This patch uses generic "bob.example.com" and "alice.example.com" hostnames to
replace the current "may" and "june" examples. Generic names chosen rather than
other names like "server"/"client" or "head-office"/"remote-office" etc which
may create other unintended or implicit meanings to the reader.
The example.com domain is set aside defined by IANA for use as documentation
examples. Refer to: http://www.iana.org/domains/reserved
Using this well-known domain makes comprehension of documentation easier.
This patch incorporates feedback from Gert Doering and Selva Nair.

Signed-off-by: Phillip Smith <fuka...@gmail.com>
---
 doc/openvpn.8 | 74 +++++++++++++++++++++++++++++------------------------------
 1 file changed, 37 insertions(+), 37 deletions(-)

diff --git a/doc/openvpn.8 b/doc/openvpn.8
index 94b5222..368bd4c 100644
--- a/doc/openvpn.8
+++ b/doc/openvpn.8
@@ -6601,13 +6601,13 @@ for use with OpenVPN.
 .SS VPN Address Setup:
 For purposes
 of our example, our two machines will be called
-.B may.kg
+.B bob.example.com
 and
-.B june.kg.
+.B alice.example.com.
 If you are constructing a VPN over the internet, then replace
-.B may.kg
+.B bob.example.com
 and
-.B june.kg
+.B alice.example.com
 with the internet hostname or IP address that each machine will use
 to contact the other over the internet.

@@ -6615,8 +6615,8 @@ Now we will choose the tunnel endpoints.  Tunnel 
endpoints are
 private IP addresses that only have meaning in the context of
 the VPN.  Each machine will use the tunnel endpoint of the other
 machine to access it over the VPN.  In our example,
-the tunnel endpoint for may.kg
-will be 10.4.0.1 and for june.kg, 10.4.0.2.
+the tunnel endpoint for bob.example.com
+will be 10.4.0.1 and for alice.example.com, 10.4.0.2.

 Once the VPN is established, you have essentially
 created a secure alternate path between the two hosts
@@ -6625,16 +6625,16 @@ control which network
 traffic passes between the hosts 
 (a) over the VPN or (b) independently of the VPN, by choosing whether to use
 (a) the VPN endpoint address or (b) the public internet address,
-to access the remote host. For example if you are on may.kg and you wish to 
connect to june.kg
+to access the remote host. For example if you are on bob.example.com and you 
wish to connect to alice.example.com
 via
 .B ssh
 without using the VPN (since
 .B ssh
 has its own built-in security) you would use the command
-.B ssh june.kg.
+.B ssh alice.example.com.
 However in the same scenario, you could also use the command
 .B telnet 10.4.0.2
-to create a telnet session with june.kg over the VPN, that would
+to create a telnet session with alice.example.com over the VPN, that would
 use the VPN to secure the session rather than
 .B ssh.

@@ -6649,21 +6649,21 @@ you will get a weird feedback loop.
 .\"*********************************************************
 .SS Example 1: A simple tunnel without security
 .LP
-On may:
+On bob:
 .IP
-.B openvpn \-\-remote june.kg \-\-dev tun1 \-\-ifconfig 10.4.0.1 10.4.0.2 
\-\-verb 9
+.B openvpn \-\-remote alice.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.1 
10.4.0.2 \-\-verb 9
 .LP
-On june:
+On alice:
 .IP
-.B openvpn \-\-remote may.kg \-\-dev tun1 \-\-ifconfig 10.4.0.2 10.4.0.1 
\-\-verb 9
+.B openvpn \-\-remote bob.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.2 
10.4.0.1 \-\-verb 9
 .LP
 Now verify the tunnel is working by pinging across the tunnel.
 .LP
-On may:
+On bob:
 .IP
 .B ping 10.4.0.2
 .LP
-On june:
+On alice:
 .IP
 .B ping 10.4.0.1
 .LP
@@ -6676,7 +6676,7 @@ program.  Omit the
 option to have OpenVPN run quietly.
 .\"*********************************************************
 .SS Example 2: A tunnel with static-key security (i.e. using a pre-shared 
secret)
-First build a static key on may.
+First build a static key on bob.
 .IP
 .B openvpn \-\-genkey \-\-secret key
 .LP
@@ -6685,39 +6685,39 @@ This command will build a random key file called
 (in ascii format).
 Now copy
 .B key
-to june over a secure medium such as by
+to alice over a secure medium such as by
 using the
 .BR scp (1)
 program.
 .LP
-On may:
+On bob:
 .IP
-.B openvpn \-\-remote june.kg \-\-dev tun1 \-\-ifconfig 10.4.0.1 10.4.0.2 
\-\-verb 5 \-\-secret key
+.B openvpn \-\-remote alice.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.1 
10.4.0.2 \-\-verb 5 \-\-secret key
 .LP
-On june:
+On alice:
 .IP
-.B openvpn \-\-remote may.kg \-\-dev tun1 \-\-ifconfig 10.4.0.2 10.4.0.1 
\-\-verb 5 \-\-secret key
+.B openvpn \-\-remote bob.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.2 
10.4.0.1 \-\-verb 5 \-\-secret key
 .LP
 Now verify the tunnel is working by pinging across the tunnel.
 .LP
-On may:
+On bob:
 .IP
 .B ping 10.4.0.2
 .LP
-On june:
+On alice:
 .IP
 .B ping 10.4.0.1
 .\"*********************************************************
 .SS Example 3: A tunnel with full TLS-based security
 For this test, we will designate
-.B may
+.B bob
 as the TLS client and
-.B june
+.B alice
 as the TLS server.
 .I Note that client or server designation only has meaning for the TLS 
subsystem.  It has no bearing on OpenVPN's peer-to-peer, UDP-based 
communication model.

 First, build a separate certificate/key pair
-for both may and june (see above where
+for both bob and alice (see above where
 .B \-\-cert
 is discussed for more info).  Then construct
 Diffie Hellman parameters (see above where
@@ -6732,21 +6732,21 @@ client.crt and server.crt.  For Diffie Hellman
 parameters you can use the included file dh1024.pem.
 .I Note that all client, server, and certificate authority certificates and 
keys included in the OpenVPN distribution are totally insecure and should be 
used for testing only.
 .LP
-On may:
+On bob:
 .IP
-.B openvpn \-\-remote june.kg \-\-dev tun1 \-\-ifconfig 10.4.0.1 10.4.0.2 
\-\-tls\-client \-\-ca ca.crt \-\-cert client.crt \-\-key client.key 
\-\-reneg\-sec 60 \-\-verb 5
+.B openvpn \-\-remote alice.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.1 
10.4.0.2 \-\-tls\-client \-\-ca ca.crt \-\-cert client.crt \-\-key client.key 
\-\-reneg\-sec 60 \-\-verb 5
 .LP
-On june:
+On alice:
 .IP
-.B openvpn \-\-remote may.kg \-\-dev tun1 \-\-ifconfig 10.4.0.2 10.4.0.1 
\-\-tls\-server \-\-dh dh1024.pem \-\-ca ca.crt \-\-cert server.crt \-\-key 
server.key \-\-reneg\-sec 60 \-\-verb 5
+.B openvpn \-\-remote bob.example.com \-\-dev tun1 \-\-ifconfig 10.4.0.2 
10.4.0.1 \-\-tls\-server \-\-dh dh1024.pem \-\-ca ca.crt \-\-cert server.crt 
\-\-key server.key \-\-reneg\-sec 60 \-\-verb 5
 .LP
 Now verify the tunnel is working by pinging across the tunnel.
 .LP
-On may:
+On bob:
 .IP
 .B ping 10.4.0.2
 .LP
-On june:
+On alice:
 .IP
 .B ping 10.4.0.1
 .LP
@@ -6766,12 +6766,12 @@ option to use OpenVPN's default key renegotiation 
interval of one hour.
 .SS Routing:
 Assuming you can ping across the tunnel,
 the next step is to route a real subnet over
-the secure tunnel.  Suppose that may and june have two network
+the secure tunnel.  Suppose that bob and alice have two network
 interfaces each, one connected
 to the internet, and the other to a private
 network.  Our goal is to securely connect
-both private networks.  We will assume that may's private subnet
-is 10.0.0.0/24 and june's is 10.0.1.0/24.
+both private networks.  We will assume that bob's private subnet
+is 10.0.0.0/24 and alice's is 10.0.1.0/24.
 .LP
 First, ensure that IP forwarding is enabled on both peers.
 On Linux, enable routing:
@@ -6782,11 +6782,11 @@ and enable TUN packet forwarding through the firewall:
 .IP
 .B iptables \-A FORWARD \-i tun+ \-j ACCEPT
 .LP
-On may:
+On bob:
 .IP
 .B route add \-net 10.0.1.0 netmask 255.255.255.0 gw 10.4.0.2
 .LP
-On june:
+On alice:
 .IP
 .B route add \-net 10.0.0.0 netmask 255.255.255.0 gw 10.4.0.1
 .LP
-- 
2.6.4



Reply via email to