Autosave
This commit is contained in:
		
							parent
							
								
									47235ac506
								
							
						
					
					
						commit
						e68f3d4134
					
				| @ -227,6 +227,7 @@ Der durch IPsec geschützte Datenverkehr lässt sich daran erkennen, dass in den | |||||||
| Für die Freigabe von IPsec-Datenverkehr in einer Firewall sind somit mehrere Regeln notwendig, während die Freigabe von OpenVPN-Verkehr über UDP-Port 1194 deutlich übersichtlicher ausfällt. | Für die Freigabe von IPsec-Datenverkehr in einer Firewall sind somit mehrere Regeln notwendig, während die Freigabe von OpenVPN-Verkehr über UDP-Port 1194 deutlich übersichtlicher ausfällt. | ||||||
| 
 | 
 | ||||||
| \paragraph{Benutzerfreundlichkeit} | \paragraph{Benutzerfreundlichkeit} | ||||||
|  | 
 | ||||||
| Platformabhängig - bei OpenVPN eher schwach, da nur die GUI eine andere ist. | Platformabhängig - bei OpenVPN eher schwach, da nur die GUI eine andere ist. | ||||||
| Bei Strongswan ... Kompilieren? Ansonsten ähnlich. Betriebssystemseitige Konfiguration ist platformabhängig. -> Zertifikate installieren | Bei Strongswan ... Kompilieren? Ansonsten ähnlich. Betriebssystemseitige Konfiguration ist platformabhängig. -> Zertifikate installieren | ||||||
| Bei Verzicht auf Strongswan ist die Benutzerfreundlichkeit definitiv platformabhängig. | Bei Verzicht auf Strongswan ist die Benutzerfreundlichkeit definitiv platformabhängig. | ||||||
|  | |||||||
| @ -1,50 +1,56 @@ | |||||||
| # This is the client configuration | # This is the client configuration | ||||||
| client | client | ||||||
| 
 | 
 | ||||||
| # No need to bind on specific interfaces, just send udp packets to the openvpn server | # No need to bind on specific interfaces, just send packets to the openvpn server | ||||||
| nobind | nobind | ||||||
| 
 | 
 | ||||||
| # Send udp packets to port 1194 | # Send udp packets to port 1194 | ||||||
| port 1194 | port 1194 | ||||||
| proto udp | proto udp | ||||||
| 
 | 
 | ||||||
| # We're using the layer 3 tunnel device | # We're using the virtual network interface on layer 3 | ||||||
| dev tun | dev tun | ||||||
| 
 | 
 | ||||||
| # Specify vpn server | # Specify vpn server | ||||||
| remote vpn-test.inform.hs-hannover.de 1194 | remote vpn-test.inform.hs-hannover.de 1194 | ||||||
| 
 | 
 | ||||||
| # Certificates (relativ path to config file, absolute paths possible if needed) | # Certificates to use. EDIT THIS SECTION to reflect your situation | ||||||
| ca vpnclient/ca.crt | ca /etc/openvpn/vpnclient/ca.crt | ||||||
| cert vpnclient/jan-philipp.timme@hs-hannover.de.crt | cert /etc/openvpn/vpnclient/jan-philipp.timme@stud.hs-hannover.de.crt | ||||||
| key vpnclient/jan-philipp.timme@hs-hannover.de.key | key /etc/openvpn/vpnclient/jan-philipp.timme@stud.hs-hannover.de.key | ||||||
| 
 | 
 | ||||||
| # Assume tls client role | # Assume client role in tls handshake | ||||||
| tls-client | tls-client | ||||||
| 
 | 
 | ||||||
| # Make sure the server presents a certificate with "server role" | # Make sure the server presents a certificate with "server role" | ||||||
|  | # This way people with proper client certificates are unable to impersonate the server | ||||||
| remote-cert-tls server | remote-cert-tls server | ||||||
| 
 | 
 | ||||||
| # Specific settings regarding TLS, chiphers and hash algorithms | # Specific settings regarding TLS, chiphers and hash algorithms | ||||||
|  | # DO NOT CHANGE THIS unless you receive explicit instructions to do so | ||||||
| cipher AES-256-GCM | cipher AES-256-GCM | ||||||
| auth SHA256 | auth SHA256 | ||||||
| tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | ||||||
| tls-version-min "1.2" | tls-version-min "1.2" | ||||||
| 
 | 
 | ||||||
| # Make sure to detect broken sessions | # Reduce connection timeout so connection problems are visible sooner | ||||||
|  | connect-timeout 20 | ||||||
|  | 
 | ||||||
|  | # Notify server on client shutdown/restart events, so old sessions get terminated immediately | ||||||
|  | # Try to send notification 3 times (because we're using UDP) | ||||||
|  | explicit-exit-notify 3 | ||||||
|  | 
 | ||||||
|  | # Send ping message every ten seconds, expect session loss after 30 seconds of no response | ||||||
| keepalive 10 30 | keepalive 10 30 | ||||||
| 
 | 
 | ||||||
| # Use this option to prevent OpenVPN from caching the password of your private key | # Enable these if you plan to enable running on reduced privileges | ||||||
| #auth-nocache | # These options allow to keep the private key and the virtual network device handle in memory | ||||||
|  | #persist-key | ||||||
|  | #persist-tun | ||||||
| 
 | 
 | ||||||
| # These are needed if running with reduced privileges | # Reduce privileges after launch (uncomment and adapt on unix/linux system) | ||||||
| persist-key |  | ||||||
| persist-tun |  | ||||||
| 
 |  | ||||||
| # Reduced privileges if possible (uncomment and adapt on unix/linux system) |  | ||||||
| # Note: On some systems, the group is "nobody" instead of "nogroup". |  | ||||||
| #user nobody | #user nobody | ||||||
| #group nogroup | #group nobody | ||||||
| 
 | 
 | ||||||
| # Logging settings | # Logging settings | ||||||
| verb 3 | verb 3 | ||||||
|  | |||||||
| @ -3,50 +3,51 @@ port 1194 | |||||||
| proto udp | proto udp | ||||||
| proto udp6 | proto udp6 | ||||||
| 
 | 
 | ||||||
| # Since we have more than one ip address, this makes openvpn respond with sender addresses | # Since we have more than one ip address, this makes openvpn respond | ||||||
|  | # with the right sender address | ||||||
| multihome | multihome | ||||||
| 
 | 
 | ||||||
| # We're using the layer 3 tunnel device | # We're using the virtual network interface on layer 3 | ||||||
| dev tun | dev tun | ||||||
| 
 | 
 | ||||||
| # Certificates (relative paths work, too) | # Certificates to use. Paths are relative to config file location. | ||||||
| ca inform/ca.crt | ca inform/ca.crt | ||||||
| cert inform/aither.inform.hs-hannover.de.crt | cert inform/aither.inform.hs-hannover.de.crt | ||||||
| key inform/aither.inform.hs-hannover.de.key | key inform/aither.inform.hs-hannover.de.key | ||||||
| 
 | 
 | ||||||
| # Assume tls server role | # Assume server role in tls handshake | ||||||
| tls-server | tls-server | ||||||
| 
 | 
 | ||||||
| # Diffie-Hellman parameters | # Diffie-Hellman parameter file | ||||||
| dh inform/dh.pem | dh inform/dh.pem | ||||||
| 
 | 
 | ||||||
| # Certificate revocation list | # Certificate revocation list location | ||||||
|  | # Make sure this file is always valid, otherwise OpenVPN refuses to (re)start! | ||||||
| crl-verify inform/crl.pem | crl-verify inform/crl.pem | ||||||
| 
 | 
 | ||||||
| # Make sure the client presents a certificate with "client role" | # Make sure the client presents a certificate with "client role" | ||||||
| remote-cert-tls client | remote-cert-tls client | ||||||
| 
 | 
 | ||||||
| # Allow multiple connections using the same certificate? | # Allow multiple connections using the same certificate? | ||||||
| # Currently, we do. | # There is no reason to not allow this, so it is allowed. | ||||||
| duplicate-cn | duplicate-cn | ||||||
| 
 | 
 | ||||||
| # We're using subnet topology | # We're using subnet topology for IPv4 tunnel connectivity | ||||||
| topology subnet | topology subnet | ||||||
| 
 | 
 | ||||||
| # Use this IPv4 range for clients (/16, so we can cope with all possible clients) | # Use this IPv4 range for clients (/16, so we can cope with potential 500 clients) | ||||||
| server 10.2.0.0 255.255.0.0 | server 10.2.0.0 255.255.0.0 | ||||||
| 
 | 
 | ||||||
| # Use this IPv6 network for clients | # Use this IPv6 network for clients | ||||||
| server-ipv6 2001:638:614:1750::/64 | server-ipv6 2001:638:614:1750::/64 | ||||||
| 
 | 
 | ||||||
| # Do we need persistence here? | # Make sure the client can still reach the OpenVPN server via its IPv4 default gateway | ||||||
| # No, not yet. Probably never. | # This is needed because the IPv4 route for DMZ is pushed below, | ||||||
| #ifconfig-pool-persist inform/ipp.txt | # which overlaps the OpenVPN server IPv4 address. | ||||||
| 
 |  | ||||||
| # Make sure the client can still reach the OpenVPN server via its default gateway |  | ||||||
| push "route remote_host 255.255.255.255 net_gateway" | push "route remote_host 255.255.255.255 net_gateway" | ||||||
| 
 | 
 | ||||||
| # Push routes for local IPv4 networks | # Push routes for local IPv4 networks | ||||||
|  | # | ||||||
| # DMZ | # DMZ | ||||||
| push "route 141.71.38.0 255.255.255.0 vpn_gateway" | push "route 141.71.38.0 255.255.255.0 vpn_gateway" | ||||||
| # Inform | # Inform | ||||||
| @ -68,6 +69,9 @@ push "route 141.71.2.0 255.255.255.0 vpn_gateway" | |||||||
| 
 | 
 | ||||||
| # Push routes for local IPv6 networks | # Push routes for local IPv6 networks | ||||||
| # (The vpn_gateway placeholder does not work here.) | # (The vpn_gateway placeholder does not work here.) | ||||||
|  | # Note: IPv6 routes that overlap the IPv6 address of the OpenVPN server will | ||||||
|  | # automatically trigger creating a direct route to the OpenVPN server on the client. | ||||||
|  | # | ||||||
| # DMZ | # DMZ | ||||||
| push "route-ipv6 2001:638:614:1780::/64 2001:638:614:1750::1" | push "route-ipv6 2001:638:614:1780::/64 2001:638:614:1750::1" | ||||||
| # Inform | # Inform | ||||||
| @ -79,20 +83,31 @@ push "route-ipv6 2001:638:614:1722::/64 2001:638:614:1750::1" | |||||||
| # Cluster | # Cluster | ||||||
| push "route-ipv6 2001:638:614:1743::/64 2001:638:614:1750::1" | push "route-ipv6 2001:638:614:1743::/64 2001:638:614:1750::1" | ||||||
| 
 | 
 | ||||||
| # Specific settings regarding TLS, chiphers and hash algorithms | # Global settings regarding TLS, chiphers and hash algorithms | ||||||
|  | # These settings MUST BE CONGRUENT with client configurations. | ||||||
|  | # If you change these, make sure you update the provided client config file | ||||||
|  | # and you NOTIFY ALL USERS to update their configuration! | ||||||
| cipher AES-256-GCM | cipher AES-256-GCM | ||||||
| auth SHA256 | auth SHA256 | ||||||
| tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | ||||||
| tls-version-min "1.2" | tls-version-min "1.2" | ||||||
| 
 | 
 | ||||||
| # Make sure to detect broken sessions | # Disable cipher negotiation on server side | ||||||
|  | ncp-disable | ||||||
|  | 
 | ||||||
|  | # Send ping message every ten seconds, expect session loss after 60 seconds of no response | ||||||
| keepalive 10 60 | keepalive 10 60 | ||||||
| 
 | 
 | ||||||
| # These are needed for reduced privileges? Probably yes. | # Notify clients when the server restarts or shuts down. | ||||||
|  | # Default behaviour: Tell clients to try to connect to the same server again. | ||||||
|  | explicit-exit-notify 1 | ||||||
|  | 
 | ||||||
|  | # Enable these if you plan to enable running on reduced privileges | ||||||
|  | # These options allow to keep the private key and the virtual network device handle in memory | ||||||
| persist-key | persist-key | ||||||
| persist-tun | persist-tun | ||||||
| 
 | 
 | ||||||
| # Reduced privileges | # Reduce privileges after launch (uncomment and adapt on unix/linux system) | ||||||
| user nobody | user nobody | ||||||
| group nogroup | group nogroup | ||||||
| 
 | 
 | ||||||
| @ -100,5 +115,6 @@ group nogroup | |||||||
| verb 3 | verb 3 | ||||||
| mute 5 | mute 5 | ||||||
| 
 | 
 | ||||||
| # Have a status log | # Print a list of active sessions into this file | ||||||
|  | # This might be helpful if you plan big maintenance | ||||||
| status inform/status.log | status inform/status.log | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user