亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? openvpn.8

?? 一個開源的VPN原碼
?? 8
?? 第 1 頁 / 共 5 頁
字號:
will run a script such as:.B ifconfig $1 10.4.0.1 pointopoint 10.4.0.2 mtu $2(Note: remove "pointopoint" from command line on OpenBSD).Note that OpenVPN also provides the.B --ifconfigoption to automatically ifconfig the TUN device,eliminating the need to define an.B --upscript, unless you also want to configure routesin the.B --upscript.If.B --ifconfigis also specified, OpenVPN will pass the ifconfig localand remote endpoints on the command line to the.B --upscript so that they can be used to configure routes such as:.B route add -net 10.0.0.0 netmask 255.255.255.0 gw $5.TP.B --down cmdShell command to run after tun/tap device close(post.B --userUID change and/or.B --chroot).  Called with the same parameters as the.B --upoption above..TP.B --user userChange the user ID of the OpenVPN process to.B userafter initialization, dropping privileges in the process.This option is useful to protect the systemin the event that some hostile party was able to gain control ofan OpenVPN session.  Though OpenVPN's security features makethis unlikely, it is provided as a second line of defense.By setting.B userto.I nobodyor somebody similarly unprivileged, the hostile party would belimited in what damage they could cause.  Of course onceyou take away privileges, you cannot return themto an OpenVPN session.  This means, for example, that ifyou want to reset an OpenVPN daemon with a.B SIGUSR1signal(for example in responseto a DHCP reset), you should make use of one or more of the.B --persistoptions to ensure that OpenVPN doesn't need to execute any privilegedoperations in order to restart (such as re-reading key filesor running.BR ifconfigon the tun device)..TP.B --group groupSimilar to the.B --useroption,this option changes the group ID of the OpenVPN process to.B groupafter initialization..TP.B --cd dirChange directory to.B dirprior to reading any files such asconfiguration files, key files, scripts, etc..B dirshould be an absolute path, with a leading "/",and without any referencesto the current directory such as "." or "..".This option is useful when you are runningOpenVPN in .B --daemonmode, and you want to consolidate all ofyour OpenVPN control files in one location..TP.B --chroot dirChroot to.B dirbefore initialization.  .B --chrootessentially redefines.B diras being the toplevel directory tree (/).  OpenVPN will thereforebe unable to access any file outside this tree.This can be desirable from a security standpoint.The caveat here is that every file thatOpenVPN might possibly need must exist within the chroot directory tree,including special files such.B /dev/random(which is used by OpenVPN to generate random keys and IVs)..TP.B --daemonBecome a daemon and write all messages to the syslog file (such as /var/log/messages)..TP.B --inetdUse this option when OpenVPN is being run from the inetd or.BR xinetd(8)server.This option precludes the use of.B --daemon, --local,or.B --remote.Note that each OpenVPN tunnel requires a separate UDP port anda separate inetd or xinetd entry.  See the OpenVPN HOWTO for an exampleon using OpenVPN with xinetd:.I http://openvpn.sourceforge.net/howto.html.TP.B --writepid fileWrite OpenVPN's main process ID to.B file..TP.B --nice nChange process priority after initialization(.B ngreater than 0 is lower priority,.B nless than zero is higher priority)..TP.B --nice-work nChange priority of background TLS work thread.  The TLS threadfeature is enabled when OpenVPN is builtwith pthread support, and you are running OpenVPNin TLS mode (i.e. with.B --tls-clientor.B --tls-serverspecified).Using a TLS thread offloads the CPU-intensive process of SSL/TLS-basedkey exchange to a background thread so that it does not becomea latency bottleneck in the tunnel packet forwarding process.The parameter.B nis interpreted exactly as with the.B --niceoption above, but in relation to the work thread ratherthan the main thread..TP.B --verb nSet output verbosity to.B n(default=1).  Each level shows all info from the previous levels.Level 5 is recommended if you want a good summaryof what's happening without being swamped by output..B 0 --no output except fatal errors.br.B 1 --show startup information + connection initiated messages + non-fatal encryption & net errors.br.B 2 --show all parameter settings.br.B 3 --show key negotiations +.B --gremlinnet outages.br.B 4 --show partial TLS debug info.br.B 5 --show adaptive compression state changes (on or off).br.B 6 --show hex representation of keys.br.B 7 --show verbose key negotiations.br.B 8 --show all debug info.TP.B --mute nLog at most.B nconsecutive messages in the same category.  This is useful tolimit repetitive logging of similar message types..TP.B --gremlinSimulate dropped & corrupted packets + network outages(for debugging and testing only).  This is apowerful tool for verifying the robustness of the OpenVPN protocol,especially in TLS mode.  When used with TLS parameters that forcefrequent key renegotiations such as.B --reneg-sec 10,this option will stress-test the ability of OpenVPN peers to recoverfrom errors and remain in sync.Current parameter settings will cause.B --gremlinto drop 2% of packets and corrupt another 2%.  A packet corruption willalter a random byte in the packet to a random value.  It mightalso increase or decrease the size of the packet by one byte..B --gremlinwill also simulate network outages by going "down"for a period of 10 to 60 seconds.Between simulated outages, OpenVPN willremain up for periods of 10 to 300 seconds.  To see gremlinmessages, set.B --verbto 3 or higher.  To change gremlin constants, consult thefile gremlin.c included in the OpenVPN source distribution..TP.B --comp-lzoUse fast LZO compression -- may add up to 1 byte perpacket for incompressible data..TP.B --comp-noadaptWhen used in conjunction with.B --comp-lzo,this option will disable OpenVPN's adaptive compression algorithm.Normally, adaptive compression is enabled with.B --comp-lzo.Adaptive compression tries to optimize the case where you havecompression enabled, but you are sending predominantly incompressible(or pre-compressed) packets over the tunnel.  With adaptive compression,OpenVPN will periodically sample the compression process to see ifit's actually saving us anything.  If not, we will disable compressionfor a period of time, then re-sample..B .SS Data Channel Encryption Options:These options are meaningful for both Static & TLS-negotiated key modes(must be compatible between peers)..TP.B --secret fileEnable Static Key encryption mode (non-TLS).Use pre-shared secret file which was generated with.B --genkey.Static key encryption mode has certain advantages, the biggestprobably being the ease of configuration.  There are no certificatesor certificate authorities or complicated negotiation handshakes and protocols.The only requirement is that you have a pre-existing secure channel withyour peer (such as.B ssh) to initially copy the key.  This requirement, along with thefact that your key never changes unless you manually generate a new one,makes it somewhat less secure than TLS mode (see below).  If an attackermanages to steal your key, everything that was ever encrypted withit is compromised.  Contrast that to the perfect forward security features ofTLS mode where even if an attacker was able to steal your private key,he would gain no information to help him decrypt past sessions.One interesting aspect of Static Key encryption mode is thatit is a handshake-free protocol without any distinguishing signature or feature(such as a header or protocol handshake sequence) that would mark the ciphertext packets as beinggenerated by OpenVPN.  Anyone eavesdropping on the wirewould see nothingbut random-looking data..TP.B --auth algAuthenticate packets with an HMAC using messagedigest algorithm.B alg.(The default is.B SHA1).HMAC is a commonly used message authentication algorithm (MAC) that usesa data string, a secure hash algorithm, and a key, to producea digital signature.  HMAC has the property that it is infeasiblefor an attacker with access to a signed string to find another stringwhich would sign to the same signature or generate a valid signaturefor his own string.OpenVPN's usage of HMAC is to first encrypt a packet, then HMAC the resulting ciphertext.In static-key encryption mode, the HMAC keyis included in the key file generated by.B --genkey.In TLS mode, the HMAC key is dynamically generated and sharedbetween peers via the TLS control channel.  If OpenVPN receives a packet witha bad HMAC it will drop the packet.HMAC usually adds 16 or 20 bytes per packet.Set.B alg=noneto disable authentication.For more information on HMAC see.I http://www.cs.ucsd.edu/users/mihir/papers/hmac.html.TP.B --cipher algEncrypt packets with cipher algorithm.B alg.The default is.B BF-CBC,an abbreviation for Blowfish in Cipher Block Chaining mode.Blowfish has the advantages of being fast, very secure, and allowing key sizesof up to 448 bits.  Blowfish is designed to be used in situations wherekeys are changed infrequently.For more information on blowfish, see.I http://www.counterpane.com/blowfish.htmlTo see other ciphers that are available withOpenVPN, use the.B --show-ciphersoption.OpenVPN supports the CBC, CFB, and OFB cipher modes.Set.B alg=noneto disable encryption..TP.B --keysize nSize of cipher key in bits (optional).If unspecified, defaults to cipher-specific default.  The.B --show-ciphersoption (see below) shows all available OpenSSL ciphers,their default key sizes, and whether the key size canbe changed.  Use care in changing a cipher's defaultkey size.  Many ciphers have not been extensivelycryptanalyzed with non-standard key lengths, and alarger key may offer no real guarantee of greatersecurity, or may even reduce security..TP.B --no-replayDisable OpenVPN's protection against replay attacks.Don't use this option unless you are prepared to makea tradeoff of greater efficiency in exchange for lesssecurity.OpenVPN provides datagram replay protection by default.Replay protection is accomplishedby tagging each outgoing datagram with an identifierthat is guaranteed to be unique for the key being used.The peer that receives the datagram will check forthe uniqueness of the identifier.  If the identifierwas already received in a previous datagram, OpenVPNwill drop the packet.  Replay protection is importantto defeat attacks such as a SYN flood attack, wherethe attacker listens in the wire, intercepts a TCPSYN packet (identifying it by the context in whichit occurs in relation to other packets), then floodsthe receiving peer with copies of this packet.OpenVPN's replay protection is implemented in slightlydifferent ways, depending on the key management modeyou have selected.In Static Key modeor when using an CFB or OFB mode cipher, OpenVPN uses a64 bit unique identifier that combines a time stamp withan incrementing sequence number.When using TLS mode for key exchange and a CBC ciphermode, OpenVPN uses only a 32 bit sequence number withouta time stamp, since OpenVPN can guarantee the uniquenessof this value for each key.  As in IPSec, if the sequence number isclose to wrapping back to zero, OpenVPN will triggera new key exchange.To check for replays, OpenVPN usesthe.I sliding windowalgorithm usedby IPSec..TP.B --no-ivDisable OpenVPN's use of IV (cipher initialization vector).Don't use this option unless you are prepared to makea tradeoff of greater efficiency in exchange for lesssecurity.OpenVPN uses an IV by default, and requires it for CFB andOFB cipher modes (which are totally insecure without it).Using an IV is important for security when multiplemessages are being encrypted/decrypted with the same key.IV is implemented differently depending on the cipher mode used.In CBC mode, OpenVPN will start with a random IV and carry forwardthe residuals across datagrams in a manner similarto that used by IPSec (see RFC 2405 for more information). In CFB/OFB mode, OpenVPN uses a unique sequence number and time stampas the IV.  In fact, in CFB/OFB mode, OpenVPN uses a datagramspace-saving optimization that uses the unique identifier fordatagram replay protection as the IV..TP.B --test-cryptoDo a self-test of OpenVPN's crypto options by encrypting anddecrypting test packets using the data channel encryption optionsspecified above.  This option does not require a peer to function,and therefore can be specified without.B --devor.B --remote.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩色综合| 久久亚洲精华国产精华液| 欧美成人免费网站| 亚洲精品乱码久久久久| 国产做a爰片久久毛片| 欧美精品在线一区二区| 亚洲乱码中文字幕| 成人av在线一区二区三区| 日韩一区二区三区在线观看| 亚洲一区二区在线观看视频| 99久久国产免费看| 久久天天做天天爱综合色| 日韩综合一区二区| 欧美偷拍一区二区| 亚洲精品久久7777| 91原创在线视频| 国产精品美女久久福利网站| 国产一区二区三区不卡在线观看 | 日韩午夜精品视频| 一区二区高清免费观看影视大全| 成人亚洲一区二区一| 久久久一区二区三区捆绑**| 成人三级伦理片| 26uuu精品一区二区三区四区在线| 蜜臀久久久久久久| 欧美一三区三区四区免费在线看 | 日韩欧美视频在线| 久久精品国产99久久6| 欧美一区二区三区四区高清 | 久久伊99综合婷婷久久伊| 美女诱惑一区二区| 精品欧美乱码久久久久久| 美女网站在线免费欧美精品| 日韩精品一区二区三区中文不卡| 日本不卡视频在线| 精品日产卡一卡二卡麻豆| 色综合网站在线| 一区二区三区在线免费观看| 91黄色激情网站| 三级精品在线观看| 日韩一区二区在线观看视频播放| 麻豆成人av在线| 久久久99精品免费观看不卡| 成人午夜激情在线| 亚洲天堂免费在线观看视频| 欧美在线播放高清精品| 午夜精品久久久久久久久久久 | 国产精品情趣视频| 色一情一乱一乱一91av| 午夜精品福利一区二区三区av | 午夜在线成人av| 91官网在线观看| 日韩精品亚洲一区| 国产拍揄自揄精品视频麻豆| 91在线精品一区二区| 日韩专区一卡二卡| 久久久国产精品不卡| 色视频一区二区| 久久国产精品色婷婷| 国产精品国产三级国产三级人妇| 色999日韩国产欧美一区二区| 免费不卡在线视频| 国产精品福利电影一区二区三区四区 | 日本免费在线视频不卡一不卡二| 精品成人a区在线观看| 91蜜桃婷婷狠狠久久综合9色| 婷婷亚洲久悠悠色悠在线播放| 国产亚洲精品免费| 国产欧美一区二区三区在线看蜜臀 | 日韩一二三四区| 波多野结衣亚洲| 日韩电影一区二区三区| 国产精品情趣视频| 精品少妇一区二区三区| av中文字幕不卡| 麻豆久久久久久久| 一区二区三区精品久久久| 精品欧美久久久| 欧美区一区二区三区| 成人h动漫精品一区二| 久久99精品国产麻豆不卡| 亚洲免费观看高清| 国产精品美女久久久久久| 日韩精品一区二区三区视频 | 国产精品资源在线观看| 一区二区三区在线观看动漫| 久久精品这里都是精品| 日韩视频一区在线观看| 欧美唯美清纯偷拍| 91麻豆福利精品推荐| 国产福利一区在线| 久久99国产精品尤物| 婷婷中文字幕一区三区| 亚洲美女视频在线观看| 国产精品看片你懂得| 久久久久久久久久久99999| 91精品福利在线一区二区三区| 在线观看视频一区二区欧美日韩| 国产成人99久久亚洲综合精品| 久久99热这里只有精品| 蜜桃视频第一区免费观看| 亚洲成年人网站在线观看| 亚洲国产一区视频| 亚洲影视在线播放| 亚洲一区二区三区自拍| 亚洲欧美另类综合偷拍| 日产欧产美韩系列久久99| 日韩精品电影一区亚洲| 日韩在线a电影| 热久久国产精品| 久久精品国产澳门| 国产美女视频91| 岛国精品一区二区| 不卡的av电影在线观看| 色综合久久综合网| 欧美中文字幕不卡| 欧美二区三区的天堂| 宅男在线国产精品| 欧美精品一区二区三区高清aⅴ| 欧美精品一区二区三区在线 | 色综合久久综合网97色综合| 在线视频欧美区| 欧美精品在线一区二区三区| 91精品久久久久久蜜臀| 精品国产91乱码一区二区三区| 怡红院av一区二区三区| 一区二区三区小说| 日韩黄色片在线观看| 美女视频黄久久| 懂色av一区二区三区免费观看| 99精品视频中文字幕| 欧美色国产精品| 精品久久久久久久久久久院品网| 国产亚洲成aⅴ人片在线观看| 国产精品美女一区二区在线观看| 亚洲综合成人网| 看电视剧不卡顿的网站| 成人综合在线网站| 在线欧美一区二区| 欧美成va人片在线观看| 欧美国产精品久久| 亚洲综合成人在线视频| 精品一二三四在线| 色综合天天综合网天天狠天天| 欧美区在线观看| 国产精品美女久久久久久久久 | 蜜臀av性久久久久蜜臀aⅴ流畅| 国产一区二区久久| 欧洲人成人精品| 欧美tickle裸体挠脚心vk| 1024成人网| 美腿丝袜亚洲综合| 91片在线免费观看| 欧美不卡一区二区三区| 亚洲日本护士毛茸茸| 麻豆精品一二三| 日本久久精品电影| 久久综合中文字幕| 亚洲1区2区3区4区| 成人黄色777网| 日韩欧美国产综合| 亚洲免费av观看| 国产91丝袜在线播放0| 欧美电影一区二区| 一区二区三区av电影| 成人av在线资源网站| 精品久久久久久久久久久久包黑料 | 一本久久a久久精品亚洲| 久久综合色婷婷| 日韩和欧美一区二区三区| 91污片在线观看| 国产欧美日韩在线| 久久99最新地址| 欧美巨大另类极品videosbest| 亚洲欧洲av色图| 国产91在线观看丝袜| 精品福利一区二区三区免费视频| 亚洲va欧美va人人爽| 欧美在线一区二区| 亚洲欧美日韩国产一区二区三区| 国产黄色精品网站| 精品国产免费一区二区三区香蕉| 天天av天天翘天天综合网| 91久久精品一区二区三区| 国产精品视频观看| 懂色中文一区二区在线播放| 久久综合色天天久久综合图片| 久久精品国产亚洲a| 26uuuu精品一区二区| 毛片av一区二区| 欧美一级淫片007| 日本免费在线视频不卡一不卡二| 欧美日韩国产不卡| 午夜成人免费电影| 欧美久久久久中文字幕| 天堂va蜜桃一区二区三区| 69堂精品视频| 捆绑调教美女网站视频一区| 精品国产乱码久久久久久牛牛 | 日本在线不卡视频|