Office_Networks/BLKR/openvpn/blkr/client-configs/anya.conf
2018-10-23 12:28:33 +02:00

286 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-blkr.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----
MIIHLDCCBRSgAwIBAgIBBDANBgkqhkiG9w0BAQsFADCBoDELMAkGA1UEBhMCREUx
DzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZvLm9w
ZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxETAPBgNVBAMTCFZQTi1CTEtS
MREwDwYDVQQpEwhWUE4gQkxLUjEdMBsGCSqGSIb3DQEJARYOYXJndXNAb29wZW4u
ZGUwHhcNMTgxMDIzMTAwNDQ2WhcNMzgxMDIzMTAwNDQ2WjCBpTELMAkGA1UEBhMC
REUxDzANBgNVBAgTBkJlcmxpbjEPMA0GA1UEBxMGQmVybGluMQ8wDQYDVQQKEwZv
Lm9wZW4xGTAXBgNVBAsTEE5ldHdvcmsgU2VydmljZXMxFjAUBgNVBAMTDVZQTi1C
TEtSLWFueWExETAPBgNVBCkTCFZQTiBCTEtSMR0wGwYJKoZIhvcNAQkBFg5hcmd1
c0Bvb3Blbi5kZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMxKAdxb
lVjXxp4MbsLdO5215+JVFCFcNp/3unPcMYIsZw+XAlID7flg1+Li+lEESP/AtLEf
IugN5zOE3d6RZkFh92rh3kMuCUS060nyByzi3Re3DaaQOkWFnT1vsyOsR6L6l9jB
cSz9Wrx8Ummk5GV+9Fv5ZfmILOcXFfvQSgzWNRIsFL6ta+/qGXPlzl+l+ZCsyvxf
UxGnzz3Be2j5LWR5/u5xJ2HhLSDrAGToBiK9qJNi1yOtHhOQ9viQJKcf84rFw6Hs
98Qr+PuSE9gVoP7dJ4TCaWnps3Xhy2SR0aSZnhWjP8Ep0ofTwQXWJD793/24vfIo
cuW88kiC3MxHd/JPMRQpqMbUVqS2tFqZSfx6MmGhEyH29/k4jGaXrNsclRCl6s65
1YbCbFmgwezsffsm2S3dcaQNFsc9J6AUEDK3hmzXAvZuw5/uA1lEfyuui8JgqC0I
UyRuVbwkMo99QA0S+RbxlhfKfOJEXRwyax40caPimpph81rChLxl9+bd7GlLwOD/
EkhJpK2WsTPzu09El2565mXYrjrENYcDmxJ9qbB2R9HKD69viDJ5fBkYQ+p++Oiv
T3sipODeesSobT3cwhMfXxcUE4fW3VmgGGnmlNU2XfEJOotG3k+BuIpdDC+irnCJ
ZPsoxQF3CBnU0nwotGKp5mI7L0JGAowZffGXAgMBAAGjggFoMIIBZDAJBgNVHRME
AjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNh
dGUwHQYDVR0OBBYEFLB5A5ev3V+21lnEH3v9kirfQalEMIHVBgNVHSMEgc0wgcqA
FPZ3o5kkgrmNg2Ki/MR7rcrWbvnioYGmpIGjMIGgMQswCQYDVQQGEwJERTEPMA0G
A1UECBMGQmVybGluMQ8wDQYDVQQHEwZCZXJsaW4xDzANBgNVBAoTBm8ub3BlbjEZ
MBcGA1UECxMQTmV0d29yayBTZXJ2aWNlczERMA8GA1UEAxMIVlBOLUJMS1IxETAP
BgNVBCkTCFZQTiBCTEtSMR0wGwYJKoZIhvcNAQkBFg5hcmd1c0Bvb3Blbi5kZYIJ
ANQ1kko/1TXWMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAPBgNV
HREECDAGggRhbnlhMA0GCSqGSIb3DQEBCwUAA4ICAQBRO87CSXrkAU2X/wcAAfgc
oW8fDBSL2Rw87zbadTKW/5w4tjraBMcKtnkTVl7/AFRXC7YcS9kEs5hb58DlsXj8
RQ9bBJAyOhUFy+CNGWqAKgCDhiQzNgep28xItBn5LuWqQyDWxEywmdoa9cNOo8J6
nK1EVCmO3YP4t4ffBC7lQpSdzonD217v9iRJ74ZfisHxNHPiV/BkXLLI2iGjNUZz
r4EAI7ao95gXNLDuOGXxy+hNJQQDoLLRnpsyCuBIvdkg95zdvflaOCc59CRH6ipn
cF/YDpmnruLYzpOalQ23HgBohwLzagofqyQ3hstk7qyNUW4fN4u1T7xo/JAR29Om
Mt0VHQpG2Fd2vnDIphGB8UnLv855B1q1O5g5tlgrFuC2Zo8Re10ciOe6A+07Ggl5
ybvNpz1xn0impuxaUVTtuGtF3TuJTmnw35tebWIQ+1grut4UpZRANJMaJhBAtoYW
EIpt01pBGotJ/JbjxYSrbecu3+8OGGjIbfXtpR+i5RMUDqOMtyYgIxbFEbERl74T
7Hz1DWOVyrFPBWWZJiasj1iGFdrvnBwMGcq2mWbN6tCTLZdYrv0+j+zmCmnTTKYE
Lz0EBU7NOiDokBRYCQlLWkc0eCQvrBOIyiDJX6ClONOO1P3cLzd8BpjdnmXpJD6F
dtVQDrwTn/2gXF0Ny8FcLQ==
-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
b185215657011d3b8e96ff855a3f90ba
94131670f65a203848ac7040329594ae
e867c606a0df1d12c265d7ec7d4dbd91
c38c1e2103405f6b5c345548da2ae3e9
6ddf55904f191037d673dc454e31dac7
d6dd17917b0a045914860b19d310e541
7bd707c41a3ed7d3b2d6fe522419a1d4
cd929a7e2aa6183a0c83a4b212cbe96b
e9bef5a76b621ef947858f96be60229f
e2107488c6f0a50e7f3acfe5a27952db
53f6e8156b7d10b4da35861906b81558
f8a24a15f2311d592a0d6186a95261e8
f186ec3f54672edec2d04b4c99e5666a
815684b3129721e82c24482438ea4c7b
80585ab2e4fd43cba32bede430bfa685
cfc5755d9b1087aa3ec4299583e1f0a6
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# --auth-nocache
#
# Don't cache --askpass or --auth-user-pass username/passwords in
# virtual memory.
# If specified, this directive will cause OpenVPN to immediately forget
# username/password inputs after they are used. As a result, when OpenVPN
# needs a username/password, it will prompt for input from stdin, which may
# be multiple times during the duration of an OpenVPN session.
#
# When using --auth-nocache in combination with a user/password file
# and --chroot or --daemon, make sure to use an absolute path.
#
#
auth-nocache
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull