openvpn:options
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
openvpn:options [2020/04/20 10:21] – peter | openvpn:options [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 58: | Line 58: | ||
|route network/IP [netmask] [gateway] [metric]|Add route to routing table after connection is established. Multiple routes can be specified. Routes will be automatically torn down in reverse order prior to TUN/TAP device close.| | |route network/IP [netmask] [gateway] [metric]|Add route to routing table after connection is established. Multiple routes can be specified. Routes will be automatically torn down in reverse order prior to TUN/TAP device close.| | ||
|::: | |::: | ||
- | |::: | + | |::: |
- | |::: | + | |::: |
|:::|The default can be specified by leaving an option blank or setting it to " | |:::|The default can be specified by leaving an option blank or setting it to " | ||
|:::|The **network** and **gateway** parameters can also be specified as a DNS or /etc/hosts file resolvable name, or as one of three special keywords:| | |:::|The **network** and **gateway** parameters can also be specified as a DNS or /etc/hosts file resolvable name, or as one of three special keywords:| | ||
Line 91: | Line 91: | ||
|client|A helper directive designed to simplify the configuration of OpenVPN' | |client|A helper directive designed to simplify the configuration of OpenVPN' | ||
- | |::: | + | |:::|**pull**| |
- | |::: | + | |:::|**tls-client**| |
- | |pull|This option must be used on a client which is connecting to a multi-client server. It indicates to OpenVPN that it should accept options pushed by the server, provided they are part of the legal set of pushable options.| | + | |pull|This option must be used on a client which is connecting to a multi-client server. |
- | |:::|In particular, --pull allows the server to push routes to the client, so you should not use --pull or --client in situations where you don't trust the server to have control over the client' | + | |:::|In particular, |
Line 119: | Line 119: | ||
|:::|This is an important security precaution to protect against a man-in-the-middle attack where an authorized client attempts to connect to another client by impersonating the server. | |:::|This is an important security precaution to protect against a man-in-the-middle attack where an authorized client attempts to connect to another client by impersonating the server. | ||
|tls-client|Enable TLS and assume client role during TLS handshake.| | |tls-client|Enable TLS and assume client role during TLS handshake.| | ||
+ | |verify-x509-name Server name-prefix|Accept connections only if a host's X.509 name is equal to **name**. | ||
+ | |:::|Which X.509 name is compared to **name** depends on the setting of type. **type** can be " | ||
+ | |::: | ||
+ | |::: | ||
+ | |:::|Using a name prefix is a useful alternative to managing a CRL (Certificate Revocation List) on the client, since it allows the client to refuse all certificates except for those associated with designated servers.| | ||
+ | |::: | ||
+ | |||
+ | |||
---- | ---- | ||
Line 128: | Line 136: | ||
|::: | |::: | ||
|::: | |::: | ||
- | |||
- | ---- | ||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |||
- | |verify-x509-name Server name-prefix|Accept connections only if a host's X.509 name is equal to **name**. | ||
- | |:::|Which X.509 name is compared to **name** depends on the setting of type. **type** can be " | ||
- | |::: | ||
- | |::: | ||
- | |:::|Using a name prefix is a useful alternative to managing a CRL (Certificate Revocation List) on the client, since it allows the client to refuse all certificates except for those associated with designated servers.| | ||
- | |::: | ||
---- | ---- | ||
openvpn/options.1587378094.txt.gz · Last modified: 2020/07/15 09:30 (external edit)