Contributed by grey on from the simpler alternatives to IPSec dept.
I have completed some documents that show OpenBSD installation with OpenVPN and OpenVPN on XP client. They provide a step by step guide to a secure VPN tunnel between an XP client and OpenBSD Firewall / Server.
I would greatly appreciate feedback and post your comments to the site so that others can benefit. These documents may be rough in some spots but I’ve run out of time to edit them further. Hopefully they may be of use to the community.
Though I’m still looking for a home for them, I’ve had a lot of e-mails requesting them so I’ve posted them to a temporary site until something more permanent can be found, here’s the link:
http://www50.brinkster.com/dachee/
Thanks,
Rhea Heuermann
(Comments are closed)
By Peter Dembinski (217.96.175.71) pdemb@illx.org on http://illx.org/~pdemb/
Comments
By Venture37 (81.101.10.241) venture37 # hotmail com on geeklan.co.uk
By Rhea Heuermann (192.147.67.12) dachee@starstream.net on
By Luiz Gustavo (200.165.159.36) on http://hades.uint8t.org
Comments
By SH (82.182.103.172) on
Comments
By James Yonan (67.173.249.91) jim@yonan.net on http://openvpn.net/
OpenVPN has been designed from the start to use a solid, well-researched security model.
See here for the details:
http://openvpn.net/security.htmlAlso see this paper:
http://www.sans.org/rr/papers/20/1459.pdfPeter Gutmann has looked at OpenVPN and did not find much to criticize. We had some very productive correspondence during the development of 1.5, he contributed some code, made some good recommendations such as using Explicit IV rather than Implicit IV, and urged me to document some of the message deletion/reordering issues implicit in tunneling protocols over UDP (now part of the replay-window documentation in the man page).
James
Comments
By SH (82.182.103.172) on
/SH
By Luiz Gustavo (200.225.76.130) on http://hades.uint8t.org