亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? openvpn.8

?? 一個開源的VPN原碼
?? 8
?? 第 1 頁 / 共 5 頁
字號:
The typical usage of.B --test-cryptowould be something like this:.B openvpn --test-crypto --secret keyor.B openvpn --test-crypto --secret key --verb 8This option is very useful to test OpenVPN after it has been ported toa new platform, or to isolate problems in the compiler, OpenSSLcrypto library, or OpenVPN's crypto code.  Since it is a self-test mode,problems with encryption and authentication can be debugged independentlyof network and tunnel issues..SS TLS Mode Options:TLS mode is the most powerful mode of OpenVPN in both security and flexibility.TLS mode works by establishing control anddata channels which are multiplexed over a single UDP port.  OpenVPN initiatesa TLS session over the control channel and uses it to exchange cipherand HMAC keys to protect the data channel.  TLS mode uses a robust reliabilitylayer over the UDP connection for all control channel communication, whilethe data channel, over which encrypted tunnel data passes, is forwarded withoutany mediation.  The result is the best of both worlds: a fast data channelthat forwards over UDP with only the overhead of encrypt,decrypt, and HMAC functions,and a control channel that provides all of the security features of TLS,including certificate-based authentication and perfect forward security.To use TLS mode, each peer that runs OpenVPN should have its own localcertificate/key pair (.B --certand.B --key), signed by the root certificate which is specifiedin.B --ca.When two OpenVPN peers connect, each presents its local certificate to theother.  Each peer will then check that its partner peer presented acertificate which was signed by the master root certificate as specified in.B --ca.If that check on both peers succeeds, then the TLS negotiation will succeed, both OpenVPNpeers will exchange temporary session keys, and the tunnel will beginpassing data.The OpenVPN distribution contains a set of scripts for managing RSA certificates & keys,located in the.I easy-rsasubdirectory.The easy-rsa package is also rendered in web form here:.I http://openvpn.sourceforge.net/easyrsa.html.TP.B --tls-serverEnable TLS and assume server role during TLS handshake.  Note thatOpenVPN is designed as a peer-to-peer application.  The designationof client or server is only for the purpose of negotiating the TLScontrol channel..TP.B --tls-clientEnable TLS and assume client role during TLS handshake..TP.B --ca fileCertificate authority (CA) file in .pem format, also referred to as the.I rootcertificate.  This file can have multiplecertificates in .pem format, concatenated together.  You can construct your owncertificate authority certificate and private key by using a command such as:.B openssl req -nodes -new -x509 -keyout tmp-ca.key -out tmp-ca.crtThen edit your openssl.cnf file and edit the.B certificatevariable to point to your new root certificate.B tmp-ca.crt.For testing purposes only, the OpenVPN distribution includes a sampleCA certificate (tmp-ca.crt).Of course you should never usethe test certificates and test keys distributed with OpenVPN in aproduction environment, since by virtue of the fact thatthey are distributed with OpenVPN, they are totally insecure..TP.B --dh fileFile containing Diffie Hellman parametersin .pem format (required for.B --tls-serveronly). Use.B openssl dhparam -out dh1024.pem 1024to generate your own, or use the existing dh1024.pem fileincluded with the OpenVPN distribution.  Diffie Hellman parametersmay be considered public..TP.B --cert fileLocal peer's signed certificate in .pem format -- must be signedby a certificate authority whose certificate is in.B --ca file.Each peer in an OpenVPN link running in TLS mode should have its owncertificate and private key file.  In addition, each certificate shouldhave been signed by the key of a certificateauthority whose public key resides in the.B --cacertificate authority file.You can easily make your own certificate authority (see above) or pay moneyto use a commercial service such as thawte.com (in which case you will behelping to finance the world's second space tourist :).To generate a certificate,you can use a command such as:.B openssl req -nodes -new -keyout mycert.key -out mycert.csrIf your certificate authority private key lives on another machine, copythe certificate signing request (mycert.csr) to this other machine (this canbe done over an insecure channel such as email).  Now sign the certificatewith a command such as:.B openssl ca -out mycert.crt -in mycert.csrNow copy the certificate (mycert.crt)back to the peer which initially generated the .csr file (thiscan be over a public medium).Note that the.B openssl cacommand reads the location of the certificate authority key from itsconfiguration file such as.B /usr/share/ssl/openssl.cnf-- note alsothat for certificate authority functions, you must set up the files.B index.txt(may be empty) and.B serial(initialize to.B 01)..TP.B --key fileLocal peer's private key in .pem format.  Use the private key which was generatedwhen you built your peer's certificate (see.B -cert fileabove)..TP.B --tls-cipher lA list l of allowable TLS ciphers separated by.B |(optional).  If you require a high level of security,you may want to set this parameter manually, to prevent aversion rollback attack where a man-in-the-middle attacker triesto force two peers to negotiate to the lowest levelof security they both support.Use.B --show-tlsto see a list of supported TLS ciphers..TP.B --tls-timeout nPacket retransmit timeout on TLS control channelif no acknowledgment from remote within.B nseconds (default=5).  When OpenVPN sends a controlpacket to its peer, it will expect to receive anacknowledgement within.B nseconds or it will retransmit the packet.  This parameteronly applies to control channel packets.  Data channelpackets (which carry encrypted tunnel data) are neveracknowledged, sequenced, or retransmitted by OpenVPN becausethe higher level network protocols running on top of the tunnelsuch as TCP expect this role to be left to them..TP.B --reneg-bytes nRenegotiate data channel key after.B nbytes sent or received (disabled by default).OpenVPN allows the lifetime of a keyto expressed as a number of bytes encrypted/decrypted, a number of packets, ora number of seconds.  A key renegotiation will be forcedif any of these three criteria are met by either peer..TP.B --reneg-pkts nRenegotiate data channel key after.B npackets sent and received (disabled by default)..TP.B --reneg-sec nRenegotiate data channel key after.B nseconds (default=3600)..TP.B --hand-window nHandshake Window -- the TLS-based key exchange must finalize within.B nsecondsof handshake initiation by any peer (default = 60 seconds).If the handshake failswe will attempt to reset our connection with our peer and try again.Even in the event of handshake failure we will still useour expiring key for up to.B --tran-windowseconds to maintain continuity of transmission of tunneldata..TP.B --tran-window nTransition window -- our old key can live this many secondsafter new a key renegotiation begins (default = 3600 seconds).This is a powerful feature that contributes to the robustnessof the OpenVPN key negotiation protocol.  Even during periodsof extremely poor network connectivity between peers, withsignificant dropped packets, OpenVPNwill never let the failure of a key exchange handshake interfere withthe continuing transmission of tunnel data..TP.B --single-sessionAfter initially connecting to a remote peer, disallow any new connections.Using thisoption means that a remote peer cannot connect, disconnect, and thenreconnect.If the daemon is reset by a signal or.B --ping-restart,it will allow one new connection..B --single-sessioncan be used with.B --ping-exitor.B --inactiveto create a single dynamic session that will exit when finished..TP.B --tls-auth fAdd an additional layer of authentication on top of the TLScontrol channel to protect against DoS attacks..B f(required) is a shared-secret passphrase file..B --tls-authis recommended when you are running OpenVPN in a mode whereit is listening for packets from any IP address such as when.B --remoteis not specified, or.B --remoteis specified with.B --float.The rationale forthis feature is as follows.  TLS requires a multi-packet exchangebefore it is able to authenticate a peer.  During this timebefore authentication, OpenVPN is allocating resources (memoryand CPU) to this potential peer.  The potential peer is alsoexposing many parts of OpenVPN and the OpenSSL library to the packetsit is sending.  Most successful network attacks today seekto either exploit bugs in programs (such as buffer overflow attacks) orforce a program to consume so many resources that it becomes unusable.Of course the first line of defense is always to produce clean,well-audited code.  OpenVPN has been written with buffer overflowattack prevention as a top priority.But as history has shown, many of the most widely usednetwork applications have, from time to time,fallen to buffer overflow attacks.So as a second line of defense, OpenVPN offersthis special layer of authentication on top of the TLS control channel so thatevery packet on the control channel is authenticated by anHMAC signature and a unique ID for replay protection.This signature will also help protect against DoS (Denial of Service) attacks.An important rule of thumb in reducing vulnerability to DoS attacks is tominimize the amount of resources a potential, but as yet unauthenticated,client is able to consume..B --tls-authdoes this by signing every TLS control channel packet with an HMAC signature,including packets which are sent before the TLS level has had a chanceto authenticate the peer.The result is that packets withoutthe correct signature can be dropped immediately upon reception,before they have a chance to consume additional system resourcessuch as by initiating a TLS handshake.It should be emphasized that this feature is optional and that thepassphrase file used with.B --tls-authgives a peer nothing more than the power to initiate a TLShandshake.  It is not used to encrypt or authenticate any tunnel data..TP.B --askpassGet PEM password from controlling tty before we daemonize.  For the extremelysecurity conscious, it is possible to protect your private key witha password.  Of course this means that every time the OpenVPNdaemon is started you must be there to type the password.  The.B --askpassoption allows you to start OpenVPN from the command line.  It willquery you for a password before it daemonizes.  To protect a privatekey with a password you should omit the.B -nodesoption when you use the.B opensslcommand line tool to manage certificates and private keys..TP.B --tls-verify cmdExecute shell command.B cmdto verify the X509 name of apending TLS connection that has otherwise passed all othertests of certification..B cmdshould return 0 to allow the TLS handshake to proceed, or 1 to fail..B cmdis executed as.B cmd certificate_depth X509_NAME_onelineCommas (',') may be used to separate multiple args in.B cmd.Before the command line is passed to the shell, all commaswill be converted to spaces.This feature is useful if the peer you want to trust has a certificatewhich was signed by a certificate authority who also signed a zillionother certificates.  In this case you want to be selective about whichpeer certificate you accept.  This feature allows you to write a scriptwhich will test the X509 name on a certificate and decide whether ornot it should be accepted.  For a simple perl script which will testthe common name field on the certificate, see the file.B verify-cnin the OpenVPN distribution..TP.B --disable-occDisable options compatibility check between peers.  This is designedto circumvent OpenVPN's normal options compatibility check inTLS mode.  Use of this option is discouraged, but is provided asa temporary fix in situations where a recent version of OpenVPN mustconnect to an old version..SS SSL Library information:.TP.B --show-ciphersShow all cipher algorithms to use with the.B --cipheroption..TP.B --show-digestsShow all message digest algorithms to use with the.B --authoption..TP.B --show-tlsShow all TLS ciphers (TLS used only as a control channel).  The TLSciphers will be sorted from highest preference (most secure) tolowest..SS Generate a random key:Used only for non-TLS static key encryption mode..TP.B --genkeyGenerate a random key to be used as a shared secret,for use with the.B --secretoption.  This file must be shared with thepeer over a pre-existing secure channel such as.BR scp (1)..TP.B --secret fileWrite key to.B file..SS TUN/TAP persistent tunnel config mode:Available with linux 2.4.7+.  These options comprise a standalone modeof OpenVPN which can be used to create and delete persistent tunnels..TP.B --mktunCreate a persistent tunnel.  Normally tun/tap tunnels exist only forthe period of time that an application has them open.  This optiontakes advantage of the tun/tap driver's ability to build persistenttunnels that live through multiple instantiations of OpenVPN and dieonly when they are deleted or the machine is rebooted.One of the advantages of persistent tunnels is that they eliminate theneed for separate.B --upand.B --downscripts to run the appropriate.BR ifconfig (8)and.BR route (8)commands.  These commands can be placed in the the same shell scriptwhich starts or terminates an OpenVPN session.Another advantage is that open connections through the tun/tap-based tunnelwill not be reset if the OpenVPN peer restarts.  This can be useful toprovide uninterrupted connectivity through the tunnel in the event of a DHCPreset of the peer's public IP address (see the.B --ipchangeoption above).One disadvantage of persistent tunnels is that it is harder to automaticallyconfigure their MTU value (see.B --udp-mtuand.B --tun-mtuabove)..TP.B --rmtunRemove a persistent tunnel..TP.B --dev tunX | tapXTUN/TAP device.SH SIGNALS

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美肥胖老妇做爰| 日本美女一区二区三区| 懂色av中文字幕一区二区三区| 欧美亚洲一区二区在线观看| 国产欧美一区视频| 韩日欧美一区二区三区| 欧美剧情片在线观看| 亚洲无人区一区| 欧美一卡二卡在线| 中文字幕日韩欧美一区二区三区| 国产精品一区二区果冻传媒| 久久久国产午夜精品| 精品中文字幕一区二区| 日韩精品中文字幕在线一区| 久久国产尿小便嘘嘘| 精品国产一区二区三区四区四| 美国十次了思思久久精品导航| 日韩欧美一区二区三区在线| 国产精品1区2区3区| 国产精品久久久久影院老司| 91久久精品国产91性色tv| 亚洲一区二区三区在线| 日韩一区二区电影网| 久久电影网电视剧免费观看| 久久精品男人的天堂| 91丨porny丨在线| 日韩国产高清在线| 国产性色一区二区| 欧美午夜精品一区二区三区 | eeuss鲁片一区二区三区 | 国产亚洲精品aa| 91影院在线免费观看| 人人精品人人爱| 中文字幕亚洲精品在线观看| 在线电影一区二区三区| 成人app软件下载大全免费| 亚洲va韩国va欧美va精品| 久久精品亚洲乱码伦伦中文| 欧美综合天天夜夜久久| 国内精品国产三级国产a久久| 一区二区在线观看视频| 精品国产a毛片| 一本大道综合伊人精品热热| 国产乱色国产精品免费视频| 亚洲视频一区在线| 欧美www视频| 在线观看av一区| 99视频热这里只有精品免费| 久久国产福利国产秒拍| 一区二区三区精品在线观看| 久久久综合九色合综国产精品| 欧美日本一区二区在线观看| 成人免费视频一区二区| 激情另类小说区图片区视频区| 亚洲gay无套男同| 一区二区三区高清| 国产精品国产三级国产aⅴ原创| 欧美va亚洲va在线观看蝴蝶网| 欧美精品高清视频| 欧美中文字幕不卡| 91香蕉视频mp4| 成人av中文字幕| 成人性生交大片免费看在线播放 | 一本一本大道香蕉久在线精品 | 欧美精品第一页| 在线观看免费成人| 欧美老女人在线| 欧美电影在哪看比较好| 欧美一区二区啪啪| 日韩一区二区免费在线电影| 欧美亚洲动漫精品| 欧美精品一二三四| 制服丝袜亚洲色图| 在线综合视频播放| 日韩精品一区二区三区swag| 日韩欧美一区二区三区在线| 久久久91精品国产一区二区精品 | 国产精品综合在线视频| 国产一区视频网站| 成人av网站在线观看免费| 不卡电影免费在线播放一区| 99久久精品国产麻豆演员表| 色综合久久中文综合久久牛| 欧美精品日韩一本| 久久久噜噜噜久久中文字幕色伊伊| 国产女人18毛片水真多成人如厕| 中文字幕一区二区三区在线播放 | 国产日韩欧美高清| 亚洲丝袜美腿综合| 久久精品国产99| 成人h精品动漫一区二区三区| 91久久奴性调教| 欧美电视剧在线看免费| 综合久久久久综合| 日韩中文字幕区一区有砖一区 | 日韩一区二区视频在线观看| 国产精品美女久久久久久2018| 亚洲丰满少妇videoshd| 国产一区二区精品久久91| 91精品国产一区二区人妖| 26uuu国产一区二区三区| 亚洲国产精品成人综合| 午夜久久电影网| 成人精品免费视频| 日韩欧美电影在线| 一区二区在线观看不卡| 国产最新精品免费| 欧美日韩国产经典色站一区二区三区| 久久先锋资源网| 日本成人在线看| 在线精品观看国产| 国产精品免费丝袜| 久久国产精品色| 337p亚洲精品色噜噜狠狠| 亚洲激情校园春色| 成人激情小说乱人伦| 精品国产人成亚洲区| 日韩av中文在线观看| 欧美日韩精品一区二区天天拍小说| 亚洲精品视频在线观看网站| 成人app网站| 成人欧美一区二区三区小说| 国产一二精品视频| 久久久久久免费网| 国产98色在线|日韩| 久久综合久久鬼色| 国产69精品久久99不卡| 亚洲精品在线免费观看视频| 国产精品中文字幕一区二区三区| 精品91自产拍在线观看一区| 国产一区二区免费视频| 久久精品视频一区二区三区| 国产在线国偷精品免费看| 国产婷婷色一区二区三区四区| 国产成人精品免费一区二区| 国产精品久久久久四虎| 色乱码一区二区三区88| 亚洲精品免费播放| 91精品国产一区二区三区蜜臀| 国产在线日韩欧美| 1024成人网| 欧美日本免费一区二区三区| 久久国产精品72免费观看| 亚洲丝袜另类动漫二区| 欧美日韩国产在线观看| 另类中文字幕网| 国产精品国产三级国产aⅴ入口| 在线免费观看成人短视频| 捆绑调教一区二区三区| 日本一区二区视频在线| 欧美日韩国产美| 国产成人亚洲综合a∨婷婷| 亚洲乱码国产乱码精品精小说 | 久久99精品久久久久久国产越南 | 欧美日韩高清一区二区三区| 老司机免费视频一区二区| 国产精品区一区二区三区| 一本大道综合伊人精品热热| 狠狠色丁香久久婷婷综合丁香| 亚洲三级电影全部在线观看高清| 日韩一级在线观看| 欧美中文字幕一区二区三区亚洲| 国产精品1024久久| 免费人成网站在线观看欧美高清| 亚洲视频一二区| 久久这里只精品最新地址| 欧美日韩mp4| 色88888久久久久久影院野外| 国产伦精品一区二区三区视频青涩 | 国产亚洲精品超碰| 欧美一级高清片在线观看| 欧美日韩1234| 欧美撒尿777hd撒尿| 色婷婷精品久久二区二区蜜臂av | 久久嫩草精品久久久精品一| 在线播放国产精品二区一二区四区| 99精品国产99久久久久久白柏 | 国产日韩欧美精品一区| 精品国产乱码久久久久久老虎 | 天天影视涩香欲综合网| 亚洲国产毛片aaaaa无费看| 亚洲丝袜美腿综合| 国产精品久久久久久久久果冻传媒| 欧美经典一区二区三区| 久久久美女毛片| 国产视频一区二区三区在线观看| 久久久久久麻豆| 国产欧美一区二区精品秋霞影院 | 91精品国产综合久久久久久漫画| 欧美日韩精品一区视频| 欧美日韩精品系列| 91色porny| 欧美精品精品一区| 日韩三级视频在线观看| 欧美精品一区二区三区在线| 久久久久久综合| 亚洲精品少妇30p| 日韩制服丝袜av| 国产成人丝袜美腿| 99精品视频一区|