<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="pt-BR">
	<id>https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=OpenVPN_2.3.1_on_Centos_6</id>
	<title>OpenVPN 2.3.1 on Centos 6 - Histórico de revisão</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=OpenVPN_2.3.1_on_Centos_6"/>
	<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=OpenVPN_2.3.1_on_Centos_6&amp;action=history"/>
	<updated>2026-04-17T13:36:16Z</updated>
	<subtitle>Histórico de revisões para esta página neste wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=OpenVPN_2.3.1_on_Centos_6&amp;diff=197&amp;oldid=prev</id>
		<title>imported&gt;Admin: uma edição</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=OpenVPN_2.3.1_on_Centos_6&amp;diff=197&amp;oldid=prev"/>
		<updated>2020-08-08T03:11:07Z</updated>

		<summary type="html">&lt;p&gt;uma edição&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;pt-BR&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Edição anterior&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Edição das 03h11min de 8 de agosto de 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;pt-BR&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(Sem diferença)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key omph_wiki-maquine_:diff:1.41:old-196:rev-197 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Admin</name></author>
	</entry>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=OpenVPN_2.3.1_on_Centos_6&amp;diff=196&amp;oldid=prev</id>
		<title>2532252&gt;Jefferson em 16h47min de 22 de abril de 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=OpenVPN_2.3.1_on_Centos_6&amp;diff=196&amp;oldid=prev"/>
		<updated>2015-04-22T16:47:29Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Página nova&lt;/b&gt;&lt;/p&gt;&lt;div&gt;How to install OpenVPN 2.3.1 on Centos 6&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tested:  OpenVPN 2.3.2 and OpebVPN 2.3.2 on Centos 6 VPS.&lt;br /&gt;
&lt;br /&gt;
Current guide should be applicable for openvpn 2.3 and higher. &lt;br /&gt;
 &lt;br /&gt;
 &amp;gt;&amp;gt;[https://billing.vpsget.com/cart.php?a=add&amp;amp;pid=17 &amp;#039;&amp;#039;&amp;#039;Get OpenVPN Ready2Go VPS. $5.95 p/m] 512RAM,20GB SAS,2Tb, Netherlands, EU&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    remember to enable TUN/TAP in SolusVM CP after you got access.&lt;br /&gt;
&lt;br /&gt;
          &lt;br /&gt;
It is recommended to install [http://wiki.vpsget.com/index.php/Epel_centos epel repository] first&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Make sure you have these packages installed:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
yum install gcc make rpm-build autoconf.noarch zlib-devel pam-devel openssl-devel -y&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Download LZO RPM&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
wget http://openvpn.net/release/lzo-1.08-4.rf.src.rpm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Download RPMForge Repo&amp;lt;br/&amp;gt;&lt;br /&gt;
x64&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el6.rf.x86_64.rpm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
x32&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el6.rf.i686.rpm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rpmbuild --rebuild lzo-1.08-4.rf.src.rpm&lt;br /&gt;
rpm -Uvh lzo-*.rpm&lt;br /&gt;
rpm -Uvh rpmforge-release*&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Install openvpn&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
yum install openvpn&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
From the version 2.3 easy-rsa is an independent project so it has to be downloaded separately, for example like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd&lt;br /&gt;
wget https://github.com/downloads/OpenVPN/easy-rsa/easy-rsa-2.2.0_master.tar.gz&lt;br /&gt;
cd easy-rsa-2.2.0_master&lt;br /&gt;
cp -R easy-rsa /etc/openvpn/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Open up /etc/openvpn/easy-rsa/2.0/vars and change the below line:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
export KEY_CONFIG=/etc/openvpn/easy-rsa/2.0/openssl-1.0.0.cnf&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
And save changes.&lt;br /&gt;
Create the certificate:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /etc/openvpn/easy-rsa/2.0&lt;br /&gt;
chmod 755 *&lt;br /&gt;
source ./vars&lt;br /&gt;
./vars&lt;br /&gt;
./clean-all&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Build CA:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
./build-ca&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Build key server:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
./build-key-server server&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Build Diffie Hellman&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
./build-dh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Generate clients&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
./build-key client1&lt;br /&gt;
./build-key client2&lt;br /&gt;
./build-key client3&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Copy server config file server.conf&lt;br /&gt;
for openvpn-2.3.1&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cp /usr/share/doc/openvpn-2.3.1/sample/sample-config-files/server.conf /etc/openvpn&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
for openvpn-2.3.2&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cp /usr/share/doc/openvpn-2.3.2/sample/sample-config-files/server.conf /etc/openvpn&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the file to get proper configuration. For example, specify path to ca, cert, key, and push public DNS&amp;lt;br/&amp;gt;&lt;br /&gt;
Example server config:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
port 1194&lt;br /&gt;
proto udp&lt;br /&gt;
dev tun&lt;br /&gt;
ca /etc/openvpn/easy-rsa/2.0/keys/ca.crt&lt;br /&gt;
cert /etc/openvpn/easy-rsa/2.0/keys/server.crt&lt;br /&gt;
key /etc/openvpn/easy-rsa/2.0/keys/server.key&lt;br /&gt;
dh /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem&lt;br /&gt;
server 10.8.0.0 255.255.255.0&lt;br /&gt;
ifconfig-pool-persist ipp.txt&lt;br /&gt;
push &amp;quot;redirect-gateway def1 bypass-dhcp&amp;quot;&lt;br /&gt;
push &amp;quot;dhcp-option DNS 8.8.8.8&amp;quot;&lt;br /&gt;
push &amp;quot;dhcp-option DNS 8.8.4.4&amp;quot;&lt;br /&gt;
keepalive 10 120&lt;br /&gt;
comp-lzo&lt;br /&gt;
persist-key&lt;br /&gt;
persist-tun&lt;br /&gt;
status openvpn-status.log&lt;br /&gt;
log-append  /var/log/openvpn.log&lt;br /&gt;
verb 3&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Save client config file with .ovpn extention&amp;lt;br/&amp;gt;&lt;br /&gt;
Disable SELinux in /etc/selinux/config by changing&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELINUX=enforcing&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELINUX=disabled&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now enable IP forwarding. Open the file /etc/sysctl.conf and change&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
net.ipv4.ip_forward = 0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
net.ipv4.ip_forward = 1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Save changes using command:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sysctl -p&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Configure /etc/sysconfig/iptables.&lt;br /&gt;
&lt;br /&gt;
Please note that you should change eth0 to your proper network device , it can be eth1 or venet0 if on vps . just check your network devices with ifconfig command.&lt;br /&gt;
&lt;br /&gt;
 Sample config:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Generated by iptables-save v1.4.7 on Thu Mar 28 11:52:05 2013&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT ACCEPT [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [3:324]&lt;br /&gt;
-A INPUT -i tun0 -p tcp -m tcp --dport 1194 -j ACCEPT&lt;br /&gt;
-A INPUT -i eth0 -p gre -j ACCEPT&lt;br /&gt;
-A FORWARD -i tun+ -o eth0 -j ACCEPT&lt;br /&gt;
-A FORWARD -i eth0 -o tun+ -j ACCEPT&lt;br /&gt;
-A INPUT -p icmp -j ACCEPT&lt;br /&gt;
-A INPUT -i lo -j ACCEPT&lt;br /&gt;
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Thu Mar 28 11:52:05 2013&lt;br /&gt;
# Generated by iptables-save v1.4.7 on Thu Mar 28 11:52:05 2013&lt;br /&gt;
*nat&lt;br /&gt;
:PREROUTING ACCEPT [6222:273716]&lt;br /&gt;
:POSTROUTING ACCEPT [306:22159]&lt;br /&gt;
:OUTPUT ACCEPT [306:22159]&lt;br /&gt;
-A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Thu Mar 28 11:52:05 2013&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Start openvpn&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service openvpn start&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
start openvpn at system startup&lt;br /&gt;
&lt;br /&gt;
 chkconfig openvpn on&lt;br /&gt;
 chkconfig iptables on&lt;br /&gt;
&lt;br /&gt;
If OpenVPN fails to start check if tun/tap in active:&lt;br /&gt;
 cat /dev/net/tun&lt;br /&gt;
If output is:&lt;br /&gt;
 cat: /dev/net/tun: File descriptor in bad state&lt;br /&gt;
than tun/tap in active, look &amp;#039;&amp;#039;/var/log/openvpn.log&amp;#039;&amp;#039; and &amp;#039;&amp;#039;/var/log/messages/&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
If output is:&lt;br /&gt;
 cat: /dev/net/tun: No such device&lt;br /&gt;
than try:&lt;br /&gt;
 mkdir -p /dev/net&lt;br /&gt;
 mknod /dev/net/tun c 10 200&lt;br /&gt;
 chmod 600 /dev/net/tun&lt;br /&gt;
&lt;br /&gt;
Download client files from /etc/openvpn/easy-rsa/2.0/keys/&lt;br /&gt;
Upload these files to OpenVPN directory on client machine.&lt;br /&gt;
OpenVPN client is available on official site http://openvpn.net/index.php/ &amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[http://wiki.vpsget.com/index.php/Configure_OpenVPN_client_on_Windows How to configure OpenVPN client on Windows]&lt;br /&gt;
&lt;br /&gt;
[http://wiki.vpsget.com/index.php/Configure_OpenVPN_client_on_Android How to configure OpenVPN client on Android]&lt;br /&gt;
&lt;br /&gt;
OpenVPN 2.3.1 Centos 6&lt;br /&gt;
&lt;br /&gt;
This guide should be applicable for the openvpn 2.3.x on centos 6. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Add user (cert) to existent OpenVPN users DB:&lt;br /&gt;
&lt;br /&gt;
You  simply should source the vars before creating the key . Use one of the next ways:&lt;br /&gt;
 &amp;quot;. vars&amp;quot; &lt;br /&gt;
or &lt;br /&gt;
 &amp;quot;. ./vars&amp;quot; &lt;br /&gt;
or &lt;br /&gt;
 &amp;quot;source ./vars&amp;quot;&lt;br /&gt;
&lt;br /&gt;
After that you can build key for new user:&lt;br /&gt;
 ./build-key client_new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Also refer to [http://wiki.vpsget.com/index.php/Forward_(redirect/nat)_traffic_with_iptables this guide] if you would like to install double vpn&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:LINUX]]&lt;br /&gt;
[[Category: TI]]&lt;/div&gt;</summary>
		<author><name>2532252&gt;Jefferson</name></author>
	</entry>
</feed>