官术网_书友最值得收藏!

  • OpenVPN 2 Cookbook
  • Jan Just Keijser
  • 343字
  • 2021-04-09 22:05:46

Plaintext tunnel

In the very first recipe, we created a tunnel in which the data traffic was not encrypted. To create a completely plain text tunnel, we also disable the HMAC authentication. This can be useful when debugging a bad connection, as all traffic over the tunnel can now easily be monitored. In this recipe, we will look at how to do this. This type of tunnel is also useful when doing performance measurements, as it is the least CPU-intensive tunnel that can be established.

Getting ready

Install OpenVPN 2.0 or higher on two computers. Make sure the computers are connected over a network. For this recipe, the server computer was running CentOS 5 Linux and OpenVPN 2.1.1 and the client was running Fedora 13 Linux and OpenVPN 2.1.1.

As we are not using any encryption, no secret keys are needed.

How to do it...

  1. Launch the server (listening)-side OpenVPN process:
     [root@server]# openvpn \
     --ifconfig 10.200.0.1 10.200.0.2 \
     --dev tun -–auth none
    
  2. Then launch the client-side OpenVPN process:
     [root@client]# openvpn \
     --ifconfig 10.200.0.2 10.200.0.1 \
     --dev tun –-auth none\
     --remote openvpnserver.example.com
    
  3. The connection is established with two warning messages in the output:

    … ******* WARNING *******: null cipher specified, no encryption will be used

    … ******* WARNING *******: null MAC specified, no authentication will be used

How it works...

With this setup, absolutely no encryption is performed. All the traffic that is sent over the tunnel is encapsulated in an OpenVPN packet and then sent "as-is".

There's more...

To actually view the traffic, we can use tcpdump:

  • Set up the connection as outlined.
  • Start tcpdump and listen on the network interface, not the tunnel interface itself:
    [root]@client]# tcpdump -w -I eth0 -s 0 host openvpnserver \
     | strings
    
  • Now, send some text across the tunnel, using something like nc (Netcat). First, launch nc on the server side:
     [server]$ nc -l 31000
    
  • On the client side, launch nc in client mode and type the words hello and goodbye.
     [client]$ nc 10.200.0.1 3100
     hello
     goodbye
    
  • In the tcpdump window, you should now see:
    There's more...
主站蜘蛛池模板: 正安县| 宿州市| 磐安县| 花莲县| 临桂县| 和政县| 淮北市| 界首市| 商水县| 子长县| 施甸县| 罗平县| 安宁市| 古丈县| 句容市| 多伦县| 买车| 加查县| 株洲市| 汝城县| 鹿邑县| 正定县| 托克逊县| 陵水| 阳山县| 饶平县| 岳普湖县| 肥城市| 满洲里市| 卢氏县| 拉萨市| 宝应县| 股票| 南昌市| 彭阳县| 白山市| 天台县| 柯坪县| 马公市| 伽师县| 平邑县|