[2024-feb-29] Sad news: Eric Layton aka Nocturnal Slacker aka vtel57 passed away on Feb 26th, shortly after hospitalization. He was one of our Wiki's most prominent admins. He will be missed.
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
howtos:network_services:openvpn [2013/12/31 11:38 (UTC)] – chrisabela | howtos:network_services:openvpn [2018/03/02 00:01 (UTC)] – User needs to remove server key passphrase in order to avoid OpenVPN prompting for it (or erroring if run as daemon) bifferos | ||
---|---|---|---|
Line 70: | Line 70: | ||
< | < | ||
# cd | # cd | ||
- | # git clone git:// | + | # git clone http:// |
</ | </ | ||
Line 144: | Line 144: | ||
=== 5.2.1 Sign the Client' | === 5.2.1 Sign the Client' | ||
- | For the purpose of this article, it is assumed that the Client' | + | For the purpose of this article, it is assumed that the Client' |
< | < | ||
Line 168: | Line 168: | ||
# cp $HOME/ | # cp $HOME/ | ||
> / | > / | ||
+ | </ | ||
+ | |||
+ | If you want to run the server as a daemon on system boot, it's necessary to remove the pass-phrase from the server1.key file first. | ||
+ | |||
+ | < | ||
+ | # cd / | ||
+ | # openssl rsa -in server1.key -out tmp.key | ||
+ | # mv tmp.key server1.key | ||
+ | # chmod 600 server1.key | ||
</ | </ | ||
Line 183: | Line 192: | ||
< | < | ||
- | # cp openvpn-2.3.2/ | + | # cp openvpn-*/ |
> / | > / | ||
</ | </ | ||
Line 597: | Line 606: | ||
===== 7. Port Forwarding ===== | ===== 7. Port Forwarding ===== | ||
- | YYou will need to forward traffic from the port you have chosen for Openvpn to be routed to the Server. To accomplish this you will need to provide your Server with a fixed IP and you will need to configure your router. You may use netconfig, wicd or network-manager to set the fixed IP on Slackware. Then you also need to consult the documentation provided with your router to set up the selected IP address reserved for the Server, and the port forwarding. For our default Openvpn set up, the UDP Port would be 1194. | + | You will need to forward traffic from the port you have chosen for Openvpn to be routed to the Server. To accomplish this you will need to provide your Server with a fixed IP and you will need to configure your router. You may use netconfig, wicd or network-manager to set the fixed IP on Slackware. Then you also need to consult the documentation provided with your router to set up the selected IP address reserved for the Server, and the port forwarding. For our default Openvpn set up, the UDP Port would be 1194. |
In case if you have misplaced such documentation, | In case if you have misplaced such documentation, | ||
Line 644: | Line 653: | ||
< | < | ||
- | You will need the this files that were generated by the Client' | + | You will need this file that were generated by the Client' |
< | < | ||
Line 922: | Line 931: | ||
push "route 192.168.200.0 255.255.255.0" | push "route 192.168.200.0 255.255.255.0" | ||
- | client-config-dir ccd | + | client-config-dir |
route 192.168.1.0 255.255.255.0 | route 192.168.1.0 255.255.255.0 | ||
Line 932: | Line 941: | ||
Naturally replace 192.168.200.0 255.255.255.0 with the Server' | Naturally replace 192.168.200.0 255.255.255.0 with the Server' | ||
+ | 208.67.222.222 and 208.67.220.220 are the OpenDNS IP addresses. | ||
- | 208.67.222.222 and 208.67.220.220 are the OpenDNS IP addresses. | + | <note warning>Up to now the DNS push configuration has not been successful.</ |
+ | |||
+ | You can either use the original Client DNS servers or else you may rewrite | ||
+ | |||
+ | < | ||
+ | # OpenDNS Servers | ||
+ | nameserver 208.67.222.222 | ||
+ | nameserver 208.67.220.220 | ||
+ | </ | ||
+ | |||
+ | According to your routing table however, | ||
+ | |||
+ | Some users have reported that their Client' | ||
Next you will have to configure some iptables NAT forwarding on the Server (only). You can do this by first flushing the iptables: | Next you will have to configure some iptables NAT forwarding on the Server (only). You can do this by first flushing the iptables: | ||
Line 999: | Line 1021: | ||
#$IPT -A SERVICES -p tcp --dport 22 -j ACCEPT # Uncomment to allow sshd | #$IPT -A SERVICES -p tcp --dport 22 -j ACCEPT # Uncomment to allow sshd | ||
- | # allow openvpn for the non-default | + | # allow openvpn for the default |
- | $IPT -A SERVICES -p tcp --dport | + | $IPT -A SERVICES -p udp --dport |
| | ||
echo " | echo " | ||
Line 1127: | Line 1149: | ||
(4) http:// | (4) http:// | ||
+ | |||
+ | (5) http:// | ||
* Originally written by [[wiki: | * Originally written by [[wiki: |