Ubuntu: OpenVPN regression


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: OpenVPN regression
# 1  
Old 05-15-2008
Ubuntu: OpenVPN regression

LinuxSecurity.com: USN-612-3 addressed a weakness in OpenSSL certificate and keys generation in OpenVPN by adding checks for vulnerable certificates and keys to OpenVPN. A regression was introduced in OpenVPN when using TLS and multi-client/server which caused OpenVPN to not start when using valid SSL certificates.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Solaris

OpenVPN and NAT

Hi. I am attempting to set up an OpenVPN server on my Solaris 11 box by following all the Linux guides. Thus far I have a working VPN that I can connect to and ssh onto my VPN server over which is great but not what I require long term. I would like to route all VPN client requests for addresses... (0 Replies)
Discussion started by: nickb1976
0 Replies
Login or Register to Ask a Question
eurephiadm fwprofiles(7)												  eurephiadm fwprofiles(7)

NAME
eurephiadm-fwprofiles - Configuring eurephia firewall profiles SYNOPSIS
eurephiadm fwprofiles --list|-l [-v|--verbose] [-a|--accessprofile <acc. ID>] [-f|--fw-destination <name>] [-i|--uid <user ID>] [-n|--username <username>] [-c|--certid <cert ID>] [-e|--email <e-mail address>] [-d|--digest <certificate SHA1 digest>] eurephiadm fwprofiles --add|-A [-d|--description <Description>] [-f|--fw-destination <name>] eurephiadm fwprofiles --delete|-D [-a|--accessprofile <acc. ID>] [-f|--fw-destination <name>] DESCRIPTION
The eurephia plug-in can take advantage of the OS firewall to give a fine grained access control of each OpenVPN client. The preconfigured firewall chains available to eurephia needs to be defined using this eurephiadm command. When the firewall profiles are defined here, they can be assigned to the different user accesses you have enabled. MODES
Available modes for the fwprofiles command are: -A | --add [-d|--description <Description>] [-f|--fw-destination <name>] Add a new firewall profile. Both --description and --fw-destination are required. The --description is just to give a human read- able description of the firewall profile name and is only used in the different reports available in eurephiadm. -D | --delete [-a|--accessprofile <acc. ID>] [-f|--fw-destination <name>] Delete a firewall profile. Either --accessprofile or --fw-destination must be provided. -l | --list [-v|--verbose] [-a|--accessprofile <acc. ID>] [-f|--fw-destination <name>] [-i|--uid <user ID>] [-n|--username <username>] [-c|--certid <cert ID>] [-e|--email <e-mail address>] [-d|--digest <certificate SHA1 digest>] List available firewall profiles. Without any arguments, a simple overview over all registered firewall profiles. If the --verbose argument is given, the list will be more comprehensive. The rest of the arguments are filters which is used to reduce the length of the list. Multiple filters may be added, but they will only work as additional "AND" argument in the query. -h | --help <mode> Show a help screen. Without any arguments, all modes are listed. Providing a mode will show more information about the cho- sen mode. FILTERS
These filters are used by the --list mode. -a | --accessprofile <id> Numeric ID defining the access profile ID. -f | --fw-destination <name> The firewall reference for the chain used by the OS when filtering the OpenVPN client traffic. -i | --uid <user id> Numeric user ID -n | --username <username> User name -c | --certid <certid> Numeric reference to a certificate -e | --email <email addr> e-mail address in certificates -d | --digest <SHA1 digest> Certificate SHA1 digest SEE ALSO
eurephiadm(7), eurephiadm-usercerts(7) AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net> David Sommerseth July 2010 eurephiadm fwprofiles(7)