# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
dev tun
# Windows needs the TAP-Windows adapter name
# from the Network Connections panel
# if you have more than one. On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node OpenVPN-TUN
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server.
proto udp
# Announce to TCP sessions running over the tunnel that
# they should limit their send packet sizes such that after
# OpenVPN has encapsulated them, the resulting UDP packet sizex
# that OpenVPN sends to its peer will not exceed max bytes.
# The default value is 1450.
mssfix 1400
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote vpn.cvt.stuba.sk 1194
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Downgrade privileges after initialization (non-Windows only)
;user nobody
;group nobody
# Try to preserve some state across restarts.
persist-key
persist-tun
# SSL/TLS parms.
# See the server config file for more
# description. It's best to use a separate .crt/.key file pair
# for each client. A single ca file can be used for all clients.
;ca [inline]
;ca STU-CA-v2.crt
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
cipher AES-256-CBC
# Certificate issued by common public CA, can by verified as follows
verify-x509-name vpn.cvt.stuba.sk name
;verify-x509-name "C=SK, ST=Bratislavsky kraj, O=Slovenska technicka univerzita v Bratislave, OU=CVT, CN=vpn.cvt.stuba.sk" subject
;remote-cert-tls server
# For extra security beyond that provided by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
# openvpn --genkey --secret ta.key
#
# The server and each client must have a copy of this key.
# The second parameter should be '0' on the server and '1' on the clients.
;tls-auth [inline] 1
;tls-auth ta.key 1
# Self signed certs only
;ns-cert-type server
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Authenticate with server using username/password. User/password file contain username/password on 2 lines.
# If the password line is missing, OpenVPN will prompt for one.
# If file is omitted, username/password will be prompted from the console.
# auth-user-pass [ login.conf ]
auth-user-pass
# Don't cache username/passwords in virtual memory.
# If specified, this directive will cause OpenVPN to immediately forget username/password inputs after they are used.
auth-nocache
# Set log file verbosity.
verb 3
# In client mode, on exit/restart, this option will tell the server to immediately close its client instance object
# rather than waiting for a timeout. The n parameter (default=1) controls the maximum number of attempts
# that the client will try to resend the exit notification message.
explicit-exit-notify 1
-----BEGIN CERTIFICATE-----
MIIERDCCAyygAwIBAgIJAIWmN/zCFZq7MA0GCSqGSIb3DQEBCwUAMIGmMQswCQYD
VQQGEwJTSzEaMBgGA1UECAwRQnJhdGlzbGF2c2t5IGtyYWoxEzARBgNVBAcMCkJy
YXRpc2xhdmExNDAyBgNVBAoMK1Nsb3ZlbnNrYSB0ZWNobmlja2EgdW5pdmVyeml0
YSB2IEJyYXRpc2xhdmUxDDAKBgNVBAsMA0NWVDEiMCAGA1UEAwwZU1RVIEJyYXRp
c2xhdmEgUm9vdCBDQSB2MjAeFw0xNzAxMzAxMTQ4NDlaFw0yNzAxMjgxMTQ4NDla
MIGmMQswCQYDVQQGEwJTSzEaMBgGA1UECAwRQnJhdGlzbGF2c2t5IGtyYWoxEzAR
BgNVBAcMCkJyYXRpc2xhdmExNDAyBgNVBAoMK1Nsb3ZlbnNrYSB0ZWNobmlja2Eg
dW5pdmVyeml0YSB2IEJyYXRpc2xhdmUxDDAKBgNVBAsMA0NWVDEiMCAGA1UEAwwZ
U1RVIEJyYXRpc2xhdmEgUm9vdCBDQSB2MjCCASIwDQYJKoZIhvcNAQEBBQADggEP
ADCCAQoCggEBAOQt41XVxVF4gJlU9qjlnh6imPqPWWoOtmnAzyhNV2rTfw/Dklcw
rDSYKVg7EOWdEMbHtPTtQ79OoIBIIkLF+3RPgwhiaVvSQZJUX7yUiAQNKtUp02PD
dYxguxdGN9wMXtu1CspjH1IkBkU1m/qlIK0lPmgmAaHTsSV9N2Zhp1yP9JFcuxkZ
waqGBNjRnj55J/mSQb0l32PaVQKo3oTAjYe/0MEKe/1/L043x8yIPsmcGflNlIVY
UFSrPDBwqjjyuYEyPLiT12+ox+DdYgNUrOhNE+xci3rw9afCcJJKnw23E2v4xro1
Rv7i78FMCtYAqbw59KmmWTzUk6RRQ+kGoAUCAwEAAaNzMHEwHQYDVR0OBBYEFMKh
qrdNT5D5BcXaE44SGovvTzKVMB8GA1UdIwQYMBaAFMKhqrdNT5D5BcXaE44SGovv
TzKVMAwGA1UdEwQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMBEGCWCGSAGG+EIBAQQE
AwIBBjANBgkqhkiG9w0BAQsFAAOCAQEAJj+kQ/W//4xFIS/01VtMZYKJkqwWQ54X
GHRn8K/5AXfCc7JUven5h66uzKOZfCftjFPc5mP9wRGOLxkClD15Uv8ZqYL3w7IJ
8IJEx3yBohFYPPAJROJcoHQdn8mt27sb1aNU+myIj0SkmPvEszogojtxZtukezhG
f4/fWWYoUKABzet0z5WUrt9/f10T0SnDy6P3YQNX343qc1zzaYwksFEJXRgBdw3b
XdiLOZczS6qIusRRyOFBECFQWJOpgrhpHUr7xKotTF5H6L0Wzu5CeAM/XBH+R1Wk
4QHQecwStvFjsDMODsLsSFm3N9T3tb3//w5TxqsCfYqLoSFn94gJQw==
-----END CERTIFICATE-----
key-direction 1
-----BEGIN OpenVPN Static key V1-----
a638f3f349a0faa14d0427d1fde9f06b
a47ad8833589cf28f24734f46919ecc3
4a3b57431b9645d31bea422a9e92d150
1e02c01bb95511eee4f47c0bf9272a0a
c4f9ded7fd693cd288f3500d7d11dfd0
0716cc552d1ac9c3c03594e22e3ba28f
f38cd7d627485adf632396765e19a563
c5cddda6d1ef21693dbd7a8af9947b31
a8513a7d738b3c32537447c99ab2962f
07d1077b69de3834add61a9d528e70b4
600042d86934d21d9a51fde63453cff1
1831046d764be7c67d14104e5f42674b
f08d4ce3a14baaa6219cd479a702999a
86dcc489f50cdddb33f31fd28cad3a30
ed0d2a6d6d3e5b01405228f28f14bdd7
0568b410df75efea1188881b047e620a
-----END OpenVPN Static key V1-----