Office_Networks/BLKR/openvpn/blkr/client-configs/chris.conf

286 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-blkr.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIHLjCCBRagAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBoDELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxETAPBgNVBAMTCFZQTi1CTEtS
MREwDwYDVQQpEwhWUE4gQkxLUjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4u
ZGUwHhcNMTgxMDE0MjIzNjU1WhcNMzgxMDE0MjIzNjU1WjCBpjELMAkGA1UEBhMC
REUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZv
Lm9wZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxFzAVBgNVBAMTDlZQTi1C
TEtSLWNocmlzMREwDwYDVQQpEwhWUE4gQkxLUjEdMBsGCSqGSIb3DQEJARYOYXJn
dXNAb29wZW4uZGUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoZnE5
rGKolfRVO9meGggYwPDbBQCl5eA/IyG2sGkpTDyt1u7piCXfEcaNRlcIVfnCZ2i/
+edfBkR4oZETR42TZKrQvSTKoJHlUXbsmxM9UsiZeh05yZEEhku0ohKplpxbuEUZ
5tj4MTFM9iNxNr9RAThrto8GKPZvil8MJeBVGAQdglyXN4tgp1+OHCiX7qFTaZFz
GYZ4A+SqwEBwQrse9GkHMKgqlYG/wjhIzYDtmy8xIKAlB2a2RXDlzSH2+BKdPAFT
EN8Qrw+bwBup8ArnXyk5V8DxJySxMHCinxxDBaVmhw191E53qY5RhC2MLm2FcpoH
PYkjGwggBdiCmynMYyGNyXaZNveHaQehGOGtK++Zaa+ecVb/gIcGxS8l/7/qJfZf
Zfx1wPs03FAMyu8GakO3DvgrheXDHHlLtpUpeKnFyu3h63bZvOHTv0jGvF/tGxX4
eNh8FHW44Y1UTk4A2Agg5SJzDrZHRzUOoKnzmq1mSBPBetztvhcMclwPOz9P7qWo
G4FqQc5CGG88i7ULMXX/xv7U/tZF7WzJv6G0b2lTBvlVoLsnubMmQD0L4NYUeQ71
Gqdscpvg6Qkptv7Zc79GH7LG7JfOVmajBT3Va9BRYhZzXwkT/iyasc01OXKlgUjS
9Kex5LCfGgHmaWMmIADjdaNwRhKIEGnguKA5+wIDAQABo4IBaTCCAWUwCQYDVR0T
BAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVkIENlcnRpZmlj
YXRlMB0GA1UdDgQWBBSiVTG2MqiFqM6DVofOs+Z136+ukTCB1QYDVR0jBIHNMIHK
gBT2d6OZJIK5jYNiovzEe63K1m754qGBpqSBozCBoDELMAkGA1UEBhMCREUxDzAN
BgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9wZW4x
GTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxETAPBgNVBAMTCFZQTi1CTEtSMREw
DwYDVQQpEwhWUE4gQkxLUjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWC
CQDUNZJKP9U11jATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwEAYD
VR0RBAkwB4IFY2hyaXMwDQYJKoZIhvcNAQELBQADggIBANMD+MABYRMiHxIg/HDi
zZG80OgwDb18GdcQJf2vUBIw8qtZJ9RxIbjeVDLd6fnVuI3XC9VrO6y3i6NcdhSy
M3Mtp8L+++PW6voZrdm9o/LXVuGbh/xic/r4dEr0TiB4aj0OQr72iWj/53UkU0Jq
XqLt8fsopI0uxio4sUZzXtqXR8Rr2L+88aVc7bSo7C5wX/6h526CdPvxDqhXWJOi
Q4Jzgz6S8xFMns4MmT91Qkpz1LDRaklygx616NBK0Dz7w15tEiofjpXfjZHuiih1
VBwAnc5CeU9zyAftoLWOLik2p5H/fL+fvn1xU9oyaeW6YMmVGF+kYhagA4wyZRF+
xGsSLFnIFGWVCI/YuIn4PFOqK+kpJ1HhU/fpUOtnUMYZXMvQr9ak5b18icdvBHxv
MqQLPFE4mHlQihK1A/eHhGDl14KTmSz2VicM9TYeGYcSU23otW/V6Mbm9hiu1Dho
fwLiN1IrN+pDvUZy9XG/EEi1WtPFMhxlWzwm5Spmpu1+0lb2QyvcDIRtyVvVHFMe
4wfrRjd0Zs4xB5Wl8vuxlezr7ac62LlK9OVJs0wRAMIEZQG+L040uCPrD8wfCh12
Eogm5BDBDWHmFmczpSUmPPuGps4XhI1m5TWdAreKY6VxGt+yZd7vZJqI42XoTJIT
EPdYrpMPTFzsbTg5X8Ww7ASJ
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
b185215657011d3b8e96ff855a3f90ba
94131670f65a203848ac7040329594ae
e867c606a0df1d12c265d7ec7d4dbd91
c38c1e2103405f6b5c345548da2ae3e9
6ddf55904f191037d673dc454e31dac7
d6dd17917b0a045914860b19d310e541
7bd707c41a3ed7d3b2d6fe522419a1d4
cd929a7e2aa6183a0c83a4b212cbe96b
e9bef5a76b621ef947858f96be60229f
e2107488c6f0a50e7f3acfe5a27952db
53f6e8156b7d10b4da35861906b81558
f8a24a15f2311d592a0d6186a95261e8
f186ec3f54672edec2d04b4c99e5666a
815684b3129721e82c24482438ea4c7b
80585ab2e4fd43cba32bede430bfa685
cfc5755d9b1087aa3ec4299583e1f0a6
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# --auth-nocache
#
# Don't cache --askpass or --auth-user-pass username/passwords in
# virtual memory.
# If specified, this directive will cause OpenVPN to immediately forget
# username/password inputs after they are used. As a result, when OpenVPN
# needs a username/password, it will prompt for input from stdin, which may
# be multiple times during the duration of an OpenVPN session.
#
# When using --auth-nocache in combination with a user/password file
# and --chroot or --daemon, make sure to use an absolute path.
#
#
auth-nocache
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull