:9e:
|
||||
52:4e:f8:77:10:b5:e5:1d:d9:f1:8d:3d:d5:4e:71:
|
||||
0a:4a:e3:c1:a4:2d:0d:50:5f:6d:a9:cb:60:f8:47:
|
||||
66:90:b8:a0:6e:8d:8e:eb:3f:88:eb:d2:f9:06:6d:
|
||||
05:ae:a0:fa:7b:04:ef:51:b1:3a:1e:5e:5f:3f:be:
|
||||
4d:e9:1c:c6:aa:6b:e4:05:63:2d:8c:ad:27:9f:ae:
|
||||
43:6d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
02:2E:C2:B5:17:63:A3:17:ED:D7:F0:71:67:BB:A4:B8:7A:25:C7:28
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:oezge
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
aa:6e:1a:e7:e4:7f:06:58:66:e7:eb:e5:7b:18:b2:b5:4e:2d:
|
||||
08:4c:c9:aa:53:bc:5a:3b:b9:5b:4e:ab:b1:15:4c:cc:43:fb:
|
||||
82:b4:81:db:22:41:fb:7d:80:f9:64:68:87:e0:f4:d2:8e:b1:
|
||||
a6:2d:c4:21:1c:58:ab:45:c8:5e:ff:e1:00:5c:95:6b:6d:50:
|
||||
86:74:98:db:c3:2a:48:f7:81:f4:fa:eb:f9:b6:28:ec:0b:e6:
|
||||
d6:4a:6c:df:74:b6:1c:59:80:2d:55:32:f4:6d:b6:a4:09:85:
|
||||
aa:fd:da:9e:e0:5b:01:ea:12:51:6d:e4:47:06:a7:0d:29:54:
|
||||
89:0c
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBKzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDExNTE0NDE1
|
||||
NVoXDTM4MDExNTE0NDE1NVowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLW9lemdlMRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBALmEvhRYDUvByjUngr8Nn/VcioUI+cFV
|
||||
C9ihDBHOMCDdNQGYi5jZkSmMboF/KJRg5UeZNz0ZjxTZfunYvxZPjdGuPUbOtcs2
|
||||
t7xwsi1Isuckdnt/a099uhGx34S4yWOIPY/stw7zs+fVZfnmsIH6I/uWXvL5kvdz
|
||||
abAqdsp9j74QYrDC1n/ApdakD3xHnL4X7FD6VgAsC+Yx0gHGaZ8ad8sFTn9+LryI
|
||||
dumPyEMamzSn39SeUk74dxC15R3Z8Y091U5xCkrjwaQtDVBfbanLYPhHZpC4oG6N
|
||||
jus/iOvS+QZtBa6g+nsE71GxOh5eXz++Tekcxqpr5AVjLYytJ5+uQ20CAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAi7CtRdjoxft1/BxZ7ukuHolxygw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVvZXpnZTANBgkqhkiG9w0BAQsFAAOBgQCqbhrn5H8GWGbn6+V7GLK1Ti0I
|
||||
TMmqU7xaO7lbTquxFUzMQ/uCtIHbIkH7fYD5ZGiH4PTSjrGmLcQhHFirRche/+EA
|
||||
XJVrbVCGdJjbwypI94H0+uv5tijsC+bWSmzfdLYcWYAtVTL0bbakCYWq/dqe4FsB
|
||||
6hJRbeRHBqcNKVSJDA==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/2C.pem
Normal file
87
OPP/openvpn/keys/2C.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 44 (0x2c)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Feb 28 23:52:40 2018 GMT
|
||||
Not After : Feb 28 23:52:40 2038 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-jenny/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c3:18:ee:89:10:3b:ef:08:3b:b4:2c:35:75:76:
|
||||
ec:b3:89:79:e8:c8:cb:a3:ed:41:eb:01:fb:ce:a9:
|
||||
57:a3:20:0f:41:3a:b1:18:35:9d:f3:52:31:c7:cb:
|
||||
e1:82:c3:e6:a2:07:1a:ef:5f:23:6e:22:1b:ee:75:
|
||||
78:63:59:b7:09:e6:d7:5b:9a:7f:03:a6:9c:1d:8d:
|
||||
45:ec:ee:73:6b:b3:36:44:31:9a:56:b4:de:c4:8b:
|
||||
4c:6f:94:5a:cb:5f:2f:0c:e8:70:98:c2:7a:fe:16:
|
||||
55:bb:fb:f5:76:1d:a5:fb:db:4c:23:ab:2b:7c:bc:
|
||||
a8:d9:b7:7a:e2:77:f7:34:f5:df:a8:ff:eb:c8:6e:
|
||||
f0:61:29:db:d2:a0:df:f2:0d:f8:ce:7f:72:79:6c:
|
||||
5a:c9:cf:9c:3c:bb:e8:40:53:b2:12:cf:5c:7f:d7:
|
||||
80:84:3d:b2:ca:6e:4b:12:0f:dd:cd:f1:8c:ac:00:
|
||||
7a:79:12:df:26:4d:21:00:76:e7:6f:9f:3a:c7:00:
|
||||
a1:2f:1a:77:ea:68:18:ac:82:fb:c5:22:30:cc:98:
|
||||
02:23:89:bf:f9:33:c0:f4:a8:7d:5d:e7:73:10:5d:
|
||||
78:ad:99:01:79:f7:58:d3:67:77:1b:33:38:56:4d:
|
||||
79:a3:c3:e4:0e:13:f9:9a:83:b2:0b:ed:96:a9:98:
|
||||
f2:d3
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
47:18:9B:D0:A8:9C:13:47:74:8E:41:24:28:3C:22:91:5E:71:A6:75
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:jenny
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
6c:ad:ca:2d:1d:19:8e:4c:ca:c6:09:3d:c5:43:67:7e:b4:42:
|
||||
76:a0:0a:23:3e:49:c1:a6:6c:03:a2:96:d9:fd:cc:a7:70:2a:
|
||||
c7:09:6f:36:59:e1:f5:51:aa:11:1e:35:f3:b4:8d:20:f0:70:
|
||||
ab:02:3b:3e:8a:96:21:c0:57:2b:97:20:16:15:63:18:ac:d6:
|
||||
a7:19:6c:cc:7c:ff:6f:b8:2f:b8:cc:0a:e8:8e:aa:39:a2:a4:
|
||||
3c:f2:85:fd:8c:36:69:39:27:1f:3f:a2:14:79:77:4d:c6:02:
|
||||
38:7f:91:73:9d:e0:fd:c1:69:c5:b1:24:bf:3d:cb:96:3e:93:
|
||||
f2:5d
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBLDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDIyODIzNTI0
|
||||
MFoXDTM4MDIyODIzNTI0MFowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWplbm55MRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMMY7okQO+8IO7QsNXV27LOJeejIy6Pt
|
||||
QesB+86pV6MgD0E6sRg1nfNSMcfL4YLD5qIHGu9fI24iG+51eGNZtwnm11uafwOm
|
||||
nB2NRezuc2uzNkQxmla03sSLTG+UWstfLwzocJjCev4WVbv79XYdpfvbTCOrK3y8
|
||||
qNm3euJ39zT136j/68hu8GEp29Kg3/IN+M5/cnlsWsnPnDy76EBTshLPXH/XgIQ9
|
||||
sspuSxIP3c3xjKwAenkS3yZNIQB252+fOscAoS8ad+poGKyC+8UiMMyYAiOJv/kz
|
||||
wPSofV3ncxBdeK2ZAXn3WNNndxszOFZNeaPD5A4T+ZqDsgvtlqmY8tMCAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQURxib0KicE0d0jkEkKDwikV5xpnUw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVqZW5ueTANBgkqhkiG9w0BAQsFAAOBgQBsrcotHRmOTMrGCT3FQ2d+tEJ2
|
||||
oAojPknBpmwDopbZ/cyncCrHCW82WeH1UaoRHjXztI0g8HCrAjs+ipYhwFcrlyAW
|
||||
FWMYrNanGWzMfP9vuC+4zArojqo5oqQ88oX9jDZpOScfP6IUeXdNxgI4f5FzneD9
|
||||
wWnFsSS/PcuWPpPyXQ==
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/2D.pem
Normal file
87
OPP/openvpn/keys/2D.pem
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 45 (0x2d)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Mar 28 11:16:20 2018 GMT
|
||||
Not After : Mar 28 11:16:20 2038 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-tine/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e7:4a:26:94:7f:c4:18:df:f0:b0:c3:d7:48:b7:
|
||||
0a:9e:37:06:3e:47:d8:0d:6d:1b:54:9c:fb:80:40:
|
||||
88:08:1c:5b:5c:f5:51:6d:db:68:c4:a4:e3:bf:c6:
|
||||
a0:c2:d7:63:40:05:a7:cf:f4:10:77:09:31:92:41:
|
||||
5e:75:07:d9:4e:6c:a8:a2:c7:9f:4b:d0:47:09:88:
|
||||
10:f1:08:b6:11:cb:27:f3:6b:6c:bf:e5:2a:b0:61:
|
||||
bd:24:04:e8:38:0c:41:43:7a:51:87:99:a2:30:fe:
|
||||
d6:dd:95:ed:9f:f7:33:91:92:c5:92:d4:1c:68:48:
|
||||
3f:9e:c8:35:9f:2a:ee:b9:e2:4a:55:37:c3:2b:3e:
|
||||
04:78:2d:cd:7c:40:05:00:2e:29:92:85:8c:25:60:
|
||||
01:09:7c:52:7d:28:a7:3e:22:2d:c6:b4:15:69:14:
|
||||
cf:14:1c:ff:81:97:3b:f9:27:b6:c6:6a:7c:29:86:
|
||||
66:d2:86:6c:d7:41:68:e0:68:a3:d7:41:ec:25:72:
|
||||
85:8b:5f:b1:38:da:39:a4:35:93:58:f4:6e:a4:b2:
|
||||
f0:91:65:6a:01:ef:d4:fb:5f:7c:01:3f:42:6c:c9:
|
||||
17:13:24:55:2a:1d:c8:bc:43:29:60:89:c0:7e:c8:
|
||||
9b:85:1d:7e:8b:a4:43:fb:a4:14:0a:61:fa:75:a9:
|
||||
72:ef
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
98:C5:01:FE:AE:8E:99:A0:2E:62:EB:0E:8B:37:7B:5A:C5:13:AB:F8
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:tine
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
89:b4:4a:48:51:93:7b:94:72:49:80:d9:da:3b:39:0d:f4:7c:
|
||||
bd:22:da:8a:d4:f7:9b:a7:3e:fd:c0:0c:5f:0d:e0:6e:c1:56:
|
||||
91:2e:ec:58:39:db:20:84:d3:8e:d1:8a:6c:23:81:aa:fc:c5:
|
||||
49:60:23:5c:de:d1:3d:2b:58:59:9d:95:82:76:e3:10:56:18:
|
||||
b2:ac:11:9d:46:76:a1:00:24:6a:a6:f8:11:63:8a:df:cf:10:
|
||||
cd:c1:da:94:91:23:7b:9f:6c:a8:be:74:1d:bb:a2:be:30:ac:
|
||||
be:8a:16:c4:38:1f:f3:a0:35:69:da:01:4a:48:dc:59:20:d8:
|
||||
4c:82
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEhzCCA/CgAwIBAgIBLTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDMyODExMTYy
|
||||
MFoXDTM4MDMyODExMTYyMFowgaMxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRUwEwYDVQQDEwxPUFAtVnBuLXRpbmUxEDAOBgNVBCkT
|
||||
B09QUC1WcG4xHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIIBIjANBgkq
|
||||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA50omlH/EGN/wsMPXSLcKnjcGPkfYDW0b
|
||||
VJz7gECICBxbXPVRbdtoxKTjv8agwtdjQAWnz/QQdwkxkkFedQfZTmyoosefS9BH
|
||||
CYgQ8Qi2Ecsn82tsv+UqsGG9JAToOAxBQ3pRh5miMP7W3ZXtn/czkZLFktQcaEg/
|
||||
nsg1nyruueJKVTfDKz4EeC3NfEAFAC4pkoWMJWABCXxSfSinPiItxrQVaRTPFBz/
|
||||
gZc7+Se2xmp8KYZm0oZs10Fo4Gij10HsJXKFi1+xONo5pDWTWPRupLLwkWVqAe/U
|
||||
+198AT9CbMkXEyRVKh3IvEMpYInAfsibhR1+i6RD+6QUCmH6daly7wIDAQABo4IB
|
||||
VzCCAVMwCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJh
|
||||
dGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSYxQH+ro6ZoC5i6w6LN3taxROr+DCB
|
||||
xAYDVR0jBIG8MIG5gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkG
|
||||
A1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYD
|
||||
VQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMT
|
||||
Ck9QUC1WcG4tY2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QU
|
||||
i1Wj34gwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA8GA1UdEQQI
|
||||
MAaCBHRpbmUwDQYJKoZIhvcNAQELBQADgYEAibRKSFGTe5RySYDZ2js5DfR8vSLa
|
||||
itT3m6c+/cAMXw3gbsFWkS7sWDnbIITTjtGKbCOBqvzFSWAjXN7RPStYWZ2Vgnbj
|
||||
EFYYsqwRnUZ2oQAkaqb4EWOK388QzcHalJEje59sqL50HbuivjCsvooWxDgf86A1
|
||||
adoBSkjcWSDYTII=
|
||||
-----END CERTIFICATE-----
|
87
OPP/openvpn/keys/amine.crt
Normal file
87
OPP/openvpn/keys/amine.crt
Normal file
@ -0,0 +1,87 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 39 (0x27)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: Sep 17 22:15:42 2017 GMT
|
||||
Not After : Sep 17 22:15:42 2037 GMT
|
||||
Subject: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-amine/name=OPP-Vpn/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ce:c6:12:91:aa:6a:5f:86:c8:ab:f0:cb:34:1d:
|
||||
8f:f5:5e:78:ec:85:b0:d9:6b:1e:2a:c4:70:f5:57:
|
||||
cd:f0:fb:bc:22:1a:d9:b1:7b:92:a4:83:b0:b3:f7:
|
||||
96:29:a3:49:81:5c:37:03:85:45:60:70:0e:e3:71:
|
||||
58:c2:02:5a:19:a1:96:9d:78:69:46:b0:fa:b0:34:
|
||||
29:8a:56:12:81:7b:00:1e:75:38:e6:09:02:b3:46:
|
||||
1d:44:5e:c3:44:b5:a7:83:e4:42:c1:75:8f:ec:ee:
|
||||
0e:62:95:0b:c6:72:3c:20:b3:ff:41:d0:7f:04:e6:
|
||||
53:1e:d1:47:09:b0:cd:e8:fe:81:f8:9d:4c:e5:bc:
|
||||
68:32:45:ed:b4:74:c0:28:fa:60:2d:86:79:6a:eb:
|
||||
30:86:07:42:04:b1:0e:a5:3b:fd:74:42:0c:50:99:
|
||||
4a:e0:29:05:4f:5c:d5:c5:42:e0:98:7a:9e:e3:49:
|
||||
47:1d:26:6e:98:70:3e:ac:52:fd:04:e3:24:13:43:
|
||||
ec:a7:92:74:d2:58:8b:89:46:f0:33:ff:a3:f0:67:
|
||||
8e:b0:d5:45:0d:43:0c:40:09:86:c6:5d:cc:ad:45:
|
||||
9e:18:a1:83:12:4c:f8:38:4c:99:cf:90:8b:e1:f1:
|
||||
39:09:fc:0a:47:8c:71:a5:9b:7b:a1:53:8d:63:44:
|
||||
0c:2b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
Easy-RSA Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
95:F1:35:CE:66:8F:B1:48:2E:54:66:83:5C:FB:E8:3A:0F:F2:78:60
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:amine
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
05:c8:92:b4:40:e7:19:42:6f:43:71:86:59:be:43:9a:6d:45:
|
||||
de:2e:e1:c6:3f:49:3b:62:b2:0d:c8:fc:6c:2c:8a:eb:d3:af:
|
||||
51:46:41:64:ef:39:cd:d3:8f:79:2d:1d:d5:06:1d:81:dc:0c:
|
||||
45:52:67:c0:68:03:15:75:eb:4a:6c:f8:83:97:86:00:8e:b4:
|
||||
a9:ee:d7:45:32:41:23:29:da:d0:57:f7:15:52:98:5f:12:90:
|
||||
2e:ea:ee:3c:34:70:f5:a0:be:02:fb:25:65:34:08:96:1b:84:
|
||||
cb:3f:3c:2e:8b:7b:13:e0:d0:46:f7:0f:a0:16:bc:8d:62:03:
|
||||
8d:3c
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEiTCCA/KgAwIBAgIBJzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MDkxNzIyMTU0
|
||||
MloXDTM3MDkxNzIyMTU0MlowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWFtaW5lMRAwDgYDVQQp
|
||||
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
|
||||
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAM7GEpGqal+GyKvwyzQdj/VeeOyFsNlr
|
||||
HirEcPVXzfD7vCIa2bF7kqSDsLP3limjSYFcNwOFRWBwDuNxWMICWhmhlp14aUaw
|
||||
+rA0KYpWEoF7AB51OOYJArNGHURew0S1p4PkQsF1j+zuDmKVC8ZyPCCz/0HQfwTm
|
||||
Ux7RRwmwzej+gfidTOW8aDJF7bR0wCj6YC2GeWrrMIYHQgSxDqU7/XRCDFCZSuAp
|
||||
BU9c1cVC4Jh6nuNJRx0mbphwPqxS/QTjJBND7KeSdNJYi4lG8DP/o/BnjrDVRQ1D
|
||||
DEAJhsZdzK1FnhihgxJM+DhMmc+Qi+HxOQn8CkeMcaWbe6FTjWNEDCsCAwEAAaOC
|
||||
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
|
||||
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlfE1zmaPsUguVGaDXPvoOg/yeGAw
|
||||
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
|
||||
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
|
||||
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
|
||||
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
|
||||
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
|
||||
CTAHggVhbWluZTANBgkqhkiG9w0BAQsFAAOBgQAFyJK0QOcZQm9DcYZZvkOabUXe
|
||||
LuHGP0k7YrINyPxsLIrr069RRkFk7znN0495LR3VBh2B3AxFUmfAaAMVdetKbPiD
|
||||
l4YAjrSp7tdFMkEjKdrQV/cVUphfEpAu6u48NHD1oL4C+yVlNAiWG4TLPzwui3sT
|
||||
4NBG9w+gFryNYgONPA==
|
||||
-----END CERTIFICATE-----
|
18
OPP/openvpn/keys/amine.csr
Normal file
18
OPP/openvpn/keys/amine.csr
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIC6jCCAdICAQAwgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3Jr
|
||||
IHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWFtaW5lMRAwDgYDVQQpEwdPUFAt
|
||||
VnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJKoZIhvcN
|
||||
AQEBBQADggEPADCCAQoCggEBAM7GEpGqal+GyKvwyzQdj/VeeOyFsNlrHirEcPVX
|
||||
zfD7vCIa2bF7kqSDsLP3limjSYFcNwOFRWBwDuNxWMICWhmhlp14aUaw+rA0KYpW
|
||||
EoF7AB51OOYJArNGHURew0S1p4PkQsF1j+zuDmKVC8ZyPCCz/0HQfwTmUx7RRwmw
|
||||
zej+gfidTOW8aDJF7bR0wCj6YC2GeWrrMIYHQgSxDqU7/XRCDFCZSuApBU9c1cVC
|
||||
4Jh6nuNJRx0mbphwPqxS/QTjJBND7KeSdNJYi4lG8DP/o/BnjrDVRQ1DDEAJhsZd
|
||||
zK1FnhihgxJM+DhMmc+Qi+HxOQn8CkeMcaWbe6FTjWNEDCsCAwEAAaAAMA0GCSqG
|
||||
SIb3DQEBCwUAA4IBAQAxLIlusK5tXwlC8i+iQq1eMg3cfk9pFYCh6/zAeqUjw8nN
|
||||
hEqMnPKo8DRMChUTgbfd8XAr+JpW9zw+RhRODdn5/jaMrC5H4t2bxQPK/UHpibc1
|
||||
W5EwF8eM7Uj4TG6to42klUluUp7dfuBfDKyugQAUZx7AXd5XuoxvKvNPnKT9QGHx
|
||||
w+ZUlN70w4yFDkCB8wG3839kB96iw09TSY+4x0j6DAop/niSsK49opzmRyY4q3Tb
|
||||
mh7hPHF1143pKfyKKMorBPnx2Sw5MSvPssQ8VjQ9ej8KA4QSQ81G+d6QLrqMGlz4
|
||||
tS5sYq1Jl6iihu8z+kAOfyXMNHE/npnuDNOjXTcm
|
||||
-----END CERTIFICATE REQUEST-----
|
30
OPP/openvpn/keys/amine.key
Normal file
30
OPP/openvpn/keys/amine.key
Normal file
@ -0,0 +1,30 @@
|
||||
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
||||
MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQI+yQZUfgv70YCAggA
|
||||
MBQGCCqGSIb3DQMHBAj0UZKdE6W8QASCBMjfRXpKKui3cAlNaQ3atz8dZefNEtLJ
|
||||
0Xt93g7q/W3+HvGWeMXyWT9cZUhYUxZwl3z8etJ8pPFGkHID9FrKqN5Wphd5RxWa
|
||||
boBWlb6EXY/WJb0uA53h9rOZVz+i8kLtavKYqRD+qfYv5Esdl0srzwMp1kquPnpE
|
||||
pCS2UB+0doz3Fd+861jp/ZJfyos+6n4c2LxTx/sLTRTfve9er0fiPMoS+1m+55DV
|
||||
zuUFW8vk/zmgjZInWB7Wd1lI39OyvS2GTnyGcpWO9utfcZVtPJHT4ZlH23ZgdDrc
|
||||
fxKD3GmXEkAR6k0lDkxI1LBDEqrjiyZTFbTfwIAhQ+ev8ixdkPnCne72E5aQd+HW
|
||||
OxZHXoeO9M7HKBqC/FunSNZqbuVpoOES7sPu0zc1+otAXCzsgs+E9Y/EMTkn82xE
|
||||
4vcuPTOIi0URhbnmi1OwgyfXblSo82C7NBNHBqQpUMclUCqVLPpFuOWeEIvyFjTL
|
||||
msDZX6iEXLAOPkVa+yeTBzm8OHknycQFx6QBrN2LvCKOQt5nqn9pm7SvqMwyzOgK
|
||||
R9zwxQm6DZcvOi37uBYgw+YCKu+SxgvSybTQOR/ttOfWwTsJz42qhJ27h+UshW7T
|
||||
0XYXUBzRtjI0Ag4ABIxVuIw2jE4YVPu4AW3vyA1lEf3TF3eAdwlpiB5iASyr0sAW
|
||||
3h6aUgtO57wyNB5qsu/VRLJfTRXN++yXXw3rgRw1wboU8iKAb07hCFYWY/mHTpQK
|
||||
2ug3UG5nEauUhRNFJNReaglVA51qcfXfHCFv3j1zesF50vUE0gILCVD6PJy6QgJ7
|
||||
nnA11dL2JLJiiLEgOX3/66g0MLJgC+viyRgViGnuIGUVQwMneX4LmQscA0vnlKo6
|
||||
8wfAIkwh53tIwfAeVqJCLr/RtBDZYcK+ct8kk12NE7mYh7tiYz6W3K9UyGxQamoG
|
||||
SChRkXJMVGSeLsmnxvn/SIPQR+t24VRMAfhLrkYtGSbMAaFSTfmRKe1q2gtOLaD8
|
||||
fhJgIW/SfjkAxXy9DfBZDSuJ9yu0cic4sAWYOW0QNOac8TLvSnKHnd/kospUlDlM
|
||||
NM1Q/zWwGtoQ950MXzj+UW60NFa7iukiFYvzJiFjyEFWo9q+rsmCSAWmxX/R5UMG
|
||||
gLYgXP0jvqbsKQkbReywUo4J5tZWK4GHg2wJgHghB4BdEy/0VFFZ5T4FzIgfMNqc
|
||||
f/AtxG99VLM6Prdq8O3WTR0bmIDykuAp4zLeyRMeifQCY8w0p3eilsKBJs/SkD2G
|
||||
MSXc3jBxZN4RD/ss29MDyZiPn+aDISvVyozGXqmoftUmVwpH6/z3HAdNUd8mySy5
|
||||
ivHuVynbOLWrTX+gaRE8tPucP0riQ1zi/+CcJw+NH0Q72GZVsoe+Ina4fDZbtWU9
|
||||
3uZNR7xNzHxVQifLB74tPie95LfrcF2w8L4SQhD4LrA7BbOjhSDuD0tnhyyC8/5e
|
||||
ACkCl4MC17BiG0cWC3dF4bCtEfTkVU8TlapVq5XMi+rfgBotx4hS3AhsinTgN4HE
|
||||
rMmBME0xKTwK9ybBnjFu4bn+5ZAgBORUMffeEafa1Uo3gNqCwXMpbd4gbfjWEz44
|
||||
rTqVdxoUsmC6Xl5H5kZybq3CiC5hbZvSBd+t3Dpat8jyYPxqWqGS3MaPoltpgDNS
|
||||
qTk=
|
||||
-----END ENCRYPTED PRIVATE KEY-----
|
67
OPP/openvpn/keys/anne.crt
Normal file
67
OPP/openvpn/keys/anne.crt
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 4 (0x4)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:10:25 2008 GMT
|
||||
Not After : May 17 14:10:25 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-anne/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:a9:01:86:b4:76:7b:0e:42:cc:95:2c:97:8d:c8:
|
||||
5b:a2:7d:a0:8b:8e:06:97:e7:f3:48:5c:a4:90:1f:
|
||||
67:3e:ae:43:1d:c0:01:29:c9:f8:3d:b9:a4:42:d7:
|
||||
2a:18:53:64:22:3b:88:70:62:3b:7c:6f:e1:50:6e:
|
||||
86:6d:e1:31:13:f7:d3:42:20:d0:b2:83:fb:71:f3:
|
||||
72:a5:ae:b2:cd:3b:da:c2:61:eb:7f:e8:67:72:83:
|
||||
de:50:a3:ad:17:ad:e4:b8:a0:09:63:09:9d:8c:5b:
|
||||
47:a7:fb:9e:51:32:9a:95:2f:81:98:19:c1:94:46:
|
||||
f9:cd:78:99:41:fe:27:4b:fb
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
16:84:EC:50:65:D5:87:51:13:EB:A5:5E:6A:00:8E:4D:1E:80:52:C4
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
35:b0:0a:3e:43:aa:72:39:8a:03:e6:77:36:f3:84:b1:18:dc:
|
||||
b1:45:9c:f9:c6:b5:49:4c:51:ec:e2:ba:c7:39:0f:cd:f6:3f:
|
||||
ed:c6:86:a3:3c:39:82:bb:cb:27:8b:b4:c7:f8:07:a3:ee:d2:
|
||||
9a:8f:fa:34:81:de:a0:68:f0:b3:2b:6e:30:b2:96:5f:84:48:
|
||||
21:25:2e:3a:69:36:49:4d:bc:40:98:5a:56:58:98:d3:22:94:
|
||||
b6:13:33:c6:4b:3c:30:22:04:91:e4:1b:f9:f4:e1:ed:0d:d4:
|
||||
32:05:e7:ab:b9:8b:b7:15:16:97:6d:2a:2a:f4:07:dc:54:be:
|
||||
a4:26
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrDCCAxWgAwIBAgIBBDANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTAy
|
||||
NVoXDTE4MDUxNzE0MTAyNVowgYAxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEV
|
||||
MBMGA1UEAxMMT1BQLVZwbi1hbm5lMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Bl
|
||||
bi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqQGGtHZ7DkLMlSyXjchb
|
||||
on2gi44Gl+fzSFykkB9nPq5DHcABKcn4PbmkQtcqGFNkIjuIcGI7fG/hUG6GbeEx
|
||||
E/fTQiDQsoP7cfNypa6yzTvawmHrf+hncoPeUKOtF63kuKAJYwmdjFtHp/ueUTKa
|
||||
lS+BmBnBlEb5zXiZQf4nS/sCAwEAAaOCASMwggEfMAkGA1UdEwQCMAAwLAYJYIZI
|
||||
AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW
|
||||
BBQWhOxQZdWHURPrpV5qAI5NHoBSxDCBxAYDVR0jBIG8MIG5gBThTcNr9HyBexay
|
||||
zG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzANBgNVBAgTBkJlcmxp
|
||||
bjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAXBgNVBAsTEG5l
|
||||
dHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAbBgkqhkiG9w0B
|
||||
CQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDQYJKoZIhvcNAQEEBQADgYEA
|
||||
NbAKPkOqcjmKA+Z3NvOEsRjcsUWc+ca1SUxR7OK6xzkPzfY/7caGozw5grvLJ4u0
|
||||
x/gHo+7Smo/6NIHeoGjwsytuMLKWX4RIISUuOmk2SU28QJhaVliY0yKUthMzxks8
|
||||
MCIEkeQb+fTh7Q3UMgXnq7mLtxUWl20qKvQH3FS+pCY=
|
||||
-----END CERTIFICATE-----
|
12
OPP/openvpn/keys/anne.csr
Normal file
12
OPP/openvpn/keys/anne.csr
Normal file
@ -0,0 +1,12 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIB0jCCATsCAQAwgZExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3Jr
|
||||
IHNlcnZpY2VzMRUwEwYDVQQDEwxPUFAtVnBuLWFubmUxHTAbBgkqhkiG9w0BCQEW
|
||||
DmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpAYa0
|
||||
dnsOQsyVLJeNyFuifaCLjgaX5/NIXKSQH2c+rkMdwAEpyfg9uaRC1yoYU2QiO4hw
|
||||
Yjt8b+FQboZt4TET99NCINCyg/tx83KlrrLNO9rCYet/6Gdyg95Qo60XreS4oAlj
|
||||
CZ2MW0en+55RMpqVL4GYGcGURvnNeJlB/idL+wIDAQABoAAwDQYJKoZIhvcNAQEF
|
||||
BQADgYEAK+pjp5tR8qIEVHj+mMhh+jcODXLXK+7Voq0tzAJovO7nBgGs+TJR8jmo
|
||||
69j2n05y9Jvi1ngqilPwz1GlFQodswudJTxAkFGcg4Q17uM2U2pPQxUaHwYMgqbT
|
||||
KARwZi0LKdhIUVvWzGCL6mooTC98boJDKn4JBbvRmYajGNyduy4=
|
||||
-----END CERTIFICATE REQUEST-----
|
18
OPP/openvpn/keys/anne.key
Normal file
18
OPP/openvpn/keys/anne.key
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
Proc-Type: 4,ENCRYPTED
|
||||
DEK-Info: DES-EDE3-CBC,B3FEC89B047C3426
|
||||
|
||||
QLsWJi2vFaMH/vHv3GR4wSrk0I8DU8JYDVnVgaK0tPxZqiixBL7kk0bFooL0ZLsb
|
||||
hSnGz3PJJRxm916zI4W1yYJfv9CWl7l+m3f+gEY3uLdFnyMbJ49P/Z+l03rUZs+u
|
||||
wRG2TzzFVTjA2EU6xwGSO0rN0eIBlomFkBXh161FDn77hcluWRjeNc1IrsVFAc3y
|
||||
yECdvOR4/H4nIIWk6a/o6k9BTprJ4NBHihsNpuMwass6EltgyhosSJsfIS1ye4KO
|
||||
S1Sp5mhLMAz1wEOifHf4bA/QUtn9IJLYMICeqyaSuOrkvSY33jTLjyrFyWjYcV+1
|
||||
1A5XmyWmyvDinL7QchTOEfBQfcEUjFAb/oVPz8qQbceNIGMGllT9IeS6NcaFC5op
|
||||
hNE5p97FHqZ8ud6Dqg/3sILW0MlPT2JTvN2oD+7rWgNVYxLXUN/90/APJ2BYzpuu
|
||||
b8KzaK8eVp2b2w4+NUTn2fBIV2+YwWlbFiALIWzz/LbbJQ0aQj0qMUNAoB/UnVA+
|
||||
eTNWbgA55no6AaEBmX6Kdroj0Ga0jjVylxtePFbyANA6+5/N06FqadQHwqzHjQaG
|
||||
9w+6FASXFpLl7ZguYFaF7DAwHz1CsgF88Bue0NXumZ64ebBCe35n/M/2ukTHPoKG
|
||||
Gb3Bc82krImLOVHq0/bwfGRU9u1FvBGP/JhPdZRtkSzVI5lRGSoo99Z9bsaZNut4
|
||||
BsNAn/Wj5DmHjfUDkgaIG45clNbjenasl880wnISyG4aMA7LP25wCqoYUPM6GNWb
|
||||
Zf3UECm1rLeKWNAurl8lS8KDJ38FDWFREhD5t6Z79yc=
|
||||
-----END RSA PRIVATE KEY-----
|
67
OPP/openvpn/keys/antje.crt
Normal file
67
OPP/openvpn/keys/antje.crt
Normal file
@ -0,0 +1,67 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number: 5 (0x5)
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
Issuer: C=DE, ST=Berlin, L=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
Validity
|
||||
Not Before: May 19 14:11:07 2008 GMT
|
||||
Not After : May 17 14:11:07 2018 GMT
|
||||
Subject: C=DE, ST=Berlin, O=o.open, OU=network services, CN=OPP-Vpn-antje/emailAddress=argus@oopen.de
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:d9:af:d5:10:fd:3d:66:4a:1f:86:43:3a:eb:9d:
|
||||
c3:3d:eb:9a:fd:c9:ac:76:79:b4:8b:62:3a:b0:22:
|
||||
92:70:ef:dc:b4:90:08:af:0e:69:c1:e1:41:42:f1:
|
||||
5a:9a:34:28:c1:4b:73:9f:cb:48:8d:e8:4e:fc:ae:
|
||||
98:aa:87:7a:a0:09:77:6c:d2:db:51:f9:0b:a1:93:
|
||||
37:57:4d:71:ed:5a:07:2b:0e:29:6c:c1:2c:79:e7:
|
||||
82:6c:f2:49:fd:1f:44:18:df:07:3b:4a:9e:53:49:
|
||||
b7:29:1c:17:ed:28:0a:72:64:3e:3d:98:ab:ce:0b:
|
||||
99:19:a4:36:7d:12:dd:6a:af
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Netscape Comment:
|
||||
OpenSSL Generated Certificate
|
||||
X509v3 Subject Key Identifier:
|
||||
DD:6A:35:36:EE:4B:F6:AE:4C:80:30:12:74:49:60:87:44:FA:09:D6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:E1:4D:C3:6B:F4:7C:81:7B:16:B2:CC:6D:24:6C:CA:DD:9B:93:53:E3
|
||||
DirName:/C=DE/ST=Berlin/L=Berlin/O=o.open/OU=network services/CN=OPP-Vpn-ca/emailAddress=argus@oopen.de
|
||||
serial:D7:44:14:8B:55:A3:DF:88
|
||||
|
||||
Signature Algorithm: md5WithRSAEncryption
|
||||
ad:af:8f:8a:fa:30:43:ce:95:ff:9d:39:65:a9:da:1e:49:dc:
|
||||
df:10:63:4a:76:74:5f:46:e6:2a:e6:be:ca:de:99:1a:84:07:
|
||||
53:f4:ec:1b:27:ae:3d:f5:21:b5:9c:27:5f:18:f8:3b:fa:39:
|
||||
6c:3a:d8:2a:01:2d:61:22:a1:36:4e:21:0a:48:e1:46:57:98:
|
||||
43:fa:f6:b1:6a:32:75:5a:b6:15:f6:3e:5b:61:8d:73:de:ff:
|
||||
cd:3c:90:8a:ca:41:88:55:97:eb:e8:92:d8:89:96:34:99:9f:
|
||||
eb:e7:4e:37:01:3d:33:dd:32:17:c6:d2:0c:1d:9e:ee:72:37:
|
||||
a6:85
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDrTCCAxagAwIBAgIBBTANBgkqhkiG9w0BAQQFADCBjzELMAkGA1UEBhMCREUx
|
||||
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
|
||||
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
|
||||
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTA4MDUxOTE0MTEw
|
||||
N1oXDTE4MDUxNzE0MTEwN1owgYExCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczEW
|
||||
MBQGA1UEAxMNT1BQLVZwbi1hbnRqZTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29w
|
||||
ZW4uZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANmv1RD9PWZKH4ZDOuud
|
||||
wz3rmv3JrHZ5tItiOrAiknDv3LSQCK8OacHhQULxWpo0KMFLc5/LSI3oTvyumKqH
|
||||
eqAJd2zS21H5C6GTN1dNce1aBysOKWzBLHnngmzySf0fRBjfBztKnlNJtykcF+0o
|
||||
CnJkPj2Yq84LmRmkNn0S3WqvAgMBAAGjggEjMIIBHzAJBgNVHRMEAjAAMCwGCWCG
|
||||
SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
|
||||
FgQU3Wo1Nu5L9q5MgDASdElgh0T6CdYwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsW
|
||||
ssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
|
||||
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
|
||||
ZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcN
|
||||
AQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdEFItVo9+IMA0GCSqGSIb3DQEBBAUAA4GB
|
||||
AK2vj4r6MEPOlf+dOWWp2h5J3N8QY0p2dF9G5irmvsremRqEB1P07Bsnrj31IbWc
|
||||
J18Y+Dv6OWw62CoBLWEioTZOIQpI4UZXmEP69rFqMnVathX2PlthjXPe/808kIrK
|
||||
QYhVl+voktiJljSZn+vnTjcBPTPdMhfG0gwdnu5yN6aF
|
||||
-----END CERTIFICATE-----
|
12
OPP/openvpn/keys/antje.csr
Normal file
12
OPP/openvpn/keys/antje.csr
Normal file
@ -0,0 +1,12 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIB0zCCATwCAQAwgZIxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzAN
|
||||
BgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3Jr
|
||||
IHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWFudGplMR0wGwYJKoZIhvcNAQkB
|
||||
Fg5hcmd1c0Bvb3Blbi5kZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA2a/V
|
||||
EP09ZkofhkM6653DPeua/cmsdnm0i2I6sCKScO/ctJAIrw5pweFBQvFamjQowUtz
|
||||
n8tIjehO/K6Yqod6oAl3bNLbUfkLoZM3V01x7VoHKw4pbMEseeeCbPJJ/R9EGN8H
|
||||
O0qeU0m3KRwX7SgKcmQ+PZirzguZGaQ2fRLdaq8CAwEAAaAAMA0GCSqGSIb3DQEB
|
||||
BQUAA4GBANkrpebbxvWh1knqDG5qeviI95fbDpfrCl4bcnOz+kTKu6VQBvcfEJQQ
|
||||
xo744kJ2bDPUva5HiWXJJie0Azpne1dU8NIbpGNHBO4BF/5NIajHBVkqfS73Q4ZS
|
||||
4233XPEyOPuEJE09BiYPofwBVlmjf6hyXKu17y4PIwsQ9nXC/l0B
|
||||
-----END CERTIFICATE REQUEST-----
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user