Changes between Version 11 and Version 12 of Openvpn23ManPage


Ignore:
Timestamp:
05/06/14 07:43:49 (10 years ago)
Author:
Samuli Seppänen
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Openvpn23ManPage

    v11 v12  
    284284
    285285<DD>
    286 Add a random string (6 characters) to first DNS label of hostname to prevent
     286Prepend a random string (6 bytes, 12 hex characters) to hostname to prevent
    287287DNS caching.  For example, &quot;foo.bar.gov&quot; would be modified to
    288288&quot;&lt;random-chars&gt;.foo.bar.gov&quot;.
     
    650650
    651651
    652 <DT><B>--socks-proxy server [port]</B>
     652<DT><B>--socks-proxy server [port] [authfile]</B>
    653653
    654654<DD>
     
    660660
    661661(default=1080).
     662<B>authfile</B>
     663
     664(optional) is a file containing a username and password on 2 lines, or
     665&quot;stdin&quot; to prompt from console.
    662666
    663667<DT><B>--socks-proxy-retry</B>
     
    770774IP address changes due to DHCP, we should configure
    771775our IP address change script (see man page for
    772 <B>dhcpcd</B>(8)
     776<B><A HREF="/cgi-bin/man/man2html?8+dhcpcd">dhcpcd</A></B>(8)
    773777
    774778) to deliver a
     
    936940of the TAP-Win32 driver.  When used on *nix, requires that the tun
    937941driver supports an
    938 <B>ifconfig</B>(8)
     942<B><A HREF="/cgi-bin/man/man2html?8+ifconfig">ifconfig</A></B>(8)
    939943
    940944command which sets a subnet instead of a remote endpoint IP address.
     
    972976<B>--dev-type tap.</B>
    973977
     978<P>
     979Under Mac OS X this option can be used to specify the default tun
     980implementation. Using
     981<B>--dev-node utun</B>
     982
     983forces usage of the native Darwin tun kernel support. Use
     984<B>--dev-node utunN</B>
     985
     986to select a specific utun instance. To force using the tun.kext (/dev/tunX) use
     987<B>--dev-node tun</B>.
     988
     989When not specifying a
     990<B>--dev-node</B>
     991
     992option openvpn will first try to open utun, and fall back to tun.kext.
    974993<P>
    975994On Windows systems, select the TAP-Win32 adapter which
     
    10501069<P>
    10511070This option, while primarily a proxy for the
    1052 <B>ifconfig</B>(8)
     1071<B><A HREF="/cgi-bin/man/man2html?8+ifconfig">ifconfig</A></B>(8)
    10531072
    10541073command, is designed to simplify TUN/TAP
     
    11191138This option is intended as
    11201139a convenience proxy for the
    1121 <B>route</B>(8)
     1140<B><A HREF="/cgi-bin/man/man2html?8+route">route</A></B>(8)
    11221141
    11231142shell command,
     
    19251944
    19261945<P>
    1927 Note that the behaviour of
     1946Note that the behavior of
    19281947<B>SIGUSR1</B>
    19291948
     
    23142333new software features to gracefully degrade when encountered by
    23152334older software versions.
     2335<P>
     2336It is also possible to tag a single directive so as not to trigger
     2337a fatal error if the directive isn't recognized.  To do this,
     2338prepend the following before the directive:
     2339<B>setenv opt</B>
     2340
     2341<P>
     2342Versions prior to OpenVPN 2.3.3 will always ignore options set with the
     2343<B>setenv opt</B>
     2344
     2345directive.
     2346<P>
     2347See also
     2348<B>--ignore-unknown-option</B>
     2349
    23162350
    23172351<DT><B>--setenv-safe name value</B>
     
    23272361is a safety precaution to prevent a LD_PRELOAD style attack
    23282362from a malicious or compromised server.
     2363
     2364<DT><B>--ignore-unknown-option opt1 opt2 opt3 ... optN</B>
     2365
     2366<DD>
     2367When one of options
     2368<B>opt1 ... optN</B>
     2369
     2370is encountered in the configuration file the configuration
     2371file parsing does not fail if this OpenVPN version does not
     2372support the option. Multiple
     2373<B>--ignore-unknown-option</B>
     2374
     2375options can be given to support a larger number of options to ignore.
     2376<P>
     2377This option should be used with caution, as there are good security
     2378reasons for having OpenVPN fail if it detects problems in a
     2379config file. Having said that, there are valid reasons for wanting
     2380new software features to gracefully degrade when encountered by
     2381older software versions.
     2382<P>
     2383<B>--ignore-unknown-option</B>
     2384
     2385is available since OpenVPN 2.3.3.
    23292386
    23302387<DT><B>--script-security level</B>
     
    25072564complications can result when scripts or restarts
    25082565are executed after the chroot operation.
     2566<P>
     2567Note: if OpenVPN is built using the PolarSSL SSL
     2568library,
     2569<B>--chroot</B>
     2570
     2571will only work if a /dev/urandom device node is available
     2572inside the chroot directory
     2573<B>dir.</B>
     2574
     2575This is due to the way PolarSSL works (it wants to open
     2576/dev/urandom every time randomness is needed, not just once
     2577at startup) and nothing OpenVPN can influence.
    25092578
    25102579<DT><B>--setcon context</B>
     
    26202689<DD>
    26212690Use this option when OpenVPN is being run from the inetd or
    2622 <B>xinetd(8)</B>
     2691<B><A HREF="/cgi-bin/man/man2html?8+xinetd">xinetd</A>(8)</B>
    26232692
    26242693server.
     
    27912860
    27922861<DD>
    2793 Configure a multi-homed UDP server.  This option can be used when
    2794 OpenVPN has been configured to listen on all interfaces, and will
    2795 attempt to bind client sessions to the interface on which packets
    2796 are being received, so that outgoing packets will be sent out
    2797 of the same interface.  Note that this option is only relevant for
    2798 UDP servers and currently is only implemented on Linux.
    2799 <P>
    2800 Note: clients connecting to a
    2801 <B>--multihome</B>
    2802 
    2803 server should always use the
    2804 <B>--nobind</B>
    2805 
    2806 option.
     2862Configure a multi-homed UDP server.  This option needs to be used when
     2863a server has more than one IP address (e.g. multiple interfaces, or
     2864secondary IP addresses), and is not using
     2865<B>--local</B>
     2866
     2867to force binding to one specific address only.  This option will
     2868add some extra lookups to the packet path to ensure that the UDP reply
     2869packets are always sent from the address that the client is
     2870talking to. This is not supported on all platforms, and it adds more
     2871processing, so it's not enabled by default.
     2872<P>
     2873Note: this option is only relevant for UDP servers.
     2874<P>
     2875Note 2: if you do an IPv6+IPv4 dual-stack bind on a Linux machine with
     2876multiple IPv4 address, connections to IPv4 addresses will not work
     2877right on kernels before 3.15, due to missing kernel support for the
     2878IPv4-mapped case (some distributions have ported this to earlier kernel
     2879versions, though).
    28072880
    28082881<DT><B>--echo [parms...]</B>
     
    29853058<B>port</B>
    29863059
    2987 to 'unix'.  While the default behaviour is to create a unix domain socket
     3060to 'unix'.  While the default behavior is to create a unix domain socket
    29883061that may be connected to by any process, the
    29893062<B>--management-client-user</B>
     
    42004273
    42014274<DT><DD>
    4202 In addition the old behaviour was to remap any character other than
     4275In addition the old behavivour was to remap any character other than
    42034276alphanumeric, underscore ('_'), dash ('-'), dot ('.'), and slash ('/') to
    42044277underscore ('_').  The X.509 Subject string as returned by the
     
    51285201above).
    51295202
     5203<DT><B>--tls-version-min version ['or-highest']</B>
     5204
     5205<DD>
     5206Enable TLS version negotiation, and set the minimum
     5207TLS version we will accept from the peer (default is &quot;1.0&quot;).
     5208Examples for version
     5209include &quot;1.0&quot;, &quot;1.1&quot;, or &quot;1.2&quot;.  If 'or-highest' is specified
     5210and version is not recognized, we will only accept the highest TLS
     5211version supported by the local SSL implementation.
     5212<P>
     5213If this options is not set, the code in OpenVPN 2.3.4 will default
     5214to using TLS 1.0 only, without any version negotiation.  This reverts
     5215the beaviour to what OpenVPN versions up to 2.3.2 did, as it turned
     5216out that TLS version negotiation can lead to handshake problems due
     5217to new signature algorithms in TLS 1.2.
     5218
    51305219<DT><B>--pkcs12 file</B>
    51315220
     
    54795568be derived by taking a secure hash of this file, similar to
    54805569the
    5481 <B>md5sum</B>(1)
     5570<B><A HREF="/cgi-bin/man/man2html?1+md5sum">md5sum</A></B>(1)
    54825571
    54835572or
    5484 <B>sha1sum</B>(1)
     5573<B><A HREF="/cgi-bin/man/man2html?1+sha1sum">sha1sum</A></B>(1)
    54855574
    54865575commands.
     
    60116100option.  This file must be shared with the
    60126101peer over a pre-existing secure channel such as
    6013 <B>scp</B>(1)
     6102<B><A HREF="/cgi-bin/man/man2html?1+scp">scp</A></B>(1)
    60146103
    60156104
     
    60486137
    60496138scripts to run the appropriate
    6050 <B>ifconfig</B>(8)
     6139<B><A HREF="/cgi-bin/man/man2html?8+ifconfig">ifconfig</A></B>(8)
    60516140
    60526141and
    6053 <B>route</B>(8)
     6142<B><A HREF="/cgi-bin/man/man2html?8+route">route</A></B>(8)
    60546143
    60556144commands.  These commands can be placed in the the same shell script
     
    64686557
    64696558option.  On non-Windows systems, the
    6470 <B>ifconfig</B>(8)
     6559<B><A HREF="/cgi-bin/man/man2html?8+ifconfig">ifconfig</A></B>(8)
    64716560
    64726561command provides similar functionality.
     
    65356624
    65366625The following options exist to support IPv6 tunneling in peer-to-peer
    6537 and client-server mode.  As of now, this is just very basic
    6538 documentation of the IPv6-related options. More documentation can be
    6539 found on <A HREF="http://www.greenie.net/ipv6/openvpn.html">http://www.greenie.net/ipv6/openvpn.html</A>
     6626and client-server mode.  All options are modeled after their IPv4
     6627counterparts, so more detailed explanations given there apply here
     6628as well (except for
     6629<B>--topology</B>
     6630
     6631, which has no effect on IPv6).
    65406632<DL COMPACT>
    65416633<DT><B>--ifconfig-ipv6 ipv6addr/bits ipv6remote</B>
     
    65756667<B>/bits</B>
    65766668
    6577 setting controls the size of the pool.
     6669setting controls the size of the pool.  Due to implementation details,
     6670the pool size must be between /64 and /112.
    65786671<DT><B>--ifconfig-ipv6-push ipv6addr/bits ipv6remote</B>
    65796672
     
    73207413script.
    73217414
     7415<DT><B>tls_digest_{n}</B>
     7416
     7417<DD>
     7418Contains the certificate SHA1 fingerprint/digest hash value,
     7419where
     7420<B>n</B>
     7421
     7422is the verification level.  Only set for TLS connections.  Set prior
     7423to execution of
     7424<B>--tls-verify</B>
     7425
     7426script.
     7427
    73227428<DT><B>tls_id_{n}</B>
    73237429
     
    73447450<B>--tls-verify</B>
    73457451
    7346 script. This is in the form of a hex string like &quot;37AB46E0&quot;, which is
    7347 suitable for doing serial-based OCSP queries (with OpenSSL, you have
    7348 to prepend &quot;0x&quot; to the string). If something goes wrong while reading
     7452script. This is in the form of a decimal string like &quot;933971680&quot;, which is
     7453suitable for doing serial-based OCSP queries (with OpenSSL, do not
     7454prepend &quot;0x&quot; to the string) If something goes wrong while reading
    73497455the value from the certificate it will be an empty string, so your
    73507456code should check that.
    73517457See the contrib/OCSP_check/OCSP_check.sh script for an example.
     7458
     7459<DT><B>tls_serial_hex_{n}</B>
     7460
     7461<DD>
     7462Like
     7463<B>tls_serial_{n}</B>,
     7464
     7465but in hex form (e.g. &quot;12:34:56:78:9A&quot;).
    73527466
    73537467<DT><B>tun_mtu</B>
     
    77597873
    77607874option will produce verbose output, similar to the
    7761 <B>tcpdump</B>(8)
     7875<B><A HREF="/cgi-bin/man/man2html?8+tcpdump">tcpdump</A></B>(8)
    77627876
    77637877program.  Omit the
     
    77867900to june over a secure medium such as by
    77877901using the
    7788 <B>scp</B>(1)
     7902<B><A HREF="/cgi-bin/man/man2html?1+scp">scp</A></B>(1)
    77897903
    77907904program.
     
    80968210<H2>SEE ALSO</H2>
    80978211
    8098 <B>dhcpcd</B>(8),
    8099 
    8100 <B>ifconfig</B>(8),
    8101 
    8102 <B>openssl</B>(1),
    8103 
    8104 <B>route</B>(8),
    8105 
    8106 <B>scp</B>(1)
    8107 
    8108 <B>ssh</B>(1)
     8212<B><A HREF="/cgi-bin/man/man2html?8+dhcpcd">dhcpcd</A></B>(8),
     8213
     8214<B><A HREF="/cgi-bin/man/man2html?8+ifconfig">ifconfig</A></B>(8),
     8215
     8216<B><A HREF="/cgi-bin/man/man2html?1+openssl">openssl</A></B>(1),
     8217
     8218<B><A HREF="/cgi-bin/man/man2html?8+route">route</A></B>(8),
     8219
     8220<B><A HREF="/cgi-bin/man/man2html?1+scp">scp</A></B>(1)
     8221
     8222<B><A HREF="/cgi-bin/man/man2html?1+ssh">ssh</A></B>(1)
    81098223
    81108224
     
    81958309<HR>
    81968310This document was created by
    8197 man2html,
     8311<A HREF="/cgi-bin/man/man2html">man2html</A>,
    81988312using the manual pages.<BR>
    8199 Time: 15:49:01 GMT, July 12, 2013
     8313Time: 07:38:58 GMT, May 06, 2014
    82008314}}}