0% found this document useful (0 votes)
27 views5 pages

Ilhamprmna-1599451283 Ovpn

This document contains an OpenVPN client configuration file that can be used by multiple clients to connect to an OpenVPN server. It specifies client-side settings like connecting via UDP, authenticating with specific certificate and key files, and logging settings. The full certificate needed by the clients is included.

Uploaded by

Ilham Permana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views5 pages

Ilhamprmna-1599451283 Ovpn

This document contains an OpenVPN client configuration file that can be used by multiple clients to connect to an OpenVPN server. It specifies client-side settings like connecting via UDP, authenticating with specific certificate and key files, and logging settings. The full certificate needed by the clients is included.

Uploaded by

Ilham Permana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

##############################################

# Sample client-side OpenVPN 2.0 config file #


# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################

# Specify that we are a client and that we


# will be pulling certain config file directives
# from the server.
client

# Use the same setting as you are using on


# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name


# from the Network Connections panel
# if you have more than one. On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap

# Are we connecting to a TCP or


# UDP server? Use the same setting as
# on the server.
;proto tcp
proto udp

# The hostname/IP and port of the server.


# You can have multiple remote entries
# to load balance between the servers.
remote vpn.hunsterverse.net 1194
;remote my-server-2 1194

# Choose a random host from the remote


# list for load-balancing. Otherwise
# try hosts in the order specified.
;remote-random

# Keep trying indefinitely to resolve the


# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite

# Most clients don't need to bind to


# a specific local port number.
nobind
# Downgrade privileges after initialization (non-Windows only)
user nobody
group nogroup

# Try to preserve some state across restarts.


persist-key
persist-tun

# If you are connecting through an


# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]

# Wireless networks often produce a lot


# of duplicate packets. Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings

# SSL/TLS parms.
# See the server config file for more
# description. It's best to use
# a separate .crt/.key file pair
# for each client. A single ca
# file can be used for all clients.
;ca ca.crt
;cert client.crt
;key client.key

# Verify server certificate by checking


# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
ns-cert-type server

# If a tls-auth key is used on the server


# then every client must also have the key.
;tls-auth ta.key 1

# Select a cryptographic cipher.


# If the cipher option is used on the server
# then you must also specify it here.
;cipher x

# Enable compression on the VPN link.


# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo
# Set log file verbosity.
verb 3

# Silence repeating messages


;mute 20
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
<cert>
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 55307 (0xd80b)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=HunsterMonterUnit,
CN=Fort-Funston CA/name=server/emailAddress=zackvixacd@gmail.com
Validity
Not Before: Sep 7 04:07:00 2020 GMT
Not After : Sep 5 04:07:00 2030 GMT
Subject: C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=HunsterMonterUnit,
CN=ilhamprmna-1599451283/name=server/emailAddress=zackvixacd@gmail.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:be:83:ef:75:97:4a:89:d0:f4:93:ed:07:09:87:
cc:85:5e:59:d8:6c:c1:2f:9b:81:6e:d2:9f:ac:69:
1b:ab:55:68:ab:6a:67:e1:ae:65:f8:22:78:0f:96:
26:d6:6b:05:da:06:f6:11:c7:8e:7a:a2:cd:e4:d4:
59:b3:1e:17:ef:fd:6f:54:c6:ce:f9:04:9b:3c:22:
4e:9b:81:18:e8:a1:59:6a:94:64:1b:cc:ba:dc:80:
7f:6f:42:7c:0c:ca:f5:d9:69:5f:70:fb:df:4d:9c:
28:63:e7:cb:f8:0e:a4:41:de:3d:01:a7:34:d7:12:
26:da:1f:b5:cd:c5:67:89:02:6a:fb:69:b2:c0:28:
5c:48:c3:ba:68:d1:14:eb:5f:2e:77:b0:4e:f4:13:
50:7e:92:ec:3f:54:e3:f6:d7:79:fc:b2:64:1e:0e:
2c:ff:3a:18:ec:24:c7:bb:78:54:0b:6d:8d:6d:6d:
12:fe:49:83:d3:e9:64:c5:f3:db:9a:9e:32:ab:6b:
1f:4a:dd:ea:a8:5f:c2:c3:05:c2:fa:0c:29:d3:37:
c1:98:7f:ab:f1:57:95:b8:33:93:a8:8c:f0:40:62:
1e:c9:57:a4:ea:21:5b:99:8a:79:01:2e:1d:dd:b2:
11:b0:b5:3b:9d:00:bb:d5:ab:94:e4:7f:ae:03:f9:
0f:7d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
Easy-RSA Generated Certificate
X509v3 Subject Key Identifier:
76:1D:CF:CA:B5:40:32:FC:CE:CF:F7:95:7C:41:34:AF:30:CD:01:EA
X509v3 Authority Key Identifier:
keyid:35:B6:93:67:68:30:8F:8C:50:DD:1B:16:79:37:60:5C:05:FA:72:DA

DirName:/C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=HunsterMonterUnit/CN=Fort-
Funston CA/name=server/emailAddress=zackvixacd@gmail.com
serial:87:C7:1C:DC:96:A5:1B:C8

X509v3 Extended Key Usage:


TLS Web Client Authentication
X509v3 Key Usage:
Digital Signature
X509v3 Subject Alternative Name:
DNS:ilhamprmna-1599451283
Signature Algorithm: sha256WithRSAEncryption
0b:01:32:f1:be:4f:ad:00:15:24:f5:81:07:91:c9:02:39:60:
3a:f0:95:93:05:6e:f4:9b:33:19:a9:c1:0f:67:64:82:b1:a4:
34:ac:0b:43:a7:67:0d:60:e7:4a:46:22:d8:2e:92:ea:d5:e1:
b3:7b:20:41:00:d0:f0:f7:8a:7b:17:fb:39:f2:d7:0e:a9:50:
8d:60:6d:db:23:e1:03:56:c7:a8:eb:4c:34:b1:55:a1:e7:54:
1e:65:23:39:50:ba:1c:13:07:f9:94:30:6f:cd:26:08:84:55:
9d:93:68:90:c1:2a:cc:8e:ac:11:48:6b:d1:aa:a3:13:8c:13:
4f:f6:05:8e:33:57:01:a1:ac:a3:55:12:e1:4b:f2:9d:70:e5:
0d:cd:b7:ef:a3:21:8f:20:4a:fe:88:d0:b9:ae:d9:dc:3a:08:
30:f8:73:c3:8e:c6:8b:99:b0:bc:4f:e9:68:3c:6d:b4:cd:5a:
0f:56:90:2e:58:a3:79:a3:8c:db:8f:a7:f1:f2:48:c0:35:9d:
19:4e:e2:a4:d9:45:fe:14:46:0e:2a:d0:fe:51:ba:83:dd:17:
18:ff:d1:cc:dc:5c:73:6d:44:9e:aa:80:8a:d5:16:08:78:71:
8c:f4:ba:c1:0c:2c:e7:9a:7f:42:30:95:be:a8:2e:c7:f5:b4:
6d:d5:07:f6
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
</key>

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy