https://community.openvpn.net/openvpn/wiki/GettingStartedwithOVPN
Server-Konfiguration
sources for configuration: # [[http://sarwiki.informatik.hu-berlin.de/OpenVPN_|http://sarwiki.informatik.hu-berlin.de/OpenVPN_]](/doku.php?id=deutsch) # [http://www.online--tutorials.net/security/openvpn-tutorial/](http://www.online--tutorials.net/security/openvpn-tutorial/)
### BASICS
mode server
# bridged vpn with client IP range
server-bridge 192.168.72.1 255.255.255.0 192.168.72.61 192.168.72.100
# Protocol/port proto udp port 1194 ### Type of operation
# operation with PKI tls-server
# instead for using a symmetric key
secret /etc/openvpn/server_static.key
# for vpn with shared key
tls-auth xxx 1 # Device type dev tap0
# receive connection request on this local adress only
# if not defined, use all interfaces
local 192.168.172.1
`# topology and network topology
subnet `
`# make IPs persistant
ifconfig-pool-persist ipp.txt `
`# clients can see each other
client-to-client `
`# see http://winaero.com/blog/speed-up-openvpn-and-get-faster-speed-over-its-channel/
sndbuf 393216
rcvbuf 393216 `
`## PKI - certificates and keys, directory of cert/key
cd /etc/openvpn `
`## Root CA which signed openvpn server and client certs
ca /etc/easyrsa-pki/ca.crt
cert of openvpn server
cert /etc/openvpn/locutus.netzwissen.local.crt `
`## key of server
key /etc/openvpn/locutus.netzwissen.local.key
diffie hellman parameter
create with: openssl genpkey -genparam -algorithm DH -out /etc/openvpn/dh2014.pem
dh /etc/easyrsa-pki/dh.pem `
`# certificate revocation list, should be copied from CA
crl-verify /etc/openvpn/crl.pem `
`# Verification of certs
Details: https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage
old method (Name/name-prefix from CN field)
verify-x509-name locutus.netzwissen.local name `
`# new method from RFC3280: type of certificate must be client
remote-cert-eku „TLS Web Client Authentication“ `
`# Cipher algorithm
cipher AES-256-CBC
HMAC Authentication
auth SHA256 `
`# tunnel compression
comp-lzo `
`# hardening. Beware: can exclude pre-2.3.3 clients
tls-version-min 1.2 `
`## pushed configs for clients for routing & dns
redirect all traffic to VPN
push „redirect-gateway def1“ push „route 192.168.72.0 255.255.255.0 172.168.72.1“
push „dhcp-option DOMAIN netzwissen.local“
push „dhcp-option DNS 192.168.72.1“
push „dhcp-option WINS 192.168.72.1“ `
`# http://winaero.com/blog/speed-up-openvpn-and-get-faster-speed-over-its-channel/
push „sndbuf 393216“
push „rcvbuf 393216“ `
`# will not work with –ifconfig-pool-persist
duplicate-cn # permissions after connect
user nobody
group nogroup `
`# dont re-read keys after –ping-restart
persist-key `
`# dont restart tun after –ping-restart
persist-tun `
`### LOGGING
log /var/log/openvpn.log `
`# Status info
status /var/log/openvpn-status.log 20
dont repeat messages so often
mute 20 `
`# Log-Levels: 0 no logging, 4 standard, 5 + 6 debugging, 9 max
verb 6 `
`# Daemon-Mode: write to syslog - activate after the configuration finished
daemon `
`# Management console
management localhost 7505 `
Management Console
Die Management Konsole läuft auf localhost und ist über P. 7505 erreichbar.
root@server6:/etc/openvpn/staticclients# telnet localhost 7505
Beenden mit quit.
INFO:OpenVPN Management Interface Version 1 – type 'help' for more info help Management Interface for OpenVPN 2.3.10 x86*64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Commands: auth-retry t : Auth failure retry mode (none,interact,nointeract). bytecount n : Show bytes in/out, update every n secs (0=off). echo [on|off] [N|all] : Like log, but only show messages in echo buffer. exit|quit : Close management session. forget-passwords : Forget passwords entered so far. help : Print this message. hold [on|off|release] : Set/show hold flag to on/off state, or release current hold and start tunnel. kill cn : Kill the client instance(s) having common name cn. kill IP:port : Kill the client instance connecting from IP:port. load-stats : Show glsobal server load stats. log [on|off] [N|all] : Turn on/off realtime log display + show last N lines or 'all' for entire history. mute [n] : Set log mute level to n, or show level if n is absent. needok type action : Enter confirmation for NEED-OK request of 'type', where action = 'ok' or 'cancel'. needstr type action : Enter confirmation for NEED-STR request of 'type', where action is reply string. net : (Windows only) Show network info and routing table. password type p : Enter password p for a queried OpenVPN password. remote type [host port] : Override remote directive, type=ACCEPT|MOD|SKIP. proxy type [host port flags] : Enter dynamic proxy server info. pid : Show process ID of the current OpenVPN process. pkcs11-id-count : Get number of available PKCS#11 identities. pkcs11-id-get index : Get PKCS#11 identity at index. client-auth CID KID : Authenticate client-id/key-id CID/KID (MULTILINE) client-auth-nt CID KID : Authenticate client-id/key-id CID/KID client-deny CID KID R [CR] : Deny auth client-id/key-id CID/KID with log reason text R and optional client reason text CR client-kill CID [M] : Kill client instance CID with message M (def=RESTART) env-filter [level] : Set env-var filter level client-pf CID : Define packet filter for client CID (MULTILINE) rsa-sig : Enter an RSA signature in response to >RSA*SIGN challenge Enter signature base64 on subsequent lines followed by END signal s : Send signal s to daemon, s = SIGHUP|SIGTERM|SIGUSR1|SIGUSR2. state [on|off] [N|all] : Like log, but show state history. status [n] : Show current daemon status info using format #n. test n : Produce n lines of output for testing/debugging. username type u : Enter username u for a queried OpenVPN username. verb [n] : Set log verbosity level to n, or show if n is absent. version : Show current version number.
Debugging auf OpenVPN Client Seite (Linux)
journalctl -fu NetworkManager
Client IPs fest zuweisen
In die *.conf kommt eine neue Direktive:
client-config-dir /etc/openvpn/staticclients
In diesem Verzeichnis für jeden Client einen Datei openvpndvsdnet[name] legen. Diese enthält die IP Adresse und die Netzmaske des Clients:
ifconfig-push 192.168.50.16 255.255.255.0
OpenVPN liest diese Datei beim Connect zusätzlich ein, aber DNS und Gateway kommen weiterhin über die zentralen push Kommandos. Ggf kann man auch ein Client-spezifisches Push anhängen, siehe dazu http://michlstechblog.info/blog/openvpn-set-a-static-ip-address-for-a-client/
Quelle: https://github.com/OpenVPN/easy-rsa
EASYRSA: CA einrichten
./easyrsa init-pki ./easyrsa build-ca
DH erzeugen
./easyrsa gen-dh
EASYRSA: Zertifikate erzeugen
Signing Request (CSR) erzeugen, mit nopass = Key ohne Passwort
./easyrsa gen-req EntityName ./easyrsa gen-req EntityName nopass
danach signieren mit
./easyrsa sign-req server EntityName ./easyrsa sign-req client EntityName
server und client bestimmt, ob es ein Server oder Client Zertifikat ist.
Achtung bei OpenVPN: der Client sollte den im OpenVPN Zertifikat angegebenen Common Name prüfen. Server prüft seinerseits den Zertifikatstyp des Clients (RFC3280):
# Verification of certs # Details: [https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage](https://community.openvpn.net/openvpn/wiki/Openvpn23ManPage) # old method (Name/name-prefix from CN field) # verify-x509-name locutus.netzwissen.local name # new method from RFC3280: type of certificate must be client remote-cert-eku "TLS Web Client Authentication"
EASYRSA: Zertifikate zurückziehen
./easyrsa revoke server EntityName
Danach mit easyrsa gen-crl die zurückgezogenen zertifikate in die crl aufnehmen.
pki/index.txt zeigt, welche Zertifikate zurückkgezogen wurden.
Inhalte kontrollieren
Zertifikat
openssl x509 -in pki/issued/openvpn.dvsdnet.local.crt -text -noout
CSR
openssl req -in www2.netzwissen.de.csr -text -noout