Jump to content

Search the Community

Showing results for tags 'openvpn'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. Hi, I am a mark V owner thinking of purchasing a TETRA. If I were to use it as a normal router with an OpenVPN tunnel (i.e. TETRA is the client) what kind of speeds can I expect to get? It seems most routers max out at ~ 20Mb/s. Am I correct in assuming TETRA will not be able to handle a 100Mb/s connection ?
  2. Hey guys! Just followed the Hak5 Episode on making an OpenVPN server from scratch on Linux. I can connect to the VPN as long as I am connected to my own internal network... I thought the whole purpose was to be able to connect from the outside?
  3. I'm trying to put OpenVPN on the pineapple nano using Private internet Access as the VPN service, but I'm having issues getting the ovpn to load properly while following along with Darren's video https://www.hak5.org/frontpage/hak5-2018-how-to-build-an-openvpn-access-point-pt-2. I listed below the script errors that I'm getting and also the text file for the ovpn that I'm trying to load. Here is the text file for the ovpn that I'm trying to load on the nano: client dev tun remote us-east.privateinternetaccess.com 1198 udp remote us-east.privateinternetaccess.com 502 tcp resolv-retry infinite nobind persist-key persist-tun setenv CLIENT_CERT 0 <ca> -----BEGIN CERTIFICATE----- MIIFqzCCBJOgAwIBAgIJAKZ7D5Yv87qDMA0GCSqGSIb3DQEBDQUAMIHoMQswCQYD VQQGEwJVUzELMAkGA1UECBMCQ0ExEzARBgNVBAcTCkxvc0FuZ2VsZXMxIDAeBgNV BAoTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMSAwHgYDVQQLExdQcml2YXRlIElu dGVybmV0IEFjY2VzczEgMB4GA1UEAxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3Mx IDAeBgNVBCkTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMS8wLQYJKoZIhvcNAQkB FiBzZWN1cmVAcHJpdmF0ZWludGVybmV0YWNjZXNzLmNvbTAeFw0xNDA0MTcxNzM1 MThaFw0zNDA0MTIxNzM1MThaMIHoMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0Ex EzARBgNVBAcTCkxvc0FuZ2VsZXMxIDAeBgNVBAoTF1ByaXZhdGUgSW50ZXJuZXQg QWNjZXNzMSAwHgYDVQQLExdQcml2YXRlIEludGVybmV0IEFjY2VzczEgMB4GA1UE AxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3MxIDAeBgNVBCkTF1ByaXZhdGUgSW50 ZXJuZXQgQWNjZXNzMS8wLQYJKoZIhvcNAQkBFiBzZWN1cmVAcHJpdmF0ZWludGVy bmV0YWNjZXNzLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPXD L1L9tX6DGf36liA7UBTy5I869z0UVo3lImfOs/GSiFKPtInlesP65577nd7UNzzX lH/P/CnFPdBWlLp5ze3HRBCc/Avgr5CdMRkEsySL5GHBZsx6w2cayQ2EcRhVTwWp cdldeNO+pPr9rIgPrtXqT4SWViTQRBeGM8CDxAyTopTsobjSiYZCF9Ta1gunl0G/ 8Vfp+SXfYCC+ZzWvP+L1pFhPRqzQQ8k+wMZIovObK1s+nlwPaLyayzw9a8sUnvWB /5rGPdIYnQWPgoNlLN9HpSmsAcw2z8DXI9pIxbr74cb3/HSfuYGOLkRqrOk6h4RC OfuWoTrZup1uEOn+fw8CAwEAAaOCAVQwggFQMB0GA1UdDgQWBBQv63nQ/pJAt5tL y8VJcbHe22ZOsjCCAR8GA1UdIwSCARYwggESgBQv63nQ/pJAt5tLy8VJcbHe22ZO sqGB7qSB6zCB6DELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRMwEQYDVQQHEwpM b3NBbmdlbGVzMSAwHgYDVQQKExdQcml2YXRlIEludGVybmV0IEFjY2VzczEgMB4G A1UECxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3MxIDAeBgNVBAMTF1ByaXZhdGUg SW50ZXJuZXQgQWNjZXNzMSAwHgYDVQQpExdQcml2YXRlIEludGVybmV0IEFjY2Vz czEvMC0GCSqGSIb3DQEJARYgc2VjdXJlQHByaXZhdGVpbnRlcm5ldGFjY2Vzcy5j b22CCQCmew+WL/O6gzAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBDQUAA4IBAQAn a5PgrtxfwTumD4+3/SYvwoD66cB8IcK//h1mCzAduU8KgUXocLx7QgJWo9lnZ8xU ryXvWab2usg4fqk7FPi00bED4f4qVQFVfGfPZIH9QQ7/48bPM9RyfzImZWUCenK3 7pdw4Bvgoys2rHLHbGen7f28knT2j/cbMxd78tQc20TIObGjo8+ISTRclSTRBtyC GohseKYpTS9himFERpUgNtefvYHbn70mIOzfOJFTVqfrptf9jXa9N8Mpy3ayfodz 1wiqdteqFXkTYoSDctgKMiZ6GdocK9nMroQipIQtpnwd4yBDWIyC6Bvlkrq5TQUt YDQ8z9v+DMO6iwyIDRiU -----END CERTIFICATE----- </ca> cipher aes-128-cbc auth sha1 tls-client remote-cert-tls server auth-user-pass comp-lzo verb 1 reneg-sec 0 <crl-verify> -----BEGIN X509 CRL----- MIICWDCCAUAwDQYJKoZIhvcNAQENBQAwgegxCzAJBgNVBAYTAlVTMQswCQYDVQQI EwJDQTETMBEGA1UEBxMKTG9zQW5nZWxlczEgMB4GA1UEChMXUHJpdmF0ZSBJbnRl cm5ldCBBY2Nlc3MxIDAeBgNVBAsTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMSAw HgYDVQQDExdQcml2YXRlIEludGVybmV0IEFjY2VzczEgMB4GA1UEKRMXUHJpdmF0 ZSBJbnRlcm5ldCBBY2Nlc3MxLzAtBgkqhkiG9w0BCQEWIHNlY3VyZUBwcml2YXRl aW50ZXJuZXRhY2Nlc3MuY29tFw0xNjA3MDgxOTAwNDZaFw0zNjA3MDMxOTAwNDZa MCYwEQIBARcMMTYwNzA4MTkwMDQ2MBECAQYXDDE2MDcwODE5MDA0NjANBgkqhkiG 9w0BAQ0FAAOCAQEAQZo9X97ci8EcPYu/uK2HB152OZbeZCINmYyluLDOdcSvg6B5 jI+ffKN3laDvczsG6CxmY3jNyc79XVpEYUnq4rT3FfveW1+Ralf+Vf38HdpwB8EW B4hZlQ205+21CALLvZvR8HcPxC9KEnev1mU46wkTiov0EKc+EdRxkj5yMgv0V2Re ze7AP+NQ9ykvDScH4eYCsmufNpIjBLhpLE2cuZZXBLcPhuRzVoU3l7A9lvzG9mjA 5YijHJGHNjlWFqyrn1CfYS6koa4TGEPngBoAziWRbDGdhEgJABHrpoaFYaL61zqy MR6jC0K2ps9qyZAN74LEBedEfK7tBOzWMwr58A== -----END X509 CRL----- </crl-verify>
  4. On my nano I have set it up to auto connect to my open vpn server upon internet connection. I did all this in rc.local my question is how do i test that the iptable settings are correct with all connections going through tun0? My other question is how to I configure the connection to autoconnect if the connection gets dropped? -M
  5. So here's the skinny - I have two OpenVPN servers now, both in my home. One is running on a Raspberry Pi and the other is an OpenVPN Access Server running on Ubuntu 14.04 (64bit). I am trying to access either of them (we'll concentrate on the OpenVPN Access Server) from my client's office. I can connect just fine when I am not one said client's network. However when on the client's network I see the following: sudo openvpn client.ovpn [sudo] password for marty331: Tue Jul 5 19:05:35 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Tue Jul 5 19:05:35 2016 library versions: OpenSSL 1.0.2g-fips 1 Mar 2016, LZO 2.08 Tue Jul 5 19:05:35 2016 Control Channel Authentication: tls-auth using INLINE static key file Tue Jul 5 19:05:35 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:35 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:35 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Tue Jul 5 19:05:35 2016 UDPv4 link local: [undef] Tue Jul 5 19:05:35 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Tue Jul 5 19:05:39 2016 Server poll timeout, restarting Tue Jul 5 19:05:39 2016 SIGUSR1[soft,server_poll] received, process restarting Tue Jul 5 19:05:39 2016 Control Channel Authentication: tls-auth using INLINE static key file Tue Jul 5 19:05:39 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:39 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:39 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Tue Jul 5 19:05:39 2016 UDPv4 link local: [undef] Tue Jul 5 19:05:39 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Tue Jul 5 19:05:43 2016 Server poll timeout, restarting Tue Jul 5 19:05:43 2016 SIGUSR1[soft,server_poll] received, process restarting Tue Jul 5 19:05:43 2016 Control Channel Authentication: tls-auth using INLINE static key file Tue Jul 5 19:05:43 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:43 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:43 2016 Socket Buffers: R=[87380->200000] S=[16384->200000] Tue Jul 5 19:05:43 2016 Attempting to establish TCP connection with [AF_INET]super.secret.ipaddress:444 [nonblock] Tue Jul 5 19:05:44 2016 TCP connection established with [AF_INET]super.secret.ipaddress:444 Tue Jul 5 19:05:44 2016 TCPv4_CLIENT link local: [undef] Tue Jul 5 19:05:44 2016 TCPv4_CLIENT link remote: [AF_INET]super.secret.ipaddress:444 Tue Jul 5 19:05:44 2016 TLS: Initial packet from [AF_INET]super.secret.ipaddress:444, sid=aeb6abae 035f030d Tue Jul 5 19:05:44 2016 VERIFY OK: depth=1, CN=OpenVPN CA Tue Jul 5 19:05:44 2016 VERIFY OK: nsCertType=SERVER Tue Jul 5 19:05:44 2016 VERIFY OK: depth=0, CN=OpenVPN Server Tue Jul 5 19:05:45 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Jul 5 19:05:45 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:45 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Jul 5 19:05:45 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jul 5 19:05:45 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 2048 bit RSA Tue Jul 5 19:05:45 2016 [OpenVPN Server] Peer Connection Initiated with [AF_INET]super.secret.ipaddress:444 Tue Jul 5 19:05:47 2016 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1) Tue Jul 5 19:05:47 2016 PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 12,ping-restart 50,socket-flags TCP_NODELAY,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 172.27.224.1,dhcp-option DNS 127.0.1.1,register-dns,block-ipv6,ifconfig 172.27.224.7 255.255.252.0' Tue Jul 5 19:05:47 2016 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:1 is ignored by previous <connection> blocks Tue Jul 5 19:05:47 2016 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:4: dhcp-pre-release (2.3.10) Tue Jul 5 19:05:47 2016 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:5: dhcp-renew (2.3.10) Tue Jul 5 19:05:47 2016 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:6: dhcp-release (2.3.10) Tue Jul 5 19:05:47 2016 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:17: register-dns (2.3.10) Tue Jul 5 19:05:47 2016 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:18: block-ipv6 (2.3.10) Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: timers and/or timeouts modified Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: LZO parms modified Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: --socket-flags option modified Tue Jul 5 19:05:47 2016 Socket flags: TCP_NODELAY=1 succeeded Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: --ifconfig/up options modified Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: route options modified Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: route-related options modified Tue Jul 5 19:05:47 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Tue Jul 5 19:05:47 2016 ROUTE_GATEWAY 172.20.1.1/255.255.240.0 IFACE=wlp3s0 HWADDR=th:is:nt:th:ad:dr Tue Jul 5 19:05:47 2016 TUN/TAP device tun0 opened Tue Jul 5 19:05:47 2016 TUN/TAP TX queue length set to 100 Tue Jul 5 19:05:47 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Tue Jul 5 19:05:47 2016 /sbin/ip link set dev tun0 up mtu 1500 Tue Jul 5 19:05:47 2016 /sbin/ip addr add dev tun0 172.27.224.7/22 broadcast 172.27.227.255 Tue Jul 5 19:05:52 2016 ROUTE remote_host is NOT LOCAL Tue Jul 5 19:05:52 2016 /sbin/ip route add super.secret.ipaddress/32 via 172.20.1.1 Tue Jul 5 19:05:52 2016 /sbin/ip route add 0.0.0.0/1 via 172.27.224.1 Tue Jul 5 19:05:52 2016 /sbin/ip route add 128.0.0.0/1 via 172.27.224.1 Tue Jul 5 19:05:52 2016 Initialization Sequence Completed Wed Jul 6 01:05:44 2016 VERIFY OK: depth=1, CN=OpenVPN CA Wed Jul 6 01:05:44 2016 VERIFY OK: nsCertType=SERVER Wed Jul 6 01:05:44 2016 VERIFY OK: depth=0, CN=OpenVPN Server Wed Jul 6 01:05:45 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Jul 6 01:05:45 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 01:05:45 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Jul 6 01:05:45 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 01:05:45 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 2048 bit RSA Wed Jul 6 02:05:44 2016 TLS: tls_process: killed expiring key ^CWed Jul 6 06:11:30 2016 event_wait : Interrupted system call (code=4) Wed Jul 6 06:11:30 2016 /sbin/ip route del super.secret.ipaddress/32 Wed Jul 6 06:11:30 2016 /sbin/ip route del 0.0.0.0/1 Wed Jul 6 06:11:30 2016 /sbin/ip route del 128.0.0.0/1 Wed Jul 6 06:11:30 2016 Closing TUN/TAP interface Wed Jul 6 06:11:30 2016 /sbin/ip addr del dev tun0 172.27.224.7/22 Wed Jul 6 06:11:30 2016 SIGINT[hard,] received, process exiting marty331@galago:~/open/pinkie$ sudo openvpn client.ovpn [sudo] password for marty331: Wed Jul 6 07:00:59 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Wed Jul 6 07:00:59 2016 library versions: OpenSSL 1.0.2g-fips 1 Mar 2016, LZO 2.08 Wed Jul 6 07:00:59 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:00:59 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:00:59 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:00:59 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:00:59 2016 UDPv4 link local: [undef] Wed Jul 6 07:00:59 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:03 2016 Server poll timeout, restarting Wed Jul 6 07:01:03 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:03 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:03 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:03 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:03 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:03 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:03 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:07 2016 Server poll timeout, restarting Wed Jul 6 07:01:07 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:07 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:07 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:07 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:07 2016 Socket Buffers: R=[87380->200000] S=[16384->200000] Wed Jul 6 07:01:07 2016 Attempting to establish TCP connection with [AF_INET]super.secret.ipaddress:444 [nonblock] Wed Jul 6 07:01:08 2016 TCP connection established with [AF_INET]super.secret.ipaddress:444 Wed Jul 6 07:01:08 2016 TCPv4_CLIENT link local: [undef] Wed Jul 6 07:01:08 2016 TCPv4_CLIENT link remote: [AF_INET]super.secret.ipaddress:444 Wed Jul 6 07:01:12 2016 Server poll timeout, restarting Wed Jul 6 07:01:12 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:12 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:12 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:12 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:12 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:12 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:12 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:16 2016 Server poll timeout, restarting Wed Jul 6 07:01:16 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:16 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:16 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:16 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:16 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:16 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:16 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:20 2016 Server poll timeout, restarting Wed Jul 6 07:01:20 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:20 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:20 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:20 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:20 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:20 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:20 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:24 2016 Server poll timeout, restarting Wed Jul 6 07:01:24 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:24 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:24 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:24 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:24 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:24 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:24 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:28 2016 Server poll timeout, restarting Wed Jul 6 07:01:28 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:28 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:28 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:28 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:28 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:28 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:28 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:32 2016 Server poll timeout, restarting Wed Jul 6 07:01:32 2016 SIGUSR1[soft,server_poll] received, process restarting Wed Jul 6 07:01:32 2016 Control Channel Authentication: tls-auth using INLINE static key file Wed Jul 6 07:01:32 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:32 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Jul 6 07:01:32 2016 Socket Buffers: R=[212992->200000] S=[212992->200000] Wed Jul 6 07:01:32 2016 UDPv4 link local: [undef] Wed Jul 6 07:01:32 2016 UDPv4 link remote: [AF_INET]super.secret.ipaddress:1194 Wed Jul 6 07:01:36 2016 Server poll timeout, restarting Wed Jul 6 07:01:36 2016 SIGUSR1[soft,server_poll] received, process restarting
  6. Hi! Tried to find something useful, but no luck. I want to send syslog messages to central server. I have openvpn working from command line. So I would need 2 things: 1. Where to configure persistent, that syslog messages will be sent to central syslog server. I need this so ship some logs to logstash server. I didn't find anything useful except syslog. 2. I want so openpvn start with my configuration. Its not started at the moment. It is installed on SD card. Any tips, hints? Thanks. MIlan
  7. I'm trying to set up a VPN tunnel for all traffic connected to the Pineapple in client mode, with the tunnel endpoint being my Ubuntu VPS out in the cloud. The goal here is to provide internet access to all clients connected to the Pineapple, while enabling more powerful MitM attacks like Metasploit using my VPS. I've installed OpenVPN on both my server and Pineapple and set up their respective keys, but I am at a loss now as to the proper configuration. Tun? Tap? Br0? lo? Should I be using tap0 or tun0 for each side of the tunnel? (And how does it hook into the pineapple's traffic?) Could someone kindly sketch out the ideal configs for this kind of setup? In an earlier post, Sebkinne referred a user to this "howto", which specifies the client [=pineapple] as tap0. Forgive my ignorance, but don't you want to make the OpenVPN client side [=pineapple] "tun0" and the OpenVPN tunnel's endpoint on the ubuntu server "tap0"? (Which in turn redirects internet traffic to its internet-facing eth0 interface?) I'm lost. In advance, thank very much for any help you can offer.
  8. Hak5, I love watch your webisodes and I was wondering if you could possibly help me with openvpn and dd-wrt... I am new to networking and have learned a lot. I was hoping I could possible get a tutorial on generating the keys to setup openvpn on my ddwrt. Next what I would like to do is tunnel 2 routers with open VPN. Also have another question: I am using a dd-wrt router as a switch and I wanted to know if I could still use the PPTP Vpn inside ddwrt to connect to network.
  9. I've been really frustrated over the past couple of years by VPN's disconnecting and leaking real IP's. It's never been a life or death issue for me, but it's plenty annoying and when I introduce people to the concept of a VPN or proxy and set them up with it I really want it to work without betraying them. I know that disconnects happen, especially when you've been connected for long periods of time. Can't change that. But is there some way to tell Windows, OS X, and/or Linux that "when this VPN [or proxy] gets disconnected I want you to disconnect from the Internet/Access Point and do not send any traffic unless I've reconnected?". Also, I'm wondering if it's possible to get some additional layers, like with a simple proxy chain. I've never heard of anyone getting a chain of VPN's to work, although I used to do VPS + VPN pretty easily. How about proxies + VPN? If I tell application X, like a torrent client or email program or whatever, to use this HTTP or SOCKS5 proxy while my OpenVPN is running then will the traffic going to application X pass through both the OpenVPN and proxy or will the proxy essentially operate independently of the VPN? What I mean is, normally the VPN knows your "real" IP as well as the server IP is assigns to you. The same is true of a SOCKS 5 or HTTP proxy. But can we make it where traffic goes from you to the VPN then from the VPN to the proxy, such that the proxy never sees your real IP and the external Internet never sees the IP of the VPN?
×
×
  • Create New...