> > But it *does* work without the -f flag.
> >
>
> That's very strange, does it detach from the terminal without the -f ?
Can't say for certain. Presumably it does, but the program
immediately exits and returns. If it does detach, it's not
perceptible.
You might try writing your own script th
> What's the -2 arg for in your script? I don't see it in the
> manpage.
>
It just forces version 2 of the protocol
> But it *does* work without the -f flag.
>
That's very strange, does it detach from the terminal without the -f ?
Now that you mention this, I have one box suddenly rebooting af
On Tue, Aug 21, 2012 at 07:59:30PM -0600, Luis F Urrea wrote:
> I have a server hosting SSH tunnels and Openbsd 4.5 clients connecting to
> it.
>
> Things work just fine but I am in the need of automating the connection
> from the client to the server. So that if the client is accidentally
> reboo
I have a server hosting SSH tunnels and Openbsd 4.5 clients connecting to
it.
Things work just fine but I am in the need of automating the connection
from the client to the server. So that if the client is accidentally
rebooted, then the connection initiates unattended.
So it should be as straigh
Manuel Giraud writes:
> Hi,
>
> I've set up an openssh based vpn as described in ssh(1). Now, I want to
> send all my traffic through this pipe. So I've put the following nat
> rules on both ends of the pipe:
> match out on em0 from tun0:network nat-to (em0)
>
> and modified the client ro
Hi,
I've set up an openssh based vpn as described in ssh(1). Now, I want to
send all my traffic through this pipe. So I've put the following nat
rules on both ends of the pipe:
match out on em0 from tun0:network nat-to (em0)
and modified the client route table like this:
route add
It appears that the SSH VPN startup runs "/bin/sh /etc/netstart tun0"
I suspect that if I could somehow get a "sudo" in front of that things
would work. Must go read source code...
On Mon, Aug 15, 2011 at 10:09:48PM +1200, Graeme Neilson wrote:
> Pretty sure if you chan
Pretty sure if you change the owner / group of the tap or tun device
you are using to the user you want to bring up the tunnel you can
avoid root.
G
On Fri, Aug 12, 2011 at 5:40 AM, Michael W. Lucas
wrote:
> Hi,
>
> I'm trying to get a SSH VPN working between a 4.9 i386 and a rece
Hi,
I'm trying to get a SSH VPN working between a 4.9 i386 and a recent
5.0 amd64 snapshot (with the MP#49 kernel).
The tunnel works fine if I SSH in as root. My guts really protest at
enabling remote root logins, however. Yes, I can limit the access with
a Match statement.
Surely I can c
Slightly offtopic here, I'm currently using openvpn on OpenBSD 4.8 as
server with OSX client using tunnelblick(openvpn).
It works fine!
On Tue, Nov 2, 2010 at 7:42 AM, Siju George wrote:
> Hi ,
>
> I created SSH VPN from my OpenBSD client at home to OpenBSD Server at
> office
Hi ,
I created SSH VPN from my OpenBSD client at home to OpenBSD Server at
office to work when I am sick.
It is working great. I created it using the instructions in
http://www.undeadly.org/cgi?action=article&sid=20090903183235
now mtu@ suggests there that dlg@ knows elegant methods on h
Someone corrects me if 'im wrong but i guess you can't. You need to create a
bridge between your tun device (tun0) on the gateway and the iface that is
connected to your 172.16.43.0/24 network (nic2).
The ssh command to use on your laptop is: ssh -w0:0 [EMAIL PROTECTED] (run it
as root user to mak
Hello,
I've read the ssh man and found the "ssh-based virtual private networks"
section.
I've set the sshd_config of the vpn server to "PermitTunnel yes"
I'm a little bit lost in my config ... and I tried for hours without success to
configure a tunnel.
My config is the following:
wireless lan
13 matches
Mail list logo