Changes between Version 4 and Version 5 of Openvpn24ManPage


Ignore:
Timestamp:
11/25/16 07:55:36 (7 years ago)
Author:
Samuli Seppänen
Comment:

Update man-page to OpenVPN 2.4_beta2

Legend:

Unmodified
Added
Removed
Modified
  • Openvpn24ManPage

    v4 v5  
    35773577<B>--setenv,</B>
    35783578
     3579<B>--auth-token,</B>
     3580
    35793581<B>--persist-key, --persist-tun, --echo,</B>
    35803582
     
    51005102<B>--cipher</B>.
    51015103
     5104<P>
     5105Additionally, to allow for more smooth transition, if NCP is enabled, OpenVPN
     5106will inherit the cipher of the peer if that cipher is different from the local
     5107<B>--cipher</B>
     5108
     5109setting, but the peer cipher is one of the ciphers specified in
     5110<B>--ncp-ciphers</B>.
     5111
     5112E.g. a non-NCP client (&lt;=2.3, or with --ncp-disabled set) connecting to a
     5113NCP server (2.4+) with &quot;--cipher BF-CBC&quot; and &quot;--ncp-ciphers
     5114AES-256-GCM:AES-256-CBC&quot; set can either specify &quot;--cipher BF-CBC&quot; or
     5115&quot;--cipher AES-256-CBC&quot; and both will work.
    51025116<P>
    51035117
     
    61976211username/password.  It is always cached.
    61986212
     6213<DT><B>--auth-token token</B>
     6214
     6215<DD>
     6216This is not an option to be used directly in any configuration files,
     6217but rather push this option from a
     6218<B>--client-connect</B>
     6219
     6220script or a
     6221<B>--plugin</B>
     6222
     6223which hooks into the OPENVPN_PLUGIN_CLIENT_CONNECT or
     6224OPENVPN_PLUGIN_CLIENT_CONNECT_V2 calls.  This option provides
     6225a possibility to replace the clients password with an authentication
     6226token during the lifetime of the OpenVPN client.
     6227<P>
     6228Whenever the connection is renegotiated and the
     6229<B>--auth-user-pass-verify</B>
     6230
     6231script or
     6232<B>--plugin</B>
     6233
     6234making use of the OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY hook is
     6235triggered, it will pass over this token as the password
     6236instead of the password the user provided.  The authentication
     6237token can only be reset by a full reconnect where the server
     6238can push new options to the client.  The password the user entered
     6239is never preserved once an authentication token have been set.  If
     6240the OpenVPN server side rejects the authentication token, the
     6241client will receive an AUTH_FAIL and disconnect.
     6242<P>
     6243The purpose of this is to enable two factor authentication
     6244methods, such as HOTP or TOTP, to be used without needing to
     6245retrieve a new OTP code each time the connection is renegotiated.
     6246Another use case is to cache authentication data on the client
     6247without needing to have the users password cached in memory
     6248during the life time of the session.
     6249<P>
     6250To make use of this feature, the
     6251<B>--client-connect</B>
     6252
     6253script or
     6254<B>--plugin</B>
     6255
     6256needs to put
     6257<P>
     6258<PRE>
     6259<B>push &quot;auth-token UNIQUE_TOKEN_VALUE&quot;
     6260</B></PRE>
     6261
     6262<P>
     6263into the file/buffer for dynamic configuration data.  This
     6264will then make the OpenVPN server to push this value to the
     6265client, which replaces the local password with the
     6266UNIQUE_TOKEN_VALUE.
     6267
    61996268<DT><B>--tls-verify cmd</B>
    62006269
     
    68796948<B>DNS addr --</B>
    68806949
    6881 Set primary domain name server address.  Repeat
     6950Set primary domain name server IPv4 address.  Repeat
    68826951this option to set secondary DNS server addresses.
     6952<P>
     6953<B>DNS6 addr --</B>
     6954
     6955Set primary domain name server IPv6 address.  Repeat
     6956this option to set secondary DNS server IPv6 addresses.
     6957<P>
     6958Note: currently this is handled using netsh (the
     6959existing DHCP code can only do IPv4 DHCP, and that protocol only
     6960permits IPv4 addresses anywhere).  The option will be put into the
     6961environment, so an
     6962<B>--up</B>
     6963
     6964script could act upon it if needed.
    68836965<P>
    68846966<B>WINS addr --</B>
     
    81568238<B>--ca, --cert, --dh, --extra-certs, --key, --pkcs12, --secret,</B>
    81578239
    8158 <B>--crl-verify, --http-proxy-user-pass</B>
     8240<B>--crl-verify, --http-proxy-user-pass, --tls-auth</B>
    81598241
    81608242and
    8161 <B>--tls-auth</B>
     8243<B>--tls-crypt</B>
    81628244
    81638245options.
     
    88738955<A HREF="/cgi-bin/man/man2html">man2html</A>,
    88748956using the manual pages.<BR>
    8875 Time: 13:04:04 GMT, November 17, 2016
     8957Time: 07:54:11 GMT, November 25, 2016
    88768958}}}