<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>openvpn &#8211; Farlock.org</title>
	<atom:link href="https://www.farlock.org/tag/openvpn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.farlock.org</link>
	<description>What you want to hack today?</description>
	<lastBuildDate>Wed, 02 Apr 2014 06:14:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0</generator>
	<item>
		<title>OpenVPN Linux Server &#8211; Router OS Client</title>
		<link>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/</link>
					<comments>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 10 Jul 2012 14:36:08 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Mikrotik]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[openvpn]]></category>
		<category><![CDATA[routeros]]></category>
		<guid isPermaLink="false">http://www.farlock.org/?p=195</guid>

					<description><![CDATA[<p>Launch this commands:</p> <p>CATOP=./personalCA</p> <p>CAKEY=./cakey.pem</p> <p>CAREQ=./careq.pem</p> <p>CACERT=./cacert.pem</p> <p>cd /etc/ssl</p> <p>mkdir $CATOP</p> <p>mkdir $CATOP/certs</p> <p>mkdir $CATOP/crl</p> <p>mkdir $CATOP/newcerts</p> <p>mkdir $CATOP/private</p> <p>echo &#8220;00&#8221; &#62; $CATOP/serial</p> <p>echo &#8220;00&#8221; &#62; $CATOP/crlnumber</p> <p>touch $CATOP/index.txt</p> <p>export OPENSSL_CONF=/etc/ssl/essetigiCA.cnf</p> <p>copy /etc/ssl/openssl.cnf to personalCA.cnf and edit OrganizationName, Country, State, ecc fields.</p> <p>Then execute:</p> <p>openssl req -new -keyout $CATOP/private/$CAKEY -out $CATOP/$CAREQ</p> <p>write a complex passhprase [...]]]></description>
										<content:encoded><![CDATA[<p>Launch this commands:</p>
<blockquote><p>CATOP=./personalCA</p>
<p>CAKEY=./cakey.pem</p>
<p>CAREQ=./careq.pem</p>
<p>CACERT=./cacert.pem</p>
<p>cd /etc/ssl</p>
<p>mkdir $CATOP</p>
<p>mkdir $CATOP/certs</p>
<p>mkdir $CATOP/crl</p>
<p>mkdir $CATOP/newcerts</p>
<p>mkdir $CATOP/private</p>
<p>echo &#8220;00&#8221; &gt; $CATOP/serial</p>
<p>echo &#8220;00&#8221; &gt; $CATOP/crlnumber</p>
<p>touch $CATOP/index.txt</p>
<p>export OPENSSL_CONF=/etc/ssl/essetigiCA.cnf</p></blockquote>
<p>copy /etc/ssl/openssl.cnf to personalCA.cnf and edit OrganizationName, Country, State, ecc fields.</p>
<p>Then execute:</p>
<blockquote><p>openssl req -new -keyout $CATOP/private/$CAKEY -out $CATOP/$CAREQ</p></blockquote>
<p>write a complex passhprase and remember it! Without it the CA is completely useless. It asks also for information about the CA.</p>
<p>Now we create our CA, it asks for the passphrase:</p>
<blockquote><p>openssl ca -out $CATOP/$CACERT $CADAYS -extensions v3_ca -days 36500 -keyfile $CATOP/private/$CAKEY -selfsign -infiles $CATOP/$CAREQ</p></blockquote>
<p>Server certificate:</p>
<blockquote><p>openssl req -new -nodes -keyout $CATOP/private/server_key.pem -out $CATOP/certs/server_req.pem</p>
<p>openssl ca -out $CATOP/certs/server_cert.pem -days 13000 -extensions server_cert -infiles $CATOP/certs/server_req.pem</p></blockquote>
<p>client certificate:</p>
<blockquote><p>openssl req -new -nodes -keyout $CATOP/private/client01_key.pem -out $CATOP/certs/client01_req.pem</p>
<div>openssl ca -out $CATOP/certs/client01_cert.pem -days 10000  -infiles $CATOP/certs/client01_req.pem</div>
</blockquote>
<p>That&#8217;s all.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.farlock.org/linux/openvpn-linux-server-router-os-client/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VPN Client with NSLU2 and OpenWrt</title>
		<link>https://www.farlock.org/nslu2/vpn-client-with-nslu2-and-openwrt/</link>
					<comments>https://www.farlock.org/nslu2/vpn-client-with-nslu2-and-openwrt/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 04 Sep 2008 09:33:47 +0000</pubDate>
				<category><![CDATA[Nslu2 Hack]]></category>
		<category><![CDATA[nslu2 hack]]></category>
		<category><![CDATA[openvpn]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[vpn client]]></category>
		<guid isPermaLink="false">http://farlock.wallweb.net/?p=39</guid>

					<description><![CDATA[ Login again in your hacked nslu2 Install needed package: <p># ipkg install ppp openvpn chat openntpd</p> <p># ipkg install http://downloads.openwrt.org/snapshots/ixp4xx/packages/hwclock_2.13.0.1-2_armeb.ipk</p> And let configure them: <p># vi /etc/ntpd.conf</p> <p>server 193.204.114.232 server 193.204.114.233 server ntp1.inrim.it # or a ntp server near you server ntp2.inrim.it # or another ntp server near you listen on *</p> <p># /etc/init.d/ntpd [...]]]></description>
										<content:encoded><![CDATA[<ul>
<li>Login again in your hacked nslu2</li>
<li>Install needed package:<em><br />
</em></li>
</ul>
<p><em># ipkg install ppp openvpn chat openntpd</em></p>
<p><em># ipkg install http://downloads.openwrt.org/snapshots/ixp4xx/packages/hwclock_2.13.0.1-2_armeb.ipk</em></p>
<ul>
<li>And let configure them:</li>
</ul>
<p><em># vi /etc/ntpd.conf</em></p>
<blockquote><p><em>server 193.204.114.232<br />
server 193.204.114.233<br />
server </em>ntp1.inrim.it<em> # or a ntp server near you<br />
server </em>ntp2.inrim.it<em> # or another ntp server near you<br />
listen on *</em></p></blockquote>
<p><em># /etc/init.d/ntpd disable</em></p>
<p><em># /etc/init.d/ntpd start</em></p>
<ul>
<li>We use a bridge configuration for network, edit /etc/config/network and add this line in eth0 section:</li>
</ul>
<blockquote><p>option type     &#8216;bridge&#8217;</p></blockquote>
<ul>
<li>Copy <em>gprsd.sh</em> in <em>/usr/scripts</em></li>
<li>Copy <em>gprsd</em> in <em>/etc/default</em> and edit it</li>
<li>Copy <em>custom-user-startup</em> into <em>/etc/init.d/</em></li>
</ul>
<blockquote><p><em># /etc/init.d/custom-user-startup enable<br />
</em></p></blockquote>
<ul>
<li>run <em># crontab -e </em>and add</li>
</ul>
<blockquote><p>*/3 * * * *    /usr/script/gprsd.sh checkrunning &amp;</p></blockquote>
<ul>
<li>copy <em>chat</em> and <em>peers</em> directory into <em>/etc/ppp</em></li>
<li>Copy<em> openvpn </em>into<em> /etc</em></li>
<li>Edit /etc/default/openvpn, add &#8220;<em>ENABLED=1</em>&#8221; and change config file</li>
<li>Edit /etc/init.d/openvpn, add &#8220;ENABLED=0&#8221; and this to start () function:</li>
</ul>
<blockquote><p>if [ &#8220;$ENABLED&#8221; != &#8220;1&#8221; ] ; then<br />
echo &#8220;$BIN disabled, check $DEFAULT&#8221;<br />
exit 0<br />
fi</p></blockquote>
<ul>
<li>run <em>#/etc/init.d/openvpn enable</em></li>
<li>bla bla bla (nice in openvpn.conf)</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.farlock.org/nslu2/vpn-client-with-nslu2-and-openwrt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
