Using the VPN

These notes describe how to use the OpenVPN-based Virtual Private Network provided by SC Lab. With it:

Setting up a new VPN client

  1. On linux, you will probably put all the configuration files in /etc/openvpn (if you are using fedora 10 or greater, you can use the System/Preferences/Internet and Network/Network Connections menu, then VPN/Add/OpenVPN instead; it will set up most of the configuration for you)
  2. On macintosh, put them in /Users/<yourname>/Library/openvpn unless you are doing a custom install - especially if you use Tunnelblick. If you want the client to start up automatically when you boot, you will need to do a little more.
  3. On MS Windows, put them in PATH-TO-OPENVPN\config. It will be 'C:\Program Files\OpenVPN\config' unless you change it. You can get a GUI version at http://openvpn.se/ for easier use.

If you asked for a fixed ip address, Bob will tell you it (it will have the form 10.160.81.x)

  1. <client>.crt
  2. <client>.key

One additional issue: openvpn uses ICMP for signalling, more broadly than some firewalls allow by default. If you can't get our VPN to work, or your connection keeps dropping out, you may need to open ICMP more broadly to get a stable connection (if this is the cause of the problems, you should be able to see ICMP packets being blocked from tun0 in your logs). If you do so, you should restrict the opening as above, to addresses in our VPN range (10.160.80.0 to 10.160.81.255) on the VPN interface (tun0). Opening ICMP risks ICMP flood attacks, but it's unlikely that they would originate in our VPN, so it should be safe so long as you only open the port to the VPN.

(With a GUI version in MS Windows, you can open the tunnel by right-clicking the config file or a tray icon on a taskbar)

      route-method exe
      route-delay 2

Please note that this configuration uses the https port 443, rather than the proper vpn port, 1194. This means you can be very confident that it won't be blocked, wherever you are using it from (and if you're behind a proxy, the proxy will almost certainly pass it too). NAT should also not cause any problems. You will need to change the lines:

ca /Users/rim/Library/openvpn/certs/ca.crt
cert /Users/rim/Library/openvpn/certs/bobsmac.crt
key /Users/rim/Library/openvpn/keys/bobsmac.key

or on MSW

ca PATH-TO-CERTS\\ca.crt
cert PATH-TO-CERTS\\bobsmac.crt
key PATH-TO-KEYS\\bobsmac.key
;user nobody
;group nobody

Useful vpn addresses:

10.160.81.65    sc
10.160.80.1     sc1