1
1
#################################################
2
- # Sample OpenVPN 2.0 config file for #
2
+ # Sample OpenVPN 2.6 config file for #
3
3
# multi-client server. #
4
4
# #
5
5
# This file is for the server side #
@@ -47,15 +47,15 @@ proto udp
47
47
# an explicit unit number, such as tun0.
48
48
# On Windows, use "dev-node" for this.
49
49
# On most systems, the VPN will not function
50
- # unless you partially or fully disable
50
+ # unless you partially or fully disable/open
51
51
# the firewall for the TUN/TAP interface.
52
52
;dev tap
53
53
dev tun
54
54
55
55
# Windows needs the TAP-Win32 adapter name
56
56
# from the Network Connections panel if you
57
- # have more than one. On XP SP2 or higher,
58
- # you may need to selectively disable the
57
+ # have more than one.
58
+ # You may need to selectively disable the
59
59
# Windows firewall for the TAP adapter.
60
60
# Non-Windows systems usually don't need this.
61
61
;dev-node MyTap
@@ -66,15 +66,23 @@ dev tun
66
66
# key file. The server and all clients will
67
67
# use the same ca file.
68
68
#
69
- # See the "easy-rsa" directory for a series
70
- # of scripts for generating RSA certificates
69
+ # See the "easy-rsa" project at
70
+ # https://github.com/OpenVPN/easy-rsa
71
+ # for generating RSA certificates
71
72
# and private keys. Remember to use
72
73
# a unique Common Name for the server
73
74
# and each of the client certificates.
74
75
#
75
76
# Any X509 key management system can be used.
76
77
# OpenVPN can also use a PKCS #12 formatted key file
77
78
# (see "pkcs12" directive in man page).
79
+ #
80
+ # If you do not want to maintain a CA
81
+ # and have a small number of clients
82
+ # you can also use self-signed certificates
83
+ # and use the peer-fingerprint option.
84
+ # See openvpn-examples man page for a
85
+ # configuration example.
78
86
ca ca.crt
79
87
cert server.crt
80
88
key server.key # This file should be kept secret
@@ -84,12 +92,18 @@ key server.key # This file should be kept secret
84
92
# openssl dhparam -out dh2048.pem 2048
85
93
dh dh2048.pem
86
94
95
+ # Allow to connect to really old OpenVPN versions
96
+ # without AEAD support (OpenVPN 2.3.x or older)
97
+ # This adds AES-256-CBC as fallback cipher and
98
+ # keeps the modern ciphers as well.
99
+ ;data-ciphers AES-256-GCM:AES-128-GCM:?CHACHA20-POLY1305:AES-256-CBC
100
+
87
101
# Network topology
88
102
# Should be subnet (addressing via IP)
89
103
# unless Windows clients v2.0.9 and lower have to
90
104
# be supported (then net30, i.e. a /30 per client)
91
105
# Defaults to net30 (not recommended)
92
- ; topology subnet
106
+ topology subnet
93
107
94
108
# Configure server mode and supply a VPN subnet
95
109
# for OpenVPN to draw client addresses from.
@@ -218,7 +232,7 @@ ifconfig-pool-persist ipp.txt
218
232
# IF YOU HAVE NOT GENERATED INDIVIDUAL
219
233
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
220
234
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
221
- # UNCOMMENT THIS LINE OUT .
235
+ # UNCOMMENT THIS LINE.
222
236
;duplicate-cn
223
237
224
238
# The keepalive directive causes ping-like
@@ -241,26 +255,7 @@ keepalive 10 120
241
255
# a copy of this key.
242
256
# The second parameter should be '0'
243
257
# on the server and '1' on the clients.
244
- tls-auth ta.key 0 # This file is secret
245
-
246
- # Select a cryptographic cipher.
247
- # This config item must be copied to
248
- # the client config file as well.
249
- # Note that v2.4 client/server will automatically
250
- # negotiate AES-256-GCM in TLS mode.
251
- # See also the ncp-cipher option in the manpage
252
- cipher AES-256-CBC
253
-
254
- # Enable compression on the VPN link and push the
255
- # option to the client (v2.4+ only, for earlier
256
- # versions see below)
257
- ;compress lz4-v2
258
- ;push "compress lz4-v2"
259
-
260
- # For compression compatible with older clients use comp-lzo
261
- # If you enable it here, you must also
262
- # enable it in the client config file.
263
- ;comp-lzo
258
+ ;tls-auth ta.key 0 # This file is secret
264
259
265
260
# The maximum number of concurrently connected
266
261
# clients we want to allow.
0 commit comments