Wasn’t compression done by openvpn considered a security risk, and to be
avoided.
Afaicr, Stephan Karger stated that compression should be done elsewhere.
From: "Gert Doering" mailto:g...@greenie.muc.de>>
Date: Friday, 10 February 2023 at 10:14:40
To: "Ralf Hildebrandt&q
Before opening SSH to the wordld, you might contemplate encapsulating it with
stunnel.
It also helps with paranoid firewalls ;-)
-Original Message-
From: Stefanie Leisestreichler
Sent: Tuesday, February 14, 2023 4:42 PM
To: openvpn-users@lists.sourceforge.net
Subject: [Openvpn-users
t) has expired.
If you use Easy-rsa (https://github.com/OpenVPN/easy-rsa) then you can build a
new
CRL with:
easyrsa gen-crl
This builds a new CRL which is valid for 180 days. You can configure the
validity
period with option --days:
easyrsa --days=365 gen-crl
You can also get a
equest.
This renewed certificate uses the original entity private key.
Make sure that you use EasyRSA version 3.1+, otherwise 'renew' will
not use the original key. Which means you also have to distribute
that entity NEW private key over a secure medium.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Thursday, February 23rd, 2023 at 23:20, Bo Berglund
wrote:
> I have used easy-rsa2 since I started with OpenVPN 10 years ago and I have
> made
> a script that eases the manufacture of cl
at 10:58:06AM +0100, Bo Berglund wrote:
> >
> > > And why is there an expiration of the crl file to begin with?
> >
> > I explained that, but that mail seems to have been lost - it's because
> > the assumption of the security folks (outside OpenVPN control) is tha
eems like the new crt file accepts the old existing client crt!
>
> NEXT TO DO?:
> ---
> I copy the ca_25.crt file to /etc/openvpn/keys dir and then edit the conf file
> for the services to use this new file as the ca entry like this:
>
> #ca /etc/openvpn/keys/ca.crt
&g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Thursday, March 2nd, 2023 at 10:12, Bo Berglund
wrote:
> I have downloaded easy-rsa3 version to my OpenVPN server for testing.
> I did so using wget on the v3.1.2/EasyRSA-3.1.2.tgz file below Relea
hanks
Richard
--- Original Message ---
On Thursday, March 2nd, 2023 at 16:56, Bo Berglund
wrote:
> On Thu, 02 Mar 2023 14:01:24 +, tincantech via Openvpn-users
> openvpn-users@lists.sourceforge.net wrote:
>
> > --- Original Message ---
> > On Thursday, Ma
ng this:
> >
> > wget
> > https://github.com/OpenVPN/easy-rsa/releases/download/v3.1.2/EasyRSA-3.1.2.tgz
> > tar -xvf EasyRSA-3.1.2.tgz
> >
> > This gives me a new EasyRSA-3.1. subdir in parallel with the existinf
> > easy-rsa
> > dir.
> >
&g
CeNrADh5FVftZnu2wsj76SJlQ==
=VvqL
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
ki
Without ';' termination, is valid.
Finally:
There is a bug in EasyRSA 3.1.2 which has been fixed in git/master.
Please try git/master from:
https://github.com/OpenVPN/easy-rsa/tree/master/easyrsa3
The bug-fix verifies that you have a working openssl before creating
a temporary sessio
chapter!
Regards
Richard
Sent with Proton Mail secure email.
--- Original Message ---
On Saturday, March 4th, 2023 at 17:41, tincantech
wrote:
> Updating openvpn-users list.
>
> If you do not use a browser for your internet then I do not support
> what-ever method tha
_vars_match=0
> [ "$CA_organizationalUnitName" = "$KEY_OU" ] || CA_vars_match=0
> [ "$CA_emailAddress" = "$KEY_EMAIL" ] || CA_vars_match=0
>
> if [ "$CA_vars_match" -eq 1 ]
> then
> CURRENT_CA_IS_VERIFIED="partially"
> else
> up23_fa
x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Follow-up:
https://github.com/OpenVPN/easy-rsa/issues/905
--- Original Message ---
On Sunday, March 5th, 2023 at 22:03, Bo Berglund wrote:
> On Sun, 05 Mar 2023 18:15:02 +, tincantech via Openvpn-users
> openvpn
tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
file yourself using openssl.
To determine if a private key is password protected, simply
look at the HEADER line in the file, which will read as:
-BEGIN ENCRYPTED PRIVATE KEY-
or
-BEGIN PRIVATE KEY-
For help with OpenVPN, there are two (possibly more) passwords,
of which, it is not
'help
options'.
Basic notes:
- https://github.com/OpenVPN/easy-rsa/issues/838
EasyRSA uses --passin/--passout to pass values to OpenSSL -passin/-passout.
Those values are dictated by OpenSSL expected syntax.
See:
- https://www.openssl.org/docs/man1.1.1/man1/openssl.html
(The very las
.req.
> What are these used for? They (.csr and *.req) do not get into the OVPN files
> and they are not mentioned in the OpenVPN server.conf files.
>
.csr means certificate signing request.
.req means the same thing but is simply "request".
For v3 they must be .req
>
>
download command I have used to get the latest version.
> Which is:
>
> svn export https://github.com/OpenVPN/easy-rsa.git/trunk/easyrsa3 easyrsa3
>
> It gave me these 11 files:
>
> A easyrsa3
> A easyrsa3/easyrsa
> A easyrsa3/openssl-easyrsa.cnf
> A easyrsa3/vars.e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with Proton Mail secure email.
--- Original Message ---
On Wednesday, March 8th, 2023 at 14:30, Bo Berglund
wrote:
> On Wed, 08 Mar 2023 01:45:40 +, tincantech via Openvpn-users
> openvpn-users@lists.sourceforge.net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Also,
Sent with Proton Mail secure email.
--- Original Message ---
On Wednesday, March 8th, 2023 at 16:35, tincantech via Openvpn-users
wrote:
>
>
>
>
>
> Sent with Proton Mail secure email.
>
>
&g
etails).
>
>
> (previously existing client)
> $ easyrsa show-cert BrittisUbu
>
> Showing cert details for: 'BrittisUbu'
>
> This file is stored at:
> * /home/bosse/openvpn/easyrsa3/pki/issued/BrittisUbu.crt
> Certificate:
> Data:
>
>
> X509v3 Extended Key
, Ralf Hildebrandt via Openvpn-users
wrote:
> > This is from the working connection - so it's "just log noise", it seems,
> > not causing an actual session abort.
>
>
> Good!
>
> > My gut feeling is that there is some garbage at the end of the CRL f
/tct/Downloads/crl.pem
Using:
date/time: VERIFY WARNING: depth=0, unable to get certificate CRL:
It works otherwise. OpenSSL 1.1.1f openvpn 2.7_git
BR
Sent with Proton Mail secure email.
--- Original Message ---
On Saturday, June 17th, 2023 at 14:01, tincantech via Openvpn-users
wrote
, spreading the load…
From: "Jason Long via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Sunday, 23 July 2023 at 10:40:44
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>,
"Leroy Tennison"
mailt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Monday, July 24th, 2023 at 11:42, Jason Long via Openvpn-users
wrote:
> Hello,
> Thank you so much for your reply.
> Your answer raised another question in my mind. Can I use the sam
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
This seems to have been forgotten.
--- Original Message ---
On Thursday, July 20th, 2023 at 11:24, Niccolò Belli
wrote:
> I'm using Debian 12 Bookworm with OpenVPN 2.6.3 on the server and Arch
> Linux with OpenVPN 2.6.5 [
addresses
or its clients. Duplicating those might lead to funny situations…
From: "Jason Long via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Sunday, 23 July 2023 at 16:41:04
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.source
From: "Jason Long via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Saturday, 22 July 2023 at 15:06:10
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: [Openvpn-users] OpenVPN multiple connecti
n.
If you encrypt your private keys with a password then you must enter
that password to use the keys in openvpn. You would add to your config
files 'askpass'.
Regards.
Sent with Proton Mail secure email.
--- Original Message ---
On Monday, July 24th, 2023 at 12:57, Jason Long wrote
OghFtlCA==
=xT0w
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Op
eport
> > that as a fault to your Internet Service Provider(s).
>
>
> Forgot what I've written before: I've did many more tests and apparently
> my connection(s)' MTU is not changing but something else is going on
> with openvpn.
My analysis of your test data,
t is your server (or client).
I am not interested in comparing your various network paths.
Establish a well known MTU on a well known path, first.
> > However, considering the data you have posted, I think OpenVPN
> > has documented the most simple solution.
> >
> > The
From: "Jason Long via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Saturday, 29 July 2023 at 16:18:44
To: "Tincantech via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: [Openvpn-users] How to write the iptables r
See below.
From: "tincantech via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Saturday, 29 July 2023 at 18:19:07
To: "Niccolò Belli"
mailto:darkba...@linuxsystems.it>>
Cc: "openvpn-users@lists.sourceforge.net"
mailto:openvpn
kernel scope link src 192.168.56.1
As a pointer; What ever errors exist here are only related to multiple
network interfaces, there are no openvpn errors present.
This question is open to all subscribers.
Sent with Proton Mail secure email.
--- Original Message ---
On Sunday, August 6th
Some thoughts below...
-Original Message-
From: Bo Berglund
Sent: Sunday, July 30, 2023 6:02 PM
To: openvpn-users@lists.sourceforge.net
Subject: Re: [Openvpn-users] How to write the iptables rules for a NIC with
multiple IP addresses?
On Sat, 29 Jul 2023 14:11:48 + (UTC), Jason
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Sent with Proton Mail secure email.
--- Original Message ---
On Saturday, August 12th, 2023 at 07:39, Jason Long via Openvpn-users
wrote:
> Hello,
> I added "tls-crypt ta.key 0" and "data-cipher AES-256-G
; On Saturday, August 12th, 2023 at 07:39, Jason Long via Openvpn-users
> openvpn-users@lists.sourceforge.net wrote:
>
>
>
> > Hello,
> > I added "tls-crypt ta.key 0" and "data-cipher AES-256-GCM" to my
> > Server.conf and "tls-crypt ta.key 1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Sent with Proton Mail secure email.
--- Original Message ---
On Monday, August 14th, 2023 at 09:23, Jason Long via Openvpn-users
wrote:
>
> Mon Aug 14 12:52:03 2023 read UDPv4: Connection reset by peer (WSAECONNRESET)
&g
lly has such an environment, then what is the solution?
This question is not related to Openvpn.
You must learn some basic networking knowledge via other means.
A book or online class, perhaps.
For now, I recommend that you DO NOT use a server with multiple NICs.
See if you can get a simple server to w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with Proton Mail secure email.
--- Original Message ---
On Monday, August 14th, 2023 at 14:13, Jason Long via Openvpn-users
wrote:
> Hello,
> To increase the security of OpenVPN, I want to use the ccd-exclusive.
t; > I take a loot at
> > "https://build.openvpn.net/man/openvpn-2.6/openvpn.8.html";, but it only
> > explained the capabilities of this option and did not provide any examples.
> > I did:
> > # mkdir /etc/openvpn/clients
> > # touch /etc/openvpn/clien
Hi,
Howto is here:
https://community.openvpn.net/openvpn/wiki/HOWTO
wkr
Pippin
--- Original Message ---
On Monday, August 14th, 2023 at 23:11, Jason Long via Openvpn-users
wrote:
> On Mon, Aug 14, 2023 at 11:47 PM, tincantech
>
>> wrote:
>> -BEGIN PGP SIGNED ME
e:
> >
> > > >
> > > > Hello,
> > > > Thank you so much for your help.
> > > > I take a loot at
> > > > "https://build.openvpn.net/man/openvpn-2.6/openvpn.8.html";, but it only
> > > > explained the capabilities
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Tuesday, August 15th, 2023 at 10:57, Jason Long wrote:
> Hello,
> My OpenVPN server internal network IP is "192.168.1.20" and the IP address of
> client is "192.168.1.21".
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Tuesday, August 15th, 2023 at 15:02, Gert Doering
wrote:
> Hi,
>
> On Tue, Aug 15, 2023 at 12:54:45PM +, Jason Long via Openvpn-users wrote:
>
> > I did a tcpdump:
> >
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Edited for brevity:
--- Original Message ---
> On 16.08.23 12:23, Jason Long via Openvpn-users wrote:
> > I opened the ca.crt file on the client and clicked on the Details tab
> > and it showed me "CN = Server". So
7IlaMVUdXGh6fbswg==
=yypt
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___________
Op
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
To follow up, a very brief introduction to Easy-RSA.
Download the latest Easy-RSA:
https://github.com/OpenVPN/easy-rsa/releases/tag/v3.1.5
Unpack that to a suitable folder in your HOME folder.
Change directory to the new folder.
Create your first
From: "Bruno Tréguier via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Monday, 14 August 2023 at 17:01:19
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: Re: [Openvpn-users] A question about
From: "Jason Long via Openvpn-users"
Hello,
I set a default getaway for my client and that error solved.
My question is that, suppose you want to set multiple public IP addresses on
the OpenVPN server. How do you
As I suggested before…
Did you read: https://lartc.org/lartc
From: "Jason Long via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Saturday, 26 August 2023 at 07:40:18
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>,
"Jochen Bern" mailto:jochen.b.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Not only but also,
This HOWTO is very useful:
https://community.openvpn.net/openvpn/wiki/HOWTO
YMMV
--
-BEGIN PGP SIGNATURE-
Version: ProtonMail
wsBzBAEBCAAnBYJk9GxPCZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr
kLidAACK4wf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Sunday, September 3rd, 2023 at 15:06, Bruno Tréguier via Openvpn-users
wrote:
> Le 03/09/2023 à 15:23, Jason Long a écrit :
>
> > Hello,
> > As I said, I have some scenario and I
See below
-Original Message-
From: Jochen Bern
Sent: Friday, September 22, 2023 1:06 AM
To: openvpn-users@lists.sourceforge.net
Subject: Re: [Openvpn-users] URL forwarding and blacklisting
On 21.09.23 21:50, Jason Long via Openvpn-users wrote:
> Hello,I have two questions:1- W
n how many days should certificates expire?
#
#set_var EASYRSA_CERT_EXPIRE825
HTH
--
>
>
> --
> Bo Berglund
> Developer in Sweden
>
>
>
> ___
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.ne
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with Proton Mail secure email.
--- Original Message ---
On Saturday, October 7th, 2023 at 07:20, Bo Berglund
wrote:
> On Fri, 06 Oct 2023 20:59:48 +, tincantech via Openvpn-users
> openvpn-users@lists.sourceforge.net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello OpenVPN Users,
--- Original Message ---
On Saturday, October 7th, 2023 at 14:27, tincantech via Openvpn-users
wrote:
> Note: The next release of Easy-RSA will not complain about the location
> of the vars file. Until then, y
ure
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
resulting PKI can be used along side OpenVPN option --tls-groups X448.
Use the PKI from EasyRSA, along with --tls-groups option on the server side.
Enjoy,
R
-BEGIN PGP SIGNATURE-
Version: ProtonMail
wsBzBAEBCAAnBYJlIa36CZBPl5z2a5C4nRYhBAm8PURno41yecVVVU+XnPZr
l.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Thursday, October 19th, 2023 at 23:39, tincantech via Openvpn-users
wrote:
> Hi,
>
> --- Original Message ---
> On Thursday, October 19th, 2023 at 23:11, Bo Berglund bo.bergl.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
--- Original Message ---
On Friday, October 20th, 2023 at 00:31, Bo Berglund
wrote:
> On Thu, 19 Oct 2023 22:52:12 +, tincantech via Openvpn-users
> openvpn-users@lists.sourceforge.net wrote:
>
> > I think I hav
C3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
ech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
I also pointed that out ;-)
>
> So you mean using the same service conf file as for the web + LAN operation,
> but
> with a different tunnel subnet and different port?
>
> That would allow LAN access.
This makes no sense.
FWIW, openvpn does not control your firewall or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Your DNS server is non-local and you are most likely
redirecting your gateway to the VPN.
So, DNS packets for your DNS server are set into the
tunnel and are finally dropped by the server gateway.
Openvpn has option : '--redirect-ga
server
side of the VPN; In which case you need to read the Howto
section which explains "Expanding the scope of the VPN ":
https://community.openvpn.net/openvpn/wiki/HOWTO#ExpandingthescopeoftheVPNtoincludeadditionalmachinesoneithertheclientorserversubnet
You do not need to use "
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
On Tuesday, 7 November 2023 at 05:27, Jason Long wrote:
>
> Hello,
> I added the following line to the server.conf file:
>
> push "route 172.20.0.0 255.255.255.0"
>
> Then, I restarted the OpenVPN se
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
for the record, OpenVPN does not set $PATH when executing scripts.
It looks like you have partially fixed this with use of `/usr/bin/echo`
but not done the same for `/usr/bin/resolvectl`.
You can set your expected $PATH for the script or call
-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https
Up/down relate to the state of the tun device.
It takes some time until you can send data through it.
From: "Leroy Tennison via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Saturday, 11 November 2023 at 07:21:17
To: "Openvpn Users&q
From: "Antonio Quartulli" mailto:a...@unstable.cc>>
Date: Monday, 11 December 2023 at 12:02:33
To: "Jason Long" mailto:hack3r...@yahoo.com>>, "Tincantech
via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: Re: [Openvpn-user
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I believe the correct answer here is:
OpenVPN does not provide a PDF form of the manual.
Which is a practical decision.
HTH
--
Sent with Proton Mail secure email.
On Monday, 11 December 2023 at 18:13, Hans via Openvpn-users
wrote
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Also:
https://openvpn.net/community-resources/#books
On Monday, 11 December 2023 at 18:25, tincantech
wrote:
> I believe the correct answer here is:
> OpenVPN does not provide a PDF form of the manual.
>
> Which is a practi
From: "Peter Davis via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Tuesday, 12 December 2023 at 07:08:08
To: "Tincantech via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: [Openvpn-users] Bypassing censorship devices
From: "Peter Davis"
mailto:peter.davis1...@proton.me>>
Date: Tuesday, 12 December 2023 at 19:29:03
To: "Witvliet, J, Ing." mailto:j.witvl...@mindef.nl>>
Cc: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>
S
From: "Peter Davis via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Tuesday, 12 December 2023 at 19:37:47
To: "Stella Ashburne" mailto:rewe...@gmx.com>>
Cc: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sou
From: "Peter Davis via Openvpn-users"
mailto:openvpn-users@lists.sourceforge.net>>
Date: Tuesday, 12 December 2023 at 19:46:18
To: "Stella Ashburne" mailto:rewe...@gmx.com>>
Cc: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sou
From: "Jochen Bern" mailto:jochen.b...@binect.de>>
Date: Wednesday, 13 December 2023 at 09:56:08
To: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sourceforge.net>>
Subject: Re: [Openvpn-users] Reference manual for OpenVPN 2.6 PDF
On 13.12.
From: Peter Davis
Sent: Wednesday, December 13, 2023 10:52 AM
To: Witvliet, J, Ing.
Cc: rewe...@gmx.com; openvpn-users@lists.sourceforge.net
Subject: Re: [Openvpn-users] Bypassing censorship devices
> On Wednesday, December 13th, 2023 at 12:13 AM,
> j.witvl...@mindef.nl<mailt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Sent with Proton Mail secure email.
On Thursday, 28 December 2023 at 04:15, Leroy Tennison via Openvpn-users
wrote:
> These are truly wild guesses but
>
All good advice.
> On Wednesday, December 27, 2023 at 09:13:21 PM CST
nmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with Proton Mail secure email.
On Saturday, 6 January 2024 at 06:48, Peter Davis via Openvpn-users
wrote:
> Hello,
>
> I edited the vars file as below and created an OpenVPN server:
>
>
> export KEY_COUNTRY="
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Sent with Proton Mail secure email.
On Saturday, 6 January 2024 at 06:48, Peter Davis via Openvpn-users
wrote:
> Hello,
>
> I edited the vars file as below and created an OpenVPN server:
>
>
> export KEY_COUNTRY="
ate accepts no
liability for damage of any kind resulting from the risks inherent in the
electronic transmission of messages.
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Sent with Proton Mail secure email.
On Monday, 8 January 2024 at 20:46, Antonio Quartulli wrote:
> Hi,
>
> On 08/01/2024 21:34, Hans via Openvpn-users wrote:
> > 1) how can I revoke a SINGLE client key (as this was
named "client" under /etc/openvpn/
> > directory?
>
The /etc/openvpn/client directory is intended for use of client openvpn
configuration files. Specifically, for use with systemd.
You will need to familiarise yourself with systemd to continue.
I believe openvpn have a
which does not have a public IP address.
> >
> > The RPi will be confiugured with openvpn to auto-connect to my VPN server
> > when
> > it starts.
> >
> > The client-to-server connection is used to make available a video library
> > to the
> > remo
onmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with Proton Mail secure email.
On Saturday, January 20th, 2024 at 11:05 PM, tincantech via Openvpn-users
wrote:
> Hi,
>
> On Saturday, January 20th, 2024 at 6:57 PM, Bo Berglund bo.bergl...@gmail.com
> wrote:
>
>
Sent with Proton Mail secure email.
On Sunday, January 21st, 2024 at 10:39, Bo Berglund
wrote:
> On Sun, 21 Jan 2024 03:21:40 +, tincantech via Openvpn-users
> openvpn-users@lists.sourceforge.net wrote:
>
> > For posterity:
> >
> > Server log --verb 4:
&g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
On Sunday, January 21st, 2024 at 1:42 PM, Bo Berglund
wrote:
> I looked around and found this File:
>
> /lib/systemd/system/openvpn-server@.service
That is the openvpn server unit file.
> Can I edit this file and rem
> but which does not deal with that, so I am continuing separately here.
>
> The issue:
> --
> Inside the globally set openvpn server configuration this item is defined:
> --suppress-timestamps
>
> This means that all server instances will get this set even though it
gt; level
> > to disable that setting such that the timestamps are returned to the
> > logfiles?
> > Like:
> > "reset suppress-timestamps"
> > or similar?
>
>
> OpenVPN does not assume to be called from something that sets undesired
> variable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
On Monday, January 22nd, 2024 at 11:23 PM, David Sommerseth
wrote:
> On 21/01/2024 17:34, tincantech via Openvpn-users wrote:
>
>
> > > Can I edit this file and remove the item --suppress-timestamps to possibly
> >
How about using stunnel instead?
From: "Gert Doering" mailto:g...@greenie.muc.de>>
Date: Wednesday, 24 January 2024 at 13:03:30
To: "Peter Davis" mailto:peter.davis1...@proton.me>>
Cc: "openvpn-users@lists.sourceforge.net"
mailto:openvpn-users@lists.sou
201 - 300 of 804 matches
Mail list logo