Office_Networks/BLKR/openvpn/blkr/client-configs/josephine.conf
2018-10-23 12:28:33 +02:00

286 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote gw-blkr.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
b185215657011d3b8e96ff855a3f90ba
94131670f65a203848ac7040329594ae
e867c606a0df1d12c265d7ec7d4dbd91
c38c1e2103405f6b5c345548da2ae3e9
6ddf55904f191037d673dc454e31dac7
d6dd17917b0a045914860b19d310e541
7bd707c41a3ed7d3b2d6fe522419a1d4
cd929a7e2aa6183a0c83a4b212cbe96b
e9bef5a76b621ef947858f96be60229f
e2107488c6f0a50e7f3acfe5a27952db
53f6e8156b7d10b4da35861906b81558
f8a24a15f2311d592a0d6186a95261e8
f186ec3f54672edec2d04b4c99e5666a
815684b3129721e82c24482438ea4c7b
80585ab2e4fd43cba32bede430bfa685
cfc5755d9b1087aa3ec4299583e1f0a6
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# --auth-nocache
#
# Don't cache --askpass or --auth-user-pass username/passwords in
# virtual memory.
# If specified, this directive will cause OpenVPN to immediately forget
# username/password inputs after they are used. As a result, when OpenVPN
# needs a username/password, it will prompt for input from stdin, which may
# be multiple times during the duration of an OpenVPN session.
#
# When using --auth-nocache in combination with a user/password file
# and --chroot or --daemon, make sure to use an absolute path.
#
#
auth-nocache
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull