Compare commits
No commits in common. "master" and "MultipleMQTT" have entirely different histories.
master
...
MultipleMQ
File diff suppressed because it is too large
Load Diff
@ -1,2 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
clickhouse-client --user=default --password=F4stCharge --queries-file=/home/yultek/cleanuplogs.sql
|
|
||||||
@ -1,7 +0,0 @@
|
|||||||
TRUNCATE TABLE system.part_log;
|
|
||||||
TRUNCATE TABLE system.trace_log;
|
|
||||||
TRUNCATE TABLE system.processors_profile_log;
|
|
||||||
TRUNCATE TABLE system.query_log;
|
|
||||||
TRUNCATE TABLE system.metric_log;
|
|
||||||
TRUNCATE TABLE system.latency_log;
|
|
||||||
TRUNCATE TABLE system.asynchronous_metric_log;
|
|
||||||
File diff suppressed because it is too large
Load Diff
@ -1,121 +0,0 @@
|
|||||||
<clickhouse>
|
|
||||||
<!-- See also the files in users.d directory where the settings can be overridden. -->
|
|
||||||
|
|
||||||
<!-- Profiles of settings. -->
|
|
||||||
<profiles>
|
|
||||||
<!-- Default settings. -->
|
|
||||||
<default>
|
|
||||||
<!-- <async_insert>1</async_insert> -->
|
|
||||||
</default>
|
|
||||||
|
|
||||||
<!-- Profile that allows only read queries. -->
|
|
||||||
<readonly>
|
|
||||||
<readonly>1</readonly>
|
|
||||||
</readonly>
|
|
||||||
</profiles>
|
|
||||||
|
|
||||||
<!-- Users and ACL. -->
|
|
||||||
<users>
|
|
||||||
<!-- If user name was not specified, 'default' user is used. -->
|
|
||||||
<default>
|
|
||||||
<!-- See also the files in users.d directory where the password can be overridden.
|
|
||||||
|
|
||||||
Password could be specified in plaintext or in SHA256 (in hex format).
|
|
||||||
|
|
||||||
If you want to specify password in plaintext (not recommended), place it in 'password' element.
|
|
||||||
Example: <password>qwerty</password>.
|
|
||||||
Password could be empty.
|
|
||||||
|
|
||||||
If you want to specify SHA256, place it in 'password_sha256_hex' element.
|
|
||||||
Example: <password_sha256_hex>65e84be33532fb784c48129675f9eff3a682b27168c0ea744b2cf58ee02337c5</password_sha256_hex>
|
|
||||||
Restrictions of SHA256: impossibility to connect to ClickHouse using MySQL JS client (as of July 2019).
|
|
||||||
|
|
||||||
If you want to specify double SHA1, place it in 'password_double_sha1_hex' element.
|
|
||||||
Example: <password_double_sha1_hex>e395796d6546b1b65db9d665cd43f0e858dd4303</password_double_sha1_hex>
|
|
||||||
|
|
||||||
If you want to specify a previously defined LDAP server (see 'ldap_servers' in the main config) for authentication,
|
|
||||||
place its name in 'server' element inside 'ldap' element.
|
|
||||||
Example: <ldap><server>my_ldap_server</server></ldap>
|
|
||||||
|
|
||||||
If you want to authenticate the user via Kerberos (assuming Kerberos is enabled, see 'kerberos' in the main config),
|
|
||||||
place 'kerberos' element instead of 'password' (and similar) elements.
|
|
||||||
The name part of the canonical principal name of the initiator must match the user name for authentication to succeed.
|
|
||||||
You can also place 'realm' element inside 'kerberos' element to further restrict authentication to only those requests
|
|
||||||
whose initiator's realm matches it.
|
|
||||||
Example: <kerberos />
|
|
||||||
Example: <kerberos><realm>EXAMPLE.COM</realm></kerberos>
|
|
||||||
|
|
||||||
How to generate decent password:
|
|
||||||
Execute: PASSWORD=$(base64 < /dev/urandom | head -c8); echo "$PASSWORD"; echo -n "$PASSWORD" | sha256sum | tr -d '-'
|
|
||||||
In first line will be password and in second - corresponding SHA256.
|
|
||||||
|
|
||||||
How to generate double SHA1:
|
|
||||||
Execute: PASSWORD=$(base64 < /dev/urandom | head -c8); echo "$PASSWORD"; echo -n "$PASSWORD" | sha1sum | tr -d '-' | xxd -r -p | sha1sum | tr -d '-'
|
|
||||||
In first line will be password and in second - corresponding double SHA1.
|
|
||||||
-->
|
|
||||||
<password>F4stCharge</password>
|
|
||||||
|
|
||||||
<!-- List of networks with open access.
|
|
||||||
|
|
||||||
To open access from everywhere, specify:
|
|
||||||
<ip>::/0</ip>
|
|
||||||
|
|
||||||
To open access only from localhost, specify:
|
|
||||||
<ip>::1</ip>
|
|
||||||
<ip>127.0.0.1</ip>
|
|
||||||
|
|
||||||
Each element of list has one of the following forms:
|
|
||||||
<ip> IP-address or network mask. Examples: 213.180.204.3 or 10.0.0.1/8 or 10.0.0.1/255.255.255.0
|
|
||||||
2a02:6b8::3 or 2a02:6b8::3/64 or 2a02:6b8::3/ffff:ffff:ffff:ffff::.
|
|
||||||
<host> Hostname. Example: server01.clickhouse.com.
|
|
||||||
To check access, DNS query is performed, and all received addresses compared to peer address.
|
|
||||||
<host_regexp> Regular expression for host names. Example, ^server\d\d-\d\d-\d\.clickhouse\.com$
|
|
||||||
To check access, DNS PTR query is performed for peer address and then regexp is applied.
|
|
||||||
Then, for result of PTR query, another DNS query is performed and all received addresses compared to peer address.
|
|
||||||
Strongly recommended that regexp is ends with $
|
|
||||||
All results of DNS requests are cached till server restart.
|
|
||||||
-->
|
|
||||||
<networks>
|
|
||||||
<ip>::/0</ip>
|
|
||||||
</networks>
|
|
||||||
|
|
||||||
<!-- Settings profile for user. -->
|
|
||||||
<profile>default</profile>
|
|
||||||
|
|
||||||
<!-- Quota for user. -->
|
|
||||||
<quota>default</quota>
|
|
||||||
|
|
||||||
<!-- User can create other users and grant rights to them. -->
|
|
||||||
<access_management>1</access_management>
|
|
||||||
|
|
||||||
<!-- User can manipulate named collections. -->
|
|
||||||
<named_collection_control>1</named_collection_control>
|
|
||||||
|
|
||||||
<!-- User permissions can be granted here -->
|
|
||||||
<!--
|
|
||||||
<grants>
|
|
||||||
<query>GRANT ALL ON *.*</query>
|
|
||||||
</grants>
|
|
||||||
-->
|
|
||||||
</default>
|
|
||||||
</users>
|
|
||||||
|
|
||||||
<!-- Quotas. -->
|
|
||||||
<quotas>
|
|
||||||
<!-- Name of quota. -->
|
|
||||||
<default>
|
|
||||||
<!-- Limits for time interval. You could specify many intervals with different limits. -->
|
|
||||||
<interval>
|
|
||||||
<!-- Length of interval. -->
|
|
||||||
<duration>3600</duration>
|
|
||||||
|
|
||||||
<!-- No limits. Just calculate resource usage for time interval. -->
|
|
||||||
<queries>0</queries>
|
|
||||||
<errors>0</errors>
|
|
||||||
<result_rows>0</result_rows>
|
|
||||||
<read_rows>0</read_rows>
|
|
||||||
<execution_time>0</execution_time>
|
|
||||||
</interval>
|
|
||||||
</default>
|
|
||||||
</quotas>
|
|
||||||
</clickhouse>
|
|
||||||
Binary file not shown.
|
Before Width: | Height: | Size: 20 KiB |
Binary file not shown.
@ -1,268 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote vpn.yultek.dev 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
ab:ba:55:27:aa:06:49:7b:13:dd:f2:5b:ae:27:08:fe
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: Jun 1 18:17:32 2023 GMT
|
|
||||||
Not After : Sep 3 18:17:32 2025 GMT
|
|
||||||
Subject: CN=fred
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:3e:78:ef:26:d9:87:bb:8b:08:47:fe:15:ad:96:
|
|
||||||
ae:f4:93:f1:d8:ce:e3:05:d2:96:46:fc:f6:47:c9:
|
|
||||||
ac:41:f5:01:1b:e3:25:61:f4:ee:6f:8d:13:dd:ab:
|
|
||||||
1b:d8:02:85:a3:fb:52:3d:02:d8:ad:0b:ed:e3:02:
|
|
||||||
88:c7:eb:06:52:ca:25:ac:8b:ac:eb:52:4c:43:52:
|
|
||||||
f9:c0:8c:f4:48:ea:72:a6:26:f7:5f:02:96:97:ad:
|
|
||||||
10:ac:6d:c8:d3:b1:28
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
3C:F6:00:C3:CF:A4:BB:8D:F1:1B:AB:A1:6F:24:44:2A:73:95:EB:46
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
10:9c:49:d0:09:dc:52:df:2b:e1:ce:59:ef:f7:a0:96:13:05:
|
|
||||||
7e:30:ba:4b:6d:17:62:ed:89:39:cb:0e:c5:cc:df:0c:5a:68:
|
|
||||||
e7:0f:bc:c2:67:e0:b2:72:b6:9f:e7:9f:1f:4c:e5:da:d9:5c:
|
|
||||||
d8:53:44:ef:47:ea:47:9d:d7:1d:12:ab:75:c3:1f:c4:d8:ae:
|
|
||||||
65:7e:39:9d:98:f1:02:df:03:77:1e:7b:88:24:5f:7e:51:5c:
|
|
||||||
f2:9c:b8:1f:84:71:4b:f9:5a:6d:06:63:4d:e9:ab:27:f5:99:
|
|
||||||
fa:ac:25:7a:e2:a7:ba:94:a7:44:8b:2f:21:73:c1:db:1a:37:
|
|
||||||
38:d6:46:4a:a5:65:f7:24:35:08:40:9a:8e:d6:22:56:20:c9:
|
|
||||||
7b:52:b3:8f:ea:53:bf:00:bd:6a:23:bd:07:fe:af:2e:20:ee:
|
|
||||||
71:69:f8:66:b0:f3:00:5e:8d:2f:2a:37:b9:14:a6:bf:c8:25:
|
|
||||||
2e:1b:f4:86:58:94:33:2b:85:f9:08:3a:48:9e:49:42:66:5a:
|
|
||||||
37:10:10:5b:50:2e:f6:06:d0:fe:86:17:0d:9d:f5:dd:cb:ab:
|
|
||||||
92:39:de:d8:57:9d:0d:7e:14:b7:61:e5:bc:dc:62:00:22:8c:
|
|
||||||
23:df:90:d4:38:01:18:23:96:c6:7e:e8:c8:5e:c8:fd:a4:b2:
|
|
||||||
47:87:02:4f
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICoTCCAYmgAwIBAgIRAKu6VSeqBkl7E93yW64nCP4wDQYJKoZIhvcNAQELBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDYwMTE4MTczMloXDTI1MDkwMzE4
|
|
||||||
MTczMlowDzENMAsGA1UEAwwEZnJlZDB2MBAGByqGSM49AgEGBSuBBAAiA2IABD54
|
|
||||||
7ybZh7uLCEf+Fa2WrvST8djO4wXSlkb89kfJrEH1ARvjJWH07m+NE92rG9gChaP7
|
|
||||||
Uj0C2K0L7eMCiMfrBlLKJayLrOtSTENS+cCM9EjqcqYm918ClpetEKxtyNOxKKOB
|
|
||||||
oDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBQ89gDDz6S7jfEbq6FvJEQqc5XrRjBP
|
|
||||||
BgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJ
|
|
||||||
SkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEF
|
|
||||||
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBABCcSdAJ3FLfK+HO
|
|
||||||
We/3oJYTBX4wukttF2LtiTnLDsXM3wxaaOcPvMJn4LJytp/nnx9M5drZXNhTRO9H
|
|
||||||
6ked1x0Sq3XDH8TYrmV+OZ2Y8QLfA3cee4gkX35RXPKcuB+EcUv5Wm0GY03pqyf1
|
|
||||||
mfqsJXrip7qUp0SLLyFzwdsaNzjWRkqlZfckNQhAmo7WIlYgyXtSs4/qU78AvWoj
|
|
||||||
vQf+ry4g7nFp+Gaw8wBejS8qN7kUpr/IJS4b9IZYlDMrhfkIOkieSUJmWjcQEFtQ
|
|
||||||
LvYG0P6GFw2d9d3Lq5I53thXnQ1+FLdh5bzcYgAijCPfkNQ4ARgjlsZ+6MheyP2k
|
|
||||||
skeHAk8=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBQw+Cfj2TA0I9LNukC
|
|
||||||
i6neLisJywxfhODlvipRtpifAMhKh1mgf3U5mcknDT4N3A6hZANiAAQ+eO8m2Ye7
|
|
||||||
iwhH/hWtlq70k/HYzuMF0pZG/PZHyaxB9QEb4yVh9O5vjRPdqxvYAoWj+1I9Atit
|
|
||||||
C+3jAojH6wZSyiWsi6zrUkxDUvnAjPRI6nKmJvdfApaXrRCsbcjTsSg=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -1,268 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
22:7a:b3:cb:88:05:00:8c:df:af:02:be:af:63:f9:59
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: Feb 20 22:37:46 2023 GMT
|
|
||||||
Not After : May 25 22:37:46 2025 GMT
|
|
||||||
Subject: CN=jf
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:8d:38:ea:4f:29:bd:83:a9:33:a3:1c:33:8a:60:
|
|
||||||
8f:fa:19:81:00:73:44:81:98:1e:76:05:ee:f6:46:
|
|
||||||
d5:25:a8:c5:3b:bd:d6:fa:cf:c6:79:e0:b4:42:27:
|
|
||||||
80:e2:96:2d:30:50:c2:f6:9c:2c:13:f8:b9:46:b3:
|
|
||||||
0d:96:6c:9b:d2:45:15:a3:f0:4c:bc:6b:51:45:f8:
|
|
||||||
cb:59:04:b1:d0:47:b9:90:06:71:c7:eb:34:32:e2:
|
|
||||||
72:14:84:94:58:e3:34
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
C5:CE:72:8F:A3:8E:13:57:DD:0E:02:A1:24:F1:56:C3:AE:2F:65:8F
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
3b:e8:1a:3e:ac:17:17:49:7c:4d:73:55:39:e9:1b:e4:d6:7f:
|
|
||||||
6d:6d:43:6c:e2:79:41:f4:26:a4:2d:18:59:24:a0:b1:e0:db:
|
|
||||||
03:07:f9:fb:24:f6:be:ed:8c:31:3e:c7:bb:74:b6:87:ba:43:
|
|
||||||
fc:d6:fb:2f:9f:1c:eb:d1:27:ad:60:eb:ab:87:c7:46:fe:22:
|
|
||||||
75:c1:bb:fb:23:ad:ba:1d:ab:41:45:29:d6:c4:89:99:94:40:
|
|
||||||
06:c7:3a:08:fe:d3:b5:f4:e7:52:57:aa:d1:a8:ec:74:e6:c9:
|
|
||||||
ec:9e:80:e0:ba:92:92:95:55:2e:d7:b2:d8:09:ee:72:fd:12:
|
|
||||||
ac:0a:0d:dc:ba:ac:4e:34:8c:37:19:76:60:7c:bd:ba:99:b7:
|
|
||||||
e5:47:c3:4b:67:2f:a9:5c:89:95:70:2d:2c:97:45:04:64:15:
|
|
||||||
47:04:d1:48:7d:d8:40:63:6c:05:8b:dc:ed:0f:a3:ae:3a:e8:
|
|
||||||
6f:49:34:54:de:99:4b:aa:28:6d:c9:3d:db:43:60:14:40:d5:
|
|
||||||
09:87:a8:b2:88:11:4c:8c:00:71:b1:38:25:91:5f:2f:93:7b:
|
|
||||||
42:64:38:db:d2:59:48:e8:ed:2e:92:69:4e:d4:2a:3b:e3:03:
|
|
||||||
94:2c:fc:ac:bc:ff:a9:b4:1e:ca:d3:d2:b5:fd:bf:33:bd:55:
|
|
||||||
12:75:db:f1
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICnjCCAYagAwIBAgIQInqzy4gFAIzfrwK+r2P5WTANBgkqhkiG9w0BAQsFADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwMjIwMjIzNzQ2WhcNMjUwNTI1MjIz
|
|
||||||
NzQ2WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABI046k8p
|
|
||||||
vYOpM6McM4pgj/oZgQBzRIGYHnYF7vZG1SWoxTu91vrPxnngtEIngOKWLTBQwvac
|
|
||||||
LBP4uUazDZZsm9JFFaPwTLxrUUX4y1kEsdBHuZAGccfrNDLichSElFjjNKOBoDCB
|
|
||||||
nTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTFznKPo44TV90OAqEk8VbDri9ljzBPBgNV
|
|
||||||
HSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZf
|
|
||||||
c2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEFBQcD
|
|
||||||
AjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBADvoGj6sFxdJfE1zVTnp
|
|
||||||
G+TWf21tQ2zieUH0JqQtGFkkoLHg2wMH+fsk9r7tjDE+x7t0toe6Q/zW+y+fHOvR
|
|
||||||
J61g66uHx0b+InXBu/sjrbodq0FFKdbEiZmUQAbHOgj+07X051JXqtGo7HTmyeye
|
|
||||||
gOC6kpKVVS7XstgJ7nL9EqwKDdy6rE40jDcZdmB8vbqZt+VHw0tnL6lciZVwLSyX
|
|
||||||
RQRkFUcE0Uh92EBjbAWL3O0Po6466G9JNFTemUuqKG3JPdtDYBRA1QmHqLKIEUyM
|
|
||||||
AHGxOCWRXy+Te0JkONvSWUjo7S6SaU7UKjvjA5Qs/Ky8/6m0HsrT0rX9vzO9VRJ1
|
|
||||||
2/E=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBI4JXNyv7EeAsIFaPn
|
|
||||||
JBe0cJDvuYM+AGWJYcMtfQj8Sg5z+K0+Ur1IjRxj6vkyXa2hZANiAASNOOpPKb2D
|
|
||||||
qTOjHDOKYI/6GYEAc0SBmB52Be72RtUlqMU7vdb6z8Z54LRCJ4Dili0wUML2nCwT
|
|
||||||
+LlGsw2WbJvSRRWj8Ey8a1FF+MtZBLHQR7mQBnHH6zQy4nIUhJRY4zQ=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -1,269 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote vpn.yultek.dev 1194
|
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
b1:a6:3d:e9:86:99:a3:9a:13:71:db:4b:3e:64:97:1e
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 13 19:49:03 2025 GMT
|
|
||||||
Not After : Mar 22 19:49:03 2035 GMT
|
|
||||||
Subject: CN=ka2501
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:d0:ce:53:7c:45:90:12:64:5a:74:2b:51:32:0e:
|
|
||||||
58:dc:c0:71:82:2d:ba:4a:75:93:b5:57:f1:9a:54:
|
|
||||||
b5:79:3b:67:01:e3:8a:9f:fa:20:82:fc:74:b0:ba:
|
|
||||||
de:71:75:8d:d4:a6:cd:59:b9:46:40:bd:08:fc:c4:
|
|
||||||
e3:53:26:57:7f:11:f1:f8:d8:7e:0a:45:1d:f4:23:
|
|
||||||
d9:25:9b:7c:ac:63:d4:7a:b0:27:80:cb:20:e5:2f:
|
|
||||||
e4:fb:21:2f:56:12:4f
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
52:EC:0F:6C:38:BD:9A:F2:07:76:03:02:5C:A2:5D:E9:45:51:77:D0
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
69:06:93:7e:7c:88:68:5b:3a:b9:7c:3c:d2:ae:43:5e:5f:aa:
|
|
||||||
cf:9b:f9:8e:58:ff:93:3d:5f:07:d4:26:c4:c0:18:a9:46:88:
|
|
||||||
1e:8d:75:32:f7:58:ea:e5:b0:39:40:e9:a0:fc:a6:a2:19:20:
|
|
||||||
e2:dd:88:3a:4c:4c:ba:00:a0:77:da:99:41:0c:49:e1:ef:07:
|
|
||||||
4c:69:52:80:9e:e0:bc:44:a8:e8:03:45:91:94:d5:b3:90:66:
|
|
||||||
67:09:55:8d:20:cf:8f:df:c0:8e:54:17:db:6a:9d:b3:a3:ce:
|
|
||||||
b9:38:c5:86:72:46:87:b8:86:c7:ca:36:75:49:01:81:07:da:
|
|
||||||
7b:6d:92:89:73:88:c7:51:36:e1:78:65:be:b5:45:51:b8:04:
|
|
||||||
a7:1c:88:03:ba:48:4f:e3:b9:eb:e2:4c:0a:5f:1c:57:3b:f6:
|
|
||||||
c7:e9:ba:c7:c3:b0:2c:a7:b2:19:e0:9f:ff:c4:c3:66:03:65:
|
|
||||||
44:10:37:48:96:80:4a:95:ea:2e:31:57:64:eb:ad:85:ab:09:
|
|
||||||
1d:87:a7:0d:0f:99:69:8d:9e:ee:d8:9a:7a:2d:3d:a1:f9:61:
|
|
||||||
90:cc:ba:c4:eb:f8:e5:c8:fc:b0:11:b6:d6:3a:d9:ee:2d:fb:
|
|
||||||
0e:98:0a:71:51:89:c3:97:34:35:00:8f:77:0f:91:15:39:52:
|
|
||||||
8f:72:4f:7d
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICozCCAYugAwIBAgIRALGmPemGmaOaE3HbSz5klx4wDQYJKoZIhvcNAQENBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTI1MDUxMzE5NDkwM1oXDTM1MDMyMjE5
|
|
||||||
NDkwM1owETEPMA0GA1UEAwwGa2EyNTAxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
|
||||||
0M5TfEWQEmRadCtRMg5Y3MBxgi26SnWTtVfxmlS1eTtnAeOKn/oggvx0sLrecXWN
|
|
||||||
1KbNWblGQL0I/MTjUyZXfxHx+Nh+CkUd9CPZJZt8rGPUerAngMsg5S/k+yEvVhJP
|
|
||||||
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFFLsD2w4vZryB3YDAlyiXelFUXfQ
|
|
||||||
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
|
||||||
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
|
||||||
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQ0FAAOCAQEAaQaTfnyIaFs6
|
|
||||||
uXw80q5DXl+qz5v5jlj/kz1fB9QmxMAYqUaIHo11MvdY6uWwOUDpoPymohkg4t2I
|
|
||||||
OkxMugCgd9qZQQxJ4e8HTGlSgJ7gvESo6ANFkZTVs5BmZwlVjSDPj9/AjlQX22qd
|
|
||||||
s6POuTjFhnJGh7iGx8o2dUkBgQfae22SiXOIx1E24XhlvrVFUbgEpxyIA7pIT+O5
|
|
||||||
6+JMCl8cVzv2x+m6x8OwLKeyGeCf/8TDZgNlRBA3SJaASpXqLjFXZOuthasJHYen
|
|
||||||
DQ+ZaY2e7tiaei09oflhkMy6xOv45cj8sBG21jrZ7i37DpgKcVGJw5c0NQCPdw+R
|
|
||||||
FTlSj3JPfQ==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCyRf14oFnDf92ZVzpH
|
|
||||||
atELaV1d2kNCpBtUko5EjiAaXQaK/HKuPoGwd5UoKzR+iF6hZANiAATQzlN8RZAS
|
|
||||||
ZFp0K1EyDljcwHGCLbpKdZO1V/GaVLV5O2cB44qf+iCC/HSwut5xdY3Ups1ZuUZA
|
|
||||||
vQj8xONTJld/EfH42H4KRR30I9klm3ysY9R6sCeAyyDlL+T7IS9WEk8=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -1,268 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
a6:7f:64:22:94:22:4a:39:b9:48:25:9b:99:9d:ae:a7
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: Mar 17 19:30:32 2023 GMT
|
|
||||||
Not After : Jun 19 19:30:32 2025 GMT
|
|
||||||
Subject: CN=pascal
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:6e:d7:fc:29:a8:23:70:28:49:70:82:f4:1a:4f:
|
|
||||||
fc:e8:5a:d3:10:84:ef:0a:59:d9:3e:31:2e:5f:91:
|
|
||||||
8b:97:7e:32:c5:e4:9a:b1:df:8b:66:82:f7:a5:5a:
|
|
||||||
6d:90:ba:4d:4b:75:4e:1b:09:37:3b:23:5b:df:b8:
|
|
||||||
08:89:c7:a0:d6:3b:fa:3e:f8:b1:08:18:a6:ee:25:
|
|
||||||
02:25:b2:c5:43:ee:f5:03:82:9e:39:a0:82:d0:23:
|
|
||||||
49:eb:fe:be:3e:8f:7a
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
8E:E1:F2:13:12:D0:E0:C4:29:EA:29:E4:3D:94:2B:EC:0D:04:8F:BC
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
7d:0b:3f:f6:58:09:f2:8a:8d:0e:1e:50:c9:e8:31:f0:8f:0a:
|
|
||||||
f5:65:66:55:d3:dd:2c:5d:42:d4:0f:a5:02:ed:6a:77:e1:1d:
|
|
||||||
39:c5:46:1c:a5:38:17:89:13:f1:cd:eb:ff:b8:a5:3d:e9:85:
|
|
||||||
6f:d2:96:9b:f4:a1:09:6c:1b:84:40:70:19:2b:e1:ac:91:c2:
|
|
||||||
df:bf:09:a4:4f:c4:31:44:fe:2b:a5:60:38:97:a8:b3:01:aa:
|
|
||||||
39:43:74:90:b5:c6:fc:85:63:26:9f:7f:54:ba:de:4a:b1:ae:
|
|
||||||
6d:85:00:35:4d:15:9f:9d:10:f4:bf:bb:67:45:7e:c6:ab:ee:
|
|
||||||
7e:ad:92:4a:b4:e8:76:65:be:94:40:5a:67:83:ab:6c:d9:f9:
|
|
||||||
7d:40:bd:70:87:1f:14:4d:eb:56:50:a5:c3:7e:4a:b3:42:b5:
|
|
||||||
95:fe:f8:7f:9b:c6:c0:81:04:62:fd:94:ef:da:dd:17:01:a0:
|
|
||||||
93:14:80:31:5a:a2:fa:c7:8c:2d:7c:df:8b:40:d5:5c:ce:5f:
|
|
||||||
a8:9f:9f:48:4f:49:49:dc:cc:37:7e:f7:55:84:74:8a:cd:68:
|
|
||||||
15:60:8b:e8:4a:75:3e:83:cb:33:be:45:e1:a1:76:52:1a:b9:
|
|
||||||
09:34:38:af:6e:af:98:e3:6d:ed:c2:24:97:de:08:83:6b:d5:
|
|
||||||
45:9e:91:3a
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICozCCAYugAwIBAgIRAKZ/ZCKUIko5uUglm5mdrqcwDQYJKoZIhvcNAQELBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDMxNzE5MzAzMloXDTI1MDYxOTE5
|
|
||||||
MzAzMlowETEPMA0GA1UEAwwGcGFzY2FsMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
|
||||||
btf8KagjcChJcIL0Gk/86FrTEITvClnZPjEuX5GLl34yxeSasd+LZoL3pVptkLpN
|
|
||||||
S3VOGwk3OyNb37gIiceg1jv6PvixCBim7iUCJbLFQ+71A4KeOaCC0CNJ6/6+Po96
|
|
||||||
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFI7h8hMS0ODEKeop5D2UK+wNBI+8
|
|
||||||
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
|
||||||
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
|
||||||
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAfQs/9lgJ8oqN
|
|
||||||
Dh5Qyegx8I8K9WVmVdPdLF1C1A+lAu1qd+EdOcVGHKU4F4kT8c3r/7ilPemFb9KW
|
|
||||||
m/ShCWwbhEBwGSvhrJHC378JpE/EMUT+K6VgOJeoswGqOUN0kLXG/IVjJp9/VLre
|
|
||||||
SrGubYUANU0Vn50Q9L+7Z0V+xqvufq2SSrTodmW+lEBaZ4OrbNn5fUC9cIcfFE3r
|
|
||||||
VlClw35Ks0K1lf74f5vGwIEEYv2U79rdFwGgkxSAMVqi+seMLXzfi0DVXM5fqJ+f
|
|
||||||
SE9JSdzMN373VYR0is1oFWCL6Ep1PoPLM75F4aF2Uhq5CTQ4r26vmONt7cIkl94I
|
|
||||||
g2vVRZ6ROg==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBaXJvFX1ve+n9RXR/s
|
|
||||||
FyOJij1AEAhcbzj6Vg0PXekMwOSAkRsAltTXYM3nAaRK93OhZANiAARu1/wpqCNw
|
|
||||||
KElwgvQaT/zoWtMQhO8KWdk+MS5fkYuXfjLF5Jqx34tmgvelWm2Quk1LdU4bCTc7
|
|
||||||
I1vfuAiJx6DWO/o++LEIGKbuJQIlssVD7vUDgp45oILQI0nr/r4+j3o=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -1,269 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote vpn.yultek.dev 1194
|
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
d1:ae:61:45:8e:84:e3:8e:5b:92:3f:aa:bb:81:9d:59
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: Feb 23 20:30:31 2023 GMT
|
|
||||||
Not After : May 28 20:30:31 2025 GMT
|
|
||||||
Subject: CN=remoteclient
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:65:e9:86:35:01:c3:d7:0e:16:3d:89:90:3c:cb:
|
|
||||||
a0:5f:d2:04:f7:b6:32:84:1e:a0:dc:6a:1d:16:a0:
|
|
||||||
6f:47:a3:b5:7d:4c:39:bd:d0:70:18:34:e8:16:67:
|
|
||||||
d4:5b:4c:ca:ce:ea:f0:75:5f:55:72:09:4b:f5:dd:
|
|
||||||
80:f1:d5:db:e6:26:09:e4:34:3b:ca:89:f3:3a:40:
|
|
||||||
91:31:14:c6:ff:06:8d:8e:f9:ba:8f:47:df:40:41:
|
|
||||||
f4:6b:84:f8:e5:e8:70
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
23:F8:BF:EB:8E:A3:77:B3:2B:6A:FA:16:7A:39:B2:C2:47:31:9F:76
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
27:af:ff:e0:98:8e:d1:6c:39:d7:40:97:df:ea:5a:fc:57:31:
|
|
||||||
a2:92:0c:d3:4c:4b:74:22:9e:47:01:9b:0f:e0:a4:6c:dc:ef:
|
|
||||||
14:b7:93:0f:99:93:ec:c9:96:dc:51:58:d3:ac:eb:f1:10:48:
|
|
||||||
ba:96:54:25:32:2a:89:66:cb:ca:13:b4:75:cc:4e:2a:5d:7c:
|
|
||||||
bb:b9:15:28:c0:32:59:f0:66:e5:fe:d8:14:14:2c:fb:df:6e:
|
|
||||||
1e:b6:53:c9:f0:77:68:54:b9:21:4b:0c:a4:d6:bc:4d:c2:a3:
|
|
||||||
de:d0:9f:ef:67:68:3e:c6:d4:da:d5:6c:92:80:cf:2e:8d:04:
|
|
||||||
59:c8:39:9f:22:4a:04:28:3e:e8:cf:02:73:73:a6:59:d4:e5:
|
|
||||||
9c:77:55:41:00:5c:c2:23:61:df:44:5c:ad:a8:bc:15:57:2d:
|
|
||||||
ae:89:99:a7:33:8f:d3:75:02:21:91:f6:38:34:23:68:70:8f:
|
|
||||||
99:0f:53:27:6d:52:9a:9b:f3:62:cf:20:bc:f5:91:41:78:fc:
|
|
||||||
92:09:2f:3e:bb:2d:9b:69:39:7f:c4:b1:a8:62:64:27:3f:27:
|
|
||||||
2d:16:c4:3e:0d:51:c9:f7:4f:40:f0:fd:55:a9:44:36:31:59:
|
|
||||||
b7:08:6a:3c:28:31:8a:43:c0:b9:05:44:75:48:6d:94:24:c6:
|
|
||||||
b2:fc:f7:33
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqTCCAZGgAwIBAgIRANGuYUWOhOOOW5I/qruBnVkwDQYJKoZIhvcNAQELBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMzIwMzAzMVoXDTI1MDUyODIw
|
|
||||||
MzAzMVowFzEVMBMGA1UEAwwMcmVtb3RlY2xpZW50MHYwEAYHKoZIzj0CAQYFK4EE
|
|
||||||
ACIDYgAEZemGNQHD1w4WPYmQPMugX9IE97YyhB6g3GodFqBvR6O1fUw5vdBwGDTo
|
|
||||||
FmfUW0zKzurwdV9VcglL9d2A8dXb5iYJ5DQ7yonzOkCRMRTG/waNjvm6j0ffQEH0
|
|
||||||
a4T45ehwo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFCP4v+uOo3ezK2r6Fno5
|
|
||||||
ssJHMZ92ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
|
||||||
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
|
||||||
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAJ6//
|
|
||||||
4JiO0Ww510CX3+pa/FcxopIM00xLdCKeRwGbD+CkbNzvFLeTD5mT7MmW3FFY06zr
|
|
||||||
8RBIupZUJTIqiWbLyhO0dcxOKl18u7kVKMAyWfBm5f7YFBQs+99uHrZTyfB3aFS5
|
|
||||||
IUsMpNa8TcKj3tCf72doPsbU2tVskoDPLo0EWcg5nyJKBCg+6M8Cc3OmWdTlnHdV
|
|
||||||
QQBcwiNh30Rcrai8FVctromZpzOP03UCIZH2ODQjaHCPmQ9TJ21SmpvzYs8gvPWR
|
|
||||||
QXj8kgkvPrstm2k5f8SxqGJkJz8nLRbEPg1RyfdPQPD9ValENjFZtwhqPCgxikPA
|
|
||||||
uQVEdUhtlCTGsvz3Mw==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBTe+pBwBZIEMj0jszW
|
|
||||||
fZEx67ft6630EHlFhaCHTXW9Nw25eDC2kfm2xwbjb093E++hZANiAARl6YY1AcPX
|
|
||||||
DhY9iZA8y6Bf0gT3tjKEHqDcah0WoG9Ho7V9TDm90HAYNOgWZ9RbTMrO6vB1X1Vy
|
|
||||||
CUv13YDx1dvmJgnkNDvKifM6QJExFMb/Bo2O+bqPR99AQfRrhPjl6HA=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -1,269 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote vpn.yultek.dev 1194
|
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
78:5e:57:99:93:be:f2:47:da:cc:6c:8e:0d:71:3d:f8
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 5 13:33:22 2024 GMT
|
|
||||||
Not After : Aug 8 13:33:22 2026 GMT
|
|
||||||
Subject: CN=stationKA2401
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:8f:4f:26:6b:af:cb:49:0b:74:3e:65:aa:0e:9a:
|
|
||||||
9a:57:99:b1:f6:bf:dc:74:ae:d6:72:ed:d3:a8:04:
|
|
||||||
2f:a8:a0:43:63:f6:c8:e2:cd:dc:d8:fd:bf:69:93:
|
|
||||||
09:d7:bd:11:ab:d9:c5:ae:20:bc:00:ac:d7:ad:ea:
|
|
||||||
fb:c0:1e:44:6f:ba:20:63:9d:32:f7:38:8f:c0:d7:
|
|
||||||
bf:b4:23:15:16:4d:84:59:13:d5:4b:de:9e:7b:46:
|
|
||||||
d3:ce:ba:5d:d9:53:c4
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
68:18:F5:54:75:30:27:4D:B5:96:D3:34:8E:1C:3B:58:1E:BC:1B:78
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha256WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
67:97:34:79:07:29:c3:cd:a6:7c:86:82:aa:94:0b:ca:69:ef:
|
|
||||||
79:5e:a6:35:97:c3:31:07:9f:cd:aa:89:95:e3:b1:26:4b:e9:
|
|
||||||
88:50:1f:3e:10:eb:d2:82:c5:6e:56:18:1e:ff:72:60:c1:de:
|
|
||||||
11:af:b8:e6:b6:bb:de:7d:52:f5:ba:1b:9b:4e:49:b2:05:25:
|
|
||||||
0a:e9:8a:f8:85:f7:0e:c8:db:fd:c4:b9:e9:a9:6f:85:0a:cb:
|
|
||||||
63:a3:d0:a7:77:e0:7f:ff:34:29:90:80:66:a7:8d:80:6a:bf:
|
|
||||||
23:74:80:77:ad:53:2d:5e:f6:02:d1:05:3f:9f:fa:17:11:8f:
|
|
||||||
7f:b4:a5:44:74:2b:57:1e:4b:7e:29:c8:95:48:a6:3a:fc:ae:
|
|
||||||
82:c2:7b:b2:26:4f:92:d5:af:73:71:30:8e:b6:b9:6a:f2:b0:
|
|
||||||
00:df:44:a2:3f:cd:4a:45:7e:ed:43:4b:d4:0e:07:25:94:37:
|
|
||||||
e0:5d:8d:0b:1b:fb:76:07:d0:41:da:c9:f3:19:fa:28:8b:46:
|
|
||||||
df:5a:19:82:ee:1e:e0:1a:be:39:c1:a9:65:b1:02:92:32:96:
|
|
||||||
2c:7e:3f:4e:ce:9e:b0:66:57:b4:74:2c:98:de:13:da:b2:27:
|
|
||||||
e5:7a:5b:30:df:3e:46:1b:6c:92:53:6f:c6:0e:88:6f:0d:ae:
|
|
||||||
89:ca:ea:ea
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqTCCAZGgAwIBAgIQeF5XmZO+8kfazGyODXE9+DANBgkqhkiG9w0BAQsFADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjQwNTA1MTMzMzIyWhcNMjYwODA4MTMz
|
|
||||||
MzIyWjAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNDAxMHYwEAYHKoZIzj0CAQYFK4EE
|
|
||||||
ACIDYgAEj08ma6/LSQt0PmWqDpqaV5mx9r/cdK7Wcu3TqAQvqKBDY/bI4s3c2P2/
|
|
||||||
aZMJ170Rq9nFriC8AKzXrer7wB5Eb7ogY50y9ziPwNe/tCMVFk2EWRPVS96ee0bT
|
|
||||||
zrpd2VPEo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFGgY9VR1MCdNtZbTNI4c
|
|
||||||
O1gevBt4ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
|
||||||
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
|
||||||
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAZ5c0
|
|
||||||
eQcpw82mfIaCqpQLymnveV6mNZfDMQefzaqJleOxJkvpiFAfPhDr0oLFblYYHv9y
|
|
||||||
YMHeEa+45ra73n1S9bobm05JsgUlCumK+IX3Dsjb/cS56alvhQrLY6PQp3fgf/80
|
|
||||||
KZCAZqeNgGq/I3SAd61TLV72AtEFP5/6FxGPf7SlRHQrVx5LfinIlUimOvyugsJ7
|
|
||||||
siZPktWvc3Ewjra5avKwAN9Eoj/NSkV+7UNL1A4HJZQ34F2NCxv7dgfQQdrJ8xn6
|
|
||||||
KItG31oZgu4e4Bq+OcGpZbECkjKWLH4/Ts6esGZXtHQsmN4T2rIn5XpbMN8+Rhts
|
|
||||||
klNvxg6Ibw2uicrq6g==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCqirzGpSX6ei53uFLm
|
|
||||||
GTcOHVuwJL0ut2FF+GghDE9CAc/up9n1u8xmfvI0/KEueYehZANiAASPTyZrr8tJ
|
|
||||||
C3Q+ZaoOmppXmbH2v9x0rtZy7dOoBC+ooENj9sjizdzY/b9pkwnXvRGr2cWuILwA
|
|
||||||
rNet6vvAHkRvuiBjnTL3OI/A17+0IxUWTYRZE9VL3p57RtPOul3ZU8Q=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
73
OpenVPN/CA Server/easy-rsa/pki/issued/DO_server.crt
Normal file
73
OpenVPN/CA Server/easy-rsa/pki/issued/DO_server.crt
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
7a:06:6f:b2:ed:70:56:f4:94:70:7b:b1:7b:dc:be:73
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Feb 20 22:27:55 2023 GMT
|
||||||
|
Not After : May 25 22:27:55 2025 GMT
|
||||||
|
Subject: CN=DO_server
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:2e:0a:88:e2:03:ad:14:3a:ee:00:51:96:3e:f5:
|
||||||
|
ec:24:cb:d6:5b:8d:d6:5d:0f:df:92:08:97:19:db:
|
||||||
|
b0:8d:c2:9d:d6:c6:a2:59:2e:94:d4:d9:d0:10:f8:
|
||||||
|
cd:d9:3c:90:80:e8:61:88:9a:be:ac:f8:ce:d2:44:
|
||||||
|
7f:21:98:ff:d7:53:48:26:d6:18:6f:8f:0d:61:d3:
|
||||||
|
36:f6:20:30:18:67:66:61:f7:25:da:ee:76:f5:ab:
|
||||||
|
16:cb:fd:40:52:95:3c
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
DF:EE:7B:FF:0B:6D:D0:D9:44:84:A9:FA:00:F6:A6:AB:D9:A4:D2:4F
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Server Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature, Key Encipherment
|
||||||
|
X509v3 Subject Alternative Name:
|
||||||
|
DNS:DO_server
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
2f:00:b3:78:70:fe:01:fc:cb:49:5d:8c:94:0a:fa:ed:91:63:
|
||||||
|
28:cc:a0:27:09:11:fd:ed:31:50:ef:d4:01:ba:1c:29:77:60:
|
||||||
|
01:2d:dd:7a:cd:ee:26:a1:1d:35:c9:08:b6:39:73:64:30:f7:
|
||||||
|
c0:21:8d:d3:36:28:7d:47:e4:92:8a:c4:23:a1:50:97:e3:2e:
|
||||||
|
5b:6c:a5:ce:87:80:c5:6e:a3:d0:56:79:2e:e8:c1:50:e2:28:
|
||||||
|
ec:31:14:fc:a4:82:29:9a:78:56:d2:07:7f:f9:7f:78:59:01:
|
||||||
|
74:ce:0e:49:cc:cb:8b:43:6b:50:d4:79:b2:9b:8d:d7:49:ac:
|
||||||
|
a4:63:e1:3b:2f:e7:41:89:b8:fe:65:84:f7:f3:bf:77:55:78:
|
||||||
|
c1:66:ac:27:d5:42:54:3b:a2:c3:ff:5d:1a:f5:db:8b:f0:3b:
|
||||||
|
23:05:23:c5:79:d7:00:db:60:03:51:60:79:4d:72:81:78:55:
|
||||||
|
11:55:95:9b:44:a0:21:b9:f4:85:2f:83:ce:03:67:ba:d3:80:
|
||||||
|
45:7e:cd:c5:0c:51:f4:03:56:30:cf:d7:e6:1f:ec:1f:8c:38:
|
||||||
|
29:cf:94:39:f7:c2:f6:21:0b:cf:33:3b:ba:05:5f:74:34:20:
|
||||||
|
da:e3:ec:50:f9:d4:3a:55:7e:cd:91:f2:bf:4e:fd:50:40:f3:
|
||||||
|
89:10:37:20
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICuzCCAaOgAwIBAgIQegZvsu1wVvSUcHuxe9y+czANBgkqhkiG9w0BAQsFADAU
|
||||||
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwMjIwMjIyNzU1WhcNMjUwNTI1MjIy
|
||||||
|
NzU1WjAUMRIwEAYDVQQDDAlET19zZXJ2ZXIwdjAQBgcqhkjOPQIBBgUrgQQAIgNi
|
||||||
|
AAQuCojiA60UOu4AUZY+9ewky9ZbjdZdD9+SCJcZ27CNwp3WxqJZLpTU2dAQ+M3Z
|
||||||
|
PJCA6GGImr6s+M7SRH8hmP/XU0gm1hhvjw1h0zb2IDAYZ2Zh9yXa7nb1qxbL/UBS
|
||||||
|
lTyjgbYwgbMwCQYDVR0TBAIwADAdBgNVHQ4EFgQU3+57/wtt0NlEhKn6APamq9mk
|
||||||
|
0k8wTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQxEjAQBgNV
|
||||||
|
BAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0lBAwwCgYI
|
||||||
|
KwYBBQUHAwEwCwYDVR0PBAQDAgWgMBQGA1UdEQQNMAuCCURPX3NlcnZlcjANBgkq
|
||||||
|
hkiG9w0BAQsFAAOCAQEALwCzeHD+AfzLSV2MlAr67ZFjKMygJwkR/e0xUO/UAboc
|
||||||
|
KXdgAS3des3uJqEdNckItjlzZDD3wCGN0zYofUfkkorEI6FQl+MuW2ylzoeAxW6j
|
||||||
|
0FZ5LujBUOIo7DEU/KSCKZp4VtIHf/l/eFkBdM4OSczLi0NrUNR5spuN10mspGPh
|
||||||
|
Oy/nQYm4/mWE9/O/d1V4wWasJ9VCVDuiw/9dGvXbi/A7IwUjxXnXANtgA1FgeU1y
|
||||||
|
gXhVEVWVm0SgIbn0hS+DzgNnutOARX7NxQxR9ANWMM/X5h/sH4w4Kc+UOffC9iEL
|
||||||
|
zzM7ugVfdDQg2uPsUPnUOlV+zZHyv079UEDziRA3IA==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/Otarcik202501.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/Otarcik202501.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
44:e3:12:88:c3:8e:16:32:f4:1e:bb:13:ca:4d:4c:8d
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Jan 18 20:53:00 2025 GMT
|
||||||
|
Not After : Apr 23 20:53:00 2027 GMT
|
||||||
|
Subject: CN=Otarcik202501
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:40:90:47:89:d8:ec:72:20:95:c0:fb:8d:b7:10:
|
||||||
|
fc:52:1d:9b:ad:c1:65:91:e4:45:d5:0f:02:b0:31:
|
||||||
|
8e:55:b7:fa:31:9a:a6:5a:1f:e0:85:cd:e2:21:9d:
|
||||||
|
3c:95:7f:ad:80:f2:d1:63:e7:41:7d:e4:87:97:7e:
|
||||||
|
a4:d1:e7:d2:c9:3d:3b:66:9f:52:fe:11:72:d3:d7:
|
||||||
|
de:b9:f7:41:d5:7b:32:2b:01:94:4c:71:cb:ff:65:
|
||||||
|
76:67:3e:ae:1a:4e:4f
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
27:9B:8A:B2:AB:54:28:C6:F2:23:81:99:3D:AB:D5:4C:25:8D:95:0B
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
5a:57:76:c3:9d:0e:55:d1:61:1d:43:2b:21:7c:ec:59:c0:07:
|
||||||
|
bf:76:f1:e6:c4:1b:3d:19:82:b0:b2:02:74:4c:d5:f2:7c:ba:
|
||||||
|
33:f4:24:d8:68:6f:29:fe:85:f9:be:ee:90:42:04:c5:25:15:
|
||||||
|
78:7e:8f:86:ef:ea:4d:15:d1:a5:dc:29:a4:50:99:74:a4:74:
|
||||||
|
53:ee:3f:6c:c3:a9:b9:af:e0:a3:e2:33:6a:4a:aa:20:21:92:
|
||||||
|
bc:e5:57:86:5b:53:c7:68:b8:05:43:c8:10:d7:06:68:58:9f:
|
||||||
|
c4:2a:51:50:f5:dd:7c:ae:e4:80:59:5a:55:83:e4:88:58:be:
|
||||||
|
be:8d:68:fe:7a:7a:95:fe:7d:67:f6:03:d5:09:4d:3d:11:24:
|
||||||
|
6d:03:33:40:5e:65:a2:c6:77:28:a0:60:aa:ea:df:08:31:7f:
|
||||||
|
d8:1f:94:8a:4e:2c:80:bc:8f:70:40:d3:14:72:a9:cd:9c:1f:
|
||||||
|
ef:b4:5d:a9:e6:65:49:fb:f7:e2:b3:ea:ce:59:c3:45:7d:05:
|
||||||
|
ca:16:fc:2b:ff:d9:fc:2d:c9:75:36:d4:60:a3:b7:03:5b:92:
|
||||||
|
85:0a:3a:e1:50:8a:39:6b:d3:d5:4b:61:58:c6:2d:fe:96:b0:
|
||||||
|
9d:26:6b:6d:d7:20:af:91:47:27:1f:13:61:34:33:f7:8a:16:
|
||||||
|
bd:da:ee:44
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICqTCCAZGgAwIBAgIQROMSiMOOFjL0HrsTyk1MjTANBgkqhkiG9w0BAQsFADAU
|
||||||
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjUwMTE4MjA1MzAwWhcNMjcwNDIzMjA1
|
||||||
|
MzAwWjAYMRYwFAYDVQQDDA1PdGFyY2lrMjAyNTAxMHYwEAYHKoZIzj0CAQYFK4EE
|
||||||
|
ACIDYgAEQJBHidjsciCVwPuNtxD8Uh2brcFlkeRF1Q8CsDGOVbf6MZqmWh/ghc3i
|
||||||
|
IZ08lX+tgPLRY+dBfeSHl36k0efSyT07Zp9S/hFy09feufdB1XsyKwGUTHHL/2V2
|
||||||
|
Zz6uGk5Po4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFCebirKrVCjG8iOBmT2r
|
||||||
|
1UwljZULME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||||
|
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||||
|
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAWld2
|
||||||
|
w50OVdFhHUMrIXzsWcAHv3bx5sQbPRmCsLICdEzV8ny6M/Qk2GhvKf6F+b7ukEIE
|
||||||
|
xSUVeH6Phu/qTRXRpdwppFCZdKR0U+4/bMOpua/go+IzakqqICGSvOVXhltTx2i4
|
||||||
|
BUPIENcGaFifxCpRUPXdfK7kgFlaVYPkiFi+vo1o/np6lf59Z/YD1QlNPREkbQMz
|
||||||
|
QF5losZ3KKBgqurfCDF/2B+Uik4sgLyPcEDTFHKpzZwf77RdqeZlSfv34rPqzlnD
|
||||||
|
RX0Fyhb8K//Z/C3JdTbUYKO3A1uShQo64VCKOWvT1UthWMYt/pawnSZrbdcgr5FH
|
||||||
|
Jx8TYTQz94oWvdruRA==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/edgerouterchambly.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/edgerouterchambly.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
35:09:16:22:41:a8:78:05:b5:72:26:31:6e:c3:94:02
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Jul 3 19:11:30 2023 GMT
|
||||||
|
Not After : Oct 5 19:11:30 2025 GMT
|
||||||
|
Subject: CN=edgerouterchambly
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:0e:fd:1c:60:83:5f:a7:64:79:a0:35:74:df:c0:
|
||||||
|
63:68:c5:3c:b1:02:95:a9:73:58:a9:a3:74:cc:d8:
|
||||||
|
5b:d8:7a:ab:aa:d3:1f:41:2d:68:86:bd:2f:e3:6c:
|
||||||
|
73:b5:e8:01:73:b4:12:f4:71:dd:dd:cb:9b:4e:b0:
|
||||||
|
f1:d4:04:00:d1:60:cf:fe:ea:3c:a5:f2:ae:ee:aa:
|
||||||
|
45:a3:21:71:e5:d2:b7:f0:22:30:c4:d4:27:58:79:
|
||||||
|
96:6c:f0:5c:ba:96:19
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
C1:2A:D4:21:E9:F3:08:CB:87:23:CC:2D:52:A3:DF:8F:BB:CF:BB:5A
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
2e:c6:3c:76:fd:64:a8:ab:c7:02:86:e8:80:d5:a6:8b:2f:ed:
|
||||||
|
be:70:cd:96:23:a5:86:1f:19:0c:72:7b:0b:ec:d2:58:ad:39:
|
||||||
|
1d:ee:63:52:55:a3:f2:47:87:12:56:ad:cd:a1:ed:0d:ed:27:
|
||||||
|
55:4c:9b:47:cf:e8:d7:a2:70:d7:8a:d2:60:7e:57:b4:02:0d:
|
||||||
|
96:46:57:9d:f9:05:cf:f1:91:5c:1e:e2:a7:79:e1:5b:fe:46:
|
||||||
|
7a:1b:ab:bb:c0:0a:a5:70:68:83:88:1a:62:8a:36:4c:98:9c:
|
||||||
|
85:31:40:6b:ad:a7:11:d3:a3:cb:d9:8a:f3:e8:d4:2c:bd:8a:
|
||||||
|
66:57:ca:bb:ad:d9:b1:cf:6a:83:88:e3:5e:a4:2e:5b:7e:50:
|
||||||
|
26:16:5c:34:cd:6c:9b:35:d9:61:ef:63:87:7c:2a:2d:f0:dd:
|
||||||
|
ce:ab:9d:7e:14:46:98:d9:cb:9a:68:91:fb:a3:59:85:91:d5:
|
||||||
|
4f:0c:ee:e3:47:df:7c:93:f8:05:ec:0a:d1:84:dc:21:0f:8e:
|
||||||
|
6d:b5:14:e8:a3:bd:ea:21:1c:d1:5a:95:36:95:98:20:f0:0e:
|
||||||
|
07:54:56:27:d9:6d:cc:c6:09:f1:98:1c:69:d7:1b:52:0c:54:
|
||||||
|
38:32:fe:c6:50:07:74:ef:8c:05:03:bf:55:e0:c7:3b:e5:20:
|
||||||
|
f2:84:3e:9f
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICrTCCAZWgAwIBAgIQNQkWIkGoeAW1ciYxbsOUAjANBgkqhkiG9w0BAQsFADAU
|
||||||
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwNzAzMTkxMTMwWhcNMjUxMDA1MTkx
|
||||||
|
MTMwWjAcMRowGAYDVQQDDBFlZGdlcm91dGVyY2hhbWJseTB2MBAGByqGSM49AgEG
|
||||||
|
BSuBBAAiA2IABA79HGCDX6dkeaA1dN/AY2jFPLEClalzWKmjdMzYW9h6q6rTH0Et
|
||||||
|
aIa9L+Nsc7XoAXO0EvRx3d3Lm06w8dQEANFgz/7qPKXyru6qRaMhceXSt/AiMMTU
|
||||||
|
J1h5lmzwXLqWGaOBoDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTBKtQh6fMIy4cj
|
||||||
|
zC1So9+Pu8+7WjBPBgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYw
|
||||||
|
FDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNV
|
||||||
|
HSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEB
|
||||||
|
AC7GPHb9ZKirxwKG6IDVposv7b5wzZYjpYYfGQxyewvs0litOR3uY1JVo/JHhxJW
|
||||||
|
rc2h7Q3tJ1VMm0fP6NeicNeK0mB+V7QCDZZGV535Bc/xkVwe4qd54Vv+Rnobq7vA
|
||||||
|
CqVwaIOIGmKKNkyYnIUxQGutpxHTo8vZivPo1Cy9imZXyrut2bHPaoOI416kLlt+
|
||||||
|
UCYWXDTNbJs12WHvY4d8Ki3w3c6rnX4URpjZy5pokfujWYWR1U8M7uNH33yT+AXs
|
||||||
|
CtGE3CEPjm21FOijveohHNFalTaVmCDwDgdUVifZbczGCfGYHGnXG1IMVDgy/sZQ
|
||||||
|
B3TvjAUDv1XgxzvlIPKEPp8=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/fred.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/fred.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
ab:ba:55:27:aa:06:49:7b:13:dd:f2:5b:ae:27:08:fe
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Jun 1 18:17:32 2023 GMT
|
||||||
|
Not After : Sep 3 18:17:32 2025 GMT
|
||||||
|
Subject: CN=fred
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:3e:78:ef:26:d9:87:bb:8b:08:47:fe:15:ad:96:
|
||||||
|
ae:f4:93:f1:d8:ce:e3:05:d2:96:46:fc:f6:47:c9:
|
||||||
|
ac:41:f5:01:1b:e3:25:61:f4:ee:6f:8d:13:dd:ab:
|
||||||
|
1b:d8:02:85:a3:fb:52:3d:02:d8:ad:0b:ed:e3:02:
|
||||||
|
88:c7:eb:06:52:ca:25:ac:8b:ac:eb:52:4c:43:52:
|
||||||
|
f9:c0:8c:f4:48:ea:72:a6:26:f7:5f:02:96:97:ad:
|
||||||
|
10:ac:6d:c8:d3:b1:28
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
3C:F6:00:C3:CF:A4:BB:8D:F1:1B:AB:A1:6F:24:44:2A:73:95:EB:46
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
10:9c:49:d0:09:dc:52:df:2b:e1:ce:59:ef:f7:a0:96:13:05:
|
||||||
|
7e:30:ba:4b:6d:17:62:ed:89:39:cb:0e:c5:cc:df:0c:5a:68:
|
||||||
|
e7:0f:bc:c2:67:e0:b2:72:b6:9f:e7:9f:1f:4c:e5:da:d9:5c:
|
||||||
|
d8:53:44:ef:47:ea:47:9d:d7:1d:12:ab:75:c3:1f:c4:d8:ae:
|
||||||
|
65:7e:39:9d:98:f1:02:df:03:77:1e:7b:88:24:5f:7e:51:5c:
|
||||||
|
f2:9c:b8:1f:84:71:4b:f9:5a:6d:06:63:4d:e9:ab:27:f5:99:
|
||||||
|
fa:ac:25:7a:e2:a7:ba:94:a7:44:8b:2f:21:73:c1:db:1a:37:
|
||||||
|
38:d6:46:4a:a5:65:f7:24:35:08:40:9a:8e:d6:22:56:20:c9:
|
||||||
|
7b:52:b3:8f:ea:53:bf:00:bd:6a:23:bd:07:fe:af:2e:20:ee:
|
||||||
|
71:69:f8:66:b0:f3:00:5e:8d:2f:2a:37:b9:14:a6:bf:c8:25:
|
||||||
|
2e:1b:f4:86:58:94:33:2b:85:f9:08:3a:48:9e:49:42:66:5a:
|
||||||
|
37:10:10:5b:50:2e:f6:06:d0:fe:86:17:0d:9d:f5:dd:cb:ab:
|
||||||
|
92:39:de:d8:57:9d:0d:7e:14:b7:61:e5:bc:dc:62:00:22:8c:
|
||||||
|
23:df:90:d4:38:01:18:23:96:c6:7e:e8:c8:5e:c8:fd:a4:b2:
|
||||||
|
47:87:02:4f
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICoTCCAYmgAwIBAgIRAKu6VSeqBkl7E93yW64nCP4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDYwMTE4MTczMloXDTI1MDkwMzE4
|
||||||
|
MTczMlowDzENMAsGA1UEAwwEZnJlZDB2MBAGByqGSM49AgEGBSuBBAAiA2IABD54
|
||||||
|
7ybZh7uLCEf+Fa2WrvST8djO4wXSlkb89kfJrEH1ARvjJWH07m+NE92rG9gChaP7
|
||||||
|
Uj0C2K0L7eMCiMfrBlLKJayLrOtSTENS+cCM9EjqcqYm918ClpetEKxtyNOxKKOB
|
||||||
|
oDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBQ89gDDz6S7jfEbq6FvJEQqc5XrRjBP
|
||||||
|
BgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJ
|
||||||
|
SkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEF
|
||||||
|
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBABCcSdAJ3FLfK+HO
|
||||||
|
We/3oJYTBX4wukttF2LtiTnLDsXM3wxaaOcPvMJn4LJytp/nnx9M5drZXNhTRO9H
|
||||||
|
6ked1x0Sq3XDH8TYrmV+OZ2Y8QLfA3cee4gkX35RXPKcuB+EcUv5Wm0GY03pqyf1
|
||||||
|
mfqsJXrip7qUp0SLLyFzwdsaNzjWRkqlZfckNQhAmo7WIlYgyXtSs4/qU78AvWoj
|
||||||
|
vQf+ry4g7nFp+Gaw8wBejS8qN7kUpr/IJS4b9IZYlDMrhfkIOkieSUJmWjcQEFtQ
|
||||||
|
LvYG0P6GFw2d9d3Lq5I53thXnQ1+FLdh5bzcYgAijCPfkNQ4ARgjlsZ+6MheyP2k
|
||||||
|
skeHAk8=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/jf.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/jf.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
22:7a:b3:cb:88:05:00:8c:df:af:02:be:af:63:f9:59
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Feb 20 22:37:46 2023 GMT
|
||||||
|
Not After : May 25 22:37:46 2025 GMT
|
||||||
|
Subject: CN=jf
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:8d:38:ea:4f:29:bd:83:a9:33:a3:1c:33:8a:60:
|
||||||
|
8f:fa:19:81:00:73:44:81:98:1e:76:05:ee:f6:46:
|
||||||
|
d5:25:a8:c5:3b:bd:d6:fa:cf:c6:79:e0:b4:42:27:
|
||||||
|
80:e2:96:2d:30:50:c2:f6:9c:2c:13:f8:b9:46:b3:
|
||||||
|
0d:96:6c:9b:d2:45:15:a3:f0:4c:bc:6b:51:45:f8:
|
||||||
|
cb:59:04:b1:d0:47:b9:90:06:71:c7:eb:34:32:e2:
|
||||||
|
72:14:84:94:58:e3:34
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
C5:CE:72:8F:A3:8E:13:57:DD:0E:02:A1:24:F1:56:C3:AE:2F:65:8F
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
3b:e8:1a:3e:ac:17:17:49:7c:4d:73:55:39:e9:1b:e4:d6:7f:
|
||||||
|
6d:6d:43:6c:e2:79:41:f4:26:a4:2d:18:59:24:a0:b1:e0:db:
|
||||||
|
03:07:f9:fb:24:f6:be:ed:8c:31:3e:c7:bb:74:b6:87:ba:43:
|
||||||
|
fc:d6:fb:2f:9f:1c:eb:d1:27:ad:60:eb:ab:87:c7:46:fe:22:
|
||||||
|
75:c1:bb:fb:23:ad:ba:1d:ab:41:45:29:d6:c4:89:99:94:40:
|
||||||
|
06:c7:3a:08:fe:d3:b5:f4:e7:52:57:aa:d1:a8:ec:74:e6:c9:
|
||||||
|
ec:9e:80:e0:ba:92:92:95:55:2e:d7:b2:d8:09:ee:72:fd:12:
|
||||||
|
ac:0a:0d:dc:ba:ac:4e:34:8c:37:19:76:60:7c:bd:ba:99:b7:
|
||||||
|
e5:47:c3:4b:67:2f:a9:5c:89:95:70:2d:2c:97:45:04:64:15:
|
||||||
|
47:04:d1:48:7d:d8:40:63:6c:05:8b:dc:ed:0f:a3:ae:3a:e8:
|
||||||
|
6f:49:34:54:de:99:4b:aa:28:6d:c9:3d:db:43:60:14:40:d5:
|
||||||
|
09:87:a8:b2:88:11:4c:8c:00:71:b1:38:25:91:5f:2f:93:7b:
|
||||||
|
42:64:38:db:d2:59:48:e8:ed:2e:92:69:4e:d4:2a:3b:e3:03:
|
||||||
|
94:2c:fc:ac:bc:ff:a9:b4:1e:ca:d3:d2:b5:fd:bf:33:bd:55:
|
||||||
|
12:75:db:f1
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICnjCCAYagAwIBAgIQInqzy4gFAIzfrwK+r2P5WTANBgkqhkiG9w0BAQsFADAU
|
||||||
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwMjIwMjIzNzQ2WhcNMjUwNTI1MjIz
|
||||||
|
NzQ2WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABI046k8p
|
||||||
|
vYOpM6McM4pgj/oZgQBzRIGYHnYF7vZG1SWoxTu91vrPxnngtEIngOKWLTBQwvac
|
||||||
|
LBP4uUazDZZsm9JFFaPwTLxrUUX4y1kEsdBHuZAGccfrNDLichSElFjjNKOBoDCB
|
||||||
|
nTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTFznKPo44TV90OAqEk8VbDri9ljzBPBgNV
|
||||||
|
HSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZf
|
||||||
|
c2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEFBQcD
|
||||||
|
AjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBADvoGj6sFxdJfE1zVTnp
|
||||||
|
G+TWf21tQ2zieUH0JqQtGFkkoLHg2wMH+fsk9r7tjDE+x7t0toe6Q/zW+y+fHOvR
|
||||||
|
J61g66uHx0b+InXBu/sjrbodq0FFKdbEiZmUQAbHOgj+07X051JXqtGo7HTmyeye
|
||||||
|
gOC6kpKVVS7XstgJ7nL9EqwKDdy6rE40jDcZdmB8vbqZt+VHw0tnL6lciZVwLSyX
|
||||||
|
RQRkFUcE0Uh92EBjbAWL3O0Po6466G9JNFTemUuqKG3JPdtDYBRA1QmHqLKIEUyM
|
||||||
|
AHGxOCWRXy+Te0JkONvSWUjo7S6SaU7UKjvjA5Qs/Ky8/6m0HsrT0rX9vzO9VRJ1
|
||||||
|
2/E=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/pascal.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/pascal.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
a6:7f:64:22:94:22:4a:39:b9:48:25:9b:99:9d:ae:a7
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Mar 17 19:30:32 2023 GMT
|
||||||
|
Not After : Jun 19 19:30:32 2025 GMT
|
||||||
|
Subject: CN=pascal
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:6e:d7:fc:29:a8:23:70:28:49:70:82:f4:1a:4f:
|
||||||
|
fc:e8:5a:d3:10:84:ef:0a:59:d9:3e:31:2e:5f:91:
|
||||||
|
8b:97:7e:32:c5:e4:9a:b1:df:8b:66:82:f7:a5:5a:
|
||||||
|
6d:90:ba:4d:4b:75:4e:1b:09:37:3b:23:5b:df:b8:
|
||||||
|
08:89:c7:a0:d6:3b:fa:3e:f8:b1:08:18:a6:ee:25:
|
||||||
|
02:25:b2:c5:43:ee:f5:03:82:9e:39:a0:82:d0:23:
|
||||||
|
49:eb:fe:be:3e:8f:7a
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
8E:E1:F2:13:12:D0:E0:C4:29:EA:29:E4:3D:94:2B:EC:0D:04:8F:BC
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
7d:0b:3f:f6:58:09:f2:8a:8d:0e:1e:50:c9:e8:31:f0:8f:0a:
|
||||||
|
f5:65:66:55:d3:dd:2c:5d:42:d4:0f:a5:02:ed:6a:77:e1:1d:
|
||||||
|
39:c5:46:1c:a5:38:17:89:13:f1:cd:eb:ff:b8:a5:3d:e9:85:
|
||||||
|
6f:d2:96:9b:f4:a1:09:6c:1b:84:40:70:19:2b:e1:ac:91:c2:
|
||||||
|
df:bf:09:a4:4f:c4:31:44:fe:2b:a5:60:38:97:a8:b3:01:aa:
|
||||||
|
39:43:74:90:b5:c6:fc:85:63:26:9f:7f:54:ba:de:4a:b1:ae:
|
||||||
|
6d:85:00:35:4d:15:9f:9d:10:f4:bf:bb:67:45:7e:c6:ab:ee:
|
||||||
|
7e:ad:92:4a:b4:e8:76:65:be:94:40:5a:67:83:ab:6c:d9:f9:
|
||||||
|
7d:40:bd:70:87:1f:14:4d:eb:56:50:a5:c3:7e:4a:b3:42:b5:
|
||||||
|
95:fe:f8:7f:9b:c6:c0:81:04:62:fd:94:ef:da:dd:17:01:a0:
|
||||||
|
93:14:80:31:5a:a2:fa:c7:8c:2d:7c:df:8b:40:d5:5c:ce:5f:
|
||||||
|
a8:9f:9f:48:4f:49:49:dc:cc:37:7e:f7:55:84:74:8a:cd:68:
|
||||||
|
15:60:8b:e8:4a:75:3e:83:cb:33:be:45:e1:a1:76:52:1a:b9:
|
||||||
|
09:34:38:af:6e:af:98:e3:6d:ed:c2:24:97:de:08:83:6b:d5:
|
||||||
|
45:9e:91:3a
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICozCCAYugAwIBAgIRAKZ/ZCKUIko5uUglm5mdrqcwDQYJKoZIhvcNAQELBQAw
|
||||||
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDMxNzE5MzAzMloXDTI1MDYxOTE5
|
||||||
|
MzAzMlowETEPMA0GA1UEAwwGcGFzY2FsMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
||||||
|
btf8KagjcChJcIL0Gk/86FrTEITvClnZPjEuX5GLl34yxeSasd+LZoL3pVptkLpN
|
||||||
|
S3VOGwk3OyNb37gIiceg1jv6PvixCBim7iUCJbLFQ+71A4KeOaCC0CNJ6/6+Po96
|
||||||
|
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFI7h8hMS0ODEKeop5D2UK+wNBI+8
|
||||||
|
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
||||||
|
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
||||||
|
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAfQs/9lgJ8oqN
|
||||||
|
Dh5Qyegx8I8K9WVmVdPdLF1C1A+lAu1qd+EdOcVGHKU4F4kT8c3r/7ilPemFb9KW
|
||||||
|
m/ShCWwbhEBwGSvhrJHC378JpE/EMUT+K6VgOJeoswGqOUN0kLXG/IVjJp9/VLre
|
||||||
|
SrGubYUANU0Vn50Q9L+7Z0V+xqvufq2SSrTodmW+lEBaZ4OrbNn5fUC9cIcfFE3r
|
||||||
|
VlClw35Ks0K1lf74f5vGwIEEYv2U79rdFwGgkxSAMVqi+seMLXzfi0DVXM5fqJ+f
|
||||||
|
SE9JSdzMN373VYR0is1oFWCL6Ep1PoPLM75F4aF2Uhq5CTQ4r26vmONt7cIkl94I
|
||||||
|
g2vVRZ6ROg==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/remoteclient.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/remoteclient.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
d1:ae:61:45:8e:84:e3:8e:5b:92:3f:aa:bb:81:9d:59
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: Feb 23 20:30:31 2023 GMT
|
||||||
|
Not After : May 28 20:30:31 2025 GMT
|
||||||
|
Subject: CN=remoteclient
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:65:e9:86:35:01:c3:d7:0e:16:3d:89:90:3c:cb:
|
||||||
|
a0:5f:d2:04:f7:b6:32:84:1e:a0:dc:6a:1d:16:a0:
|
||||||
|
6f:47:a3:b5:7d:4c:39:bd:d0:70:18:34:e8:16:67:
|
||||||
|
d4:5b:4c:ca:ce:ea:f0:75:5f:55:72:09:4b:f5:dd:
|
||||||
|
80:f1:d5:db:e6:26:09:e4:34:3b:ca:89:f3:3a:40:
|
||||||
|
91:31:14:c6:ff:06:8d:8e:f9:ba:8f:47:df:40:41:
|
||||||
|
f4:6b:84:f8:e5:e8:70
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
23:F8:BF:EB:8E:A3:77:B3:2B:6A:FA:16:7A:39:B2:C2:47:31:9F:76
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
27:af:ff:e0:98:8e:d1:6c:39:d7:40:97:df:ea:5a:fc:57:31:
|
||||||
|
a2:92:0c:d3:4c:4b:74:22:9e:47:01:9b:0f:e0:a4:6c:dc:ef:
|
||||||
|
14:b7:93:0f:99:93:ec:c9:96:dc:51:58:d3:ac:eb:f1:10:48:
|
||||||
|
ba:96:54:25:32:2a:89:66:cb:ca:13:b4:75:cc:4e:2a:5d:7c:
|
||||||
|
bb:b9:15:28:c0:32:59:f0:66:e5:fe:d8:14:14:2c:fb:df:6e:
|
||||||
|
1e:b6:53:c9:f0:77:68:54:b9:21:4b:0c:a4:d6:bc:4d:c2:a3:
|
||||||
|
de:d0:9f:ef:67:68:3e:c6:d4:da:d5:6c:92:80:cf:2e:8d:04:
|
||||||
|
59:c8:39:9f:22:4a:04:28:3e:e8:cf:02:73:73:a6:59:d4:e5:
|
||||||
|
9c:77:55:41:00:5c:c2:23:61:df:44:5c:ad:a8:bc:15:57:2d:
|
||||||
|
ae:89:99:a7:33:8f:d3:75:02:21:91:f6:38:34:23:68:70:8f:
|
||||||
|
99:0f:53:27:6d:52:9a:9b:f3:62:cf:20:bc:f5:91:41:78:fc:
|
||||||
|
92:09:2f:3e:bb:2d:9b:69:39:7f:c4:b1:a8:62:64:27:3f:27:
|
||||||
|
2d:16:c4:3e:0d:51:c9:f7:4f:40:f0:fd:55:a9:44:36:31:59:
|
||||||
|
b7:08:6a:3c:28:31:8a:43:c0:b9:05:44:75:48:6d:94:24:c6:
|
||||||
|
b2:fc:f7:33
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICqTCCAZGgAwIBAgIRANGuYUWOhOOOW5I/qruBnVkwDQYJKoZIhvcNAQELBQAw
|
||||||
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMzIwMzAzMVoXDTI1MDUyODIw
|
||||||
|
MzAzMVowFzEVMBMGA1UEAwwMcmVtb3RlY2xpZW50MHYwEAYHKoZIzj0CAQYFK4EE
|
||||||
|
ACIDYgAEZemGNQHD1w4WPYmQPMugX9IE97YyhB6g3GodFqBvR6O1fUw5vdBwGDTo
|
||||||
|
FmfUW0zKzurwdV9VcglL9d2A8dXb5iYJ5DQ7yonzOkCRMRTG/waNjvm6j0ffQEH0
|
||||||
|
a4T45ehwo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFCP4v+uOo3ezK2r6Fno5
|
||||||
|
ssJHMZ92ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||||
|
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||||
|
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAJ6//
|
||||||
|
4JiO0Ww510CX3+pa/FcxopIM00xLdCKeRwGbD+CkbNzvFLeTD5mT7MmW3FFY06zr
|
||||||
|
8RBIupZUJTIqiWbLyhO0dcxOKl18u7kVKMAyWfBm5f7YFBQs+99uHrZTyfB3aFS5
|
||||||
|
IUsMpNa8TcKj3tCf72doPsbU2tVskoDPLo0EWcg5nyJKBCg+6M8Cc3OmWdTlnHdV
|
||||||
|
QQBcwiNh30Rcrai8FVctromZpzOP03UCIZH2ODQjaHCPmQ9TJ21SmpvzYs8gvPWR
|
||||||
|
QXj8kgkvPrstm2k5f8SxqGJkJz8nLRbEPg1RyfdPQPD9ValENjFZtwhqPCgxikPA
|
||||||
|
uQVEdUhtlCTGsvz3Mw==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
71
OpenVPN/CA Server/easy-rsa/pki/issued/stationKA2401.crt
Normal file
71
OpenVPN/CA Server/easy-rsa/pki/issued/stationKA2401.crt
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
Certificate:
|
||||||
|
Data:
|
||||||
|
Version: 3 (0x2)
|
||||||
|
Serial Number:
|
||||||
|
78:5e:57:99:93:be:f2:47:da:cc:6c:8e:0d:71:3d:f8
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Issuer: CN=JF_server
|
||||||
|
Validity
|
||||||
|
Not Before: May 5 13:33:22 2024 GMT
|
||||||
|
Not After : Aug 8 13:33:22 2026 GMT
|
||||||
|
Subject: CN=stationKA2401
|
||||||
|
Subject Public Key Info:
|
||||||
|
Public Key Algorithm: id-ecPublicKey
|
||||||
|
Public-Key: (384 bit)
|
||||||
|
pub:
|
||||||
|
04:8f:4f:26:6b:af:cb:49:0b:74:3e:65:aa:0e:9a:
|
||||||
|
9a:57:99:b1:f6:bf:dc:74:ae:d6:72:ed:d3:a8:04:
|
||||||
|
2f:a8:a0:43:63:f6:c8:e2:cd:dc:d8:fd:bf:69:93:
|
||||||
|
09:d7:bd:11:ab:d9:c5:ae:20:bc:00:ac:d7:ad:ea:
|
||||||
|
fb:c0:1e:44:6f:ba:20:63:9d:32:f7:38:8f:c0:d7:
|
||||||
|
bf:b4:23:15:16:4d:84:59:13:d5:4b:de:9e:7b:46:
|
||||||
|
d3:ce:ba:5d:d9:53:c4
|
||||||
|
ASN1 OID: secp384r1
|
||||||
|
NIST CURVE: P-384
|
||||||
|
X509v3 extensions:
|
||||||
|
X509v3 Basic Constraints:
|
||||||
|
CA:FALSE
|
||||||
|
X509v3 Subject Key Identifier:
|
||||||
|
68:18:F5:54:75:30:27:4D:B5:96:D3:34:8E:1C:3B:58:1E:BC:1B:78
|
||||||
|
X509v3 Authority Key Identifier:
|
||||||
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
|
DirName:/CN=JF_server
|
||||||
|
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||||
|
X509v3 Extended Key Usage:
|
||||||
|
TLS Web Client Authentication
|
||||||
|
X509v3 Key Usage:
|
||||||
|
Digital Signature
|
||||||
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
|
Signature Value:
|
||||||
|
67:97:34:79:07:29:c3:cd:a6:7c:86:82:aa:94:0b:ca:69:ef:
|
||||||
|
79:5e:a6:35:97:c3:31:07:9f:cd:aa:89:95:e3:b1:26:4b:e9:
|
||||||
|
88:50:1f:3e:10:eb:d2:82:c5:6e:56:18:1e:ff:72:60:c1:de:
|
||||||
|
11:af:b8:e6:b6:bb:de:7d:52:f5:ba:1b:9b:4e:49:b2:05:25:
|
||||||
|
0a:e9:8a:f8:85:f7:0e:c8:db:fd:c4:b9:e9:a9:6f:85:0a:cb:
|
||||||
|
63:a3:d0:a7:77:e0:7f:ff:34:29:90:80:66:a7:8d:80:6a:bf:
|
||||||
|
23:74:80:77:ad:53:2d:5e:f6:02:d1:05:3f:9f:fa:17:11:8f:
|
||||||
|
7f:b4:a5:44:74:2b:57:1e:4b:7e:29:c8:95:48:a6:3a:fc:ae:
|
||||||
|
82:c2:7b:b2:26:4f:92:d5:af:73:71:30:8e:b6:b9:6a:f2:b0:
|
||||||
|
00:df:44:a2:3f:cd:4a:45:7e:ed:43:4b:d4:0e:07:25:94:37:
|
||||||
|
e0:5d:8d:0b:1b:fb:76:07:d0:41:da:c9:f3:19:fa:28:8b:46:
|
||||||
|
df:5a:19:82:ee:1e:e0:1a:be:39:c1:a9:65:b1:02:92:32:96:
|
||||||
|
2c:7e:3f:4e:ce:9e:b0:66:57:b4:74:2c:98:de:13:da:b2:27:
|
||||||
|
e5:7a:5b:30:df:3e:46:1b:6c:92:53:6f:c6:0e:88:6f:0d:ae:
|
||||||
|
89:ca:ea:ea
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICqTCCAZGgAwIBAgIQeF5XmZO+8kfazGyODXE9+DANBgkqhkiG9w0BAQsFADAU
|
||||||
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjQwNTA1MTMzMzIyWhcNMjYwODA4MTMz
|
||||||
|
MzIyWjAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNDAxMHYwEAYHKoZIzj0CAQYFK4EE
|
||||||
|
ACIDYgAEj08ma6/LSQt0PmWqDpqaV5mx9r/cdK7Wcu3TqAQvqKBDY/bI4s3c2P2/
|
||||||
|
aZMJ170Rq9nFriC8AKzXrer7wB5Eb7ogY50y9ziPwNe/tCMVFk2EWRPVS96ee0bT
|
||||||
|
zrpd2VPEo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFGgY9VR1MCdNtZbTNI4c
|
||||||
|
O1gevBt4ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||||
|
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||||
|
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAZ5c0
|
||||||
|
eQcpw82mfIaCqpQLymnveV6mNZfDMQefzaqJleOxJkvpiFAfPhDr0oLFblYYHv9y
|
||||||
|
YMHeEa+45ra73n1S9bobm05JsgUlCumK+IX3Dsjb/cS56alvhQrLY6PQp3fgf/80
|
||||||
|
KZCAZqeNgGq/I3SAd61TLV72AtEFP5/6FxGPf7SlRHQrVx5LfinIlUimOvyugsJ7
|
||||||
|
siZPktWvc3Ewjra5avKwAN9Eoj/NSkV+7UNL1A4HJZQ34F2NCxv7dgfQQdrJ8xn6
|
||||||
|
KItG31oZgu4e4Bq+OcGpZbECkjKWLH4/Ts6esGZXtHQsmN4T2rIn5XpbMN8+Rhts
|
||||||
|
klNvxg6Ibw2uicrq6g==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/DO_server.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/DO_server.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBDDCBkwIBADAUMRIwEAYDVQQDDAlET19zZXJ2ZXIwdjAQBgcqhkjOPQIBBgUr
|
||||||
|
gQQAIgNiAAQuCojiA60UOu4AUZY+9ewky9ZbjdZdD9+SCJcZ27CNwp3WxqJZLpTU
|
||||||
|
2dAQ+M3ZPJCA6GGImr6s+M7SRH8hmP/XU0gm1hhvjw1h0zb2IDAYZ2Zh9yXa7nb1
|
||||||
|
qxbL/UBSlTygADAKBggqhkjOPQQDBANoADBlAjBre9V6PcQqQZs3zymemhYWPiJp
|
||||||
|
CCXGC4I8MOnjVlSdeCgl2SKvxRx+87Ywvr1o8hQCMQCPuQ+ntCc1yCGOJ9JlDCE0
|
||||||
|
rxa71Os35Ma78TK+vuW/bv1zrTSoHxgJpCrnJS0V21o=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/Otarcik202501.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/Otarcik202501.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBEDCBlwIBADAYMRYwFAYDVQQDDA1PdGFyY2lrMjAyNTAxMHYwEAYHKoZIzj0C
|
||||||
|
AQYFK4EEACIDYgAEQJBHidjsciCVwPuNtxD8Uh2brcFlkeRF1Q8CsDGOVbf6MZqm
|
||||||
|
Wh/ghc3iIZ08lX+tgPLRY+dBfeSHl36k0efSyT07Zp9S/hFy09feufdB1XsyKwGU
|
||||||
|
THHL/2V2Zz6uGk5PoAAwCgYIKoZIzj0EAwQDaAAwZQIwRKy3o/Z419Oh8JHDBhEM
|
||||||
|
x4EAhdueoKp+PK5nKQ1FdI+TbwYSGEgoCpc5bjQB0TkVAjEAnV9R90TWM+kSr+R3
|
||||||
|
XUkUyfdkukpHyRMmH7HINp/hDf2idPQHdpm+y4CgtNpmTShp
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBFDCBmwIBADAcMRowGAYDVQQDDBFlZGdlcm91dGVyY2hhbWJseTB2MBAGByqG
|
||||||
|
SM49AgEGBSuBBAAiA2IABA79HGCDX6dkeaA1dN/AY2jFPLEClalzWKmjdMzYW9h6
|
||||||
|
q6rTH0EtaIa9L+Nsc7XoAXO0EvRx3d3Lm06w8dQEANFgz/7qPKXyru6qRaMhceXS
|
||||||
|
t/AiMMTUJ1h5lmzwXLqWGaAAMAoGCCqGSM49BAMEA2gAMGUCMCvrCc8hUdJ+NdGi
|
||||||
|
64TnDwHJ9Kl1HDBmW3fxYJzjXzBAY8ZhgLuw2Bn4GqIUYtdhqgIxAM5GStvPR0iy
|
||||||
|
Qp7iXmjAhg15YQL2hm/qckmm3S7SwMGMKqZkQvBk/XafYZe8VajM0Q==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/fred.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/fred.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBCDCBjgIBADAPMQ0wCwYDVQQDDARmcmVkMHYwEAYHKoZIzj0CAQYFK4EEACID
|
||||||
|
YgAEPnjvJtmHu4sIR/4VrZau9JPx2M7jBdKWRvz2R8msQfUBG+MlYfTub40T3asb
|
||||||
|
2AKFo/tSPQLYrQvt4wKIx+sGUsolrIus61JMQ1L5wIz0SOpypib3XwKWl60QrG3I
|
||||||
|
07EooAAwCgYIKoZIzj0EAwQDaQAwZgIxAJmONNtX7d0nhO1ExxBRWzyjsripBfo2
|
||||||
|
pzMXN/wL70YmZ/JiVDB9FcZGKCGkqxGPUAIxAJQ766zGfSReyVeBWWkzZJQvhU7o
|
||||||
|
RNP2pIhWmCneLhb0hkiIxkgNm/ZQmHD1WCuT3w==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/jf.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/jf.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBBjCBjAIBADANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IA
|
||||||
|
BI046k8pvYOpM6McM4pgj/oZgQBzRIGYHnYF7vZG1SWoxTu91vrPxnngtEIngOKW
|
||||||
|
LTBQwvacLBP4uUazDZZsm9JFFaPwTLxrUUX4y1kEsdBHuZAGccfrNDLichSElFjj
|
||||||
|
NKAAMAoGCCqGSM49BAMEA2kAMGYCMQCavWzeG/WWhQ6wkIJC72oie/5xCwYGrlSP
|
||||||
|
b4ijDgJlmyQfy920wbDcTLWFJ26lpeYCMQC2FDVLQ+AjZnsWvVkPWl2j10VfRQxF
|
||||||
|
lPJnbb+ajusWy7qLdOFeLWVKeQCYL2s1aMc=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/pascal.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/pascal.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBCTCBkAIBADARMQ8wDQYDVQQDDAZwYXNjYWwwdjAQBgcqhkjOPQIBBgUrgQQA
|
||||||
|
IgNiAARu1/wpqCNwKElwgvQaT/zoWtMQhO8KWdk+MS5fkYuXfjLF5Jqx34tmgvel
|
||||||
|
Wm2Quk1LdU4bCTc7I1vfuAiJx6DWO/o++LEIGKbuJQIlssVD7vUDgp45oILQI0nr
|
||||||
|
/r4+j3qgADAKBggqhkjOPQQDBANoADBlAjEA4IhMIxWjsYamRn2jr0X0Z2ilUyC6
|
||||||
|
IaPo9mE7gLQNxvvNlksKBlrIcOMoqp4RX58mAjAqGNEb63KjrKwaCVzbjiF4h4dg
|
||||||
|
c3PYjObVjwTwWQKSNHReGrqhgjCcrcAbK5pdofs=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/remoteclient.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/remoteclient.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBEDCBlgIBADAXMRUwEwYDVQQDDAxyZW1vdGVjbGllbnQwdjAQBgcqhkjOPQIB
|
||||||
|
BgUrgQQAIgNiAARl6YY1AcPXDhY9iZA8y6Bf0gT3tjKEHqDcah0WoG9Ho7V9TDm9
|
||||||
|
0HAYNOgWZ9RbTMrO6vB1X1VyCUv13YDx1dvmJgnkNDvKifM6QJExFMb/Bo2O+bqP
|
||||||
|
R99AQfRrhPjl6HCgADAKBggqhkjOPQQDBANpADBmAjEAorG1junRTCsKjo5zCAi/
|
||||||
|
VCT/LtoDyb3xpxDaTFX33WCB77AFc5m4PZ8w43sldxHQAjEAutGviIFXdGI/HM0g
|
||||||
|
Q7lGg4ch2v0y6SbZA7Fphp5FX1w/8uR7lvMBOSCE3KbnS5on
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
8
OpenVPN/CA Server/easy-rsa/pki/reqs/stationKA2401.req
Normal file
8
OpenVPN/CA Server/easy-rsa/pki/reqs/stationKA2401.req
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBDzCBlwIBADAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNDAxMHYwEAYHKoZIzj0C
|
||||||
|
AQYFK4EEACIDYgAEj08ma6/LSQt0PmWqDpqaV5mx9r/cdK7Wcu3TqAQvqKBDY/bI
|
||||||
|
4s3c2P2/aZMJ170Rq9nFriC8AKzXrer7wB5Eb7ogY50y9ziPwNe/tCMVFk2EWRPV
|
||||||
|
S96ee0bTzrpd2VPEoAAwCgYIKoZIzj0EAwQDZwAwZAIwMhPuY2cvcd/nxcmEJjqV
|
||||||
|
5H+FLyOW+xTOFIF2EIptJqMw2fUt8xFg1A6S/m7FNG/nAjAVTYLqYdy7xw/o7Lz8
|
||||||
|
v5nTfxE1n2YsApc9ZmnrZOMiDPdWLMV5U8t+b3Vn574Tetc=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
c6:8a:f6:d0:0c:af:91:e6:de:c9:7c:69:ab:c7:51:61
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:03:32 2025 GMT
|
|
||||||
Not After : May 19 19:03:32 2055 GMT
|
|
||||||
Subject: CN=DO_server
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:ed:69:aa:97:e7:07:67:8a:59:7f:70:79:ff:34:
|
|
||||||
89:5d:ce:41:2e:94:7a:00:cc:73:38:70:09:b3:b1:
|
|
||||||
84:63:83:c2:74:73:b5:16:26:13:8d:67:1e:27:25:
|
|
||||||
ec:8f:52:81:b9:55:a2:e4:68:11:5f:e5:04:16:11:
|
|
||||||
18:b1:f9:9f:cc:96:28:fa:98:01:8e:2d:a6:cb:f8:
|
|
||||||
92:27:e7:e7:a5:68:05:26:e9:0a:3c:b3:ef:0c:c1:
|
|
||||||
40:1c:10:60:40:0d:5d
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
CA:37:30:A5:B6:6B:08:68:52:55:72:A2:44:E6:9A:53:38:5F:38:B7
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Server Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature, Key Encipherment
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
7b:e0:43:5f:e8:b1:dc:90:2b:b9:05:f2:25:87:22:f4:6b:54:
|
|
||||||
c6:2c:f1:e7:bd:a5:7a:1c:96:3e:63:1e:a9:6d:de:b8:3f:62:
|
|
||||||
10:43:ce:a5:99:01:a1:f0:17:c9:31:a8:d8:de:45:95:d6:c3:
|
|
||||||
c2:c1:5a:b0:19:d3:94:4b:35:0e:fa:95:41:72:f1:c1:3a:15:
|
|
||||||
d7:d4:c8:3e:86:68:e8:cb:d2:86:c1:bd:0f:79:76:ce:4a:18:
|
|
||||||
0f:49:68:ee:73:4f:e4:f9:ca:0c:f3:7e:e6:0d:ca:04:5a:89:
|
|
||||||
73:94:fb:79:22:b8:c5:ef:05:fe:e3:b3:35:cf:47:55:e2:c5:
|
|
||||||
54:03:f1:b2:e5:14:96:72:a0:6b:48:fc:5a:f8:04:83:52:8d:
|
|
||||||
08:dc:ad:c7:63:94:4a:6b:ca:39:ad:44:5d:08:5a:96:d5:3a:
|
|
||||||
76:ff:53:a9:19:9a:64:ae:6b:d7:10:a9:71:bb:90:ea:19:48:
|
|
||||||
4b:3a:99:4c:a1:64:33:8f:5e:58:f1:9a:3c:a4:43:19:0c:a9:
|
|
||||||
ff:d2:23:26:1e:b7:b4:0a:f7:3c:25:c7:3c:c7:b8:b5:4e:d5:
|
|
||||||
e1:59:74:ad:b4:8b:63:b9:d4:c2:24:cb:03:ac:34:07:6e:80:
|
|
||||||
30:a3:07:dd:ef:7a:c2:1a:98:58:66:02:a7:ab:d7:ee:64:95:
|
|
||||||
74:e9:aa:75
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqDCCAZCgAwIBAgIRAMaK9tAMr5Hm3sl8aavHUWEwDQYJKoZIhvcNAQENBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MDMzMloYDzIwNTUwNTE5
|
|
||||||
MTkwMzMyWjAUMRIwEAYDVQQDDAlET19zZXJ2ZXIwdjAQBgcqhkjOPQIBBgUrgQQA
|
|
||||||
IgNiAATtaaqX5wdnill/cHn/NIldzkEulHoAzHM4cAmzsYRjg8J0c7UWJhONZx4n
|
|
||||||
JeyPUoG5VaLkaBFf5QQWERix+Z/Mlij6mAGOLabL+JIn5+elaAUm6Qo8s+8MwUAc
|
|
||||||
EGBADV2jgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUyjcwpbZrCGhSVXKiROaa
|
|
||||||
UzhfOLcwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQxEjAQ
|
|
||||||
BgNVBAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0lBAww
|
|
||||||
CgYIKwYBBQUHAwEwCwYDVR0PBAQDAgWgMA0GCSqGSIb3DQEBDQUAA4IBAQB74ENf
|
|
||||||
6LHckCu5BfIlhyL0a1TGLPHnvaV6HJY+Yx6pbd64P2IQQ86lmQGh8BfJMajY3kWV
|
|
||||||
1sPCwVqwGdOUSzUO+pVBcvHBOhXX1Mg+hmjoy9KGwb0PeXbOShgPSWjuc0/k+coM
|
|
||||||
837mDcoEWolzlPt5IrjF7wX+47M1z0dV4sVUA/Gy5RSWcqBrSPxa+ASDUo0I3K3H
|
|
||||||
Y5RKa8o5rURdCFqW1Tp2/1OpGZpkrmvXEKlxu5DqGUhLOplMoWQzj15Y8Zo8pEMZ
|
|
||||||
DKn/0iMmHre0Cvc8Jcc8x7i1TtXhWXSttItjudTCJMsDrDQHboAwowfd73rCGphY
|
|
||||||
ZgKnq9fuZJV06ap1
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBDDCBkwIBADAUMRIwEAYDVQQDDAlET19zZXJ2ZXIwdjAQBgcqhkjOPQIBBgUr
|
|
||||||
gQQAIgNiAATtaaqX5wdnill/cHn/NIldzkEulHoAzHM4cAmzsYRjg8J0c7UWJhON
|
|
||||||
Zx4nJeyPUoG5VaLkaBFf5QQWERix+Z/Mlij6mAGOLabL+JIn5+elaAUm6Qo8s+8M
|
|
||||||
wUAcEGBADV2gADAKBggqhkjOPQQDBANoADBlAjBjt6J7Dqsy4PiBBx1YqrVn5gWZ
|
|
||||||
3ON0zZtMdkmRoVikydg2G6vMULEEIVRljqvo1xgCMQDdGO3UljUiWxRWHViFycUG
|
|
||||||
QUwYhY/wasubzOv7Fnx6ZcBg29FXEh9txFcUlVHVpis=
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
ab:57:22:69:00:94:7d:2d:f2:86:c1:7c:f6:84:a4:d1
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:26:43 2025 GMT
|
|
||||||
Not After : May 19 19:26:43 2055 GMT
|
|
||||||
Subject: CN=fred
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:52:a0:c4:e8:7b:31:2c:fe:6a:e1:55:f0:94:5e:
|
|
||||||
70:d0:6e:43:6d:72:7b:7d:a2:f5:61:cf:68:e7:ef:
|
|
||||||
b7:e5:f0:2f:bd:76:26:4c:ce:f0:4e:bb:99:03:cf:
|
|
||||||
17:05:a9:3f:a2:0d:ed:6e:6f:3f:0f:08:f2:1b:68:
|
|
||||||
9e:e0:4d:38:5f:55:99:51:1b:ae:39:2e:1d:9f:78:
|
|
||||||
b1:58:52:5c:b5:1f:54:d6:c9:09:6d:4e:b5:9c:00:
|
|
||||||
c2:01:89:c7:27:94:ea
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
0F:E2:50:A5:9A:17:2B:87:71:11:CB:52:15:48:08:5B:72:F6:92:5E
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
1d:9a:07:1e:b0:5f:56:08:c3:a8:25:6a:54:2c:50:4d:98:b3:
|
|
||||||
f0:ab:39:ae:93:87:35:44:04:2c:ac:92:ea:a4:96:d3:10:77:
|
|
||||||
01:16:93:1e:b5:1d:5d:7f:98:c9:5d:2b:6d:03:97:e4:6b:38:
|
|
||||||
2e:3b:a9:00:5f:d4:34:11:fe:24:51:47:27:31:a3:60:b0:ce:
|
|
||||||
af:b3:87:95:eb:dd:4f:c5:88:18:db:60:9b:22:09:3d:73:53:
|
|
||||||
83:f6:31:a6:61:0f:60:e3:76:77:d7:be:a8:fa:01:5b:7d:53:
|
|
||||||
97:7e:25:9b:30:e6:34:52:ae:e7:0b:d1:0e:3a:69:8d:55:f8:
|
|
||||||
40:a4:4d:3c:2e:7b:40:06:8e:bf:ba:e5:46:30:d7:26:fa:49:
|
|
||||||
aa:bc:7d:3c:a8:89:84:28:0a:b4:7b:a8:51:f6:df:04:f8:63:
|
|
||||||
e8:a7:72:4e:d0:ae:45:23:91:7e:d3:a6:20:16:86:93:08:8f:
|
|
||||||
c0:83:ff:17:96:ff:63:9a:c9:0b:b8:cd:ff:05:ea:ef:33:2e:
|
|
||||||
78:e7:1e:86:23:0d:de:66:9d:74:d7:17:2e:9c:e2:a0:42:03:
|
|
||||||
9a:ed:ae:44:da:f5:a5:c1:36:56:9c:7d:eb:ca:dc:76:eb:62:
|
|
||||||
6e:fe:8f:dc:f5:eb:a1:72:9e:64:bd:2e:64:1b:62:e0:52:d0:
|
|
||||||
f9:ab:52:cf
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICozCCAYugAwIBAgIRAKtXImkAlH0t8obBfPaEpNEwDQYJKoZIhvcNAQENBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjY0M1oYDzIwNTUwNTE5
|
|
||||||
MTkyNjQzWjAPMQ0wCwYDVQQDDARmcmVkMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
|
||||||
UqDE6HsxLP5q4VXwlF5w0G5DbXJ7faL1Yc9o5++35fAvvXYmTM7wTruZA88XBak/
|
|
||||||
og3tbm8/DwjyG2ie4E04X1WZURuuOS4dn3ixWFJctR9U1skJbU61nADCAYnHJ5Tq
|
|
||||||
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFA/iUKWaFyuHcRHLUhVICFty9pJe
|
|
||||||
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
|
||||||
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
|
||||||
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQ0FAAOCAQEAHZoHHrBfVgjD
|
|
||||||
qCVqVCxQTZiz8Ks5rpOHNUQELKyS6qSW0xB3ARaTHrUdXX+YyV0rbQOX5Gs4Ljup
|
|
||||||
AF/UNBH+JFFHJzGjYLDOr7OHlevdT8WIGNtgmyIJPXNTg/YxpmEPYON2d9e+qPoB
|
|
||||||
W31Tl34lmzDmNFKu5wvRDjppjVX4QKRNPC57QAaOv7rlRjDXJvpJqrx9PKiJhCgK
|
|
||||||
tHuoUfbfBPhj6KdyTtCuRSORftOmIBaGkwiPwIP/F5b/Y5rJC7jN/wXq7zMueOce
|
|
||||||
hiMN3maddNcXLpzioEIDmu2uRNr1pcE2Vpx968rcdutibv6P3PXroXKeZL0uZBti
|
|
||||||
4FLQ+atSzw==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBBzCBjgIBADAPMQ0wCwYDVQQDDARmcmVkMHYwEAYHKoZIzj0CAQYFK4EEACID
|
|
||||||
YgAEUqDE6HsxLP5q4VXwlF5w0G5DbXJ7faL1Yc9o5++35fAvvXYmTM7wTruZA88X
|
|
||||||
Bak/og3tbm8/DwjyG2ie4E04X1WZURuuOS4dn3ixWFJctR9U1skJbU61nADCAYnH
|
|
||||||
J5TqoAAwCgYIKoZIzj0EAwQDaAAwZQIxAJm/Uds5rhrtrPD3t7789IcI2lEuzo8g
|
|
||||||
4hS86a/rDSZ5FI+IdRNJDqPYQRTuc2vtMQIwbWHqs/cEMIG6WIoJ3AzvVTfaP7NJ
|
|
||||||
68CzzVuC/g5ie/yZc5FbLWchBUiRNPxLSXzq
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
b7:43:9e:5a:80:04:ad:6f:3c:d2:82:9f:99:b4:55:0c
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:26:08 2025 GMT
|
|
||||||
Not After : May 19 19:26:08 2055 GMT
|
|
||||||
Subject: CN=jf
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:cb:cf:fb:cd:5a:b5:1c:e2:f6:1c:35:36:e4:6b:
|
|
||||||
29:06:48:0f:aa:e9:5b:2e:e3:f7:ca:5d:f4:01:97:
|
|
||||||
8c:09:fc:cb:5c:b9:96:3f:44:0b:7b:6b:6f:39:f3:
|
|
||||||
62:92:43:8d:31:15:ca:b3:80:f5:c3:1a:7b:7e:de:
|
|
||||||
ac:ba:5c:9f:26:f4:1c:d6:91:d0:59:4a:b2:5e:dc:
|
|
||||||
dc:94:0a:9d:24:29:b0:42:26:57:93:5e:e9:02:44:
|
|
||||||
ca:60:aa:86:99:2d:d1
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
D9:70:4D:CC:BF:72:8F:F4:6D:DD:20:85:2C:19:3B:6F:1E:97:EC:88
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
8e:56:20:a2:64:1f:bb:3c:fc:f4:4d:6a:30:f7:90:c0:84:03:
|
|
||||||
00:a1:d7:f4:57:93:b0:a2:78:fc:79:f4:29:46:22:79:f1:90:
|
|
||||||
80:e9:65:6d:c8:c7:54:c3:4f:38:fc:c4:b5:df:b5:7f:fd:20:
|
|
||||||
95:a3:be:d7:7c:89:58:a8:f0:84:b7:d4:17:4d:81:1c:fa:30:
|
|
||||||
bb:e7:6e:ce:1e:4c:da:5f:d4:ff:66:1e:c3:e5:cb:42:5e:dd:
|
|
||||||
02:a8:95:af:81:62:dd:9a:a1:48:1c:f1:1d:ae:4e:07:78:9d:
|
|
||||||
e0:5e:6b:2c:92:27:2a:53:3f:c3:eb:cb:62:24:f9:43:05:0f:
|
|
||||||
25:14:6f:2f:3f:ee:92:47:29:84:a4:76:c1:fb:c6:35:a6:eb:
|
|
||||||
cb:2b:a3:bc:1e:85:33:c3:0e:7e:5e:45:32:24:61:83:64:aa:
|
|
||||||
6b:23:a6:43:54:b6:6e:85:1c:14:09:f3:09:94:e9:af:49:5f:
|
|
||||||
86:99:93:de:e7:63:f7:30:a9:d6:74:7e:40:0c:6c:4d:51:f1:
|
|
||||||
ff:a0:41:b6:6f:db:1b:f2:03:36:22:7c:94:c5:b2:30:0d:66:
|
|
||||||
00:4e:0d:09:50:3e:02:8b:38:a5:30:e6:1b:76:29:58:2b:f9:
|
|
||||||
5e:b1:99:55:78:9e:65:93:fa:54:72:48:f4:3b:92:d2:c0:07:
|
|
||||||
68:01:bc:b1
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICoTCCAYmgAwIBAgIRALdDnlqABK1vPNKCn5m0VQwwDQYJKoZIhvcNAQENBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjYwOFoYDzIwNTUwNTE5
|
|
||||||
MTkyNjA4WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABMvP
|
|
||||||
+81atRzi9hw1NuRrKQZID6rpWy7j98pd9AGXjAn8y1y5lj9EC3trbznzYpJDjTEV
|
|
||||||
yrOA9cMae37erLpcnyb0HNaR0FlKsl7c3JQKnSQpsEImV5Ne6QJEymCqhpkt0aOB
|
|
||||||
oDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTZcE3Mv3KP9G3dIIUsGTtvHpfsiDBP
|
|
||||||
BgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJ
|
|
||||||
SkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEF
|
|
||||||
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQENBQADggEBAI5WIKJkH7s8/PRN
|
|
||||||
ajD3kMCEAwCh1/RXk7CiePx59ClGInnxkIDpZW3Ix1TDTzj8xLXftX/9IJWjvtd8
|
|
||||||
iVio8IS31BdNgRz6MLvnbs4eTNpf1P9mHsPly0Je3QKola+BYt2aoUgc8R2uTgd4
|
|
||||||
neBeayySJypTP8Pry2Ik+UMFDyUUby8/7pJHKYSkdsH7xjWm68sro7wehTPDDn5e
|
|
||||||
RTIkYYNkqmsjpkNUtm6FHBQJ8wmU6a9JX4aZk97nY/cwqdZ0fkAMbE1R8f+gQbZv
|
|
||||||
2xvyAzYifJTFsjANZgBODQlQPgKLOKUw5ht2KVgr+V6xmVV4nmWT+lRySPQ7ktLA
|
|
||||||
B2gBvLE=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBBTCBjAIBADANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IA
|
|
||||||
BMvP+81atRzi9hw1NuRrKQZID6rpWy7j98pd9AGXjAn8y1y5lj9EC3trbznzYpJD
|
|
||||||
jTEVyrOA9cMae37erLpcnyb0HNaR0FlKsl7c3JQKnSQpsEImV5Ne6QJEymCqhpkt
|
|
||||||
0aAAMAoGCCqGSM49BAMEA2gAMGUCMBAXAOJq9GamxmFoEgJTK5/LCoG9iOJYFMd7
|
|
||||||
/SvurAL593D6ke+JJAy8Ft8xWujXAAIxAPGOwqpNf5T3U92CWu2iYkDrNpQOx0Lv
|
|
||||||
AU+VnOYr67yUL6mziR8H38TIC5YqlBk3Rw==
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
b7:78:f3:d4:2a:58:b2:3b:23:0c:a9:70:43:45:de:fa
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:26:26 2025 GMT
|
|
||||||
Not After : May 19 19:26:26 2055 GMT
|
|
||||||
Subject: CN=pascal
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:03:0b:f5:f3:3a:02:fb:22:42:b1:5c:ab:74:8f:
|
|
||||||
43:78:3a:d0:b1:3d:97:8d:c0:9a:07:11:ee:d3:03:
|
|
||||||
22:d3:da:f3:04:a9:c0:bd:8f:ac:41:7d:91:09:07:
|
|
||||||
49:fc:1c:32:a5:9a:7d:fd:85:51:01:64:cb:3e:00:
|
|
||||||
d6:bc:c0:c8:ed:e9:47:64:5d:24:a4:4f:37:30:b2:
|
|
||||||
e8:c8:ed:75:55:87:7c:cb:01:52:ea:ac:a1:21:96:
|
|
||||||
06:a7:8f:86:b5:19:52
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
EC:EE:95:98:8B:6A:1F:DB:AB:49:CB:88:40:65:67:D6:3B:F3:F7:D7
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
4b:18:4a:f9:45:fb:ad:34:73:f2:4d:4f:f1:b9:fd:4a:c7:2a:
|
|
||||||
eb:a7:2c:e4:c5:3f:f0:e7:55:d6:d9:61:b9:2f:92:bb:f2:3e:
|
|
||||||
49:a8:ad:27:33:88:c1:ca:32:7a:33:4e:53:d0:4e:6f:30:c5:
|
|
||||||
59:c2:b7:1b:ef:36:48:06:80:a3:cf:da:b2:d1:46:3e:30:10:
|
|
||||||
a4:e8:7a:0d:e0:e0:fe:9d:24:fc:b0:b9:21:64:0b:c0:11:55:
|
|
||||||
6f:5e:75:d2:0a:18:15:7b:dd:40:00:a7:1c:bb:f4:90:29:1e:
|
|
||||||
6e:b1:3d:8e:14:d0:65:48:12:e6:7e:40:24:f9:72:5a:f4:70:
|
|
||||||
df:89:a9:1a:d2:12:21:9d:b0:00:d1:f7:35:20:f4:6e:3a:ad:
|
|
||||||
c1:72:29:06:a7:c8:4d:86:3d:a5:b5:a0:f5:9f:1f:44:4c:84:
|
|
||||||
ad:69:81:d8:f1:11:62:6f:0f:67:6e:4d:ef:1a:59:0c:6f:b3:
|
|
||||||
9d:95:b3:ef:3b:07:54:81:90:15:14:ce:0f:71:2c:b7:f8:39:
|
|
||||||
96:11:94:77:db:ce:55:96:c2:4a:cc:fe:c6:38:6e:58:0a:83:
|
|
||||||
8a:e6:ab:26:b4:ad:90:78:cc:0a:90:31:6b:66:ce:eb:ea:1d:
|
|
||||||
19:71:34:eb:25:61:a2:3f:5d:a0:0b:d3:4e:56:73:b6:14:5a:
|
|
||||||
09:0c:1d:1c
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICpTCCAY2gAwIBAgIRALd489QqWLI7IwypcENF3vowDQYJKoZIhvcNAQENBQAw
|
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjYyNloYDzIwNTUwNTE5
|
|
||||||
MTkyNjI2WjARMQ8wDQYDVQQDDAZwYXNjYWwwdjAQBgcqhkjOPQIBBgUrgQQAIgNi
|
|
||||||
AAQDC/XzOgL7IkKxXKt0j0N4OtCxPZeNwJoHEe7TAyLT2vMEqcC9j6xBfZEJB0n8
|
|
||||||
HDKlmn39hVEBZMs+ANa8wMjt6UdkXSSkTzcwsujI7XVVh3zLAVLqrKEhlganj4a1
|
|
||||||
GVKjgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7O6VmItqH9urScuIQGVn1jvz
|
|
||||||
99cwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQxEjAQBgNV
|
|
||||||
BAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0lBAwwCgYI
|
|
||||||
KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQBLGEr5Rfut
|
|
||||||
NHPyTU/xuf1KxyrrpyzkxT/w51XW2WG5L5K78j5JqK0nM4jByjJ6M05T0E5vMMVZ
|
|
||||||
wrcb7zZIBoCjz9qy0UY+MBCk6HoN4OD+nST8sLkhZAvAEVVvXnXSChgVe91AAKcc
|
|
||||||
u/SQKR5usT2OFNBlSBLmfkAk+XJa9HDfiaka0hIhnbAA0fc1IPRuOq3BcikGp8hN
|
|
||||||
hj2ltaD1nx9ETIStaYHY8RFibw9nbk3vGlkMb7OdlbPvOwdUgZAVFM4PcSy3+DmW
|
|
||||||
EZR3285VlsJKzP7GOG5YCoOK5qsmtK2QeMwKkDFrZs7r6h0ZcTTrJWGiP12gC9NO
|
|
||||||
VnO2FFoJDB0c
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBCjCBkAIBADARMQ8wDQYDVQQDDAZwYXNjYWwwdjAQBgcqhkjOPQIBBgUrgQQA
|
|
||||||
IgNiAAQDC/XzOgL7IkKxXKt0j0N4OtCxPZeNwJoHEe7TAyLT2vMEqcC9j6xBfZEJ
|
|
||||||
B0n8HDKlmn39hVEBZMs+ANa8wMjt6UdkXSSkTzcwsujI7XVVh3zLAVLqrKEhlgan
|
|
||||||
j4a1GVKgADAKBggqhkjOPQQDBANpADBmAjEA2FJFlVFqiHn5kb+IrxFkn8fCGC3v
|
|
||||||
QVlO01hca2mf5diyyUmmMTUtEtg3o7cf89pWAjEA0bKPNzw6v2F7a1B6c/ZcbPy2
|
|
||||||
uAYgUARFP38JYc0KyWNz/uT62JCFBrlwCw9Zitoh
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBDjCBlgIBADAXMRUwEwYDVQQDDAxyZW1vdGVjbGllbnQwdjAQBgcqhkjOPQIB
|
|
||||||
BgUrgQQAIgNiAASEnkviXj+VqmKiq7/31fePisZ4muC/1d7/oTEmEsMpJswWz3Lu
|
|
||||||
KvxyUuCbPg+9Fjgs20Og/jkKYf5ivt8645z5MjKetZvPMkVJAO18DkScYDaWJbhM
|
|
||||||
TMjD5HtU6PvnnvagADAKBggqhkjOPQQDBANnADBkAjAFNQm1L5teW52NHEm5Js8v
|
|
||||||
oVOG8mpk+2qvvdRg7h/HUR3Yzvzzz8txZVpRS/A9IfICMGHVE0yxgDz5YUlGCQH6
|
|
||||||
US5q3LixPUtDFNi2VlJt4X5WEM4Ofv6HSWLZcZsgldqNiQ==
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
66:08:5b:1b:f8:f4:1a:91:25:8d:57:e4:d1:eb:c9:02
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:53:27 2025 GMT
|
|
||||||
Not After : May 19 19:53:27 2055 GMT
|
|
||||||
Subject: CN=stationKA2401
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:82:a2:c4:54:2e:5f:18:b0:09:38:2e:88:52:6e:
|
|
||||||
23:10:f1:a3:d1:12:8c:33:e6:24:00:e8:03:18:12:
|
|
||||||
ff:11:d3:fb:38:7c:e7:85:12:94:11:ad:d4:41:67:
|
|
||||||
97:29:8e:07:fb:b6:b9:b2:80:ca:cc:d5:14:4d:a3:
|
|
||||||
2e:55:29:60:8a:9f:7d:50:a4:21:dc:e2:17:05:5c:
|
|
||||||
ca:c6:5d:8f:c4:a2:99:e2:2b:18:a7:69:a4:e4:26:
|
|
||||||
11:1c:f5:0e:a1:5e:a5
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
43:48:E4:77:19:BA:6E:C7:4A:98:98:A5:05:8B:DB:19:62:8B:47:33
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
66:0e:a7:15:99:98:0b:a7:bf:be:fa:c5:c6:c9:6e:d4:d0:18:
|
|
||||||
84:fd:ef:bc:33:98:db:8e:56:44:25:c9:7e:7d:d9:1b:00:95:
|
|
||||||
39:59:36:2e:b0:d1:2e:8f:cf:c8:c4:0e:47:7f:c9:21:01:18:
|
|
||||||
7f:8b:5a:16:30:97:c3:a3:bb:70:54:58:e2:55:97:71:e0:f7:
|
|
||||||
b3:47:bb:88:11:30:a4:b9:41:65:2b:b5:d7:1b:df:5e:df:66:
|
|
||||||
33:32:52:a7:92:83:2e:87:57:11:65:52:28:f5:16:06:92:ec:
|
|
||||||
39:24:20:c0:fb:b2:21:30:a6:87:b4:08:b9:7c:32:3c:3b:09:
|
|
||||||
36:2d:9c:e8:8b:47:f3:d8:58:10:44:b0:10:f4:dc:e1:d5:e7:
|
|
||||||
e6:7b:c6:51:0b:de:fc:ef:aa:d7:ee:3b:ec:55:11:2b:43:52:
|
|
||||||
24:4e:b4:56:0d:cf:25:33:05:67:ad:0a:3e:b4:b2:55:db:b9:
|
|
||||||
43:bf:24:87:8e:02:8e:50:7e:6a:35:ef:fb:89:b9:16:1f:6f:
|
|
||||||
c0:46:6a:7f:6c:8a:ea:94:2d:a5:62:04:f9:ee:fe:31:51:d9:
|
|
||||||
73:f9:b8:5c:83:3a:46:00:fa:4f:e7:44:e3:60:da:c8:cc:cd:
|
|
||||||
6b:18:55:27:6e:c9:38:e7:3b:7d:c8:a3:67:13:08:6a:67:18:
|
|
||||||
92:7d:7e:c9
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqzCCAZOgAwIBAgIQZghbG/j0GpEljVfk0evJAjANBgkqhkiG9w0BAQ0FADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI2MTk1MzI3WhgPMjA1NTA1MTkx
|
|
||||||
OTUzMjdaMBgxFjAUBgNVBAMMDXN0YXRpb25LQTI0MDEwdjAQBgcqhkjOPQIBBgUr
|
|
||||||
gQQAIgNiAASCosRULl8YsAk4LohSbiMQ8aPREowz5iQA6AMYEv8R0/s4fOeFEpQR
|
|
||||||
rdRBZ5cpjgf7trmygMrM1RRNoy5VKWCKn31QpCHc4hcFXMrGXY/EopniKxinaaTk
|
|
||||||
JhEc9Q6hXqWjgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUQ0jkdxm6bsdKmJil
|
|
||||||
BYvbGWKLRzMwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQx
|
|
||||||
EjAQBgNVBAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0l
|
|
||||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQBm
|
|
||||||
DqcVmZgLp7+++sXGyW7U0BiE/e+8M5jbjlZEJcl+fdkbAJU5WTYusNEuj8/IxA5H
|
|
||||||
f8khARh/i1oWMJfDo7twVFjiVZdx4PezR7uIETCkuUFlK7XXG99e32YzMlKnkoMu
|
|
||||||
h1cRZVIo9RYGkuw5JCDA+7IhMKaHtAi5fDI8Owk2LZzoi0fz2FgQRLAQ9Nzh1efm
|
|
||||||
e8ZRC97876rX7jvsVRErQ1IkTrRWDc8lMwVnrQo+tLJV27lDvySHjgKOUH5qNe/7
|
|
||||||
ibkWH2/ARmp/bIrqlC2lYgT57v4xUdlz+bhcgzpGAPpP50TjYNrIzM1rGFUnbsk4
|
|
||||||
5zt9yKNnEwhqZxiSfX7J
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBETCBlwIBADAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNDAxMHYwEAYHKoZIzj0C
|
|
||||||
AQYFK4EEACIDYgAEgqLEVC5fGLAJOC6IUm4jEPGj0RKMM+YkAOgDGBL/EdP7OHzn
|
|
||||||
hRKUEa3UQWeXKY4H+7a5soDKzNUUTaMuVSlgip99UKQh3OIXBVzKxl2PxKKZ4isY
|
|
||||||
p2mk5CYRHPUOoV6loAAwCgYIKoZIzj0EAwQDaQAwZgIxAO+GCyXJVu6aQS7T72qX
|
|
||||||
7nkgj5HyOKzLSo1AcO+BaUiVUTEeMAuoVejbXRBO/VYxzgIxAK/yU2EupeCv51hR
|
|
||||||
vbIih0lu5siEzKOGR1LtB/JtPjDwj/64cTwn1HsijWhPGrmXmA==
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
09:c8:7d:2d:3b:1f:85:c2:1b:4e:a6:df:24:2b:98:cd
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 27 18:51:42 2025 GMT
|
|
||||||
Not After : May 20 18:51:42 2055 GMT
|
|
||||||
Subject: CN=stationKA2501
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:4f:cf:df:9f:3a:ca:37:5b:71:71:5a:50:8c:39:
|
|
||||||
73:a7:2f:04:16:c6:66:81:72:70:89:b6:ba:58:06:
|
|
||||||
83:54:58:37:19:74:f8:a5:42:70:41:1b:c1:eb:59:
|
|
||||||
26:5a:aa:ed:1b:7a:af:0e:c5:2a:3f:26:6e:3d:53:
|
|
||||||
28:6d:2e:b6:c6:4e:9c:73:d3:c5:2b:96:10:b4:2e:
|
|
||||||
f4:e5:06:b7:ca:cd:c7:72:20:b5:07:05:84:17:64:
|
|
||||||
4e:cb:f5:4f:51:b3:c7
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
9E:36:BB:6F:4C:C7:DE:80:C4:CB:11:AC:4B:C8:C2:11:26:0B:64:83
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
26:a0:0c:57:fb:39:8b:25:ee:0d:a0:23:f3:c8:67:27:b4:bb:
|
|
||||||
f9:f1:10:e1:7e:80:a7:04:f6:19:ca:b8:a2:b4:f5:db:d6:64:
|
|
||||||
5d:7f:fc:fb:58:6b:02:1a:2c:b4:df:f3:1d:33:bc:c4:8e:f9:
|
|
||||||
5c:70:0f:07:e1:51:99:17:62:2e:7d:a2:69:46:c7:ee:d8:d3:
|
|
||||||
ee:9b:aa:d0:d5:9d:90:ae:3d:26:83:51:30:73:24:4d:6c:67:
|
|
||||||
4f:f2:4c:8f:e8:b7:34:94:85:c0:4e:0e:01:5a:16:0c:44:ca:
|
|
||||||
29:f9:02:de:e0:93:38:d3:d7:22:04:40:b1:8a:02:2f:33:16:
|
|
||||||
f8:92:c2:df:b8:33:79:18:75:d0:66:87:10:6b:b1:7d:49:b6:
|
|
||||||
d1:fc:7a:2c:89:e9:51:0a:8b:38:c5:5a:03:47:93:3a:ed:60:
|
|
||||||
81:ef:99:a2:45:6a:97:46:f7:ae:be:4b:e5:4c:e6:5e:01:f4:
|
|
||||||
c0:9b:9f:f6:0d:3d:80:17:da:91:3a:d2:9e:e7:fe:7d:b8:30:
|
|
||||||
31:3c:ad:72:ab:e0:7d:5b:2b:a2:f1:9b:db:8f:09:4a:0e:a1:
|
|
||||||
a9:5e:a8:3b:fe:9c:4c:36:7b:b6:35:41:54:32:ff:72:22:c5:
|
|
||||||
0f:b4:7e:71:c9:78:04:56:fb:1f:81:87:25:b3:3a:78:56:76:
|
|
||||||
61:a9:4f:c1
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqzCCAZOgAwIBAgIQCch9LTsfhcIbTqbfJCuYzTANBgkqhkiG9w0BAQ0FADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI3MTg1MTQyWhgPMjA1NTA1MjAx
|
|
||||||
ODUxNDJaMBgxFjAUBgNVBAMMDXN0YXRpb25LQTI1MDEwdjAQBgcqhkjOPQIBBgUr
|
|
||||||
gQQAIgNiAARPz9+fOso3W3FxWlCMOXOnLwQWxmaBcnCJtrpYBoNUWDcZdPilQnBB
|
|
||||||
G8HrWSZaqu0beq8OxSo/Jm49UyhtLrbGTpxz08UrlhC0LvTlBrfKzcdyILUHBYQX
|
|
||||||
ZE7L9U9Rs8ejgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUnja7b0zH3oDEyxGs
|
|
||||||
S8jCESYLZIMwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQx
|
|
||||||
EjAQBgNVBAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0l
|
|
||||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQAm
|
|
||||||
oAxX+zmLJe4NoCPzyGcntLv58RDhfoCnBPYZyriitPXb1mRdf/z7WGsCGiy03/Md
|
|
||||||
M7zEjvlccA8H4VGZF2IufaJpRsfu2NPum6rQ1Z2Qrj0mg1EwcyRNbGdP8kyP6Lc0
|
|
||||||
lIXATg4BWhYMRMop+QLe4JM409ciBECxigIvMxb4ksLfuDN5GHXQZocQa7F9SbbR
|
|
||||||
/HosielRCos4xVoDR5M67WCB75miRWqXRveuvkvlTOZeAfTAm5/2DT2AF9qROtKe
|
|
||||||
5/59uDAxPK1yq+B9Wyui8ZvbjwlKDqGpXqg7/pxMNnu2NUFUMv9yIsUPtH5xyXgE
|
|
||||||
VvsfgYclszp4VnZhqU/B
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBDzCBlwIBADAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNTAxMHYwEAYHKoZIzj0C
|
|
||||||
AQYFK4EEACIDYgAET8/fnzrKN1txcVpQjDlzpy8EFsZmgXJwiba6WAaDVFg3GXT4
|
|
||||||
pUJwQRvB61kmWqrtG3qvDsUqPyZuPVMobS62xk6cc9PFK5YQtC705Qa3ys3HciC1
|
|
||||||
BwWEF2ROy/VPUbPHoAAwCgYIKoZIzj0EAwQDZwAwZAIwddJTP6meDC2EyDpH+EXH
|
|
||||||
HD+JsJuBuPzBwDKCLw56Ltiha0s8hOJuRnXDo2XuugQnAjB1kCBFJ5NVjmiKx2LZ
|
|
||||||
FlHo5P37lI9IOAfBuh00fIqgXzIWbUCZ9qR/uqBnc1Tk1oc=
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
||||||
@ -1,71 +0,0 @@
|
|||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
57:8f:49:9e:03:dd:fb:c9:41:7c:9a:36:9f:15:fa:17
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 26 19:53:18 2025 GMT
|
|
||||||
Not After : May 19 19:53:18 2055 GMT
|
|
||||||
Subject: CN=remoteclient
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:84:9e:4b:e2:5e:3f:95:aa:62:a2:ab:bf:f7:d5:
|
|
||||||
f7:8f:8a:c6:78:9a:e0:bf:d5:de:ff:a1:31:26:12:
|
|
||||||
c3:29:26:cc:16:cf:72:ee:2a:fc:72:52:e0:9b:3e:
|
|
||||||
0f:bd:16:38:2c:db:43:a0:fe:39:0a:61:fe:62:be:
|
|
||||||
df:3a:e3:9c:f9:32:32:9e:b5:9b:cf:32:45:49:00:
|
|
||||||
ed:7c:0e:44:9c:60:36:96:25:b8:4c:4c:c8:c3:e4:
|
|
||||||
7b:54:e8:fb:e7:9e:f6
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
DE:16:FC:5F:F9:D9:20:5A:ED:F6:62:49:91:1C:BE:D2:38:0D:ED:23
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
40:83:8d:27:36:cc:75:97:2f:15:56:f2:5c:f2:0b:21:54:db:
|
|
||||||
f5:35:5e:42:92:44:84:b6:c7:b4:0d:4d:8d:8d:5b:d8:31:d2:
|
|
||||||
43:f3:7b:20:58:13:be:25:02:6e:a4:a2:9a:19:97:1e:35:50:
|
|
||||||
aa:0a:0c:e9:08:d7:2a:cf:3f:3d:ba:0b:0b:fa:36:e0:29:64:
|
|
||||||
3d:5f:a1:bb:17:12:13:33:cd:27:25:c5:92:e5:76:14:21:b5:
|
|
||||||
98:4c:33:99:f9:b2:4d:50:b7:5c:d9:dc:19:26:9c:12:19:95:
|
|
||||||
1c:01:04:4f:fa:b0:5a:ba:84:73:b5:84:86:78:3a:b2:99:38:
|
|
||||||
aa:a0:41:a8:8a:6d:f2:05:ce:8e:6b:f6:95:a8:06:f0:92:d7:
|
|
||||||
6b:1f:91:62:58:31:2f:0f:38:e1:67:f7:e0:62:35:c8:e8:12:
|
|
||||||
10:69:c7:08:5b:be:71:7e:c7:69:4e:0e:16:8b:7a:03:73:09:
|
|
||||||
d6:ed:ac:98:e5:4b:97:09:ce:d4:c9:78:53:03:8a:b5:da:60:
|
|
||||||
dc:e5:3d:9e:39:09:4f:6d:3d:55:6e:33:79:e7:dc:55:33:14:
|
|
||||||
e3:99:4d:4e:b3:67:7b:e5:6d:c4:d4:dd:81:85:36:e2:ed:b8:
|
|
||||||
d8:ea:90:a8:29:c8:04:6f:ed:a0:6b:50:ea:d4:3e:20:d9:de:
|
|
||||||
fe:db:79:a4
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqjCCAZKgAwIBAgIQV49JngPd+8lBfJo2nxX6FzANBgkqhkiG9w0BAQ0FADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI2MTk1MzE4WhgPMjA1NTA1MTkx
|
|
||||||
OTUzMThaMBcxFTATBgNVBAMMDHJlbW90ZWNsaWVudDB2MBAGByqGSM49AgEGBSuB
|
|
||||||
BAAiA2IABISeS+JeP5WqYqKrv/fV94+Kxnia4L/V3v+hMSYSwykmzBbPcu4q/HJS
|
|
||||||
4Js+D70WOCzbQ6D+OQph/mK+3zrjnPkyMp61m88yRUkA7XwORJxgNpYluExMyMPk
|
|
||||||
e1To++ee9qOBoDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTeFvxf+dkgWu32YkmR
|
|
||||||
HL7SOA3tIzBPBgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDES
|
|
||||||
MBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUE
|
|
||||||
DDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQENBQADggEBAECD
|
|
||||||
jSc2zHWXLxVW8lzyCyFU2/U1XkKSRIS2x7QNTY2NW9gx0kPzeyBYE74lAm6kopoZ
|
|
||||||
lx41UKoKDOkI1yrPPz26Cwv6NuApZD1fobsXEhMzzSclxZLldhQhtZhMM5n5sk1Q
|
|
||||||
t1zZ3BkmnBIZlRwBBE/6sFq6hHO1hIZ4OrKZOKqgQaiKbfIFzo5r9pWoBvCS12sf
|
|
||||||
kWJYMS8POOFn9+BiNcjoEhBpxwhbvnF+x2lODhaLegNzCdbtrJjlS5cJztTJeFMD
|
|
||||||
irXaYNzlPZ45CU9tPVVuM3nn3FUzFOOZTU6zZ3vlbcTU3YGFNuLtuNjqkKgpyARv
|
|
||||||
7aBrUOrUPiDZ3v7beaQ=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
@ -40,7 +40,6 @@ proto udp
|
|||||||
# You can have multiple remote entries
|
# You can have multiple remote entries
|
||||||
# to load balance between the servers.
|
# to load balance between the servers.
|
||||||
remote vpn.yultek.dev 1194
|
remote vpn.yultek.dev 1194
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
;remote my-server-2 1194
|
||||||
|
|
||||||
# Choose a random host from the remote
|
# Choose a random host from the remote
|
||||||
@ -168,31 +167,31 @@ Certificate:
|
|||||||
Data:
|
Data:
|
||||||
Version: 3 (0x2)
|
Version: 3 (0x2)
|
||||||
Serial Number:
|
Serial Number:
|
||||||
ab:57:22:69:00:94:7d:2d:f2:86:c1:7c:f6:84:a4:d1
|
ab:ba:55:27:aa:06:49:7b:13:dd:f2:5b:ae:27:08:fe
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Issuer: CN=JF_server
|
Issuer: CN=JF_server
|
||||||
Validity
|
Validity
|
||||||
Not Before: May 26 19:26:43 2025 GMT
|
Not Before: Jun 1 18:17:32 2023 GMT
|
||||||
Not After : May 19 19:26:43 2055 GMT
|
Not After : Sep 3 18:17:32 2025 GMT
|
||||||
Subject: CN=fred
|
Subject: CN=fred
|
||||||
Subject Public Key Info:
|
Subject Public Key Info:
|
||||||
Public Key Algorithm: id-ecPublicKey
|
Public Key Algorithm: id-ecPublicKey
|
||||||
Public-Key: (384 bit)
|
Public-Key: (384 bit)
|
||||||
pub:
|
pub:
|
||||||
04:52:a0:c4:e8:7b:31:2c:fe:6a:e1:55:f0:94:5e:
|
04:3e:78:ef:26:d9:87:bb:8b:08:47:fe:15:ad:96:
|
||||||
70:d0:6e:43:6d:72:7b:7d:a2:f5:61:cf:68:e7:ef:
|
ae:f4:93:f1:d8:ce:e3:05:d2:96:46:fc:f6:47:c9:
|
||||||
b7:e5:f0:2f:bd:76:26:4c:ce:f0:4e:bb:99:03:cf:
|
ac:41:f5:01:1b:e3:25:61:f4:ee:6f:8d:13:dd:ab:
|
||||||
17:05:a9:3f:a2:0d:ed:6e:6f:3f:0f:08:f2:1b:68:
|
1b:d8:02:85:a3:fb:52:3d:02:d8:ad:0b:ed:e3:02:
|
||||||
9e:e0:4d:38:5f:55:99:51:1b:ae:39:2e:1d:9f:78:
|
88:c7:eb:06:52:ca:25:ac:8b:ac:eb:52:4c:43:52:
|
||||||
b1:58:52:5c:b5:1f:54:d6:c9:09:6d:4e:b5:9c:00:
|
f9:c0:8c:f4:48:ea:72:a6:26:f7:5f:02:96:97:ad:
|
||||||
c2:01:89:c7:27:94:ea
|
10:ac:6d:c8:d3:b1:28
|
||||||
ASN1 OID: secp384r1
|
ASN1 OID: secp384r1
|
||||||
NIST CURVE: P-384
|
NIST CURVE: P-384
|
||||||
X509v3 extensions:
|
X509v3 extensions:
|
||||||
X509v3 Basic Constraints:
|
X509v3 Basic Constraints:
|
||||||
CA:FALSE
|
CA:FALSE
|
||||||
X509v3 Subject Key Identifier:
|
X509v3 Subject Key Identifier:
|
||||||
0F:E2:50:A5:9A:17:2B:87:71:11:CB:52:15:48:08:5B:72:F6:92:5E
|
3C:F6:00:C3:CF:A4:BB:8D:F1:1B:AB:A1:6F:24:44:2A:73:95:EB:46
|
||||||
X509v3 Authority Key Identifier:
|
X509v3 Authority Key Identifier:
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
DirName:/CN=JF_server
|
DirName:/CN=JF_server
|
||||||
@ -201,47 +200,47 @@ Certificate:
|
|||||||
TLS Web Client Authentication
|
TLS Web Client Authentication
|
||||||
X509v3 Key Usage:
|
X509v3 Key Usage:
|
||||||
Digital Signature
|
Digital Signature
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Signature Value:
|
Signature Value:
|
||||||
1d:9a:07:1e:b0:5f:56:08:c3:a8:25:6a:54:2c:50:4d:98:b3:
|
10:9c:49:d0:09:dc:52:df:2b:e1:ce:59:ef:f7:a0:96:13:05:
|
||||||
f0:ab:39:ae:93:87:35:44:04:2c:ac:92:ea:a4:96:d3:10:77:
|
7e:30:ba:4b:6d:17:62:ed:89:39:cb:0e:c5:cc:df:0c:5a:68:
|
||||||
01:16:93:1e:b5:1d:5d:7f:98:c9:5d:2b:6d:03:97:e4:6b:38:
|
e7:0f:bc:c2:67:e0:b2:72:b6:9f:e7:9f:1f:4c:e5:da:d9:5c:
|
||||||
2e:3b:a9:00:5f:d4:34:11:fe:24:51:47:27:31:a3:60:b0:ce:
|
d8:53:44:ef:47:ea:47:9d:d7:1d:12:ab:75:c3:1f:c4:d8:ae:
|
||||||
af:b3:87:95:eb:dd:4f:c5:88:18:db:60:9b:22:09:3d:73:53:
|
65:7e:39:9d:98:f1:02:df:03:77:1e:7b:88:24:5f:7e:51:5c:
|
||||||
83:f6:31:a6:61:0f:60:e3:76:77:d7:be:a8:fa:01:5b:7d:53:
|
f2:9c:b8:1f:84:71:4b:f9:5a:6d:06:63:4d:e9:ab:27:f5:99:
|
||||||
97:7e:25:9b:30:e6:34:52:ae:e7:0b:d1:0e:3a:69:8d:55:f8:
|
fa:ac:25:7a:e2:a7:ba:94:a7:44:8b:2f:21:73:c1:db:1a:37:
|
||||||
40:a4:4d:3c:2e:7b:40:06:8e:bf:ba:e5:46:30:d7:26:fa:49:
|
38:d6:46:4a:a5:65:f7:24:35:08:40:9a:8e:d6:22:56:20:c9:
|
||||||
aa:bc:7d:3c:a8:89:84:28:0a:b4:7b:a8:51:f6:df:04:f8:63:
|
7b:52:b3:8f:ea:53:bf:00:bd:6a:23:bd:07:fe:af:2e:20:ee:
|
||||||
e8:a7:72:4e:d0:ae:45:23:91:7e:d3:a6:20:16:86:93:08:8f:
|
71:69:f8:66:b0:f3:00:5e:8d:2f:2a:37:b9:14:a6:bf:c8:25:
|
||||||
c0:83:ff:17:96:ff:63:9a:c9:0b:b8:cd:ff:05:ea:ef:33:2e:
|
2e:1b:f4:86:58:94:33:2b:85:f9:08:3a:48:9e:49:42:66:5a:
|
||||||
78:e7:1e:86:23:0d:de:66:9d:74:d7:17:2e:9c:e2:a0:42:03:
|
37:10:10:5b:50:2e:f6:06:d0:fe:86:17:0d:9d:f5:dd:cb:ab:
|
||||||
9a:ed:ae:44:da:f5:a5:c1:36:56:9c:7d:eb:ca:dc:76:eb:62:
|
92:39:de:d8:57:9d:0d:7e:14:b7:61:e5:bc:dc:62:00:22:8c:
|
||||||
6e:fe:8f:dc:f5:eb:a1:72:9e:64:bd:2e:64:1b:62:e0:52:d0:
|
23:df:90:d4:38:01:18:23:96:c6:7e:e8:c8:5e:c8:fd:a4:b2:
|
||||||
f9:ab:52:cf
|
47:87:02:4f
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICozCCAYugAwIBAgIRAKtXImkAlH0t8obBfPaEpNEwDQYJKoZIhvcNAQENBQAw
|
MIICoTCCAYmgAwIBAgIRAKu6VSeqBkl7E93yW64nCP4wDQYJKoZIhvcNAQELBQAw
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjY0M1oYDzIwNTUwNTE5
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDYwMTE4MTczMloXDTI1MDkwMzE4
|
||||||
MTkyNjQzWjAPMQ0wCwYDVQQDDARmcmVkMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
MTczMlowDzENMAsGA1UEAwwEZnJlZDB2MBAGByqGSM49AgEGBSuBBAAiA2IABD54
|
||||||
UqDE6HsxLP5q4VXwlF5w0G5DbXJ7faL1Yc9o5++35fAvvXYmTM7wTruZA88XBak/
|
7ybZh7uLCEf+Fa2WrvST8djO4wXSlkb89kfJrEH1ARvjJWH07m+NE92rG9gChaP7
|
||||||
og3tbm8/DwjyG2ie4E04X1WZURuuOS4dn3ixWFJctR9U1skJbU61nADCAYnHJ5Tq
|
Uj0C2K0L7eMCiMfrBlLKJayLrOtSTENS+cCM9EjqcqYm918ClpetEKxtyNOxKKOB
|
||||||
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFA/iUKWaFyuHcRHLUhVICFty9pJe
|
oDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBQ89gDDz6S7jfEbq6FvJEQqc5XrRjBP
|
||||||
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
BgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJ
|
||||||
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
SkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEF
|
||||||
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQ0FAAOCAQEAHZoHHrBfVgjD
|
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBABCcSdAJ3FLfK+HO
|
||||||
qCVqVCxQTZiz8Ks5rpOHNUQELKyS6qSW0xB3ARaTHrUdXX+YyV0rbQOX5Gs4Ljup
|
We/3oJYTBX4wukttF2LtiTnLDsXM3wxaaOcPvMJn4LJytp/nnx9M5drZXNhTRO9H
|
||||||
AF/UNBH+JFFHJzGjYLDOr7OHlevdT8WIGNtgmyIJPXNTg/YxpmEPYON2d9e+qPoB
|
6ked1x0Sq3XDH8TYrmV+OZ2Y8QLfA3cee4gkX35RXPKcuB+EcUv5Wm0GY03pqyf1
|
||||||
W31Tl34lmzDmNFKu5wvRDjppjVX4QKRNPC57QAaOv7rlRjDXJvpJqrx9PKiJhCgK
|
mfqsJXrip7qUp0SLLyFzwdsaNzjWRkqlZfckNQhAmo7WIlYgyXtSs4/qU78AvWoj
|
||||||
tHuoUfbfBPhj6KdyTtCuRSORftOmIBaGkwiPwIP/F5b/Y5rJC7jN/wXq7zMueOce
|
vQf+ry4g7nFp+Gaw8wBejS8qN7kUpr/IJS4b9IZYlDMrhfkIOkieSUJmWjcQEFtQ
|
||||||
hiMN3maddNcXLpzioEIDmu2uRNr1pcE2Vpx968rcdutibv6P3PXroXKeZL0uZBti
|
LvYG0P6GFw2d9d3Lq5I53thXnQ1+FLdh5bzcYgAijCPfkNQ4ARgjlsZ+6MheyP2k
|
||||||
4FLQ+atSzw==
|
skeHAk8=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
</cert>
|
</cert>
|
||||||
<key>
|
<key>
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBWcN+8Dvwua4D5eX5O
|
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBQw+Cfj2TA0I9LNukC
|
||||||
7ur9tcu7we995i8cwa5S12vPvmKukUwENyzmm8O3xNYjtX2hZANiAARSoMToezEs
|
i6neLisJywxfhODlvipRtpifAMhKh1mgf3U5mcknDT4N3A6hZANiAAQ+eO8m2Ye7
|
||||||
/mrhVfCUXnDQbkNtcnt9ovVhz2jn77fl8C+9diZMzvBOu5kDzxcFqT+iDe1ubz8P
|
iwhH/hWtlq70k/HYzuMF0pZG/PZHyaxB9QEb4yVh9O5vjRPdqxvYAoWj+1I9Atit
|
||||||
CPIbaJ7gTThfVZlRG645Lh2feLFYUly1H1TWyQltTrWcAMIBiccnlOo=
|
C+3jAojH6wZSyiWsi6zrUkxDUvnAjPRI6nKmJvdfApaXrRCsbcjTsSg=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
</key>
|
</key>
|
||||||
<tls-crypt>
|
<tls-crypt>
|
||||||
|
|||||||
@ -39,8 +39,7 @@ proto udp
|
|||||||
# The hostname/IP and port of the server.
|
# The hostname/IP and port of the server.
|
||||||
# You can have multiple remote entries
|
# You can have multiple remote entries
|
||||||
# to load balance between the servers.
|
# to load balance between the servers.
|
||||||
remote vpn.yultek.dev 1194
|
remote 138.197.151.172 1194
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
;remote my-server-2 1194
|
||||||
|
|
||||||
# Choose a random host from the remote
|
# Choose a random host from the remote
|
||||||
@ -168,31 +167,31 @@ Certificate:
|
|||||||
Data:
|
Data:
|
||||||
Version: 3 (0x2)
|
Version: 3 (0x2)
|
||||||
Serial Number:
|
Serial Number:
|
||||||
b7:43:9e:5a:80:04:ad:6f:3c:d2:82:9f:99:b4:55:0c
|
22:7a:b3:cb:88:05:00:8c:df:af:02:be:af:63:f9:59
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Issuer: CN=JF_server
|
Issuer: CN=JF_server
|
||||||
Validity
|
Validity
|
||||||
Not Before: May 26 19:26:08 2025 GMT
|
Not Before: Feb 20 22:37:46 2023 GMT
|
||||||
Not After : May 19 19:26:08 2055 GMT
|
Not After : May 25 22:37:46 2025 GMT
|
||||||
Subject: CN=jf
|
Subject: CN=jf
|
||||||
Subject Public Key Info:
|
Subject Public Key Info:
|
||||||
Public Key Algorithm: id-ecPublicKey
|
Public Key Algorithm: id-ecPublicKey
|
||||||
Public-Key: (384 bit)
|
Public-Key: (384 bit)
|
||||||
pub:
|
pub:
|
||||||
04:cb:cf:fb:cd:5a:b5:1c:e2:f6:1c:35:36:e4:6b:
|
04:8d:38:ea:4f:29:bd:83:a9:33:a3:1c:33:8a:60:
|
||||||
29:06:48:0f:aa:e9:5b:2e:e3:f7:ca:5d:f4:01:97:
|
8f:fa:19:81:00:73:44:81:98:1e:76:05:ee:f6:46:
|
||||||
8c:09:fc:cb:5c:b9:96:3f:44:0b:7b:6b:6f:39:f3:
|
d5:25:a8:c5:3b:bd:d6:fa:cf:c6:79:e0:b4:42:27:
|
||||||
62:92:43:8d:31:15:ca:b3:80:f5:c3:1a:7b:7e:de:
|
80:e2:96:2d:30:50:c2:f6:9c:2c:13:f8:b9:46:b3:
|
||||||
ac:ba:5c:9f:26:f4:1c:d6:91:d0:59:4a:b2:5e:dc:
|
0d:96:6c:9b:d2:45:15:a3:f0:4c:bc:6b:51:45:f8:
|
||||||
dc:94:0a:9d:24:29:b0:42:26:57:93:5e:e9:02:44:
|
cb:59:04:b1:d0:47:b9:90:06:71:c7:eb:34:32:e2:
|
||||||
ca:60:aa:86:99:2d:d1
|
72:14:84:94:58:e3:34
|
||||||
ASN1 OID: secp384r1
|
ASN1 OID: secp384r1
|
||||||
NIST CURVE: P-384
|
NIST CURVE: P-384
|
||||||
X509v3 extensions:
|
X509v3 extensions:
|
||||||
X509v3 Basic Constraints:
|
X509v3 Basic Constraints:
|
||||||
CA:FALSE
|
CA:FALSE
|
||||||
X509v3 Subject Key Identifier:
|
X509v3 Subject Key Identifier:
|
||||||
D9:70:4D:CC:BF:72:8F:F4:6D:DD:20:85:2C:19:3B:6F:1E:97:EC:88
|
C5:CE:72:8F:A3:8E:13:57:DD:0E:02:A1:24:F1:56:C3:AE:2F:65:8F
|
||||||
X509v3 Authority Key Identifier:
|
X509v3 Authority Key Identifier:
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
DirName:/CN=JF_server
|
DirName:/CN=JF_server
|
||||||
@ -201,47 +200,47 @@ Certificate:
|
|||||||
TLS Web Client Authentication
|
TLS Web Client Authentication
|
||||||
X509v3 Key Usage:
|
X509v3 Key Usage:
|
||||||
Digital Signature
|
Digital Signature
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Signature Value:
|
Signature Value:
|
||||||
8e:56:20:a2:64:1f:bb:3c:fc:f4:4d:6a:30:f7:90:c0:84:03:
|
3b:e8:1a:3e:ac:17:17:49:7c:4d:73:55:39:e9:1b:e4:d6:7f:
|
||||||
00:a1:d7:f4:57:93:b0:a2:78:fc:79:f4:29:46:22:79:f1:90:
|
6d:6d:43:6c:e2:79:41:f4:26:a4:2d:18:59:24:a0:b1:e0:db:
|
||||||
80:e9:65:6d:c8:c7:54:c3:4f:38:fc:c4:b5:df:b5:7f:fd:20:
|
03:07:f9:fb:24:f6:be:ed:8c:31:3e:c7:bb:74:b6:87:ba:43:
|
||||||
95:a3:be:d7:7c:89:58:a8:f0:84:b7:d4:17:4d:81:1c:fa:30:
|
fc:d6:fb:2f:9f:1c:eb:d1:27:ad:60:eb:ab:87:c7:46:fe:22:
|
||||||
bb:e7:6e:ce:1e:4c:da:5f:d4:ff:66:1e:c3:e5:cb:42:5e:dd:
|
75:c1:bb:fb:23:ad:ba:1d:ab:41:45:29:d6:c4:89:99:94:40:
|
||||||
02:a8:95:af:81:62:dd:9a:a1:48:1c:f1:1d:ae:4e:07:78:9d:
|
06:c7:3a:08:fe:d3:b5:f4:e7:52:57:aa:d1:a8:ec:74:e6:c9:
|
||||||
e0:5e:6b:2c:92:27:2a:53:3f:c3:eb:cb:62:24:f9:43:05:0f:
|
ec:9e:80:e0:ba:92:92:95:55:2e:d7:b2:d8:09:ee:72:fd:12:
|
||||||
25:14:6f:2f:3f:ee:92:47:29:84:a4:76:c1:fb:c6:35:a6:eb:
|
ac:0a:0d:dc:ba:ac:4e:34:8c:37:19:76:60:7c:bd:ba:99:b7:
|
||||||
cb:2b:a3:bc:1e:85:33:c3:0e:7e:5e:45:32:24:61:83:64:aa:
|
e5:47:c3:4b:67:2f:a9:5c:89:95:70:2d:2c:97:45:04:64:15:
|
||||||
6b:23:a6:43:54:b6:6e:85:1c:14:09:f3:09:94:e9:af:49:5f:
|
47:04:d1:48:7d:d8:40:63:6c:05:8b:dc:ed:0f:a3:ae:3a:e8:
|
||||||
86:99:93:de:e7:63:f7:30:a9:d6:74:7e:40:0c:6c:4d:51:f1:
|
6f:49:34:54:de:99:4b:aa:28:6d:c9:3d:db:43:60:14:40:d5:
|
||||||
ff:a0:41:b6:6f:db:1b:f2:03:36:22:7c:94:c5:b2:30:0d:66:
|
09:87:a8:b2:88:11:4c:8c:00:71:b1:38:25:91:5f:2f:93:7b:
|
||||||
00:4e:0d:09:50:3e:02:8b:38:a5:30:e6:1b:76:29:58:2b:f9:
|
42:64:38:db:d2:59:48:e8:ed:2e:92:69:4e:d4:2a:3b:e3:03:
|
||||||
5e:b1:99:55:78:9e:65:93:fa:54:72:48:f4:3b:92:d2:c0:07:
|
94:2c:fc:ac:bc:ff:a9:b4:1e:ca:d3:d2:b5:fd:bf:33:bd:55:
|
||||||
68:01:bc:b1
|
12:75:db:f1
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICoTCCAYmgAwIBAgIRALdDnlqABK1vPNKCn5m0VQwwDQYJKoZIhvcNAQENBQAw
|
MIICnjCCAYagAwIBAgIQInqzy4gFAIzfrwK+r2P5WTANBgkqhkiG9w0BAQsFADAU
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjYwOFoYDzIwNTUwNTE5
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwMjIwMjIzNzQ2WhcNMjUwNTI1MjIz
|
||||||
MTkyNjA4WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABMvP
|
NzQ2WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABI046k8p
|
||||||
+81atRzi9hw1NuRrKQZID6rpWy7j98pd9AGXjAn8y1y5lj9EC3trbznzYpJDjTEV
|
vYOpM6McM4pgj/oZgQBzRIGYHnYF7vZG1SWoxTu91vrPxnngtEIngOKWLTBQwvac
|
||||||
yrOA9cMae37erLpcnyb0HNaR0FlKsl7c3JQKnSQpsEImV5Ne6QJEymCqhpkt0aOB
|
LBP4uUazDZZsm9JFFaPwTLxrUUX4y1kEsdBHuZAGccfrNDLichSElFjjNKOBoDCB
|
||||||
oDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTZcE3Mv3KP9G3dIIUsGTtvHpfsiDBP
|
nTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTFznKPo44TV90OAqEk8VbDri9ljzBPBgNV
|
||||||
BgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJ
|
HSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZf
|
||||||
SkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEF
|
c2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEFBQcD
|
||||||
BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQENBQADggEBAI5WIKJkH7s8/PRN
|
AjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBADvoGj6sFxdJfE1zVTnp
|
||||||
ajD3kMCEAwCh1/RXk7CiePx59ClGInnxkIDpZW3Ix1TDTzj8xLXftX/9IJWjvtd8
|
G+TWf21tQ2zieUH0JqQtGFkkoLHg2wMH+fsk9r7tjDE+x7t0toe6Q/zW+y+fHOvR
|
||||||
iVio8IS31BdNgRz6MLvnbs4eTNpf1P9mHsPly0Je3QKola+BYt2aoUgc8R2uTgd4
|
J61g66uHx0b+InXBu/sjrbodq0FFKdbEiZmUQAbHOgj+07X051JXqtGo7HTmyeye
|
||||||
neBeayySJypTP8Pry2Ik+UMFDyUUby8/7pJHKYSkdsH7xjWm68sro7wehTPDDn5e
|
gOC6kpKVVS7XstgJ7nL9EqwKDdy6rE40jDcZdmB8vbqZt+VHw0tnL6lciZVwLSyX
|
||||||
RTIkYYNkqmsjpkNUtm6FHBQJ8wmU6a9JX4aZk97nY/cwqdZ0fkAMbE1R8f+gQbZv
|
RQRkFUcE0Uh92EBjbAWL3O0Po6466G9JNFTemUuqKG3JPdtDYBRA1QmHqLKIEUyM
|
||||||
2xvyAzYifJTFsjANZgBODQlQPgKLOKUw5ht2KVgr+V6xmVV4nmWT+lRySPQ7ktLA
|
AHGxOCWRXy+Te0JkONvSWUjo7S6SaU7UKjvjA5Qs/Ky8/6m0HsrT0rX9vzO9VRJ1
|
||||||
B2gBvLE=
|
2/E=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
</cert>
|
</cert>
|
||||||
<key>
|
<key>
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDDgu9X2O9NIi4drCkTl
|
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBI4JXNyv7EeAsIFaPn
|
||||||
INFnFPYQSJ10JliFqGNM37UW4U2v5A93isSNU2YXyGgZnSWhZANiAATLz/vNWrUc
|
JBe0cJDvuYM+AGWJYcMtfQj8Sg5z+K0+Ur1IjRxj6vkyXa2hZANiAASNOOpPKb2D
|
||||||
4vYcNTbkaykGSA+q6Vsu4/fKXfQBl4wJ/MtcuZY/RAt7a28582KSQ40xFcqzgPXD
|
qTOjHDOKYI/6GYEAc0SBmB52Be72RtUlqMU7vdb6z8Z54LRCJ4Dili0wUML2nCwT
|
||||||
Gnt+3qy6XJ8m9BzWkdBZSrJe3NyUCp0kKbBCJleTXukCRMpgqoaZLdE=
|
+LlGsw2WbJvSRRWj8Ey8a1FF+MtZBLHQR7mQBnHH6zQy4nIUhJRY4zQ=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
</key>
|
</key>
|
||||||
<tls-crypt>
|
<tls-crypt>
|
||||||
|
|||||||
@ -1,269 +0,0 @@
|
|||||||
##############################################
|
|
||||||
# Sample client-side OpenVPN 2.0 config file #
|
|
||||||
# for connecting to multi-client server. #
|
|
||||||
# #
|
|
||||||
# This configuration can be used by multiple #
|
|
||||||
# clients, however each client should have #
|
|
||||||
# its own cert and key files. #
|
|
||||||
# #
|
|
||||||
# On Windows, you might want to rename this #
|
|
||||||
# file so it has a .ovpn extension #
|
|
||||||
##############################################
|
|
||||||
|
|
||||||
# Specify that we are a client and that we
|
|
||||||
# will be pulling certain config file directives
|
|
||||||
# from the server.
|
|
||||||
client
|
|
||||||
|
|
||||||
# Use the same setting as you are using on
|
|
||||||
# the server.
|
|
||||||
# On most systems, the VPN will not function
|
|
||||||
# unless you partially or fully disable
|
|
||||||
# the firewall for the TUN/TAP interface.
|
|
||||||
;dev tap
|
|
||||||
dev tun
|
|
||||||
|
|
||||||
# Windows needs the TAP-Win32 adapter name
|
|
||||||
# from the Network Connections panel
|
|
||||||
# if you have more than one. On XP SP2,
|
|
||||||
# you may need to disable the firewall
|
|
||||||
# for the TAP adapter.
|
|
||||||
;dev-node MyTap
|
|
||||||
|
|
||||||
# Are we connecting to a TCP or
|
|
||||||
# UDP server? Use the same setting as
|
|
||||||
# on the server.
|
|
||||||
;proto tcp
|
|
||||||
proto udp
|
|
||||||
|
|
||||||
# The hostname/IP and port of the server.
|
|
||||||
# You can have multiple remote entries
|
|
||||||
# to load balance between the servers.
|
|
||||||
remote vpn.yultek.dev 1194
|
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
|
||||||
|
|
||||||
# Choose a random host from the remote
|
|
||||||
# list for load-balancing. Otherwise
|
|
||||||
# try hosts in the order specified.
|
|
||||||
;remote-random
|
|
||||||
|
|
||||||
# Keep trying indefinitely to resolve the
|
|
||||||
# host name of the OpenVPN server. Very useful
|
|
||||||
# on machines which are not permanently connected
|
|
||||||
# to the internet such as laptops.
|
|
||||||
resolv-retry infinite
|
|
||||||
|
|
||||||
# Most clients don't need to bind to
|
|
||||||
# a specific local port number.
|
|
||||||
nobind
|
|
||||||
|
|
||||||
# Downgrade privileges after initialization (non-Windows only)
|
|
||||||
;user nobody
|
|
||||||
;group nobody
|
|
||||||
|
|
||||||
# Try to preserve some state across restarts.
|
|
||||||
persist-key
|
|
||||||
persist-tun
|
|
||||||
|
|
||||||
# If you are connecting through an
|
|
||||||
# HTTP proxy to reach the actual OpenVPN
|
|
||||||
# server, put the proxy server/IP and
|
|
||||||
# port number here. See the man page
|
|
||||||
# if your proxy server requires
|
|
||||||
# authentication.
|
|
||||||
;http-proxy-retry # retry on connection failures
|
|
||||||
;http-proxy [proxy server] [proxy port #]
|
|
||||||
|
|
||||||
# Wireless networks often produce a lot
|
|
||||||
# of duplicate packets. Set this flag
|
|
||||||
# to silence duplicate packet warnings.
|
|
||||||
;mute-replay-warnings
|
|
||||||
|
|
||||||
# SSL/TLS parms.
|
|
||||||
# See the server config file for more
|
|
||||||
# description. It's best to use
|
|
||||||
# a separate .crt/.key file pair
|
|
||||||
# for each client. A single ca
|
|
||||||
# file can be used for all clients.
|
|
||||||
;ca ca.crt
|
|
||||||
;cert client.crt
|
|
||||||
;key client.key
|
|
||||||
|
|
||||||
# Verify server certificate by checking that the
|
|
||||||
# certificate has the correct key usage set.
|
|
||||||
# This is an important precaution to protect against
|
|
||||||
# a potential attack discussed here:
|
|
||||||
# http://openvpn.net/howto.html#mitm
|
|
||||||
#
|
|
||||||
# To use this feature, you will need to generate
|
|
||||||
# your server certificates with the keyUsage set to
|
|
||||||
# digitalSignature, keyEncipherment
|
|
||||||
# and the extendedKeyUsage to
|
|
||||||
# serverAuth
|
|
||||||
# EasyRSA can do this for you.
|
|
||||||
remote-cert-tls server
|
|
||||||
|
|
||||||
# If a tls-auth key is used on the server
|
|
||||||
# then every client must also have the key.
|
|
||||||
;tls-auth ta.key 1
|
|
||||||
|
|
||||||
# Select a cryptographic cipher.
|
|
||||||
# If the cipher option is used on the server
|
|
||||||
# then you must also specify it here.
|
|
||||||
# Note that v2.4 client/server will automatically
|
|
||||||
# negotiate AES-256-GCM in TLS mode.
|
|
||||||
# See also the data-ciphers option in the manpage
|
|
||||||
cipher AES-256-GCM
|
|
||||||
auth SHA256
|
|
||||||
|
|
||||||
# Enable compression on the VPN link.
|
|
||||||
# Don't enable this unless it is also
|
|
||||||
# enabled in the server config file.
|
|
||||||
#comp-lzo
|
|
||||||
|
|
||||||
# Set log file verbosity.
|
|
||||||
verb 3
|
|
||||||
|
|
||||||
# Silence repeating messages
|
|
||||||
;mute 20
|
|
||||||
|
|
||||||
key-direction 1
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-resolv-conf
|
|
||||||
; down /etc/openvpn/update-resolv-conf
|
|
||||||
|
|
||||||
|
|
||||||
; script-security 2
|
|
||||||
; up /etc/openvpn/update-systemd-resolved
|
|
||||||
; down /etc/openvpn/update-systemd-resolved
|
|
||||||
; down-pre
|
|
||||||
; dhcp-option DOMAIN-ROUTE .
|
|
||||||
<ca>
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
|
||||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
|
||||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
|
||||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
|
||||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
|
||||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
|
||||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
|
||||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
|
||||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
|
||||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
|
||||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
|
||||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
|
||||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
|
||||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
|
||||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
|
||||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
|
||||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</ca>
|
|
||||||
<cert>
|
|
||||||
Certificate:
|
|
||||||
Data:
|
|
||||||
Version: 3 (0x2)
|
|
||||||
Serial Number:
|
|
||||||
09:c8:7d:2d:3b:1f:85:c2:1b:4e:a6:df:24:2b:98:cd
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Issuer: CN=JF_server
|
|
||||||
Validity
|
|
||||||
Not Before: May 27 18:51:42 2025 GMT
|
|
||||||
Not After : May 20 18:51:42 2055 GMT
|
|
||||||
Subject: CN=stationKA2501
|
|
||||||
Subject Public Key Info:
|
|
||||||
Public Key Algorithm: id-ecPublicKey
|
|
||||||
Public-Key: (384 bit)
|
|
||||||
pub:
|
|
||||||
04:4f:cf:df:9f:3a:ca:37:5b:71:71:5a:50:8c:39:
|
|
||||||
73:a7:2f:04:16:c6:66:81:72:70:89:b6:ba:58:06:
|
|
||||||
83:54:58:37:19:74:f8:a5:42:70:41:1b:c1:eb:59:
|
|
||||||
26:5a:aa:ed:1b:7a:af:0e:c5:2a:3f:26:6e:3d:53:
|
|
||||||
28:6d:2e:b6:c6:4e:9c:73:d3:c5:2b:96:10:b4:2e:
|
|
||||||
f4:e5:06:b7:ca:cd:c7:72:20:b5:07:05:84:17:64:
|
|
||||||
4e:cb:f5:4f:51:b3:c7
|
|
||||||
ASN1 OID: secp384r1
|
|
||||||
NIST CURVE: P-384
|
|
||||||
X509v3 extensions:
|
|
||||||
X509v3 Basic Constraints:
|
|
||||||
CA:FALSE
|
|
||||||
X509v3 Subject Key Identifier:
|
|
||||||
9E:36:BB:6F:4C:C7:DE:80:C4:CB:11:AC:4B:C8:C2:11:26:0B:64:83
|
|
||||||
X509v3 Authority Key Identifier:
|
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
|
||||||
DirName:/CN=JF_server
|
|
||||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
|
||||||
X509v3 Extended Key Usage:
|
|
||||||
TLS Web Client Authentication
|
|
||||||
X509v3 Key Usage:
|
|
||||||
Digital Signature
|
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
|
||||||
Signature Value:
|
|
||||||
26:a0:0c:57:fb:39:8b:25:ee:0d:a0:23:f3:c8:67:27:b4:bb:
|
|
||||||
f9:f1:10:e1:7e:80:a7:04:f6:19:ca:b8:a2:b4:f5:db:d6:64:
|
|
||||||
5d:7f:fc:fb:58:6b:02:1a:2c:b4:df:f3:1d:33:bc:c4:8e:f9:
|
|
||||||
5c:70:0f:07:e1:51:99:17:62:2e:7d:a2:69:46:c7:ee:d8:d3:
|
|
||||||
ee:9b:aa:d0:d5:9d:90:ae:3d:26:83:51:30:73:24:4d:6c:67:
|
|
||||||
4f:f2:4c:8f:e8:b7:34:94:85:c0:4e:0e:01:5a:16:0c:44:ca:
|
|
||||||
29:f9:02:de:e0:93:38:d3:d7:22:04:40:b1:8a:02:2f:33:16:
|
|
||||||
f8:92:c2:df:b8:33:79:18:75:d0:66:87:10:6b:b1:7d:49:b6:
|
|
||||||
d1:fc:7a:2c:89:e9:51:0a:8b:38:c5:5a:03:47:93:3a:ed:60:
|
|
||||||
81:ef:99:a2:45:6a:97:46:f7:ae:be:4b:e5:4c:e6:5e:01:f4:
|
|
||||||
c0:9b:9f:f6:0d:3d:80:17:da:91:3a:d2:9e:e7:fe:7d:b8:30:
|
|
||||||
31:3c:ad:72:ab:e0:7d:5b:2b:a2:f1:9b:db:8f:09:4a:0e:a1:
|
|
||||||
a9:5e:a8:3b:fe:9c:4c:36:7b:b6:35:41:54:32:ff:72:22:c5:
|
|
||||||
0f:b4:7e:71:c9:78:04:56:fb:1f:81:87:25:b3:3a:78:56:76:
|
|
||||||
61:a9:4f:c1
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICqzCCAZOgAwIBAgIQCch9LTsfhcIbTqbfJCuYzTANBgkqhkiG9w0BAQ0FADAU
|
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI3MTg1MTQyWhgPMjA1NTA1MjAx
|
|
||||||
ODUxNDJaMBgxFjAUBgNVBAMMDXN0YXRpb25LQTI1MDEwdjAQBgcqhkjOPQIBBgUr
|
|
||||||
gQQAIgNiAARPz9+fOso3W3FxWlCMOXOnLwQWxmaBcnCJtrpYBoNUWDcZdPilQnBB
|
|
||||||
G8HrWSZaqu0beq8OxSo/Jm49UyhtLrbGTpxz08UrlhC0LvTlBrfKzcdyILUHBYQX
|
|
||||||
ZE7L9U9Rs8ejgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUnja7b0zH3oDEyxGs
|
|
||||||
S8jCESYLZIMwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQx
|
|
||||||
EjAQBgNVBAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0l
|
|
||||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQAm
|
|
||||||
oAxX+zmLJe4NoCPzyGcntLv58RDhfoCnBPYZyriitPXb1mRdf/z7WGsCGiy03/Md
|
|
||||||
M7zEjvlccA8H4VGZF2IufaJpRsfu2NPum6rQ1Z2Qrj0mg1EwcyRNbGdP8kyP6Lc0
|
|
||||||
lIXATg4BWhYMRMop+QLe4JM409ciBECxigIvMxb4ksLfuDN5GHXQZocQa7F9SbbR
|
|
||||||
/HosielRCos4xVoDR5M67WCB75miRWqXRveuvkvlTOZeAfTAm5/2DT2AF9qROtKe
|
|
||||||
5/59uDAxPK1yq+B9Wyui8ZvbjwlKDqGpXqg7/pxMNnu2NUFUMv9yIsUPtH5xyXgE
|
|
||||||
VvsfgYclszp4VnZhqU/B
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
</cert>
|
|
||||||
<key>
|
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCT5IR1xQ0c5icEgDpq
|
|
||||||
ou6eTfKeJ7CrwlCMtgyjvF8VwuGiXSE35Lck/WMLwBeyBGahZANiAARPz9+fOso3
|
|
||||||
W3FxWlCMOXOnLwQWxmaBcnCJtrpYBoNUWDcZdPilQnBBG8HrWSZaqu0beq8OxSo/
|
|
||||||
Jm49UyhtLrbGTpxz08UrlhC0LvTlBrfKzcdyILUHBYQXZE7L9U9Rs8c=
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
</key>
|
|
||||||
<tls-crypt>
|
|
||||||
#
|
|
||||||
# 2048 bit OpenVPN static key
|
|
||||||
#
|
|
||||||
-----BEGIN OpenVPN Static key V1-----
|
|
||||||
4c828cbf0e58f927758e9471c1b6f03b
|
|
||||||
2e77b2c634bad76df0570dd8f47184d6
|
|
||||||
3921e25c6e6cbe4af4b64aad89d12425
|
|
||||||
a9fca69ae08802b5ed583632c26678b0
|
|
||||||
cc28c481c3831d1b2204dc30cd466395
|
|
||||||
ccb8cd82cd2259c956b510c9a56e842a
|
|
||||||
8693c44dca462f0ab7be3856abe9bbe1
|
|
||||||
95a6ffd3b0237225b9497c7a0df05ad8
|
|
||||||
2f2e0a8bff97c927d2890906d0105947
|
|
||||||
fa3430fc779583772382534fb880add6
|
|
||||||
8d5592fa4ff384d3e96c560019b5835f
|
|
||||||
095da9b2fb33dbfbc1ffce9560908271
|
|
||||||
ee96e02ccecc9d51b9dda79a77704a1d
|
|
||||||
4407d7c805e6950854fe232adee02a12
|
|
||||||
b09af2d9bfe04868a9e2e942dc64eb81
|
|
||||||
9e062ab9f781e52d263195a58db72ebe
|
|
||||||
-----END OpenVPN Static key V1-----
|
|
||||||
</tls-crypt>
|
|
||||||
@ -39,8 +39,7 @@ proto udp
|
|||||||
# The hostname/IP and port of the server.
|
# The hostname/IP and port of the server.
|
||||||
# You can have multiple remote entries
|
# You can have multiple remote entries
|
||||||
# to load balance between the servers.
|
# to load balance between the servers.
|
||||||
remote vpn.yultek.dev 1194
|
remote 138.197.151.172 1194
|
||||||
;remote 138.197.151.172 1194
|
|
||||||
;remote my-server-2 1194
|
;remote my-server-2 1194
|
||||||
|
|
||||||
# Choose a random host from the remote
|
# Choose a random host from the remote
|
||||||
@ -168,31 +167,31 @@ Certificate:
|
|||||||
Data:
|
Data:
|
||||||
Version: 3 (0x2)
|
Version: 3 (0x2)
|
||||||
Serial Number:
|
Serial Number:
|
||||||
b7:78:f3:d4:2a:58:b2:3b:23:0c:a9:70:43:45:de:fa
|
a6:7f:64:22:94:22:4a:39:b9:48:25:9b:99:9d:ae:a7
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Issuer: CN=JF_server
|
Issuer: CN=JF_server
|
||||||
Validity
|
Validity
|
||||||
Not Before: May 26 19:26:26 2025 GMT
|
Not Before: Mar 17 19:30:32 2023 GMT
|
||||||
Not After : May 19 19:26:26 2055 GMT
|
Not After : Jun 19 19:30:32 2025 GMT
|
||||||
Subject: CN=pascal
|
Subject: CN=pascal
|
||||||
Subject Public Key Info:
|
Subject Public Key Info:
|
||||||
Public Key Algorithm: id-ecPublicKey
|
Public Key Algorithm: id-ecPublicKey
|
||||||
Public-Key: (384 bit)
|
Public-Key: (384 bit)
|
||||||
pub:
|
pub:
|
||||||
04:03:0b:f5:f3:3a:02:fb:22:42:b1:5c:ab:74:8f:
|
04:6e:d7:fc:29:a8:23:70:28:49:70:82:f4:1a:4f:
|
||||||
43:78:3a:d0:b1:3d:97:8d:c0:9a:07:11:ee:d3:03:
|
fc:e8:5a:d3:10:84:ef:0a:59:d9:3e:31:2e:5f:91:
|
||||||
22:d3:da:f3:04:a9:c0:bd:8f:ac:41:7d:91:09:07:
|
8b:97:7e:32:c5:e4:9a:b1:df:8b:66:82:f7:a5:5a:
|
||||||
49:fc:1c:32:a5:9a:7d:fd:85:51:01:64:cb:3e:00:
|
6d:90:ba:4d:4b:75:4e:1b:09:37:3b:23:5b:df:b8:
|
||||||
d6:bc:c0:c8:ed:e9:47:64:5d:24:a4:4f:37:30:b2:
|
08:89:c7:a0:d6:3b:fa:3e:f8:b1:08:18:a6:ee:25:
|
||||||
e8:c8:ed:75:55:87:7c:cb:01:52:ea:ac:a1:21:96:
|
02:25:b2:c5:43:ee:f5:03:82:9e:39:a0:82:d0:23:
|
||||||
06:a7:8f:86:b5:19:52
|
49:eb:fe:be:3e:8f:7a
|
||||||
ASN1 OID: secp384r1
|
ASN1 OID: secp384r1
|
||||||
NIST CURVE: P-384
|
NIST CURVE: P-384
|
||||||
X509v3 extensions:
|
X509v3 extensions:
|
||||||
X509v3 Basic Constraints:
|
X509v3 Basic Constraints:
|
||||||
CA:FALSE
|
CA:FALSE
|
||||||
X509v3 Subject Key Identifier:
|
X509v3 Subject Key Identifier:
|
||||||
EC:EE:95:98:8B:6A:1F:DB:AB:49:CB:88:40:65:67:D6:3B:F3:F7:D7
|
8E:E1:F2:13:12:D0:E0:C4:29:EA:29:E4:3D:94:2B:EC:0D:04:8F:BC
|
||||||
X509v3 Authority Key Identifier:
|
X509v3 Authority Key Identifier:
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
DirName:/CN=JF_server
|
DirName:/CN=JF_server
|
||||||
@ -201,47 +200,47 @@ Certificate:
|
|||||||
TLS Web Client Authentication
|
TLS Web Client Authentication
|
||||||
X509v3 Key Usage:
|
X509v3 Key Usage:
|
||||||
Digital Signature
|
Digital Signature
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Signature Value:
|
Signature Value:
|
||||||
4b:18:4a:f9:45:fb:ad:34:73:f2:4d:4f:f1:b9:fd:4a:c7:2a:
|
7d:0b:3f:f6:58:09:f2:8a:8d:0e:1e:50:c9:e8:31:f0:8f:0a:
|
||||||
eb:a7:2c:e4:c5:3f:f0:e7:55:d6:d9:61:b9:2f:92:bb:f2:3e:
|
f5:65:66:55:d3:dd:2c:5d:42:d4:0f:a5:02:ed:6a:77:e1:1d:
|
||||||
49:a8:ad:27:33:88:c1:ca:32:7a:33:4e:53:d0:4e:6f:30:c5:
|
39:c5:46:1c:a5:38:17:89:13:f1:cd:eb:ff:b8:a5:3d:e9:85:
|
||||||
59:c2:b7:1b:ef:36:48:06:80:a3:cf:da:b2:d1:46:3e:30:10:
|
6f:d2:96:9b:f4:a1:09:6c:1b:84:40:70:19:2b:e1:ac:91:c2:
|
||||||
a4:e8:7a:0d:e0:e0:fe:9d:24:fc:b0:b9:21:64:0b:c0:11:55:
|
df:bf:09:a4:4f:c4:31:44:fe:2b:a5:60:38:97:a8:b3:01:aa:
|
||||||
6f:5e:75:d2:0a:18:15:7b:dd:40:00:a7:1c:bb:f4:90:29:1e:
|
39:43:74:90:b5:c6:fc:85:63:26:9f:7f:54:ba:de:4a:b1:ae:
|
||||||
6e:b1:3d:8e:14:d0:65:48:12:e6:7e:40:24:f9:72:5a:f4:70:
|
6d:85:00:35:4d:15:9f:9d:10:f4:bf:bb:67:45:7e:c6:ab:ee:
|
||||||
df:89:a9:1a:d2:12:21:9d:b0:00:d1:f7:35:20:f4:6e:3a:ad:
|
7e:ad:92:4a:b4:e8:76:65:be:94:40:5a:67:83:ab:6c:d9:f9:
|
||||||
c1:72:29:06:a7:c8:4d:86:3d:a5:b5:a0:f5:9f:1f:44:4c:84:
|
7d:40:bd:70:87:1f:14:4d:eb:56:50:a5:c3:7e:4a:b3:42:b5:
|
||||||
ad:69:81:d8:f1:11:62:6f:0f:67:6e:4d:ef:1a:59:0c:6f:b3:
|
95:fe:f8:7f:9b:c6:c0:81:04:62:fd:94:ef:da:dd:17:01:a0:
|
||||||
9d:95:b3:ef:3b:07:54:81:90:15:14:ce:0f:71:2c:b7:f8:39:
|
93:14:80:31:5a:a2:fa:c7:8c:2d:7c:df:8b:40:d5:5c:ce:5f:
|
||||||
96:11:94:77:db:ce:55:96:c2:4a:cc:fe:c6:38:6e:58:0a:83:
|
a8:9f:9f:48:4f:49:49:dc:cc:37:7e:f7:55:84:74:8a:cd:68:
|
||||||
8a:e6:ab:26:b4:ad:90:78:cc:0a:90:31:6b:66:ce:eb:ea:1d:
|
15:60:8b:e8:4a:75:3e:83:cb:33:be:45:e1:a1:76:52:1a:b9:
|
||||||
19:71:34:eb:25:61:a2:3f:5d:a0:0b:d3:4e:56:73:b6:14:5a:
|
09:34:38:af:6e:af:98:e3:6d:ed:c2:24:97:de:08:83:6b:d5:
|
||||||
09:0c:1d:1c
|
45:9e:91:3a
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICpTCCAY2gAwIBAgIRALd489QqWLI7IwypcENF3vowDQYJKoZIhvcNAQENBQAw
|
MIICozCCAYugAwIBAgIRAKZ/ZCKUIko5uUglm5mdrqcwDQYJKoZIhvcNAQELBQAw
|
||||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMCAXDTI1MDUyNjE5MjYyNloYDzIwNTUwNTE5
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDMxNzE5MzAzMloXDTI1MDYxOTE5
|
||||||
MTkyNjI2WjARMQ8wDQYDVQQDDAZwYXNjYWwwdjAQBgcqhkjOPQIBBgUrgQQAIgNi
|
MzAzMlowETEPMA0GA1UEAwwGcGFzY2FsMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
||||||
AAQDC/XzOgL7IkKxXKt0j0N4OtCxPZeNwJoHEe7TAyLT2vMEqcC9j6xBfZEJB0n8
|
btf8KagjcChJcIL0Gk/86FrTEITvClnZPjEuX5GLl34yxeSasd+LZoL3pVptkLpN
|
||||||
HDKlmn39hVEBZMs+ANa8wMjt6UdkXSSkTzcwsujI7XVVh3zLAVLqrKEhlganj4a1
|
S3VOGwk3OyNb37gIiceg1jv6PvixCBim7iUCJbLFQ+71A4KeOaCC0CNJ6/6+Po96
|
||||||
GVKjgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQU7O6VmItqH9urScuIQGVn1jvz
|
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFI7h8hMS0ODEKeop5D2UK+wNBI+8
|
||||||
99cwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQxEjAQBgNV
|
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
||||||
BAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0lBAwwCgYI
|
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
||||||
KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQBLGEr5Rfut
|
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAfQs/9lgJ8oqN
|
||||||
NHPyTU/xuf1KxyrrpyzkxT/w51XW2WG5L5K78j5JqK0nM4jByjJ6M05T0E5vMMVZ
|
Dh5Qyegx8I8K9WVmVdPdLF1C1A+lAu1qd+EdOcVGHKU4F4kT8c3r/7ilPemFb9KW
|
||||||
wrcb7zZIBoCjz9qy0UY+MBCk6HoN4OD+nST8sLkhZAvAEVVvXnXSChgVe91AAKcc
|
m/ShCWwbhEBwGSvhrJHC378JpE/EMUT+K6VgOJeoswGqOUN0kLXG/IVjJp9/VLre
|
||||||
u/SQKR5usT2OFNBlSBLmfkAk+XJa9HDfiaka0hIhnbAA0fc1IPRuOq3BcikGp8hN
|
SrGubYUANU0Vn50Q9L+7Z0V+xqvufq2SSrTodmW+lEBaZ4OrbNn5fUC9cIcfFE3r
|
||||||
hj2ltaD1nx9ETIStaYHY8RFibw9nbk3vGlkMb7OdlbPvOwdUgZAVFM4PcSy3+DmW
|
VlClw35Ks0K1lf74f5vGwIEEYv2U79rdFwGgkxSAMVqi+seMLXzfi0DVXM5fqJ+f
|
||||||
EZR3285VlsJKzP7GOG5YCoOK5qsmtK2QeMwKkDFrZs7r6h0ZcTTrJWGiP12gC9NO
|
SE9JSdzMN373VYR0is1oFWCL6Ep1PoPLM75F4aF2Uhq5CTQ4r26vmONt7cIkl94I
|
||||||
VnO2FFoJDB0c
|
g2vVRZ6ROg==
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
</cert>
|
</cert>
|
||||||
<key>
|
<key>
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCpWK6mbGbGCMnXPvTJ
|
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBaXJvFX1ve+n9RXR/s
|
||||||
7WyarccXE9ZIdbSip3eHcdwknfl/Uwl55EoeeFAgD8vqj9ShZANiAAQDC/XzOgL7
|
FyOJij1AEAhcbzj6Vg0PXekMwOSAkRsAltTXYM3nAaRK93OhZANiAARu1/wpqCNw
|
||||||
IkKxXKt0j0N4OtCxPZeNwJoHEe7TAyLT2vMEqcC9j6xBfZEJB0n8HDKlmn39hVEB
|
KElwgvQaT/zoWtMQhO8KWdk+MS5fkYuXfjLF5Jqx34tmgvelWm2Quk1LdU4bCTc7
|
||||||
ZMs+ANa8wMjt6UdkXSSkTzcwsujI7XVVh3zLAVLqrKEhlganj4a1GVI=
|
I1vfuAiJx6DWO/o++LEIGKbuJQIlssVD7vUDgp45oILQI0nr/r4+j3o=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
</key>
|
</key>
|
||||||
<tls-crypt>
|
<tls-crypt>
|
||||||
|
|||||||
@ -168,31 +168,31 @@ Certificate:
|
|||||||
Data:
|
Data:
|
||||||
Version: 3 (0x2)
|
Version: 3 (0x2)
|
||||||
Serial Number:
|
Serial Number:
|
||||||
57:8f:49:9e:03:dd:fb:c9:41:7c:9a:36:9f:15:fa:17
|
d1:ae:61:45:8e:84:e3:8e:5b:92:3f:aa:bb:81:9d:59
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Issuer: CN=JF_server
|
Issuer: CN=JF_server
|
||||||
Validity
|
Validity
|
||||||
Not Before: May 26 19:53:18 2025 GMT
|
Not Before: Feb 23 20:30:31 2023 GMT
|
||||||
Not After : May 19 19:53:18 2055 GMT
|
Not After : May 28 20:30:31 2025 GMT
|
||||||
Subject: CN=remoteclient
|
Subject: CN=remoteclient
|
||||||
Subject Public Key Info:
|
Subject Public Key Info:
|
||||||
Public Key Algorithm: id-ecPublicKey
|
Public Key Algorithm: id-ecPublicKey
|
||||||
Public-Key: (384 bit)
|
Public-Key: (384 bit)
|
||||||
pub:
|
pub:
|
||||||
04:84:9e:4b:e2:5e:3f:95:aa:62:a2:ab:bf:f7:d5:
|
04:65:e9:86:35:01:c3:d7:0e:16:3d:89:90:3c:cb:
|
||||||
f7:8f:8a:c6:78:9a:e0:bf:d5:de:ff:a1:31:26:12:
|
a0:5f:d2:04:f7:b6:32:84:1e:a0:dc:6a:1d:16:a0:
|
||||||
c3:29:26:cc:16:cf:72:ee:2a:fc:72:52:e0:9b:3e:
|
6f:47:a3:b5:7d:4c:39:bd:d0:70:18:34:e8:16:67:
|
||||||
0f:bd:16:38:2c:db:43:a0:fe:39:0a:61:fe:62:be:
|
d4:5b:4c:ca:ce:ea:f0:75:5f:55:72:09:4b:f5:dd:
|
||||||
df:3a:e3:9c:f9:32:32:9e:b5:9b:cf:32:45:49:00:
|
80:f1:d5:db:e6:26:09:e4:34:3b:ca:89:f3:3a:40:
|
||||||
ed:7c:0e:44:9c:60:36:96:25:b8:4c:4c:c8:c3:e4:
|
91:31:14:c6:ff:06:8d:8e:f9:ba:8f:47:df:40:41:
|
||||||
7b:54:e8:fb:e7:9e:f6
|
f4:6b:84:f8:e5:e8:70
|
||||||
ASN1 OID: secp384r1
|
ASN1 OID: secp384r1
|
||||||
NIST CURVE: P-384
|
NIST CURVE: P-384
|
||||||
X509v3 extensions:
|
X509v3 extensions:
|
||||||
X509v3 Basic Constraints:
|
X509v3 Basic Constraints:
|
||||||
CA:FALSE
|
CA:FALSE
|
||||||
X509v3 Subject Key Identifier:
|
X509v3 Subject Key Identifier:
|
||||||
DE:16:FC:5F:F9:D9:20:5A:ED:F6:62:49:91:1C:BE:D2:38:0D:ED:23
|
23:F8:BF:EB:8E:A3:77:B3:2B:6A:FA:16:7A:39:B2:C2:47:31:9F:76
|
||||||
X509v3 Authority Key Identifier:
|
X509v3 Authority Key Identifier:
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
DirName:/CN=JF_server
|
DirName:/CN=JF_server
|
||||||
@ -201,47 +201,47 @@ Certificate:
|
|||||||
TLS Web Client Authentication
|
TLS Web Client Authentication
|
||||||
X509v3 Key Usage:
|
X509v3 Key Usage:
|
||||||
Digital Signature
|
Digital Signature
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Signature Value:
|
Signature Value:
|
||||||
40:83:8d:27:36:cc:75:97:2f:15:56:f2:5c:f2:0b:21:54:db:
|
27:af:ff:e0:98:8e:d1:6c:39:d7:40:97:df:ea:5a:fc:57:31:
|
||||||
f5:35:5e:42:92:44:84:b6:c7:b4:0d:4d:8d:8d:5b:d8:31:d2:
|
a2:92:0c:d3:4c:4b:74:22:9e:47:01:9b:0f:e0:a4:6c:dc:ef:
|
||||||
43:f3:7b:20:58:13:be:25:02:6e:a4:a2:9a:19:97:1e:35:50:
|
14:b7:93:0f:99:93:ec:c9:96:dc:51:58:d3:ac:eb:f1:10:48:
|
||||||
aa:0a:0c:e9:08:d7:2a:cf:3f:3d:ba:0b:0b:fa:36:e0:29:64:
|
ba:96:54:25:32:2a:89:66:cb:ca:13:b4:75:cc:4e:2a:5d:7c:
|
||||||
3d:5f:a1:bb:17:12:13:33:cd:27:25:c5:92:e5:76:14:21:b5:
|
bb:b9:15:28:c0:32:59:f0:66:e5:fe:d8:14:14:2c:fb:df:6e:
|
||||||
98:4c:33:99:f9:b2:4d:50:b7:5c:d9:dc:19:26:9c:12:19:95:
|
1e:b6:53:c9:f0:77:68:54:b9:21:4b:0c:a4:d6:bc:4d:c2:a3:
|
||||||
1c:01:04:4f:fa:b0:5a:ba:84:73:b5:84:86:78:3a:b2:99:38:
|
de:d0:9f:ef:67:68:3e:c6:d4:da:d5:6c:92:80:cf:2e:8d:04:
|
||||||
aa:a0:41:a8:8a:6d:f2:05:ce:8e:6b:f6:95:a8:06:f0:92:d7:
|
59:c8:39:9f:22:4a:04:28:3e:e8:cf:02:73:73:a6:59:d4:e5:
|
||||||
6b:1f:91:62:58:31:2f:0f:38:e1:67:f7:e0:62:35:c8:e8:12:
|
9c:77:55:41:00:5c:c2:23:61:df:44:5c:ad:a8:bc:15:57:2d:
|
||||||
10:69:c7:08:5b:be:71:7e:c7:69:4e:0e:16:8b:7a:03:73:09:
|
ae:89:99:a7:33:8f:d3:75:02:21:91:f6:38:34:23:68:70:8f:
|
||||||
d6:ed:ac:98:e5:4b:97:09:ce:d4:c9:78:53:03:8a:b5:da:60:
|
99:0f:53:27:6d:52:9a:9b:f3:62:cf:20:bc:f5:91:41:78:fc:
|
||||||
dc:e5:3d:9e:39:09:4f:6d:3d:55:6e:33:79:e7:dc:55:33:14:
|
92:09:2f:3e:bb:2d:9b:69:39:7f:c4:b1:a8:62:64:27:3f:27:
|
||||||
e3:99:4d:4e:b3:67:7b:e5:6d:c4:d4:dd:81:85:36:e2:ed:b8:
|
2d:16:c4:3e:0d:51:c9:f7:4f:40:f0:fd:55:a9:44:36:31:59:
|
||||||
d8:ea:90:a8:29:c8:04:6f:ed:a0:6b:50:ea:d4:3e:20:d9:de:
|
b7:08:6a:3c:28:31:8a:43:c0:b9:05:44:75:48:6d:94:24:c6:
|
||||||
fe:db:79:a4
|
b2:fc:f7:33
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICqjCCAZKgAwIBAgIQV49JngPd+8lBfJo2nxX6FzANBgkqhkiG9w0BAQ0FADAU
|
MIICqTCCAZGgAwIBAgIRANGuYUWOhOOOW5I/qruBnVkwDQYJKoZIhvcNAQELBQAw
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI2MTk1MzE4WhgPMjA1NTA1MTkx
|
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMzIwMzAzMVoXDTI1MDUyODIw
|
||||||
OTUzMThaMBcxFTATBgNVBAMMDHJlbW90ZWNsaWVudDB2MBAGByqGSM49AgEGBSuB
|
MzAzMVowFzEVMBMGA1UEAwwMcmVtb3RlY2xpZW50MHYwEAYHKoZIzj0CAQYFK4EE
|
||||||
BAAiA2IABISeS+JeP5WqYqKrv/fV94+Kxnia4L/V3v+hMSYSwykmzBbPcu4q/HJS
|
ACIDYgAEZemGNQHD1w4WPYmQPMugX9IE97YyhB6g3GodFqBvR6O1fUw5vdBwGDTo
|
||||||
4Js+D70WOCzbQ6D+OQph/mK+3zrjnPkyMp61m88yRUkA7XwORJxgNpYluExMyMPk
|
FmfUW0zKzurwdV9VcglL9d2A8dXb5iYJ5DQ7yonzOkCRMRTG/waNjvm6j0ffQEH0
|
||||||
e1To++ee9qOBoDCBnTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTeFvxf+dkgWu32YkmR
|
a4T45ehwo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFCP4v+uOo3ezK2r6Fno5
|
||||||
HL7SOA3tIzBPBgNVHSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDES
|
ssJHMZ92ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||||
MBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUE
|
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||||
DDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQENBQADggEBAECD
|
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAJ6//
|
||||||
jSc2zHWXLxVW8lzyCyFU2/U1XkKSRIS2x7QNTY2NW9gx0kPzeyBYE74lAm6kopoZ
|
4JiO0Ww510CX3+pa/FcxopIM00xLdCKeRwGbD+CkbNzvFLeTD5mT7MmW3FFY06zr
|
||||||
lx41UKoKDOkI1yrPPz26Cwv6NuApZD1fobsXEhMzzSclxZLldhQhtZhMM5n5sk1Q
|
8RBIupZUJTIqiWbLyhO0dcxOKl18u7kVKMAyWfBm5f7YFBQs+99uHrZTyfB3aFS5
|
||||||
t1zZ3BkmnBIZlRwBBE/6sFq6hHO1hIZ4OrKZOKqgQaiKbfIFzo5r9pWoBvCS12sf
|
IUsMpNa8TcKj3tCf72doPsbU2tVskoDPLo0EWcg5nyJKBCg+6M8Cc3OmWdTlnHdV
|
||||||
kWJYMS8POOFn9+BiNcjoEhBpxwhbvnF+x2lODhaLegNzCdbtrJjlS5cJztTJeFMD
|
QQBcwiNh30Rcrai8FVctromZpzOP03UCIZH2ODQjaHCPmQ9TJ21SmpvzYs8gvPWR
|
||||||
irXaYNzlPZ45CU9tPVVuM3nn3FUzFOOZTU6zZ3vlbcTU3YGFNuLtuNjqkKgpyARv
|
QXj8kgkvPrstm2k5f8SxqGJkJz8nLRbEPg1RyfdPQPD9ValENjFZtwhqPCgxikPA
|
||||||
7aBrUOrUPiDZ3v7beaQ=
|
uQVEdUhtlCTGsvz3Mw==
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
</cert>
|
</cert>
|
||||||
<key>
|
<key>
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDA1iZlXa1lnVT6M75dK
|
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBTe+pBwBZIEMj0jszW
|
||||||
rcHt/NYGD8M7yhDKvxPBKX6jPBm/dhcHiYiGrxB4gLDs5MihZANiAASEnkviXj+V
|
fZEx67ft6630EHlFhaCHTXW9Nw25eDC2kfm2xwbjb093E++hZANiAARl6YY1AcPX
|
||||||
qmKiq7/31fePisZ4muC/1d7/oTEmEsMpJswWz3LuKvxyUuCbPg+9Fjgs20Og/jkK
|
DhY9iZA8y6Bf0gT3tjKEHqDcah0WoG9Ho7V9TDm90HAYNOgWZ9RbTMrO6vB1X1Vy
|
||||||
Yf5ivt8645z5MjKetZvPMkVJAO18DkScYDaWJbhMTMjD5HtU6PvnnvY=
|
CUv13YDx1dvmJgnkNDvKifM6QJExFMb/Bo2O+bqPR99AQfRrhPjl6HA=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
</key>
|
</key>
|
||||||
<tls-crypt>
|
<tls-crypt>
|
||||||
|
|||||||
@ -168,31 +168,31 @@ Certificate:
|
|||||||
Data:
|
Data:
|
||||||
Version: 3 (0x2)
|
Version: 3 (0x2)
|
||||||
Serial Number:
|
Serial Number:
|
||||||
66:08:5b:1b:f8:f4:1a:91:25:8d:57:e4:d1:eb:c9:02
|
78:5e:57:99:93:be:f2:47:da:cc:6c:8e:0d:71:3d:f8
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Issuer: CN=JF_server
|
Issuer: CN=JF_server
|
||||||
Validity
|
Validity
|
||||||
Not Before: May 26 19:53:27 2025 GMT
|
Not Before: May 5 13:33:22 2024 GMT
|
||||||
Not After : May 19 19:53:27 2055 GMT
|
Not After : Aug 8 13:33:22 2026 GMT
|
||||||
Subject: CN=stationKA2401
|
Subject: CN=stationKA2401
|
||||||
Subject Public Key Info:
|
Subject Public Key Info:
|
||||||
Public Key Algorithm: id-ecPublicKey
|
Public Key Algorithm: id-ecPublicKey
|
||||||
Public-Key: (384 bit)
|
Public-Key: (384 bit)
|
||||||
pub:
|
pub:
|
||||||
04:82:a2:c4:54:2e:5f:18:b0:09:38:2e:88:52:6e:
|
04:8f:4f:26:6b:af:cb:49:0b:74:3e:65:aa:0e:9a:
|
||||||
23:10:f1:a3:d1:12:8c:33:e6:24:00:e8:03:18:12:
|
9a:57:99:b1:f6:bf:dc:74:ae:d6:72:ed:d3:a8:04:
|
||||||
ff:11:d3:fb:38:7c:e7:85:12:94:11:ad:d4:41:67:
|
2f:a8:a0:43:63:f6:c8:e2:cd:dc:d8:fd:bf:69:93:
|
||||||
97:29:8e:07:fb:b6:b9:b2:80:ca:cc:d5:14:4d:a3:
|
09:d7:bd:11:ab:d9:c5:ae:20:bc:00:ac:d7:ad:ea:
|
||||||
2e:55:29:60:8a:9f:7d:50:a4:21:dc:e2:17:05:5c:
|
fb:c0:1e:44:6f:ba:20:63:9d:32:f7:38:8f:c0:d7:
|
||||||
ca:c6:5d:8f:c4:a2:99:e2:2b:18:a7:69:a4:e4:26:
|
bf:b4:23:15:16:4d:84:59:13:d5:4b:de:9e:7b:46:
|
||||||
11:1c:f5:0e:a1:5e:a5
|
d3:ce:ba:5d:d9:53:c4
|
||||||
ASN1 OID: secp384r1
|
ASN1 OID: secp384r1
|
||||||
NIST CURVE: P-384
|
NIST CURVE: P-384
|
||||||
X509v3 extensions:
|
X509v3 extensions:
|
||||||
X509v3 Basic Constraints:
|
X509v3 Basic Constraints:
|
||||||
CA:FALSE
|
CA:FALSE
|
||||||
X509v3 Subject Key Identifier:
|
X509v3 Subject Key Identifier:
|
||||||
43:48:E4:77:19:BA:6E:C7:4A:98:98:A5:05:8B:DB:19:62:8B:47:33
|
68:18:F5:54:75:30:27:4D:B5:96:D3:34:8E:1C:3B:58:1E:BC:1B:78
|
||||||
X509v3 Authority Key Identifier:
|
X509v3 Authority Key Identifier:
|
||||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||||
DirName:/CN=JF_server
|
DirName:/CN=JF_server
|
||||||
@ -201,47 +201,47 @@ Certificate:
|
|||||||
TLS Web Client Authentication
|
TLS Web Client Authentication
|
||||||
X509v3 Key Usage:
|
X509v3 Key Usage:
|
||||||
Digital Signature
|
Digital Signature
|
||||||
Signature Algorithm: sha512WithRSAEncryption
|
Signature Algorithm: sha256WithRSAEncryption
|
||||||
Signature Value:
|
Signature Value:
|
||||||
66:0e:a7:15:99:98:0b:a7:bf:be:fa:c5:c6:c9:6e:d4:d0:18:
|
67:97:34:79:07:29:c3:cd:a6:7c:86:82:aa:94:0b:ca:69:ef:
|
||||||
84:fd:ef:bc:33:98:db:8e:56:44:25:c9:7e:7d:d9:1b:00:95:
|
79:5e:a6:35:97:c3:31:07:9f:cd:aa:89:95:e3:b1:26:4b:e9:
|
||||||
39:59:36:2e:b0:d1:2e:8f:cf:c8:c4:0e:47:7f:c9:21:01:18:
|
88:50:1f:3e:10:eb:d2:82:c5:6e:56:18:1e:ff:72:60:c1:de:
|
||||||
7f:8b:5a:16:30:97:c3:a3:bb:70:54:58:e2:55:97:71:e0:f7:
|
11:af:b8:e6:b6:bb:de:7d:52:f5:ba:1b:9b:4e:49:b2:05:25:
|
||||||
b3:47:bb:88:11:30:a4:b9:41:65:2b:b5:d7:1b:df:5e:df:66:
|
0a:e9:8a:f8:85:f7:0e:c8:db:fd:c4:b9:e9:a9:6f:85:0a:cb:
|
||||||
33:32:52:a7:92:83:2e:87:57:11:65:52:28:f5:16:06:92:ec:
|
63:a3:d0:a7:77:e0:7f:ff:34:29:90:80:66:a7:8d:80:6a:bf:
|
||||||
39:24:20:c0:fb:b2:21:30:a6:87:b4:08:b9:7c:32:3c:3b:09:
|
23:74:80:77:ad:53:2d:5e:f6:02:d1:05:3f:9f:fa:17:11:8f:
|
||||||
36:2d:9c:e8:8b:47:f3:d8:58:10:44:b0:10:f4:dc:e1:d5:e7:
|
7f:b4:a5:44:74:2b:57:1e:4b:7e:29:c8:95:48:a6:3a:fc:ae:
|
||||||
e6:7b:c6:51:0b:de:fc:ef:aa:d7:ee:3b:ec:55:11:2b:43:52:
|
82:c2:7b:b2:26:4f:92:d5:af:73:71:30:8e:b6:b9:6a:f2:b0:
|
||||||
24:4e:b4:56:0d:cf:25:33:05:67:ad:0a:3e:b4:b2:55:db:b9:
|
00:df:44:a2:3f:cd:4a:45:7e:ed:43:4b:d4:0e:07:25:94:37:
|
||||||
43:bf:24:87:8e:02:8e:50:7e:6a:35:ef:fb:89:b9:16:1f:6f:
|
e0:5d:8d:0b:1b:fb:76:07:d0:41:da:c9:f3:19:fa:28:8b:46:
|
||||||
c0:46:6a:7f:6c:8a:ea:94:2d:a5:62:04:f9:ee:fe:31:51:d9:
|
df:5a:19:82:ee:1e:e0:1a:be:39:c1:a9:65:b1:02:92:32:96:
|
||||||
73:f9:b8:5c:83:3a:46:00:fa:4f:e7:44:e3:60:da:c8:cc:cd:
|
2c:7e:3f:4e:ce:9e:b0:66:57:b4:74:2c:98:de:13:da:b2:27:
|
||||||
6b:18:55:27:6e:c9:38:e7:3b:7d:c8:a3:67:13:08:6a:67:18:
|
e5:7a:5b:30:df:3e:46:1b:6c:92:53:6f:c6:0e:88:6f:0d:ae:
|
||||||
92:7d:7e:c9
|
89:ca:ea:ea
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICqzCCAZOgAwIBAgIQZghbG/j0GpEljVfk0evJAjANBgkqhkiG9w0BAQ0FADAU
|
MIICqTCCAZGgAwIBAgIQeF5XmZO+8kfazGyODXE9+DANBgkqhkiG9w0BAQsFADAU
|
||||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwIBcNMjUwNTI2MTk1MzI3WhgPMjA1NTA1MTkx
|
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjQwNTA1MTMzMzIyWhcNMjYwODA4MTMz
|
||||||
OTUzMjdaMBgxFjAUBgNVBAMMDXN0YXRpb25LQTI0MDEwdjAQBgcqhkjOPQIBBgUr
|
MzIyWjAYMRYwFAYDVQQDDA1zdGF0aW9uS0EyNDAxMHYwEAYHKoZIzj0CAQYFK4EE
|
||||||
gQQAIgNiAASCosRULl8YsAk4LohSbiMQ8aPREowz5iQA6AMYEv8R0/s4fOeFEpQR
|
ACIDYgAEj08ma6/LSQt0PmWqDpqaV5mx9r/cdK7Wcu3TqAQvqKBDY/bI4s3c2P2/
|
||||||
rdRBZ5cpjgf7trmygMrM1RRNoy5VKWCKn31QpCHc4hcFXMrGXY/EopniKxinaaTk
|
aZMJ170Rq9nFriC8AKzXrer7wB5Eb7ogY50y9ziPwNe/tCMVFk2EWRPVS96ee0bT
|
||||||
JhEc9Q6hXqWjgaAwgZ0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUQ0jkdxm6bsdKmJil
|
zrpd2VPEo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFGgY9VR1MCdNtZbTNI4c
|
||||||
BYvbGWKLRzMwTwYDVR0jBEgwRoAUiniQ5fBQ54x15LjAoejpm7IanTKhGKQWMBQx
|
O1gevBt4ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||||
EjAQBgNVBAMMCUpGX3NlcnZlcoIUXe37kz2yqgyL2xXfvaGRzlz7ywYwEwYDVR0l
|
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||||
BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBDQUAA4IBAQBm
|
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAZ5c0
|
||||||
DqcVmZgLp7+++sXGyW7U0BiE/e+8M5jbjlZEJcl+fdkbAJU5WTYusNEuj8/IxA5H
|
eQcpw82mfIaCqpQLymnveV6mNZfDMQefzaqJleOxJkvpiFAfPhDr0oLFblYYHv9y
|
||||||
f8khARh/i1oWMJfDo7twVFjiVZdx4PezR7uIETCkuUFlK7XXG99e32YzMlKnkoMu
|
YMHeEa+45ra73n1S9bobm05JsgUlCumK+IX3Dsjb/cS56alvhQrLY6PQp3fgf/80
|
||||||
h1cRZVIo9RYGkuw5JCDA+7IhMKaHtAi5fDI8Owk2LZzoi0fz2FgQRLAQ9Nzh1efm
|
KZCAZqeNgGq/I3SAd61TLV72AtEFP5/6FxGPf7SlRHQrVx5LfinIlUimOvyugsJ7
|
||||||
e8ZRC97876rX7jvsVRErQ1IkTrRWDc8lMwVnrQo+tLJV27lDvySHjgKOUH5qNe/7
|
siZPktWvc3Ewjra5avKwAN9Eoj/NSkV+7UNL1A4HJZQ34F2NCxv7dgfQQdrJ8xn6
|
||||||
ibkWH2/ARmp/bIrqlC2lYgT57v4xUdlz+bhcgzpGAPpP50TjYNrIzM1rGFUnbsk4
|
KItG31oZgu4e4Bq+OcGpZbECkjKWLH4/Ts6esGZXtHQsmN4T2rIn5XpbMN8+Rhts
|
||||||
5zt9yKNnEwhqZxiSfX7J
|
klNvxg6Ibw2uicrq6g==
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
</cert>
|
</cert>
|
||||||
<key>
|
<key>
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDAh/Y9TU8aUUekLbX6h
|
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDCqirzGpSX6ei53uFLm
|
||||||
FFiLOce9MCbh1b8Kpw9bjc9fLmB8zrWjmRvrieIjaOaLD8ShZANiAASCosRULl8Y
|
GTcOHVuwJL0ut2FF+GghDE9CAc/up9n1u8xmfvI0/KEueYehZANiAASPTyZrr8tJ
|
||||||
sAk4LohSbiMQ8aPREowz5iQA6AMYEv8R0/s4fOeFEpQRrdRBZ5cpjgf7trmygMrM
|
C3Q+ZaoOmppXmbH2v9x0rtZy7dOoBC+ooENj9sjizdzY/b9pkwnXvRGr2cWuILwA
|
||||||
1RRNoy5VKWCKn31QpCHc4hcFXMrGXY/EopniKxinaaTkJhEc9Q6hXqU=
|
rNet6vvAHkRvuiBjnTL3OI/A17+0IxUWTYRZE9VL3p57RtPOul3ZU8Q=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
</key>
|
</key>
|
||||||
<tls-crypt>
|
<tls-crypt>
|
||||||
|
|||||||
Binary file not shown.
@ -1988,177 +1988,3 @@ Démarrage du logiciel Otarcik CAN version 1.08 le 2025-05-08 à 13:37:29
|
|||||||
2025-05-08 13:38:34 Client MQTT metrics.yultek.dev déconnecté.
|
2025-05-08 13:38:34 Client MQTT metrics.yultek.dev déconnecté.
|
||||||
2025-05-08 13:38:34 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
2025-05-08 13:38:34 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
||||||
2025-05-08 13:38:34 Client MQTT 192.168.51.32 déconnecté.
|
2025-05-08 13:38:34 Client MQTT 192.168.51.32 déconnecté.
|
||||||
|
|
||||||
|
|
||||||
********************************************************************
|
|
||||||
Démarrage du logiciel Otarcik CAN version 1.08 le 2025-05-16 à 12:15:05
|
|
||||||
********************************************************************
|
|
||||||
2025-05-16 12:15:05 Chargement de la configuration système...
|
|
||||||
2025-05-16 12:15:05 Configuration système chargée avec succès!
|
|
||||||
2025-05-16 12:15:05 Initialisation du dispositif [MasterCAN]
|
|
||||||
2025-05-16 12:15:05 Démarrage d'un module CAN...
|
|
||||||
2025-05-16 12:15:05 Impossible de trouver le module CAN sur le channel 1
|
|
||||||
2025-05-16 12:15:05 Démarrage du Watchdog CAN...
|
|
||||||
2025-05-16 12:15:05 Watchdog CAN initialisé pour le module sur le channel 1
|
|
||||||
2025-05-16 12:15:05 Démarrage du logiciel OtarcikCAN
|
|
||||||
2025-05-16 12:15:05 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-05-16 12:15:05 Client MQTT 192.168.51.32 en cours de connexion...
|
|
||||||
2025-05-16 12:15:05 LAN Device 192.168.51.2 is now ONLINE on network
|
|
||||||
2025-05-16 12:15:05 LAN Device 192.168.50.100 is now ONLINE on network
|
|
||||||
2025-05-16 12:15:05 LAN Device 192.168.50.1 is now ONLINE on network
|
|
||||||
2025-05-16 12:15:05 LAN Device 192.168.51.32 is now ONLINE on network
|
|
||||||
2025-05-16 12:15:05 LAN Device 192.168.50.110 is now ONLINE on network
|
|
||||||
2025-05-16 12:15:05 Client MQTT 192.168.51.32 connecté.
|
|
||||||
2025-05-16 12:15:05 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-05-16 12:15:05 Internet Connecté...
|
|
||||||
2025-05-16 12:18:35 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-05-16 12:18:35 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-05-16 12:18:35 Client MQTT 192.168.51.32 déconnecté.
|
|
||||||
2025-05-16 12:18:35 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-05-16 12:18:35 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 12:18:35 Sauvegarde de la configuration système...
|
|
||||||
2025-05-16 12:18:35 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 12:18:35 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-05-16 12:18:57 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-05-16 12:18:57 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-05-16 12:18:57 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
2025-05-16 12:18:57 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-05-16 12:18:57 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 12:18:57 Sauvegarde de la configuration système...
|
|
||||||
2025-05-16 12:18:57 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 12:18:57 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-05-16 12:19:27 Déinitialisation du module PCAN USB ID 81
|
|
||||||
2025-05-16 12:19:27 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
|
||||||
2025-05-16 12:19:27 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-05-16 12:19:27 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-05-16 12:19:27 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
|
|
||||||
|
|
||||||
********************************************************************
|
|
||||||
Démarrage du logiciel Otarcik CAN version 1.08 le 2025-05-16 à 12:38:45
|
|
||||||
********************************************************************
|
|
||||||
2025-05-16 12:38:45 Chargement de la configuration système...
|
|
||||||
2025-05-16 12:38:45 Configuration système chargée avec succès!
|
|
||||||
2025-05-16 12:38:45 Initialisation du dispositif [MasterCAN]
|
|
||||||
2025-05-16 12:38:45 Démarrage d'un module CAN...
|
|
||||||
2025-05-16 12:38:45 Impossible de trouver le module CAN sur le channel 1
|
|
||||||
2025-05-16 12:38:45 Démarrage du Watchdog CAN...
|
|
||||||
2025-05-16 12:38:45 Watchdog CAN initialisé pour le module sur le channel 1
|
|
||||||
2025-05-16 12:38:45 Démarrage du logiciel OtarcikCAN
|
|
||||||
2025-05-16 12:38:45 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-05-16 12:38:45 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 12:38:45 LAN Device 192.168.51.2 is now ONLINE on network
|
|
||||||
2025-05-16 12:38:45 LAN Device 192.168.50.100 is now ONLINE on network
|
|
||||||
2025-05-16 12:38:45 LAN Device 192.168.50.1 is now ONLINE on network
|
|
||||||
2025-05-16 12:38:45 LAN Device 192.168.51.32 is now ONLINE on network
|
|
||||||
2025-05-16 12:38:45 LAN Device 192.168.50.110 is now ONLINE on network
|
|
||||||
2025-05-16 12:38:45 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 12:38:45 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-05-16 12:38:45 Internet Connecté...
|
|
||||||
2025-05-16 13:32:35 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
2025-05-16 13:32:45 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:32:45 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:32:49 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:32:59 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:32:59 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:33:03 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:33:13 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:33:13 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:33:17 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:33:27 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:33:27 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:33:32 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:33:42 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:33:42 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:33:46 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:33:56 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:33:56 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:34:00 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:34:10 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:34:10 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:34:14 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:34:24 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:34:24 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:34:29 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:34:39 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:34:39 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:34:43 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:34:53 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:34:53 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:34:57 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:35:07 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:35:07 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:35:11 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:35:21 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:35:21 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:35:26 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:35:36 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:35:36 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:35:40 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:35:50 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:35:50 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:35:52 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 13:38:07 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
2025-05-16 13:38:17 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:38:17 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:38:21 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 13:40:31 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
2025-05-16 13:40:41 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:40:41 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:40:45 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 13:40:45 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
2025-05-16 13:40:55 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:40:55 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:40:59 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:41:09 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:41:09 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:41:13 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:41:23 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:41:23 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:41:28 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:41:38 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:41:38 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:41:42 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:41:52 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:41:52 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:41:56 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:42:06 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:42:06 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:42:10 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:42:20 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:42:20 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:42:25 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:42:35 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:42:35 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:42:39 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:42:49 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:42:49 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:42:53 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:43:03 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:43:03 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:43:07 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:43:17 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:43:17 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:43:22 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:43:32 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:43:32 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:43:36 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:43:46 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:43:46 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:43:50 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:44:00 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:44:00 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:44:04 Client MQTT 142.93.152.2 déconnecté pendant une reconnexion.
|
|
||||||
2025-05-16 13:44:14 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 13:44:14 Client MQTT 142.93.152.2 en cours de connexion...
|
|
||||||
2025-05-16 13:44:14 Client MQTT 142.93.152.2 connecté.
|
|
||||||
2025-05-16 14:59:50 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-05-16 14:59:50 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-05-16 15:00:00 Tentative de connexion au serveur MQTT...
|
|
||||||
2025-05-16 15:00:00 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-05-16 15:00:00 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-05-16 16:43:08 Déinitialisation du module PCAN USB ID 81
|
|
||||||
2025-05-16 16:43:08 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
|
||||||
2025-05-16 16:43:08 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-05-16 16:43:08 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-05-16 16:43:08 Client MQTT 142.93.152.2 déconnecté.
|
|
||||||
|
|||||||
@ -5550,31 +5550,3 @@ Démarrage du logiciel Otarcik CAN version 1.08 le 2025-05-03 à 20:09:04
|
|||||||
2025-05-03 20:09:27 Client MQTT metrics.yultek.dev déconnecté.
|
2025-05-03 20:09:27 Client MQTT metrics.yultek.dev déconnecté.
|
||||||
2025-05-03 20:09:27 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
2025-05-03 20:09:27 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
||||||
2025-05-03 20:09:27 Client MQTT 192.168.51.32 déconnecté.
|
2025-05-03 20:09:27 Client MQTT 192.168.51.32 déconnecté.
|
||||||
|
|
||||||
|
|
||||||
********************************************************************
|
|
||||||
Démarrage du logiciel Otarcik CAN version 1.08 le 2025-12-12 à 10:22:19
|
|
||||||
********************************************************************
|
|
||||||
2025-12-12 10:22:19 Chargement de la configuration système...
|
|
||||||
2025-12-12 10:22:19 Configuration système chargée avec succès!
|
|
||||||
2025-12-12 10:22:19 Initialisation du dispositif [MasterCAN]
|
|
||||||
2025-12-12 10:22:19 Démarrage d'un module CAN...
|
|
||||||
2025-12-12 10:22:19 Impossible de trouver le module CAN sur le channel 1
|
|
||||||
2025-12-12 10:22:19 Démarrage du Watchdog CAN...
|
|
||||||
2025-12-12 10:22:19 Watchdog CAN initialisé pour le module sur le channel 1
|
|
||||||
2025-12-12 10:22:19 Démarrage du logiciel OtarcikCAN
|
|
||||||
2025-12-12 10:22:19 Client MQTT metrics.yultek.dev en cours de connexion...
|
|
||||||
2025-12-12 10:22:19 Client MQTT 192.168.51.32 en cours de connexion...
|
|
||||||
2025-12-12 10:22:19 Client MQTT 192.168.51.32 connecté.
|
|
||||||
2025-12-12 10:22:19 LAN Device 192.168.51.2 is now ONLINE on network
|
|
||||||
2025-12-12 10:22:19 LAN Device 192.168.50.100 is now ONLINE on network
|
|
||||||
2025-12-12 10:22:19 LAN Device 192.168.50.1 is now ONLINE on network
|
|
||||||
2025-12-12 10:22:19 LAN Device 192.168.51.32 is now ONLINE on network
|
|
||||||
2025-12-12 10:22:19 LAN Device 192.168.50.110 is now ONLINE on network
|
|
||||||
2025-12-12 10:22:19 Client MQTT metrics.yultek.dev connecté.
|
|
||||||
2025-12-12 10:22:19 Internet Connecté...
|
|
||||||
2025-12-12 10:22:27 Déinitialisation du module PCAN USB ID 81
|
|
||||||
2025-12-12 10:22:27 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
|
||||||
2025-12-12 10:22:27 Client MQTT metrics.yultek.dev déconnecté.
|
|
||||||
2025-12-12 10:22:27 Passage en mode buffering des messages MQTT pour metrics.yultek.dev
|
|
||||||
2025-12-12 10:22:27 Client MQTT 192.168.51.32 déconnecté.
|
|
||||||
|
|||||||
Binary file not shown.
Binary file not shown.
18
PWD.txt
18
PWD.txt
@ -3,27 +3,11 @@ PC remote de test: b2BiiIU8
|
|||||||
Anydesk: Otarcik!
|
Anydesk: Otarcik!
|
||||||
Anydesk ID : 1949771789
|
Anydesk ID : 1949771789
|
||||||
Anydesk ID PC #2: 1004609138
|
Anydesk ID PC #2: 1004609138
|
||||||
Anydesk ID PC #3: 1907983063
|
|
||||||
Anydesk ID PC #4: 1848634538
|
|
||||||
Router Ubiquiti: user:yultek pwd:Evinrude30
|
Router Ubiquiti: user:yultek pwd:Evinrude30
|
||||||
Windows PC Axiomtek: user yultek pwd:Otarcik!
|
Windows PC Axiomtek: user yultek pwd:Otarcik!
|
||||||
Pet name: otarcik
|
Pet name: otarcik
|
||||||
City born: Chambly
|
City born: Chambly
|
||||||
childhood nickname : otarcik
|
childhood nickname : otarcik
|
||||||
|
EMQX
|
||||||
Crédentiels pour clients EMQX (Kubernetes ET droplet)
|
|
||||||
Login: YULTekDev pwd: PaceST25!
|
Login: YULTekDev pwd: PaceST25!
|
||||||
Login: JFMDev pwd:PaceST25!
|
Login: JFMDev pwd:PaceST25!
|
||||||
|
|
||||||
EMQX Web GUI (droplet)
|
|
||||||
Login: admin pwd: Otarcik!
|
|
||||||
Login: pblouin pwd: MoustiqueLeChat2025
|
|
||||||
Login: JFMDev pwd: LolaLeChat2025
|
|
||||||
|
|
||||||
Accès droplets (apps et clickhouse)
|
|
||||||
Login: root pwd: F4stCharge
|
|
||||||
Login: yultek pwd: Ch4rgeRapide
|
|
||||||
|
|
||||||
Clickhouse (droplet)
|
|
||||||
Login: default pwd: F4stCharge <-- c'est le compte admin
|
|
||||||
Login: yultek pwd: Otarcik!
|
|
||||||
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user