Office_Networks/WF/openvpn/wf/client-configs/mariette.conf
2018-05-08 03:01:03 +02:00

271 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote wf.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----
MIIGxjCCBK6gAwIBAgIJANhMyyi1cVS7MA0GCSqGSIb3DQEBCwUAMIGcMQswCQYD
VQQGEwJERTEPMA0GA1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNV
BAoTBm8ub3BlbjEZMBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczEPMA0GA1UEAxMG
VlBOLVdGMQ8wDQYDVQQpEwZWUE4gV0YxHTAbBgkqhkiG9w0BCQEWDmFyZ3VzQG9v
cGVuLmRlMCAXDTE4MDUwNDE4MjA0MloYDzIwNTAwNTA0MTgyMDQyWjCBnDELMAkG
A1UEBhMCREUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYD
VQQKEwZvLm9wZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxDzANBgNVBAMT
BlZQTi1XRjEPMA0GA1UEKRMGVlBOIFdGMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bv
b3Blbi5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK+cDn8x2oBG
oH7SDD3d9p+rRE4uzVDp/7YxuvvCXazhPUVc0BGE8hj6jCwB+tbbNlhbm/uwxAX6
96kz2AmoGzEZQy/Icb+UKNkKni15PUEaCcFWkgb9mMb/6XBP4JLUdnxxUn5rYB8A
m4jpKzMz6tBRlNmLbDVbcHriLuJJ3mgFBN/QYV9zurKzMRLv6Y8MVzLXY6MPYaFs
Lw398Iz/lIVLq40FxZ7oktvT3RFQUFjiTqBvdmQw91MYxJHGYZH6XB+tPhGw+9D7
w2ejAvv3MQU246oaEyyH3Pgh8GajSdKmiTH5YHRkp6LVnh7IGEZ1G7dbq8d5KlZP
zBP+Xdsf0gkjl3HI5cu4RJHWFg3dpNJxatxXc8owhaLa3wiVwSXobNsQBUNI5CeE
OItnetBLZzAmDlS5WoOAj5KMApun4xQQJXaazTaM5LhUN1TmXL6dq6rHSZrnrciV
aM0M6F96h0OFYq0RxsztXHiWFxJgbuNQSx1pzqsaFe4MtEEpMlI4SRQjtJPbje80
HCELo3Qfuxm6vLSGH1jXozhDt3/3jB96yBT+wemN3wxiiR/fWfmwH0k3VEFxbsBR
sMcgA3xopoyHU3cUQqWkFaKT0gBa0t2sZqpsaRgaR4YzKVuHu7Wezb3VRAt9VH35
E97yq3vv0J2OFN4trPMZ6TdRcRppe79bAgMBAAGjggEFMIIBATAdBgNVHQ4EFgQU
Tz6IFOGhISjj5ltza9wPl9lg9fEwgdEGA1UdIwSByTCBxoAUTz6IFOGhISjj5ltz
a9wPl9lg9fGhgaKkgZ8wgZwxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZCZXJsaW4x
DzANBgNVBAcTBkJlcmxpbjEPMA0GA1UEChMGby5vcGVuMRkwFwYDVQQLExBOZXR3
b3JrIFNlcnZpY2VzMQ8wDQYDVQQDEwZWUE4tV0YxDzANBgNVBCkTBlZQTiBXRjEd
MBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4uZGWCCQDYTMsotXFUuzAMBgNVHRME
BTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQApiMctoi++fFyKUOzdI5p+mJLxldQD
Jx6V6aY3wZRtKerXFuH+rAZDcBg5pCc+IwVYhR0ilJGvSFrN3nsipSRYkev3W8F7
8NBD0I0A02WmwOZA9GM5LAwc3w7dkGKLTIFM/qfwti4Y6o0Sb10r8QKhggiNBO53
Z10StshS5ciUtw0oH7oTRbsXhLOwwikkBxQgeCU5IJUtC2Xp8uG6Mrkqva/l+PIe
I83YPlE6NGiok2N9Cg7wx7Y65hg6F8lLePIh81pPLVujr91B1Y9Oc/iKwDZ+f0ep
uWnLSZJYbCrv4/QqPi4Km7CqJlPy4Wj861U2SmNkzJC721d2UDVBcFoGw3zIszYl
zGdXF71fcLqThlU/EwNgSOa/hQd6mcCZVBh0qlQHp1nefCUM4O5Qd7swSTV3Bdbx
wkkH/lWRPURL0qMevF5KNYT+dUV7Tplf11cW8D3cIe8+mr7p7FnFjKlbQ+YQQZ+O
d1zX06ADQPLsOat4FNwAkxBLSQ0anK9iu0xZUNy3RMRsLIX/gtl6qvxnWvuy2OJs
3bjs7hauPZLwycL5uaFoKt8twwomLPj4tE0AsWwxIGK7vQajJl755QNEgHfUd8Ng
U9tR185HsyrrKii3tuxGRwJGeN5IQkp/04CL2jVYYzkqe7tsr4SPE++hj/vK4zrw
E+i0hdVFGZBFNQ==
-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
055e6b31c205ec1ace25b0ef1f0b3e80
e74c454b9136ba2a73e77af7d1a69e27
961a2792f86003c7e5477606511ab117
86a4c648a987b4aed406d30bcf5c32b4
da5405b247161f9f1cafcb82df78f63e
e2151005472f97c913ab994c2b2fc3b0
2c8e2b7d9b466a1f092f375f2a08f561
b8e0c6bd019a5e9b9bc821715287f279
ca56cdd6fcbb3fde55d44da9be2ec86a
b81e52bc44f7c92174795dc12f95a6c1
beeca15154a9c72872c3f205ccf601ea
c610bd2aa828e052febb747c02cfdf4a
959e9a86a01863bebb30ed8f79d13dae
f58e8dde86d46026a27de24e6db51348
1d395e5736eab696c653d1f68a972dc1
e47de0993b8b5d57ecab103e70c4874a
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull