Initial commit

This commit is contained in:
2018-05-08 03:01:03 +02:00
commit 1c4c595cd6
3256 changed files with 417972 additions and 0 deletions

View File

@ -0,0 +1,182 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,202 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIEiTCCA/KgAwIBAgIBLDANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDIyODIzNTI0
MFoXDTM4MDIyODIzNTI0MFowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLWplbm55MRAwDgYDVQQp
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMMY7okQO+8IO7QsNXV27LOJeejIy6Pt
QesB+86pV6MgD0E6sRg1nfNSMcfL4YLD5qIHGu9fI24iG+51eGNZtwnm11uafwOm
nB2NRezuc2uzNkQxmla03sSLTG+UWstfLwzocJjCev4WVbv79XYdpfvbTCOrK3y8
qNm3euJ39zT136j/68hu8GEp29Kg3/IN+M5/cnlsWsnPnDy76EBTshLPXH/XgIQ9
sspuSxIP3c3xjKwAenkS3yZNIQB252+fOscAoS8ad+poGKyC+8UiMMyYAiOJv/kz
wPSofV3ncxBdeK2ZAXn3WNNndxszOFZNeaPD5A4T+ZqDsgvtlqmY8tMCAwEAAaOC
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQURxib0KicE0d0jkEkKDwikV5xpnUw
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
CTAHggVqZW5ueTANBgkqhkiG9w0BAQsFAAOBgQBsrcotHRmOTMrGCT3FQ2d+tEJ2
oAojPknBpmwDopbZ/cyncCrHCW82WeH1UaoRHjXztI0g8HCrAjs+ipYhwFcrlyAW
FWMYrNanGWzMfP9vuC+4zArojqo5oqQ88oX9jDZpOScfP6IUeXdNxgI4f5FzneD9
wWnFsSS/PcuWPpPyXQ==
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,202 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1195
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
Y/hjEv3y78V8QA==
-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,202 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1195
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
Y/hjEv3y78V8QA==
-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIElTCCA/6gAwIBAgIBKjANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTIzNDIy
MVoXDTM3MTIxMTIzNDIyMVowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAyMRAw
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL7iPPaeJzTmsK05kNWd1xS7
MF//l5D0baIAbmoYbtoJ6AIzALMfoeLigt5clkmsSNbERO2XdmuN1+05QtfaXUZo
SqV/18Pfoe+NGI8tlMS4IewD5WCGWLkm8akn2AigxUYc92lhRLpZHWu1k5NSjHc+
Mzgi8QIgIpb7/gjbgFoKnIR5dJy6WLoTke+pDSB7JM73ZXiHuiwT2/MqQ7Clb7e6
K74yoM5rBZPdgvLbPkRRaaAHg9x15UnmucdQ09Ny3hJ6MAJzao+tOpEQqitrGfzi
m5yFFIxNLAI1YVnUSHTGcQGAloBJby7o0rTTTIZuQYEGBSozf2F4U8bRJ/3vn98C
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUmgpK2Gop3E6rlrU38NZL
UnaRhXAwgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
BgNVHREEDzANggtsYXB0b3Atb3BwMjANBgkqhkiG9w0BAQsFAAOBgQBuOP7fJrTK
ntl8UBuMT6garKT95ZO8ZvXNEhwxhE6Pd7PcLaHlRV/R6f1MQmDjm6PakOswo8aX
KX0ENM+Bv9cPVOM4/iHpsMo3rVGsJjFxGQmjPYqzBKnhp7scnZe+5fdj31OpB4Qj
4QyH8FlYvZ4atU7Aao2pSaUprjduTGkg2Q==
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,202 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1195
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIElTCCA/6gAwIBAgIBKTANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE3MTIxMTE4MzA0
OFoXDTM3MTIxMTE4MzA0OFowgaoxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
ZXR3b3JrIHNlcnZpY2VzMRwwGgYDVQQDExNPUFAtVnBuLWxhcHRvcC1vcHAzMRAw
DgYDVQQpEwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCC
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOY+T33t6+MGoC2ZVVucGMp9
Bz12/5TsG1oh1L47K1CLckhVM3pUKWvYuxHPmn+cIGn9bnohrBlG2y4YNm1PkTvk
pWozI8YGYsXVKMPEKD44FuYDZJUYExmV4craQaYcmVYW6/JwwGfcDN3YvG9hB30C
dsMs9IBMQuhVl6Cg6ngecYq7e7+1LVWmoTQNOg7UAjKTKzyztIEfYznI5irprE+T
vSptv7N3m9h6Jw2yRNnkuQ/MsCdb+zKieXdV2LbQY8eYxURHT01nIuJAmOAKD7yV
RtdLNwvppxGo/Qf4GG1ZjVQR/J4jYhRkYs8NSV1BlcTT7NQD5i5pFWs/NhVmWMEC
AwEAAaOCAV4wggFaMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU5+o1f7cxB1BbVCp8NffX
QMqfsNowgcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIw
gY8xCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxp
bjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMw
EQYDVQQDEwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5k
ZYIJANdEFItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAW
BgNVHREEDzANggtsYXB0b3Atb3BwMzANBgkqhkiG9w0BAQsFAAOBgQBGTCJBsP42
28Lml/xQ/3QmQg4fD9x2jOo8JLmy04/iWhlXuxXITun6BrhhHWXpRirGz1XFGoF6
yw8uXWq8VXqo33oWYmp1nd4ZdQ1YKj2Swbx5UrjfGSSsY/2wzoxlEsUDyWLnFIXs
OiBrkyXKN3tdOn2y8hTP5szeXqrVKaL8Bw==
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,185 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,17B9907A94C0924E
krHc1xE84ce/mYSlw95UdKuic+wC1J1cAIMq170+Lez43232Qy9/evNW8lVl7BXS
9fs9ayCX8Xdr5lyCOxWukZQ6Lk2tySBCkdTFnhDQgUXjwx9tNqLmMkajF/GrGyJ0
Tn+LQG5r6Z05ogE+4naWH12iE9OMqGNNIebbNbmTc1jYMUtKgWIuQkpe+9DMWBN+
PhKHM7BA420Z9E74KmkhmAJYdHgSle7U7Ca27IY/u9gXUoa+MxLsET+KTY665NJq
KP8+H9Hsw3zVQmu2XR9s/UfayOFYcMJBEATI9K7dBDB3zTblcYHmFfXSxpAW7AZz
bbFHmpitgkzC657Xw6d/TRktYGQbNbi6Zwsc2dcQuyHtpiF443fN77m5N4g/7IgQ
MghSlTImS+K9r357UQN43cXRIpgEoKk+22H/fLGtxVDlkYmx9MNzXnmGNooJFIkS
FcV164sSr3FOSZ6oQANsRNIJtHy79gUyh0fgPzng7kKrNwsQCVsTzsdglZEXDCLt
BbKpiAB8JcB/EHHR/vx0xj0LJPWskVj8v07GKwQCvW8mD0oKnm9OuDAzXUvR/bj+
mv0yYA2ZRvJeC7ZFYIanzmmMH5EuoKLsFzvp+79+beKDD24x8xbQVjxi5cmfzH6s
pfXY6suLB4wtzVbj+TzMPuP+W12V5oShO2Q0ifUuBMkgUNEyem593l72yy1CERcf
O9gR8hUpP0yHCFRhds00EkllKDvb9FixL8EWO9JGVLZhLuYead5yOcop0tdT2aXT
v8kWDFBcGdNg9u7HgjapeTKjBnI1bYNsC5knB1TugR41PcJUN5qCRw==
-----END RSA PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,202 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1195
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIEiTCCA/KgAwIBAgIBKzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4t
Y2ExHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMB4XDTE4MDExNTE0NDE1
NVoXDTM4MDExNTE0NDE1NVowgaQxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJs
aW4xDzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBu
ZXR3b3JrIHNlcnZpY2VzMRYwFAYDVQQDEw1PUFAtVnBuLW9lemdlMRAwDgYDVQQp
EwdPUFAtVnBuMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZTCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBALmEvhRYDUvByjUngr8Nn/VcioUI+cFV
C9ihDBHOMCDdNQGYi5jZkSmMboF/KJRg5UeZNz0ZjxTZfunYvxZPjdGuPUbOtcs2
t7xwsi1Isuckdnt/a099uhGx34S4yWOIPY/stw7zs+fVZfnmsIH6I/uWXvL5kvdz
abAqdsp9j74QYrDC1n/ApdakD3xHnL4X7FD6VgAsC+Yx0gHGaZ8ad8sFTn9+LryI
dumPyEMamzSn39SeUk74dxC15R3Z8Y091U5xCkrjwaQtDVBfbanLYPhHZpC4oG6N
jus/iOvS+QZtBa6g+nsE71GxOh5eXz++Tekcxqpr5AVjLYytJ5+uQ20CAwEAAaOC
AVgwggFUMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy
YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAi7CtRdjoxft1/BxZ7ukuHolxygw
gcQGA1UdIwSBvDCBuYAU4U3Da/R8gXsWssxtJGzK3ZuTU+OhgZWkgZIwgY8xCzAJ
BgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4xDzANBgNVBAcTBkJlcmxpbjEPMA0G
A1UEChMGby5vcGVuMRkwFwYDVQQLExBuZXR3b3JrIHNlcnZpY2VzMRMwEQYDVQQD
EwpPUFAtVnBuLWNhMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJANdE
FItVo9+IMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
CTAHggVvZXpnZTANBgkqhkiG9w0BAQsFAAOBgQCqbhrn5H8GWGbn6+V7GLK1Ti0I
TMmqU7xaO7lbTquxFUzMQ/uCtIHbIkH7fYD5ZGiH4PTSjrGmLcQhHFirRche/+EA
XJVrbVCGdJjbwypI94H0+uv5tijsC+bWSmzfdLYcWYAtVTL0bbakCYWq/dqe4FsB
6hJRbeRHBqcNKVSJDA==
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-serve
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull

View File

@ -0,0 +1,214 @@
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-opp.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----
MIIDljCCAv+gAwIBAgIJANdEFItVo9+IMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYD
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
BAoTBm8ub3BlbjEZMBcGA1UECxMQbmV0d29yayBzZXJ2aWNlczETMBEGA1UEAxMK
T1BQLVZwbi1jYTEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGUwHhcNMDgw
NTE5MTMxNDA1WhcNMTgwNTE3MTMxNDA1WjCBjzELMAkGA1UEBhMCREUxDzANBgNV
BAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4xGTAX
BgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2ExHTAb
BgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlMIGfMA0GCSqGSIb3DQEBAQUAA4GN
ADCBiQKBgQC1RgTR9sLzgKQW/1iSnMYgrl0OIc9KUxg4lwnA0WcMTPk5iQrX6guV
BAP6gTzf23qd1mwXqJDGIYaeA7D4KI3kKZdM6vCtKPZ+E2d4j8Kt5JzWAdy2fXVg
75PCqY2KWfkAh8EGlxmGeSQCuDGqVeiL+ekbp0hx7M57Gst5yxN44wIDAQABo4H3
MIH0MB0GA1UdDgQWBBThTcNr9HyBexayzG0kbMrdm5NT4zCBxAYDVR0jBIG8MIG5
gBThTcNr9HyBexayzG0kbMrdm5NT46GBlaSBkjCBjzELMAkGA1UEBhMCREUxDzAN
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
GTAXBgNVBAsTEG5ldHdvcmsgc2VydmljZXMxEzARBgNVBAMTCk9QUC1WcG4tY2Ex
HTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9vcGVuLmRlggkA10QUi1Wj34gwDAYDVR0T
BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBgKYEcUleLw/trPJbbeI/s0ZKRGVki
nk7jY7+k8qa88FqrTP3V7pgGnWunINBgTBxM1dH/H4p8DXiIGWJrY7KCddIJSA5J
JiX7UJBXFQDXflP+MhqIdHfGjd37djMqUD2//WLAKuahxNSuf4L9FfoeNGghlYKX
Y/hjEv3y78V8QA==
-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
ff2b7b56af351769ba703f874d389327
2e8fed8405df740d51d58eff3eb25af3
d6de19376333a9b05aa72f8b90124bbf
5ea3085029070d28952a1fe9baa392fc
4865bd5dbc58a4ccfc373d2ce772a217
17f099df7d2354e404ae7690cbc50002
151667c2af583705bd3896327917327a
a8b2c9073e58b7deabb3ad04336170b9
6fcce57b50827b0f393b7d1f0a7f6299
d15140e46f6108983234eb53b0a6d56c
6ce3815bc7f5ec9f52bc7eb680562b4f
1241f1378b774491ca817b56f1d5ba09
c25e8a4dff3610c60e4f9f3c306c15af
8a70829075343f2ab24d61560804c78a
dda39ceb12e11a0079b59dcb607166e5
567cbf1dc83c2f32f8ce1cb4576c12df
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull