On 9/18/22 14:23, William Kenworthy wrote:
On 18/9/22 16:26, n952162 wrote:
On 9/18/22 09:52, William Kenworthy wrote:
On 18/9/22 15:26, n952162 wrote:
Hello all,
I want to ssh over my openvpn connection, and I can't do it, the
connection times out.
I saw a reference to gentoo in the
On 9/18/22 1:26 AM, n952162 wrote:
I want to ssh over my openvpn connection, and I can't do it, the
connection times out.
IMHO the first, second, and third thing to try when OpenSSH clients fail
for some reason is `-v`, `-v -v`, and `-v -v -v` in your ssh command(s).
That will almost always
On Sun, 2022-09-18 at 09:26 +0200, n952162 wrote:
>
> Then, for some reason (licensing?), we were switched to openvpn, which
> works for xfreerdp but not for ssh.
>
> I don't have control over the institution's firewall (but I do have for
> the host itself)
>
Is the machine that you're trying
On 9/18/22 11:08, Michael wrote:
On Sunday, 18 September 2022 08:52:13 BST William Kenworthy wrote:
On 18/9/22 15:26, n952162 wrote:
Hello all,
I want to ssh over my openvpn connection, and I can't do it, the
connection times out.
I saw a reference to gentoo in the openvpn scripts in
On Sunday, 18 September 2022 08:52:13 BST William Kenworthy wrote:
> On 18/9/22 15:26, n952162 wrote:
> > Hello all,
> >
> > I want to ssh over my openvpn connection, and I can't do it, the
> > connection times out.
> >
> > I saw a reference to gentoo in the openvpn scripts in /etc/openvpn and
>
On 18/9/22 15:26, n952162 wrote:
Hello all,
I want to ssh over my openvpn connection, and I can't do it, the
connection times out.
I saw a reference to gentoo in the openvpn scripts in /etc/openvpn and
thought maybe somebody here knows something about this.
Earlier my institution
Hello all,
I want to ssh over my openvpn connection, and I can't do it, the
connection times out.
I saw a reference to gentoo in the openvpn scripts in /etc/openvpn and
thought maybe somebody here knows something about this.
Earlier my institution recommended openconnect, and I was able to
Thank you. [SOLVED]
All I needed was on sever.conf line:
tls-auth /etc/openvpn/cert/ta.key 0
In my case it was pointing it to a wrong file :-/
Thelma
On 02/22/2020 03:30 AM, Roger Welsh wrote:
> Hi Thelma,
>
> I think you need
> tls-server
> And
> tls-client
> In your respective configs
Hi Thelma,
I think you need
tls-server
And
tls-client
In your respective configs below.
Reference:
https://askubuntu.com/questions/594868/openvpn-hmac-authentication-failure-no-matter-what-i-do
And
https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/
Grep for
When I try to start openVPN on a client I see this error on a server:
Sat Feb 22 02:32:10 2020 Authenticate/Decrypt packet error: packet HMAC
authentication failed
Sat Feb 22 02:32:10 2020 TLS Error: incoming packet authentication failed from
[AF_INET]
cat server.conf
proto udp
port 9000
dev
On Tuesday, April 10, 2018 1:25:42 PM CEST Simon Thelen wrote:
> On 18-04-10 at 10:55, Christoph Böhmwalder wrote:
> > I was wondering how the OpenRC dependencies between start scripts work.
> >
> > Basically, I have two network interfaces on my laptop (wlp3s0 and
> > enp0s20u2u3 for wireless and
On Tuesday, 10 April 2018 14:59:39 BST Christoph Böhmwalder wrote:
> On Tue, Apr 10, 2018 at 01:25:42PM +0200, Simon Thelen wrote:
> > What does your /etc/runlevels/ look like? Is the openvpn service in one
> > of the runlevels? Are either of your network interfaces in one of the
> > runlevels?
>
On Tue, Apr 10, 2018 at 09:28:10AM -0400, Michael Orlitzky wrote:
> This is half the problem, but the OpenVPN init script probably shouldn't
> have "need net" in its depend() function to begin with. It runs fine
> with only the loopback interface up.
That's exactly why I got confused. Shouldn't
On Tue, Apr 10, 2018 at 01:25:42PM +0200, Simon Thelen wrote:
> What does your /etc/runlevels/ look like? Is the openvpn service in one
> of the runlevels? Are either of your network interfaces in one of the
> runlevels?
Looking at `rc-status -a`, the openvpn service and the wifi interface
are
On 04/10/2018 07:25 AM, Simon Thelen wrote:
>
> Also check /etc/rc.conf and try setting rc_depend_strict="NO". I do wish
> there were a way to modify require/provides without having to edit the
> init scripts themselves.
>
This is half the problem, but the OpenVPN init script probably shouldn't
On 18-04-10 at 10:55, Christoph Böhmwalder wrote:
> I was wondering how the OpenRC dependencies between start scripts work.
>
> Basically, I have two network interfaces on my laptop (wlp3s0 and
> enp0s20u2u3 for wireless and ethernet respectively). When I start the
> wireless interface service
I was wondering how the OpenRC dependencies between start scripts work.
Basically, I have two network interfaces on my laptop (wlp3s0 and
enp0s20u2u3 for wireless and ethernet respectively). When I start the
wireless interface service (rc-service net.wlp3s0 start) the OpenVPN
service starts and
On 01/18/2018 07:15 AM, Michael Orlitzky wrote:
> On 01/17/2018 09:51 PM, the...@sys-concept.com wrote:
>> How openvpn client obtains IP address from the server?
>>
>> On the sever in server.conf I had:
>> server 192.168.139.0 255.255.255.0
>> route 10.0.0.0 255.255.255.0 192.168.139.7
>>
>> On
On 01/17/2018 09:51 PM, the...@sys-concept.com wrote:
> How openvpn client obtains IP address from the server?
>
> On the sever in server.conf I had:
> server 192.168.139.0 255.255.255.0
> route 10.0.0.0 255.255.255.0 192.168.139.7
>
> On server in ccd/ I had client.file:
> ifconfig-push
How openvpn client obtains IP address from the server?
On the sever in server.conf I had:
server 192.168.139.0 255.255.255.0
route 10.0.0.0 255.255.255.0 192.168.139.7
On server in ccd/ I had client.file:
ifconfig-push 192.168.139.3 255.255.255.0
When I connected to server my client IP address
On Monday 06 Feb 2017 23:14:39 the...@sys-concept.com wrote:
> On 02/06/2017 10:37 PM, the...@sys-concept.com wrote:
> [snip]
>
> > but I'm getting an error below:
> >
> > ./easyrsa build-client-full syscon_home nopass
> > NOTE: If you run ./clean-all, I will be doing a rm -rf on
> >
On 02/06/2017 10:37 PM, the...@sys-concept.com wrote:
[snip]
> but I'm getting an error below:
>
> ./easyrsa build-client-full syscon_home nopass
> NOTE: If you run ./clean-all, I will be doing a rm -rf on
> /usr/share/easy-rsa/keys
>
> Note: using Easy-RSA configuration from: ./vars
>
>
On 02/06/2017 08:23 PM, Michael Orlitzky wrote:
> On 02/06/2017 09:53 PM, the...@sys-concept.com wrote:
>> I'm trying to configure "openvpn" on my new box (have done it in the
>> past - long time ago).
>>
>> Trying to follow some basic instruction but when I change to:
>> cd /usr/share/easy-rsa/
On Mon, Feb 06, 2017 at 08:03:21PM -0700, the...@sys-concept.com wrote:
> and try to re-emerge it, it is not taking any effect.
> emerge -avq easy-rsa
>
> [ebuild R ] app-crypt/easy-rsa-3.0.1-r1 USE="(-libressl)"
>
> why isn't the package enclosing the libressl in emerge?
The parentheses
On 02/06/2017 09:53 PM, the...@sys-concept.com wrote:
> I'm trying to configure "openvpn" on my new box (have done it in the
> past - long time ago).
>
> Trying to follow some basic instruction but when I change to:
> cd /usr/share/easy-rsa/
>
> and try to run: ./build-ca
> bash: ./build-ca: No
On 02/06/2017 07:53 PM, the...@sys-concept.com wrote:
> I'm trying to configure "openvpn" on my new box (have done it in the
> past - long time ago).
>
> Trying to follow some basic instruction but when I change to:
> cd /usr/share/easy-rsa/
>
> and try to run: ./build-ca
> bash: ./build-ca: No
I'm trying to configure "openvpn" on my new box (have done it in the
past - long time ago).
Trying to follow some basic instruction but when I change to:
cd /usr/share/easy-rsa/
and try to run: ./build-ca
bash: ./build-ca: No such file or directory
--
Thelma
Hi all,
I have a home openvpn server that works fine except the annoying
behaviour that it doesnt "fix" a client with an IP address. That is,
with multiple clients it keeps swapping/reissueing IP addresses around.
Openvpn is supposed to use the file ipp.txt to hold the address mapping
On 02/09/15 13:47, Michael Orlitzky wrote:
On 02/09/2015 01:42 PM, Joseph wrote:
I've openvpn installed:
...
amd I'm trying to generate server key but I don't have directory:
/usr/share/openvpn/easy-rsa/
does openvpn creates this directory or I do it manually?
It moved to
you can install app-crypt/easyrsa
On Mon, Feb 9, 2015 at 8:42 PM, Joseph syscon...@gmail.com wrote:
I've openvpn installed:
Installed versions: 2.3.6(11:44:47 PM 01/30/2015)(lzo pam plugins ssl
-down-root -examples -iproute2 -passwordsave -pkcs11 -polarssl -selinux
-static -systemd
On 02/09/2015 01:42 PM, Joseph wrote:
I've openvpn installed:
...
amd I'm trying to generate server key but I don't have directory:
/usr/share/openvpn/easy-rsa/
does openvpn creates this directory or I do it manually?
It moved to /usr/share/easy-rsa when the app-crypt/easy-rsa package
On 02/09/15 11:42, Joseph wrote:
I've openvpn installed:
Installed versions: 2.3.6(11:44:47 PM 01/30/2015)(lzo pam plugins ssl
-down-root -examples -iproute2 -passwordsave -pkcs11 -polarssl -selinux -static
-systemd
USERLAND=-BSD)
amd I'm trying to generate server key but I don't have
On 02/09/15 11:57, Joseph wrote:
On 02/09/15 13:47, Michael Orlitzky wrote:
On 02/09/2015 01:42 PM, Joseph wrote:
I've openvpn installed:
...
amd I'm trying to generate server key but I don't have directory:
/usr/share/openvpn/easy-rsa/
does openvpn creates this directory or I do it
I've openvpn installed:
Installed versions: 2.3.6(11:44:47 PM 01/30/2015)(lzo pam plugins ssl -down-root -examples -iproute2 -passwordsave -pkcs11 -polarssl -selinux -static -systemd
USERLAND=-BSD)
amd I'm trying to generate server key but I don't have directory:
/usr/share/openvpn/easy-rsa/
On Mon, Feb 9, 2015 at 8:57 PM, Joseph syscon...@gmail.com wrote:
On 02/09/15 13:47, Michael Orlitzky wrote:
On 02/09/2015 01:42 PM, Joseph wrote:
I've openvpn installed:
...
amd I'm trying to generate server key but I don't have directory:
/usr/share/openvpn/easy-rsa/
does openvpn
On 02/09/2015 01:57 PM, Joseph wrote:
It moved to /usr/share/easy-rsa when the app-crypt/easy-rsa package was
split off.
I've emerged easy-rsa but the /usr/share/openvpn/easy-rsa/ directory wasn't
created.
That's because
It moved to /usr/share/easy-rsa
=)
On 02/25/2010 11:21 PM, Joseph wrote:
On 02/25/10 22:17, Xavier Parizet wrote:
[snip]
I added full path to the server for ccd:
/etc/openvpn/ccd
Now I'm getting consistent IP: 192.168.139.2 every-time I restart
openvpn.client_clinic2
but I'm not getting what I requested in ccd/syscon9:
On Friday 26 February 2010 01:39:55 Joseph wrote:
On 02/25/10 22:17, Xavier Parizet wrote:
From what i can see, please try to add full path to the ccd directory in
client-config-dir directive on the server path. Also check permissions
on that directory. On which user are you running openvpn on
I have one client and trying to connect to two openvpn servers (both servers
are behind same IP address):
client1
remote 208.38.31.237 9000
client2
remote 208.38.31.237 9050
I can connect to them one at a time but not both at the same time.
If I try to start the second connection I get:
On 02/25/2010 02:32 AM, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to figure it
out how to assign static IP to clients
My server.conf port 8458
proto udp
dev tun
mode server
ca /usr/share/openvpn/easy-rsa/keys/ca.crt
cert
On Wed, 2010-02-24 at 20:37 -0700, Joseph wrote:
The directory name shouldn't make any difference, I'm using directory
name ccd; though I've tried the IP's you suggested, it makes no
difference, still
not getting static IP :-/
Thanks for suggestion, I've been on it all day and can not find
Le 25/02/2010 17:51, Joseph a écrit :
On 02/25/10 08:40, Xavier Parizet wrote:
On 02/25/2010 02:32 AM, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to figure it
out how to assign static IP to clients
My server.conf port 8458
[SNIP]
On client in
On 02/25/10 18:12, Xavier Parizet wrote:
Le 25/02/2010 17:51, Joseph a ??crit :
On 02/25/10 08:40, Xavier Parizet wrote:
On 02/25/2010 02:32 AM, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to figure it
out how to assign static IP to clients
My server.conf port
Le 25/02/2010 20:20, Joseph a écrit :
On 02/25/10 18:12, Xavier Parizet wrote:
Le 25/02/2010 17:51, Joseph a ??crit :
On 02/25/10 08:40, Xavier Parizet wrote:
On 02/25/2010 02:32 AM, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to
figure it
out how to assign
On Thursday 25 February 2010, Joseph wrote:
Yes, it was a typo :-/ I corrected it:
cat syscon9
ifconfig-push 192.168.139.15 255.255.255.0
but from log you can see it still didn't give me what I want, I got IP
192.168.139.6 and was asking for: 192.168.139.15
Try adding
topology subnet
On 02/25/10 21:09, Xavier Parizet wrote:
[snip]
Yes, it was a typo :-/ I corrected it:
cat syscon9
ifconfig-push 192.168.139.15 255.255.255.0
but from log you can see it still didn't give me what I want, I got IP
192.168.139.6 and was asking for: 192.168.139.15
log:
cat /var/log/openvpn.log
Le 25/02/2010 22:01, Joseph a écrit :
On 02/25/10 21:09, Xavier Parizet wrote:
[snip]
Yes, it was a typo :-/ I corrected it:
cat syscon9
ifconfig-push 192.168.139.15 255.255.255.0
but from log you can see it still didn't give me what I want, I got IP
192.168.139.6 and was asking for:
On 02/25/10 22:17, Xavier Parizet wrote:
[snip]
topology subnet
remote 208.38.31.237 9000
resolv-retry infinite
nobind
^^
you should remove this line to avoid connection refused messages from
the server. As you are in udp, client should bind on udp source port to
get messages from the
On 02/25/10 22:17, Xavier Parizet wrote:
From what i can see, please try to add full path to the ccd directory in
client-config-dir directive on the server path. Also check permissions
on that directory. On which user are you running openvpn on the server ?
On the client ?
On client:
I've configured OpenVPN and it works OK but I can not seems to figure it out
how to assign static IP to clients
My server.conf port 8458
proto udp
dev tun
mode server
ca /usr/share/openvpn/easy-rsa/keys/ca.crt
cert /usr/share/openvpn/easy-rsa/keys/server.crt
key
On Wed, 2010-02-24 at 18:32 -0700, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to figure it out
how to assign static IP to clients
Put this your config config:
client-config-dir client.d
And then in client.d/ have a file for each client, e.g.
#
On 02/24/10 21:51, Albert Hopkins wrote:
On Wed, 2010-02-24 at 18:32 -0700, Joseph wrote:
I've configured OpenVPN and it works OK but I can not seems to figure it out
how to assign static IP to clients
Put this your config config:
client-config-dir client.d
And then in client.d/
Hi All,
I would like to set up a VPN connection to a router which is using IKE
IPsec: http://www.ciscopress.com/articles/article.asp?p=25474seqNum=7
Would I be able to achieve this using OpenVPN on my gentoo box? I read the
IPsec HowTo and scared myself to death (it seems long enough to
On Thursday 11 December 2008, 22:08, Mick wrote:
Hi All,
I would like to set up a VPN connection to a router which is using IKE
IPsec:
http://www.ciscopress.com/articles/article.asp?p=25474seqNum=7
Would I be able to achieve this using OpenVPN on my gentoo box?
Unfortunately not,
On Sunday 17 February 2008, Grant wrote:
What wasn't mentioned is that SSL covers transport encryption, not
necessarily application security. What that means is if you open IMAP,
SMTP, CUPS, and SSH daemons over the internet then you also need to keep
(better) track of security
Thanks a lot for everyone's help. Here is a more to-the-point list of
what I'd like to accomplish:
1. encrypt CUPS printouts between remote server and local print server
2. add an additional layer of security around SSH and CUPS on local
firewall/print server
3. add an
On Sun, 2008-02-17 at 07:12 -0800, Grant wrote:
I'd just like to reiterate that most of those don't need any extra
security. SSH and HTTPS are already secure, and IMAP and SMTP can be
accessed over SSL (like HTTPS). These are all secure enough to be
widely used without extra layers of
I'd just like to reiterate that most of those don't need any extra
security. SSH and HTTPS are already secure, and IMAP and SMTP can be
accessed over SSL (like HTTPS). These are all secure enough to be
widely used without extra layers of encryption.
I'm surprised, but glad to hear
On Sun, 2008-02-17 at 12:03 -0800, Grant wrote:
Good points Albert. Is a daily 'emerge --sync emerge -avDuN world'
generally enough as far as tracking security vulnerabilities?
- Grant
That's not really for me to say. But I can tell you that although the
Gentoo developers take matters of
Good points Albert. Is a daily 'emerge --sync emerge -avDuN world'
generally enough as far as tracking security vulnerabilities?
- Grant
That's not really for me to say. But I can tell you that although the
Gentoo developers take matters of security seriously, there is no
full-time
Good points Albert. Is a daily 'emerge --sync emerge -avDuN world'
generally enough as far as tracking security vulnerabilities?
- Grant
That's not really for me to say. But I can tell you that although the
Gentoo developers take matters of security seriously, there is no
full-time
On Wed, 13 Feb 2008 08:19:48 -0800
Grant [EMAIL PROTECTED] wrote:
Even if you just want to encrypt some clear-text protocol that
doesn't have an encrypted equivalent, a vpn is still overkill.
For that you use ssh tunneling (which is essentially the same
thing as an encrypted
Even if you just want to encrypt some clear-text protocol that
doesn't have an encrypted equivalent, a vpn is still overkill. For
that you use ssh tunneling (which is essentially the same thing as
an encrypted version of a protocol). 'ssh -X' is the classic
example of easily
Hi Grant,
On Thu, Feb 14, 2008 at 1:19 AM, Grant [EMAIL PROTECTED] wrote:
Thanks a lot for everyone's help. Here is a more to-the-point list of
what I'd like to accomplish:
1. encrypt CUPS printouts between remote server and local print server
2. add an additional layer of security
On Wed, 2008-02-13 at 08:19 -0800, Grant wrote:
Thanks a lot for everyone's help. Here is a more to-the-point list of
what I'd like to accomplish:
1. encrypt CUPS printouts between remote server and local print server
2. add an additional layer of security around SSH and CUPS on local
On Tuesday 12 February 2008, Grant wrote:
Use SSH if you need a quick ad-hoc connection or something
temporary. Use OpenVPN if you need something more permanent that is
always prsent and just works.
I need temporary, but automated. Can an ssh tunnel be set up in an
automated way?
Of
On Tue, 2008-02-12 at 19:30 +0200, Alan McKinnon wrote:
On Tuesday 12 February 2008, Etaoin Shrdlu wrote:
On Tuesday 12 February 2008, Alan McKinnon wrote:
Your statement it seems like running SSH inside a VPN is better
for security than running SSH on a non-standard port is
Grant wrote:
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my laptop to the remote server
3. cups printing from the remote server to the print server
I don't think you need a VPN to SSH from your laptop to the remote
On Tue, 12 Feb 2008 19:42:44 +0200
Alan McKinnon [EMAIL PROTECTED] wrote:
What about having ssh, imap, smtp, cups, and possibly a non-standard
https port all hidden within a VPN? Should that be considered a
benefit of running a VPN?
One other thought about ssh+vpn, if you have VPN
On Tuesday 12 February 2008, Alan McKinnon wrote:
Perhaps confusingly, ssh itself can be used to create openVPN-like
VPNs (actually, much simpler), using the -w option and a couple of
tun (or tap) interfaces on the connected computers.
hehehe, I'd forgetten about that one for a bit :-)
On Tuesday 12 February 2008, Grant wrote:
Even if you just want to encrypt some clear-text protocol that
doesn't have an encrypted equivalent, a vpn is still overkill. For
that you use ssh tunneling (which is essentially the same thing as
an encrypted version of a protocol). 'ssh -X' is
Your statement it seems like running SSH inside a VPN is better
for security than running SSH on a non-standard port is
non-sensical. From a security and encryption perspective, ssh and
OpenVPN are exactly the same thing - stuff wrapped in an encryption
layer provided by ssl,
On Tuesday 12 February 2008, Etaoin Shrdlu wrote:
On Tuesday 12 February 2008, Alan McKinnon wrote:
Your statement it seems like running SSH inside a VPN is better
for security than running SSH on a non-standard port is
non-sensical. From a security and encryption perspective, ssh and
On Tuesday 12 February 2008, Alan McKinnon wrote:
Your statement it seems like running SSH inside a VPN is better for
security than running SSH on a non-standard port is non-sensical.
From a security and encryption perspective, ssh and OpenVPN are
exactly the same thing - stuff wrapped in an
On Tuesday 12 February 2008, Grant wrote:
I don't think you need a VPN to SSH from your laptop to the remote
server -- SSH is already encrypted.
For sure, but it seems like running SSH inside a VPN is better for
security than running SSH on a non-standard port or even port
knocking. If I
I don't think you need a VPN to SSH from your laptop to the remote
server -- SSH is already encrypted.
For sure, but it seems like running SSH inside a VPN is better for
security than running SSH on a non-standard port or even port
knocking. If I need to set up a VPN for printing,
On Monday 11 February 2008, Grant wrote:
The second guide deals with bridging and the first does not. Should
I be setting up bridging? The first guide seems simpler. Should I
be OK with that one? I'd hate to dig into one of them and then find
out I should have chosen the other.
- Grant
I'm hoping to install openvpn on my remote hosted server. I have
three machines to consider:
1. remote hosted web/mail server
2. local firewall, print server
3. local laptop
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my
Hi Grant,
On Tue, Feb 12, 2008 at 5:41 AM, Grant [EMAIL PROTECTED] wrote:
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my laptop to the remote server
3. cups printing from the remote server to the print server
I don't
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my laptop to the remote server
3. cups printing from the remote server to the print server
I don't think you need a VPN to SSH from your laptop to the remote
server --
I do this with my work printer - the printer is locked down to a local
network - I can print from locked out offices/labs anywhere (and even
from home, picking up the printouts when I arrive - convenient!)
I also transfer sometimes large files (using scp) and run ssh sessions
and imap/smtp mail
On Mon, 11 Feb 2008 16:00:49 -0800
Grant [EMAIL PROTECTED] wrote:
You can print from your laptop to your printer at home while
overseas, for example.
Sounds very convenient ; )
--
gentoo-user@lists.gentoo.org mailing list
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my laptop to the remote server
3. cups printing from the remote server to the print server
I don't think you need a VPN to SSH from your laptop to the
Hi Grant,
On Tue, Feb 12, 2008 at 8:11 AM, Grant [EMAIL PROTECTED] wrote:
I'm hoping to use the vpn in three few ways:
1. imap and smtp between my laptop and the mail server
2. ssh from my laptop to the remote server
3. cups printing from the remote server to the print
Hello again!
Nevertheless I've used this many times before, and although realtime
performance isn't especially good, I certainly wouldn't go so far as to
call it unstable.
I've used OpenVPN to interconnect workstations and servers in Argentina,
using all from Cable internet to ADSL, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Patrick Holthaus wrote:
How can I adjust init script dependencies based on ESSID / IP adress or
network devices that are up and running?
I'd just remove the stock, for example, /etc/init.d/openvpn script. Write my
own, (one that checks
ESSID/IP
And NFS, well, it's NFS. I don't love it, but I've used NFS exports from a
14.k modem... So... maybe
he is having internet issues, router issues, firewall issues, compilation
issues... but OpenVPN and
NFS, given a relatively good network environment, work more than OK.
I would still use tcp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Eric Martin wrote:
I would still use tcp rather than UDP for NFS if I was going to mount it
over a slow network. I did some benchmarks for my wireless and wired
network and TCP clearly beats UDP on files over 1MB. I know the
wireless
It isn't good idea to mount nfs over openvpn. Both are highly unstable.
You should try openssh and it's simple tunnel and ftp over it or any other
networked file system. If you really need to use nfs set it to use tcp.
--
Morpheus: No, what happened, happened and couldn't have happened any
On Wed, 29 Aug 2007 21:18:47 +0200 (CEST)
Cipher van Byte [EMAIL PROTECTED] wrote:
It isn't good idea to mount nfs over openvpn. Both are highly
unstable.
Openvpn is highly unstable? really? mine's been up for days.
NFS is highly unstable? Hardly. Perhaps you mean that it's unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Farrell wrote:
Nevertheless I've used this many times before, and although realtime
performance isn't especially good, I certainly wouldn't go so far as to
call it unstable.
I've used OpenVPN to interconnect workstations and servers in
Hello!
I am having difficulties in setting up nfs with my laptop. I have an openvpn
server running at home that can be reached via dynamic dns from the outside
world. Now i would like to mount my nfs exports from everywhere I am. These
exports are only available in the vpn subnet (10.8.0.*).
Greetings,
I have a openvpn.conf file, here is its contents...
dev tun
ifconfig 66.11.182.5 192.168.0.1
secret key.txt
port 5000
user nobody
group nobody
log /var/log/openvpn/openvpn.log
verb 4
What I don't know what to do is what goes after ifconfig... 66.11.182.5 is
my servers ip address to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jason Carson wrote:
What I don't know what to do is what goes after ifconfig... 66.11.182.5 is
my servers ip address to the external world (eth0). 192.168.0.1 is the
internal network (eth1) address. What do I put after ifconfig?
Go to
Hi,
Patrick Holthaus schrieb:
Hello everybody!
Maybe this is a bit Off-Topic here, but maybe some of you like to help me
anyway.
I am trying to build a VPN network where the clients get their IP adresses
from a local DHCP server (because it should notify the nameserver of the
clients).
Hello everybody!
Maybe this is a bit Off-Topic here, but maybe some of you like to help me
anyway.
I am trying to build a VPN network where the clients get their IP adresses
from a local DHCP server (because it should notify the nameserver of the
clients). The VPN should have its own adress
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Patrick Holthaus wrote:
Now my questions are:
Do I need bridging for making the DHCP server work in the VPN?
How should the configuration files look like?
I don't think you can do it, because the openvpn client needs an IP provided by
the
Used to be you could have multiple tunnels open with vpn. when it changed to
require /etc/openvpn/openvpn.conf, instead of launching all the tunnels, i
can no longer figure out how to open multiple tunnels. the docs seem to
mention an /etc/conf.d/openvpn file, but that didn't get created on
Used to be you could have multiple tunnels open with vpn. when it changed
to
require /etc/openvpn/openvpn.conf, instead of launching all the tunnels, i
can no longer figure out how to open multiple tunnels. the docs seem to
mention an /etc/conf.d/openvpn file, but that didn't get created on
What you need to do is create a tunnelname.conf file for your second
tunnel, and then link /etc/init.d/openvpn to /etc/init.d/tunnelname.
Then you can start the second tunnel with either /etc/init.d/tunnelname
start, or by using rc-update to add tunnelname to the runlevel of your
choice. For
1 - 100 of 105 matches
Mail list logo