From 6d42241e9160d72e0fb52c7ed95f80c096c78296 Mon Sep 17 00:00:00 2001 From: Kilian Saffran Date: Tue, 19 Feb 2019 17:14:31 +0100 Subject: [PATCH 1/1] initial input --- bin/allstations.sh | 0 bin/checkplayerstatus.pl | 113 + bin/checkvpn.pl | 76 + bin/clr.pl | 302 ++ bin/clr2.pl | 321 ++ bin/firewall.pl | 210 ++ bin/ftpclient.pl | 38 + bin/multistation.sh | 58 + bin/resetkeylogin.sh | 3 + bin/rsynctostation.pl | 32 + bin/sqlite.pm | 149 + bin/station.sh | 98 + bin/updstation.sh | 45 + bin/vpn-client.sh | 86 + bin/vpn-client2.sh | 83 + bin/vpn-server.sh | 66 + bin/vpnclient.pl | 88 + bin/vpnserver.pl | 171 ++ current/POSDABStation.sqlite | Bin 0 -> 77824 bytes current/aral-bertrange/current_audio.txt | 2038 +++++++++++++ current/aral-diekirch/current_audio.txt | 2038 +++++++++++++ current/aral-ettelbruck/current_audio.txt | 2038 +++++++++++++ current/aral-lintgen/current_audio.txt | 2039 +++++++++++++ current/aral-pommerloch/current_audio.txt | 2038 +++++++++++++ .../stations/aral-bascharage_audio.txt | 2049 +++++++++++++ .../stations/aral-bascharage_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-berchem_audio.txt | 2587 ++++++++++++++++ .../stations/aral-berchem_audio2.txt | 2587 ++++++++++++++++ .../stations/aral-berchem_audio_cmp.txt | 2587 ++++++++++++++++ .../stations/aral-bertrange_audio.txt | 2183 ++++++++++++++ .../stations/aral-bertrange_audio_cmp.txt | 2183 ++++++++++++++ .../stations/aral-bettembourg_audio.txt | 2049 +++++++++++++ .../stations/aral-bettembourg_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-diekirch_audio.txt | 2038 +++++++++++++ .../stations/aral-diekirch_audio_cmp.txt | 2038 +++++++++++++ .../stations/aral-differdange_audio.txt | 2049 +++++++++++++ .../stations/aral-differdange_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-dudelange_audio.txt | 2632 +++++++++++++++++ .../stations/aral-dudelange_audio_cmp.txt | 2632 +++++++++++++++++ .../stations/aral-echternach_audio.txt | 2182 ++++++++++++++ .../stations/aral-echternach_audio_cmp.txt | 2182 ++++++++++++++ .../stations/aral-ettelbruck_audio.txt | 2183 ++++++++++++++ .../stations/aral-ettelbruck_audio_cmp.txt | 2183 ++++++++++++++ .../audiolists/stations/aral-findel_audio.txt | 2182 ++++++++++++++ .../stations/aral-findel_audio_cmp.txt | 2182 ++++++++++++++ .../audiolists/stations/aral-foetz_audio.txt | 2171 ++++++++++++++ .../stations/aral-foetz_audio_cmp.txt | 2171 ++++++++++++++ .../stations/aral-frisange_audio.txt | 2049 +++++++++++++ .../stations/aral-frisange_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-hoscheiddickt_audio.txt | 2049 +++++++++++++ .../stations/aral-hoscheiddickt_audio_cmp.txt | 2049 +++++++++++++ .../audiolists/stations/aral-howald_audio.txt | 2049 +++++++++++++ .../stations/aral-howald_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-lallange_audio.txt | 2181 ++++++++++++++ .../stations/aral-lallange_audio_cmp.txt | 2181 ++++++++++++++ .../stations/aral-lintgen_audio.txt | 2184 ++++++++++++++ .../stations/aral-lintgen_audio_cmp.txt | 2184 ++++++++++++++ .../audiolists/stations/aral-merl2_audio.txt | 2049 +++++++++++++ .../stations/aral-merl2_audio_cmp.txt | 2049 +++++++++++++ .../audiolists/stations/aral-merl_audio.txt | 2049 +++++++++++++ .../stations/aral-merl_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-mondorf_audio.txt | 2049 +++++++++++++ .../stations/aral-mondorf_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-petange_audio.txt | 2039 +++++++++++++ .../stations/aral-petange_audio_cmp.txt | 2039 +++++++++++++ .../stations/aral-pommerloch_audio.txt | 2163 ++++++++++++++ .../stations/aral-pommerloch_audio_cmp.txt | 2163 ++++++++++++++ .../stations/aral-redange_audio.txt | 1859 ++++++++++++ .../stations/aral-redange_audio_cmp.txt | 1859 ++++++++++++ .../stations/aral-remich1_audio.txt | 2407 +++++++++++++++ .../stations/aral-remich1_audio_cmp.txt | 2407 +++++++++++++++ .../stations/aral-remich2_audio.txt | 2038 +++++++++++++ .../stations/aral-remich2_audio_cmp.txt | 2038 +++++++++++++ .../stations/aral-rodange2_audio.txt | 2182 ++++++++++++++ .../stations/aral-rodange2_audio_cmp.txt | 2182 ++++++++++++++ .../stations/aral-rodange_audio.txt | 2087 +++++++++++++ .../stations/aral-rodange_audio_cmp.txt | 2087 +++++++++++++ .../stations/aral-rollingergrund_audio.txt | 2171 ++++++++++++++ .../aral-rollingergrund_audio_cmp.txt | 2171 ++++++++++++++ .../stations/aral-schengen_audio.txt | 2300 ++++++++++++++ .../stations/aral-schengen_audio_cmp.txt | 2300 ++++++++++++++ .../stations/aral-schifflange_audio.txt | 2182 ++++++++++++++ .../stations/aral-schifflange_audio_cmp.txt | 2182 ++++++++++++++ .../stations/aral-steinfort_audio.txt | 2087 +++++++++++++ .../stations/aral-steinfort_audio_cmp.txt | 2087 +++++++++++++ .../stations/aral-vianden_audio.txt | 2049 +++++++++++++ .../stations/aral-vianden_audio_cmp.txt | 2049 +++++++++++++ .../stations/aral-wasserbillig_audio.txt | 2021 +++++++++++++ .../audiolists/stations/bp-capellen_audio.txt | 2152 ++++++++++++++ .../stations/bp-capellen_audio_cmp.txt | 2152 ++++++++++++++ .../stations/maroq-belleetoile_audio.txt | 2279 ++++++++++++++ .../stations/maroq-belleetoile_audio_cmp.txt | 2279 ++++++++++++++ current/current_mainstream.2.txt | 1922 ++++++++++++ current/current_mainstream.txt | 1922 ++++++++++++ current/station_config.txt | 36 + current/station_uptime.txt | 37 + current/vsftpd.passwd | 1 + logs/coloradio/2017-09-01.log | 35 + logs/coloradio/2017-09-02.log | 35 + logs/coloradio/2017-09-03.log | 34 + logs/coloradio/2017-09-04.log | 36 + logs/coloradio/2017-09-05.log | 36 + logs/coloradio/2017-09-06.log | 36 + logs/coloradio/2017-09-07.log | 36 + logs/coloradio/2017-09-08.log | 36 + logs/coloradio/2017-09-09.log | 36 + logs/coloradio/2017-09-10.log | 33 + logs/coloradio/2017-09-11.log | 36 + logs/coloradio/2017-09-12.log | 36 + logs/coloradio/2017-09-13.log | 36 + logs/coloradio/2017-09-14.log | 36 + logs/coloradio/2017-09-15.log | 36 + logs/coloradio/2017-09-16.log | 35 + logs/coloradio/2017-09-17.log | 33 + logs/coloradio/2017-09-18.log | 35 + logs/coloradio/2017-09-19.log | 35 + logs/coloradio/2017-09-20.log | 35 + logs/coloradio/2017-09-21.log | 35 + logs/coloradio/2017-09-22.log | 35 + logs/coloradio/2017-09-23.log | 36 + logs/coloradio/2017-09-24.log | 34 + logs/coloradio/2017-09-25.log | 36 + logs/coloradio/2017-09-26.log | 36 + logs/coloradio/2017-09-27.log | 36 + logs/coloradio/2017-09-28.log | 35 + logs/coloradio/2017-09-29.log | 36 + logs/coloradio/2017-09-30.log | 36 + logs/coloradio/2017-10-01.log | 33 + logs/coloradio/2017-10-02.log | 35 + logs/coloradio/2017-10-03.log | 32 + logs/coloradio/2017-10-04.log | 35 + logs/coloradio/2017-10-05.log | 35 + logs/coloradio/2017-10-06.log | 35 + logs/coloradio/2017-10-07.log | 36 + logs/coloradio/2017-10-08.log | 32 + logs/coloradio/2017-10-09.log | 34 + logs/coloradio/2017-10-10.log | 35 + logs/coloradio/2017-10-11.log | 36 + logs/coloradio/2017-10-12.log | 35 + logs/coloradio/2017-10-13.log | 35 + logs/coloradio/2017-10-14.log | 35 + logs/coloradio/2017-10-15.log | 33 + logs/coloradio/2017-10-16.log | 35 + logs/coloradio/2017-10-17.log | 35 + logs/coloradio/2017-10-18.log | 35 + logs/coloradio/2017-10-19.log | 35 + logs/coloradio/2017-10-20.log | 35 + logs/coloradio/2017-10-21.log | 36 + logs/coloradio/2017-10-22.log | 34 + logs/coloradio/2017-10-23.log | 36 + logs/coloradio/2017-10-24.log | 35 + logs/coloradio/2017-10-25.log | 35 + logs/coloradio/2017-10-26.log | 36 + logs/coloradio/2017-10-27.log | 36 + logs/coloradio/2017-10-28.log | 35 + logs/coloradio/2017-10-29.log | 33 + logs/coloradio/2017-10-30.log | 35 + logs/coloradio/2017-10-31.log | 36 + logs/coloradio/2017-11-01.log | 36 + logs/coloradio/2017-11-02.log | 35 + logs/coloradio/2017-11-03.log | 35 + logs/coloradio/2017-11-04.log | 34 + logs/coloradio/2017-11-05.log | 33 + logs/coloradio/2017-11-06.log | 35 + logs/coloradio/2017-11-07.log | 35 + logs/coloradio/2017-11-08.log | 35 + logs/coloradio/2017-11-09.log | 36 + logs/coloradio/2017-11-10.log | 35 + logs/coloradio/2017-11-11.log | 36 + logs/coloradio/2017-11-12.log | 33 + logs/coloradio/2017-11-13.log | 36 + logs/coloradio/2017-11-14.log | 35 + logs/coloradio/2017-11-15.log | 36 + logs/coloradio/2017-11-16.log | 35 + logs/coloradio/2017-11-17.log | 35 + logs/coloradio/2017-11-18.log | 35 + logs/coloradio/2017-11-19.log | 34 + logs/coloradio/2017-11-20.log | 36 + logs/coloradio/2017-11-21.log | 36 + logs/coloradio/2017-11-22.log | 73 + logs/coloradio/2017-11-23.log | 36 + logs/coloradio/status2016.zip | Bin 0 -> 65928 bytes logs/coloradio/status2017.zip | Bin 0 -> 86889 bytes toinstall/logrotate.d/openvpn | 19 + toinstall/vsftpd/dks.passwd | 3 + toinstall/vsftpd/inst.txt | 0 toinstall/vsftpd/pam.vsftpd_dks | 6 + toinstall/vsftpd/setupuser.txt | 5 + toinstall/vsftpd/vsftpd.conf | 67 + vpn/.DS_Store | Bin 0 -> 6148 bytes vpn/aran/.DS_Store | Bin 0 -> 6148 bytes vpn/aran/clients/DKS-VPN-DKS-MacBook.ovpn | 152 + .../DKS-VPN-Solana-ExternalMirror.ovpn | 152 + vpn/aran/clients/DKS-VPN-Solana-IM1.ovpn | 152 + vpn/aran/clients/DKS-VPN-Solana-Server.ovpn | 152 + vpn/aran/clients/DKS-VPN-Solana-iPhone.ovpn | 152 + .../DKS-VPN-calim-bascharage-hourtrax.ovpn | 153 + .../clients/DKS-VPN-calim-creorga-server.ovpn | 153 + .../DKS-VPN-calim-differdange-hourtrax.ovpn | 153 + vpn/aran/clients/DKS-VPN-dks-hourtrax.ovpn | 153 + vpn/aran/clients/DKS-VPN-home-backup.ovpn | 153 + vpn/aran/clients/DKS-VPN-kilian-iphone.ovpn | 152 + vpn/aran/clients/dks-laptop.ovpn | 152 + .../aral-bascharage/1/aral-bascharage.crt | 74 + .../aral-bascharage/1/aral-bascharage.key | 16 + .../clients/aral-bascharage/1/ca.crt | 23 + .../clients/aral-bascharage/client.conf | 15 + .../aral-bertrange/1/aral-bertrange.crt | 74 + .../aral-bertrange/1/aral-bertrange.key | 16 + .../clients/aral-bertrange/1/ca.crt | 23 + .../clients/aral-bertrange/client.conf | 15 + .../aral-bettembourg/1/aral-bettembourg.crt | 74 + .../aral-bettembourg/1/aral-bettembourg.key | 16 + .../clients/aral-bettembourg/1/ca.crt | 23 + .../clients/aral-bettembourg/client.conf | 15 + .../clients/aral-diekirch/1/aral-diekirch.crt | 74 + .../clients/aral-diekirch/1/aral-diekirch.key | 16 + .../clients/aral-diekirch/1/ca.crt | 23 + .../clients/aral-diekirch/client.conf | 15 + .../aral-differdange/1/aral-differdange.crt | 74 + .../aral-differdange/1/aral-differdange.key | 16 + .../clients/aral-differdange/1/ca.crt | 23 + .../clients/aral-differdange/client.conf | 15 + .../aral-dudelange/1/aral-dudelange.crt | 74 + .../aral-dudelange/1/aral-dudelange.key | 16 + .../clients/aral-dudelange/1/ca.crt | 23 + .../clients/aral-dudelange/client.conf | 15 + .../aral-ettelbruck/1/aral-ettelbruck.crt | 74 + .../aral-ettelbruck/1/aral-ettelbruck.key | 16 + .../clients/aral-ettelbruck/1/ca.crt | 23 + .../clients/aral-ettelbruck/client.conf | 15 + .../clients/aral-foetz/1/aral-foetz.crt | 74 + .../clients/aral-foetz/1/aral-foetz.key | 16 + vpn/coloradio01/clients/aral-foetz/1/ca.crt | 23 + .../clients/aral-foetz/client.conf | 15 + .../clients/aral-frisange/1/aral-frisange.crt | 74 + .../clients/aral-frisange/1/aral-frisange.key | 16 + .../clients/aral-frisange/1/ca.crt | 23 + .../clients/aral-frisange/client.conf | 15 + .../aral-gonderange/1/aral-gonderange.crt | 74 + .../aral-gonderange/1/aral-gonderange.key | 16 + .../clients/aral-gonderange/1/ca.crt | 23 + .../clients/aral-gonderange/client.conf | 15 + .../1/aral-hoscheiddickt.crt | 74 + .../1/aral-hoscheiddickt.key | 16 + .../clients/aral-hoscheiddickt/1/ca.crt | 23 + .../clients/aral-hoscheiddickt/client.conf | 15 + .../clients/aral-howald/1/aral-howald.crt | 74 + .../clients/aral-howald/1/aral-howald.key | 16 + vpn/coloradio01/clients/aral-howald/1/ca.crt | 23 + .../clients/aral-howald/client.conf | 15 + .../aral-junglinster/1/aral-junglinster.crt | 74 + .../aral-junglinster/1/aral-junglinster.key | 16 + .../clients/aral-junglinster/1/ca.crt | 23 + .../clients/aral-junglinster/client.conf | 15 + .../clients/aral-lintgen/1/aral-lintgen.crt | 74 + .../clients/aral-lintgen/1/aral-lintgen.key | 16 + vpn/coloradio01/clients/aral-lintgen/1/ca.crt | 23 + .../clients/aral-lintgen/client.conf | 15 + .../clients/aral-merl/1/aral-merl.crt | 74 + .../clients/aral-merl/1/aral-merl.key | 16 + vpn/coloradio01/clients/aral-merl/1/ca.crt | 23 + vpn/coloradio01/clients/aral-merl/client.conf | 15 + .../clients/aral-mondorf/1/aral-mondorf.crt | 74 + .../clients/aral-mondorf/1/aral-mondorf.key | 16 + vpn/coloradio01/clients/aral-mondorf/1/ca.crt | 23 + .../clients/aral-mondorf/client.conf | 15 + .../aral-niederfeulen/1/aral-niederfeulen.crt | 74 + .../aral-niederfeulen/1/aral-niederfeulen.key | 16 + .../clients/aral-niederfeulen/1/ca.crt | 23 + .../clients/aral-niederfeulen/client.conf | 15 + .../clients/aral-petange/1/aral-petange.crt | 74 + .../clients/aral-petange/1/aral-petange.key | 16 + vpn/coloradio01/clients/aral-petange/1/ca.crt | 23 + .../clients/aral-petange/client.conf | 15 + .../aral-pommerloch/1/aral-pommerloch.crt | 74 + .../aral-pommerloch/1/aral-pommerloch.key | 16 + .../clients/aral-pommerloch/1/ca.crt | 23 + .../clients/aral-pommerloch/client.conf | 15 + .../clients/aral-redange/1/aral-redange.crt | 74 + .../clients/aral-redange/1/aral-redange.key | 16 + vpn/coloradio01/clients/aral-redange/1/ca.crt | 23 + .../clients/aral-redange/client.conf | 15 + .../clients/aral-rodange/1/aral-rodange.crt | 74 + .../clients/aral-rodange/1/aral-rodange.key | 16 + vpn/coloradio01/clients/aral-rodange/1/ca.crt | 23 + .../clients/aral-rodange/client.conf | 15 + .../1/aral-rollingergrund.crt | 74 + .../1/aral-rollingergrund.key | 16 + .../clients/aral-rollingergrund/1/ca.crt | 23 + .../clients/aral-rollingergrund/client.conf | 15 + .../clients/aral-schengen/1/aral-schengen.crt | 74 + .../clients/aral-schengen/1/aral-schengen.key | 16 + .../clients/aral-schengen/1/ca.crt | 23 + .../clients/aral-schengen/client.conf | 15 + .../aral-steinfort/1/aral-steinfort.crt | 74 + .../aral-steinfort/1/aral-steinfort.key | 16 + .../clients/aral-steinfort/1/ca.crt | 23 + .../clients/aral-steinfort/client.conf | 15 + .../clients/aral-vianden/1/aral-vianden.crt | 74 + .../clients/aral-vianden/1/aral-vianden.key | 16 + vpn/coloradio01/clients/aral-vianden/1/ca.crt | 23 + .../clients/aral-vianden/client.conf | 15 + .../aral-wasserbillig/1/aral-wasserbillig.crt | 74 + .../aral-wasserbillig/1/aral-wasserbillig.key | 16 + .../clients/aral-wasserbillig/1/ca.crt | 23 + .../clients/aral-wasserbillig/client.conf | 15 + vpn/coloradio01/clients/dks-rpi2test/1/ca.crt | 23 + .../clients/dks-rpi2test/1/dks-rpi2test.crt | 74 + .../clients/dks-rpi2test/1/dks-rpi2test.key | 16 + .../clients/dks-rpi2test/client.conf | 15 + vpn/coloradio01/clients/dks-testrpi/1/ca.crt | 23 + .../clients/dks-testrpi/1/dks-testrpi.crt | 74 + .../clients/dks-testrpi/1/dks-testrpi.key | 16 + .../clients/dks-testrpi/client.conf | 15 + vpn/coloradio01/clients/rb75-lintgen/1/ca.crt | 23 + .../clients/rb75-lintgen/1/rb75-lintgen.crt | 74 + .../clients/rb75-lintgen/1/rb75-lintgen.key | 16 + .../clients/rb75-lintgen/client.conf | 15 + vpn/coloradio01/conf/ipp.txt | 52 + vpn/coloradio01/conf/server.conf | 21 + vpn/coloradio01/easyrsa/build-ca | 8 + vpn/coloradio01/easyrsa/build-dh | 11 + vpn/coloradio01/easyrsa/build-inter | 7 + vpn/coloradio01/easyrsa/build-key | 7 + vpn/coloradio01/easyrsa/build-key-pass | 7 + vpn/coloradio01/easyrsa/build-key-pkcs12 | 8 + vpn/coloradio01/easyrsa/build-key-server | 10 + vpn/coloradio01/easyrsa/build-req | 7 + vpn/coloradio01/easyrsa/build-req-pass | 7 + vpn/coloradio01/easyrsa/clean-all | 16 + vpn/coloradio01/easyrsa/inherit-inter | 39 + vpn/coloradio01/easyrsa/list-crl | 13 + vpn/coloradio01/easyrsa/openssl-0.9.6.cnf | 265 ++ vpn/coloradio01/easyrsa/openssl-0.9.8.cnf | 290 ++ vpn/coloradio01/easyrsa/openssl-1.0.0.cnf | 285 ++ vpn/coloradio01/easyrsa/pkitool | 379 +++ vpn/coloradio01/easyrsa/revoke-full | 40 + vpn/coloradio01/easyrsa/sign-req | 7 + vpn/coloradio01/easyrsa/vars | 75 + vpn/coloradio01/easyrsa/whichopensslcnf | 26 + vpn/coloradio01/keys/01.pem | 76 + vpn/coloradio01/keys/02.pem | 74 + vpn/coloradio01/keys/03.pem | 74 + vpn/coloradio01/keys/04.pem | 74 + vpn/coloradio01/keys/05.pem | 74 + vpn/coloradio01/keys/06.pem | 74 + vpn/coloradio01/keys/07.pem | 74 + vpn/coloradio01/keys/08.pem | 74 + vpn/coloradio01/keys/09.pem | 74 + vpn/coloradio01/keys/0A.pem | 74 + vpn/coloradio01/keys/0B.pem | 74 + vpn/coloradio01/keys/0C.pem | 74 + vpn/coloradio01/keys/0D.pem | 74 + vpn/coloradio01/keys/0E.pem | 74 + vpn/coloradio01/keys/0F.pem | 74 + vpn/coloradio01/keys/10.pem | 74 + vpn/coloradio01/keys/11.pem | 74 + vpn/coloradio01/keys/12.pem | 74 + vpn/coloradio01/keys/13.pem | 74 + vpn/coloradio01/keys/14.pem | 74 + vpn/coloradio01/keys/15.pem | 74 + vpn/coloradio01/keys/16.pem | 74 + vpn/coloradio01/keys/17.pem | 74 + vpn/coloradio01/keys/18.pem | 74 + vpn/coloradio01/keys/19.pem | 74 + vpn/coloradio01/keys/1A.pem | 74 + vpn/coloradio01/keys/1B.pem | 74 + vpn/coloradio01/keys/1C.pem | 74 + vpn/coloradio01/keys/1D.pem | 74 + vpn/coloradio01/keys/1E.pem | 74 + vpn/coloradio01/keys/1F.pem | 74 + vpn/coloradio01/keys/20.pem | 74 + vpn/coloradio01/keys/aral-bascharage.crt | 74 + vpn/coloradio01/keys/aral-bascharage.csr | 13 + vpn/coloradio01/keys/aral-bascharage.key | 16 + vpn/coloradio01/keys/aral-bertrange.crt | 74 + vpn/coloradio01/keys/aral-bertrange.csr | 13 + vpn/coloradio01/keys/aral-bertrange.key | 16 + vpn/coloradio01/keys/aral-bettembourg.crt | 74 + vpn/coloradio01/keys/aral-bettembourg.csr | 13 + vpn/coloradio01/keys/aral-bettembourg.key | 16 + vpn/coloradio01/keys/aral-diekirch.crt | 74 + vpn/coloradio01/keys/aral-diekirch.csr | 13 + vpn/coloradio01/keys/aral-diekirch.key | 16 + vpn/coloradio01/keys/aral-differdange.crt | 74 + vpn/coloradio01/keys/aral-differdange.csr | 13 + vpn/coloradio01/keys/aral-differdange.key | 16 + vpn/coloradio01/keys/aral-dudelange.crt | 74 + vpn/coloradio01/keys/aral-dudelange.csr | 13 + vpn/coloradio01/keys/aral-dudelange.key | 16 + vpn/coloradio01/keys/aral-ettelbruck.crt | 74 + vpn/coloradio01/keys/aral-ettelbruck.csr | 13 + vpn/coloradio01/keys/aral-ettelbruck.key | 16 + vpn/coloradio01/keys/aral-foetz.crt | 74 + vpn/coloradio01/keys/aral-foetz.csr | 13 + vpn/coloradio01/keys/aral-foetz.key | 16 + vpn/coloradio01/keys/aral-frisange.crt | 74 + vpn/coloradio01/keys/aral-frisange.csr | 13 + vpn/coloradio01/keys/aral-frisange.key | 16 + vpn/coloradio01/keys/aral-gonderange.crt | 74 + vpn/coloradio01/keys/aral-gonderange.csr | 13 + vpn/coloradio01/keys/aral-gonderange.key | 16 + vpn/coloradio01/keys/aral-hoscheiddickt.crt | 74 + vpn/coloradio01/keys/aral-hoscheiddickt.csr | 13 + vpn/coloradio01/keys/aral-hoscheiddickt.key | 16 + vpn/coloradio01/keys/aral-howald.crt | 74 + vpn/coloradio01/keys/aral-howald.csr | 13 + vpn/coloradio01/keys/aral-howald.key | 16 + vpn/coloradio01/keys/aral-junglinster.crt | 74 + vpn/coloradio01/keys/aral-junglinster.csr | 13 + vpn/coloradio01/keys/aral-junglinster.key | 16 + vpn/coloradio01/keys/aral-lintgen.crt | 74 + vpn/coloradio01/keys/aral-lintgen.csr | 13 + vpn/coloradio01/keys/aral-lintgen.key | 16 + vpn/coloradio01/keys/aral-merl.crt | 74 + vpn/coloradio01/keys/aral-merl.csr | 13 + vpn/coloradio01/keys/aral-merl.key | 16 + vpn/coloradio01/keys/aral-mondorf.crt | 74 + vpn/coloradio01/keys/aral-mondorf.csr | 13 + vpn/coloradio01/keys/aral-mondorf.key | 16 + vpn/coloradio01/keys/aral-niederfeulen.crt | 74 + vpn/coloradio01/keys/aral-niederfeulen.csr | 13 + vpn/coloradio01/keys/aral-niederfeulen.key | 16 + vpn/coloradio01/keys/aral-petange.crt | 74 + vpn/coloradio01/keys/aral-petange.csr | 13 + vpn/coloradio01/keys/aral-petange.key | 16 + vpn/coloradio01/keys/aral-pommerloch.crt | 74 + vpn/coloradio01/keys/aral-pommerloch.csr | 13 + vpn/coloradio01/keys/aral-pommerloch.key | 16 + vpn/coloradio01/keys/aral-redange.crt | 74 + vpn/coloradio01/keys/aral-redange.csr | 13 + vpn/coloradio01/keys/aral-redange.key | 16 + vpn/coloradio01/keys/aral-rodange.crt | 74 + vpn/coloradio01/keys/aral-rodange.csr | 13 + vpn/coloradio01/keys/aral-rodange.key | 16 + vpn/coloradio01/keys/aral-rollingergrund.crt | 74 + vpn/coloradio01/keys/aral-rollingergrund.csr | 13 + vpn/coloradio01/keys/aral-rollingergrund.key | 16 + vpn/coloradio01/keys/aral-schengen.crt | 74 + vpn/coloradio01/keys/aral-schengen.csr | 13 + vpn/coloradio01/keys/aral-schengen.key | 16 + vpn/coloradio01/keys/aral-steinfort.crt | 74 + vpn/coloradio01/keys/aral-steinfort.csr | 13 + vpn/coloradio01/keys/aral-steinfort.key | 16 + vpn/coloradio01/keys/aral-vianden.crt | 74 + vpn/coloradio01/keys/aral-vianden.csr | 13 + vpn/coloradio01/keys/aral-vianden.key | 16 + vpn/coloradio01/keys/aral-wasserbillig.crt | 74 + vpn/coloradio01/keys/aral-wasserbillig.csr | 13 + vpn/coloradio01/keys/aral-wasserbillig.key | 16 + vpn/coloradio01/keys/ban-coloradiotp02.crt | 74 + vpn/coloradio01/keys/ban-coloradiotp02.csr | 13 + vpn/coloradio01/keys/ban-coloradiotp02.key | 16 + vpn/coloradio01/keys/ca.crt | 23 + vpn/coloradio01/keys/ca.key | 16 + vpn/coloradio01/keys/dh1024.pem | 5 + vpn/coloradio01/keys/dks-laptop.crt | 74 + vpn/coloradio01/keys/dks-laptop.csr | 13 + vpn/coloradio01/keys/dks-laptop.key | 16 + vpn/coloradio01/keys/dks-rpi2test.crt | 74 + vpn/coloradio01/keys/dks-rpi2test.csr | 13 + vpn/coloradio01/keys/dks-rpi2test.key | 16 + vpn/coloradio01/keys/dks-testrpi.crt | 74 + vpn/coloradio01/keys/dks-testrpi.csr | 13 + vpn/coloradio01/keys/dks-testrpi.key | 16 + vpn/coloradio01/keys/index.txt | 32 + vpn/coloradio01/keys/index.txt.attr | 1 + vpn/coloradio01/keys/index.txt.attr.old | 1 + vpn/coloradio01/keys/index.txt.old | 31 + vpn/coloradio01/keys/rb75-lintgen.crt | 74 + vpn/coloradio01/keys/rb75-lintgen.csr | 13 + vpn/coloradio01/keys/rb75-lintgen.key | 16 + vpn/coloradio01/keys/serial | 1 + vpn/coloradio01/keys/serial.old | 1 + vpn/coloradio01/keys/server.crt | 76 + vpn/coloradio01/keys/server.csr | 14 + vpn/coloradio01/keys/server.key | 16 + vpn/coloradio01/log/openvpn-status.log | 58 + vpn/coloradio01/log/openvpn.log | 0 vpn/coloradio01/log/openvpn.log.1 | 540 ++++ .../clients/aral-berchem/2/aral-berchem.crt | 74 + .../clients/aral-berchem/2/aral-berchem.key | 16 + vpn/coloradio02/clients/aral-berchem/2/ca.crt | 23 + .../clients/aral-berchem/client2.conf | 15 + .../aral-echternach/2/aral-echternach.crt | 74 + .../aral-echternach/2/aral-echternach.key | 16 + .../clients/aral-echternach/2/ca.crt | 23 + .../clients/aral-echternach/client2.conf | 15 + .../clients/aral-findel/2/aral-findel.crt | 74 + .../clients/aral-findel/2/aral-findel.key | 16 + vpn/coloradio02/clients/aral-findel/2/ca.crt | 23 + .../clients/aral-findel/client2.conf | 15 + .../clients/aral-lallange/2/aral-lallange.crt | 74 + .../clients/aral-lallange/2/aral-lallange.key | 16 + .../clients/aral-lallange/2/ca.crt | 23 + .../clients/aral-lallange/client2.conf | 15 + .../clients/aral-merl2/2/aral-merl2.crt | 74 + .../clients/aral-merl2/2/aral-merl2.key | 16 + vpn/coloradio02/clients/aral-merl2/2/ca.crt | 23 + .../clients/aral-merl2/client2.conf | 15 + .../clients/aral-remich1/2/aral-remich1.crt | 74 + .../clients/aral-remich1/2/aral-remich1.key | 16 + vpn/coloradio02/clients/aral-remich1/2/ca.crt | 23 + .../clients/aral-remich1/client2.conf | 15 + .../clients/aral-remich2/2/aral-remich2.crt | 74 + .../clients/aral-remich2/2/aral-remich2.key | 16 + vpn/coloradio02/clients/aral-remich2/2/ca.crt | 23 + .../clients/aral-remich2/client2.conf | 15 + .../clients/aral-rodange2/2/aral-rodange2.crt | 74 + .../clients/aral-rodange2/2/aral-rodange2.key | 16 + .../clients/aral-rodange2/2/ca.crt | 23 + .../clients/aral-rodange2/client2.conf | 15 + .../aral-schifflange/2/aral-schifflange.crt | 74 + .../aral-schifflange/2/aral-schifflange.key | 16 + .../clients/aral-schifflange/2/ca.crt | 23 + .../clients/aral-schifflange/client2.conf | 15 + .../ban-coloradiotp01/2/ban-coloradiotp01.crt | 74 + .../ban-coloradiotp01/2/ban-coloradiotp01.key | 16 + .../clients/ban-coloradiotp01/2/ca.crt | 23 + .../clients/ban-coloradiotp01/client2.conf | 15 + .../ban-coloradiotp02/2/ban-coloradiotp02.crt | 74 + .../ban-coloradiotp02/2/ban-coloradiotp02.key | 16 + .../clients/ban-coloradiotp02/2/ca.crt | 23 + .../clients/ban-coloradiotp02/client2.conf | 15 + .../clients/bp-capellen/2/bp-capellen.crt | 74 + .../clients/bp-capellen/2/bp-capellen.key | 16 + vpn/coloradio02/clients/bp-capellen/2/ca.crt | 23 + .../clients/bp-capellen/client2.conf | 15 + .../clients/coloradio-tp01/2/ca.crt | 23 + .../coloradio-tp01/2/coloradio-tp01.crt | 74 + .../coloradio-tp01/2/coloradio-tp01.key | 16 + .../clients/coloradio-tp01/client2.conf | 15 + vpn/coloradio02/clients/dks-backup/2/ca.crt | 23 + .../clients/dks-backup/2/dks-backup.crt | 74 + .../clients/dks-backup/2/dks-backup.key | 16 + .../clients/dks-backup/client2.conf | 16 + .../clients/dks-homebackup/2/ca.crt | 23 + .../dks-homebackup/2/dks-homebackup.crt | 74 + .../dks-homebackup/2/dks-homebackup.key | 16 + .../clients/dks-homebackup/client2.conf | 16 + vpn/coloradio02/clients/dks-ksmac/2/ca.crt | 23 + .../clients/dks-ksmac/2/dks-ksmac.crt | 74 + .../clients/dks-ksmac/2/dks-ksmac.key | 16 + .../clients/dks-ksmac/client2.conf | 16 + .../clients/dks-ksmachome/2/ca.crt | 23 + .../clients/dks-ksmachome/2/dks-ksmachome.crt | 74 + .../clients/dks-ksmachome/2/dks-ksmachome.key | 16 + .../clients/dks-ksmachome/client2.conf | 16 + vpn/coloradio02/clients/dks-laptop/1/ca.crt | 23 + .../clients/dks-laptop/1/dks-laptop.crt | 74 + .../clients/dks-laptop/1/dks-laptop.key | 16 + vpn/coloradio02/clients/dks-laptop/2/ca.crt | 23 + .../clients/dks-laptop/2/dks-laptop.crt | 74 + .../clients/dks-laptop/2/dks-laptop.key | 16 + .../clients/dks-laptop/client.conf | 15 + .../clients/dks-laptop/client2.conf | 15 + .../clients/dks-station01/2/ca.crt | 23 + .../clients/dks-station01/2/dks-station01.crt | 74 + .../clients/dks-station01/2/dks-station01.key | 16 + .../clients/dks-station01/client2.conf | 15 + .../clients/dks-station02/2/ca.crt | 23 + .../clients/dks-station02/2/dks-station02.crt | 74 + .../clients/dks-station02/2/dks-station02.key | 16 + .../clients/dks-station02/client2.conf | 15 + .../clients/dks-station03/2/ca.crt | 23 + .../clients/dks-station03/2/dks-station03.crt | 74 + .../clients/dks-station03/2/dks-station03.key | 16 + .../clients/dks-station03/client2.conf | 15 + .../clients/maroq-belleetoile/2/ca.crt | 23 + .../maroq-belleetoile/2/maroq-belleetoile.crt | 74 + .../maroq-belleetoile/2/maroq-belleetoile.key | 16 + .../clients/maroq-belleetoile/client2.conf | 15 + vpn/coloradio02/conf/ipp2.txt | 24 + vpn/coloradio02/conf/server2.conf | 23 + vpn/coloradio02/easyrsa/build-ca | 8 + vpn/coloradio02/easyrsa/build-dh | 11 + vpn/coloradio02/easyrsa/build-inter | 7 + vpn/coloradio02/easyrsa/build-key | 7 + vpn/coloradio02/easyrsa/build-key-pass | 7 + vpn/coloradio02/easyrsa/build-key-pkcs12 | 8 + vpn/coloradio02/easyrsa/build-key-server | 10 + vpn/coloradio02/easyrsa/build-req | 7 + vpn/coloradio02/easyrsa/build-req-pass | 7 + vpn/coloradio02/easyrsa/clean-all | 16 + vpn/coloradio02/easyrsa/inherit-inter | 39 + vpn/coloradio02/easyrsa/list-crl | 13 + vpn/coloradio02/easyrsa/openssl-0.9.6.cnf | 265 ++ vpn/coloradio02/easyrsa/openssl-0.9.8.cnf | 290 ++ vpn/coloradio02/easyrsa/openssl-1.0.0.cnf | 285 ++ vpn/coloradio02/easyrsa/pkitool | 379 +++ vpn/coloradio02/easyrsa/revoke-full | 40 + vpn/coloradio02/easyrsa/sign-req | 7 + vpn/coloradio02/easyrsa/vars | 75 + vpn/coloradio02/easyrsa/whichopensslcnf | 26 + vpn/coloradio02/keys/01.pem | 76 + vpn/coloradio02/keys/02.pem | 74 + vpn/coloradio02/keys/03.pem | 74 + vpn/coloradio02/keys/04.pem | 74 + vpn/coloradio02/keys/05.pem | 74 + vpn/coloradio02/keys/06.pem | 74 + vpn/coloradio02/keys/07.pem | 74 + vpn/coloradio02/keys/08.pem | 74 + vpn/coloradio02/keys/09.pem | 74 + vpn/coloradio02/keys/0A.pem | 74 + vpn/coloradio02/keys/0B.pem | 74 + vpn/coloradio02/keys/0C.pem | 74 + vpn/coloradio02/keys/0D.pem | 74 + vpn/coloradio02/keys/0E.pem | 74 + vpn/coloradio02/keys/0F.pem | 74 + vpn/coloradio02/keys/10.pem | 74 + vpn/coloradio02/keys/11.pem | 74 + vpn/coloradio02/keys/12.pem | 74 + vpn/coloradio02/keys/13.pem | 74 + vpn/coloradio02/keys/14.pem | 74 + vpn/coloradio02/keys/15.pem | 74 + vpn/coloradio02/keys/16.pem | 74 + vpn/coloradio02/keys/17.pem | 74 + vpn/coloradio02/keys/aral-berchem.crt | 74 + vpn/coloradio02/keys/aral-berchem.csr | 13 + vpn/coloradio02/keys/aral-berchem.key | 16 + vpn/coloradio02/keys/aral-echternach.crt | 74 + vpn/coloradio02/keys/aral-echternach.csr | 13 + vpn/coloradio02/keys/aral-echternach.key | 16 + vpn/coloradio02/keys/aral-findel.crt | 74 + vpn/coloradio02/keys/aral-findel.csr | 13 + vpn/coloradio02/keys/aral-findel.key | 16 + vpn/coloradio02/keys/aral-lallange.crt | 74 + vpn/coloradio02/keys/aral-lallange.csr | 13 + vpn/coloradio02/keys/aral-lallange.key | 16 + vpn/coloradio02/keys/aral-merl2.crt | 74 + vpn/coloradio02/keys/aral-merl2.csr | 13 + vpn/coloradio02/keys/aral-merl2.key | 16 + vpn/coloradio02/keys/aral-remich1.crt | 74 + vpn/coloradio02/keys/aral-remich1.csr | 13 + vpn/coloradio02/keys/aral-remich1.key | 16 + vpn/coloradio02/keys/aral-remich2.crt | 74 + vpn/coloradio02/keys/aral-remich2.csr | 13 + vpn/coloradio02/keys/aral-remich2.key | 16 + vpn/coloradio02/keys/aral-rodange2.crt | 74 + vpn/coloradio02/keys/aral-rodange2.csr | 13 + vpn/coloradio02/keys/aral-rodange2.key | 16 + vpn/coloradio02/keys/aral-schifflange.crt | 74 + vpn/coloradio02/keys/aral-schifflange.csr | 13 + vpn/coloradio02/keys/aral-schifflange.key | 16 + vpn/coloradio02/keys/ban-coloradiotp01.crt | 74 + vpn/coloradio02/keys/ban-coloradiotp01.csr | 13 + vpn/coloradio02/keys/ban-coloradiotp01.key | 16 + vpn/coloradio02/keys/ban-coloradiotp02.crt | 74 + vpn/coloradio02/keys/ban-coloradiotp02.csr | 13 + vpn/coloradio02/keys/ban-coloradiotp02.key | 16 + vpn/coloradio02/keys/bp-capellen.crt | 74 + vpn/coloradio02/keys/bp-capellen.csr | 13 + vpn/coloradio02/keys/bp-capellen.key | 16 + vpn/coloradio02/keys/ca.crt | 23 + vpn/coloradio02/keys/ca.key | 16 + vpn/coloradio02/keys/coloradio-tp01.crt | 74 + vpn/coloradio02/keys/coloradio-tp01.csr | 13 + vpn/coloradio02/keys/coloradio-tp01.key | 16 + vpn/coloradio02/keys/dh1024.pem | 5 + vpn/coloradio02/keys/dks-backup.crt | 74 + vpn/coloradio02/keys/dks-backup.csr | 13 + vpn/coloradio02/keys/dks-backup.key | 16 + vpn/coloradio02/keys/dks-homebackup.crt | 74 + vpn/coloradio02/keys/dks-homebackup.csr | 13 + vpn/coloradio02/keys/dks-homebackup.key | 16 + vpn/coloradio02/keys/dks-ksmac.crt | 74 + vpn/coloradio02/keys/dks-ksmac.csr | 13 + vpn/coloradio02/keys/dks-ksmac.key | 16 + vpn/coloradio02/keys/dks-ksmachome.crt | 74 + vpn/coloradio02/keys/dks-ksmachome.csr | 13 + vpn/coloradio02/keys/dks-ksmachome.key | 16 + vpn/coloradio02/keys/dks-laptop.crt | 74 + vpn/coloradio02/keys/dks-laptop.csr | 13 + vpn/coloradio02/keys/dks-laptop.key | 16 + vpn/coloradio02/keys/dks-station01.crt | 74 + vpn/coloradio02/keys/dks-station01.csr | 13 + vpn/coloradio02/keys/dks-station01.key | 16 + vpn/coloradio02/keys/dks-station02.crt | 74 + vpn/coloradio02/keys/dks-station02.csr | 13 + vpn/coloradio02/keys/dks-station02.key | 16 + vpn/coloradio02/keys/dks-station03.crt | 74 + vpn/coloradio02/keys/dks-station03.csr | 13 + vpn/coloradio02/keys/dks-station03.key | 16 + vpn/coloradio02/keys/index.txt | 23 + vpn/coloradio02/keys/index.txt.attr | 1 + vpn/coloradio02/keys/index.txt.attr.old | 1 + vpn/coloradio02/keys/index.txt.old | 22 + vpn/coloradio02/keys/maroq-belleetoile.crt | 74 + vpn/coloradio02/keys/maroq-belleetoile.csr | 13 + vpn/coloradio02/keys/maroq-belleetoile.key | 16 + vpn/coloradio02/keys/serial | 1 + vpn/coloradio02/keys/serial.old | 1 + vpn/coloradio02/keys/server.crt | 76 + vpn/coloradio02/keys/server.csr | 14 + vpn/coloradio02/keys/server.key | 16 + vpn/coloradio02/log/openvpn-status2.log | 8 + vpn/coloradio02/log/openvpn2.log | 0 vpn/coloradio02/log/openvpn2.log.1 | 559 ++++ vpn/coloradio02/log/status-openvpn2.log | 34 + vpn/source/clients/servername-clientname.ovpn | 0 vpn/source/easyrsa/COPYING.md | 33 + vpn/source/easyrsa/ChangeLog | 78 + vpn/source/easyrsa/README.quickstart.md | 100 + vpn/source/easyrsa/doc/EasyRSA-Advanced.md | 115 + vpn/source/easyrsa/doc/EasyRSA-Readme.md | 235 ++ .../easyrsa/doc/EasyRSA-Upgrade-Notes.md | 58 + vpn/source/easyrsa/doc/Hacking.md | 142 + vpn/source/easyrsa/doc/Intro-To-PKI.md | 97 + vpn/source/easyrsa/easyrsa | 1256 ++++++++ vpn/source/easyrsa/gpl-2.0.txt | 340 +++ vpn/source/easyrsa/openssl-1.0.cnf | 137 + vpn/source/easyrsa/vars.example | 209 ++ vpn/source/easyrsa/x509-types/COMMON | 7 + vpn/source/easyrsa/x509-types/ca | 13 + vpn/source/easyrsa/x509-types/client | 8 + vpn/source/easyrsa/x509-types/san | 2 + vpn/source/easyrsa/x509-types/server | 8 + vpn/testserver/conf/dks-laptop-test.ovpn | 17 + vpn/testserver/conf/dks-laptop-test2.ovpn | 17 + vpn/testserver/conf/ipp.txt | 0 vpn/testserver/conf/testserver.conf | 24 + vpn/testserver/easyrsa/COPYING.md | 33 + vpn/testserver/easyrsa/ChangeLog | 78 + vpn/testserver/easyrsa/README.quickstart.md | 100 + .../easyrsa/doc/EasyRSA-Advanced.md | 115 + vpn/testserver/easyrsa/doc/EasyRSA-Readme.md | 235 ++ .../easyrsa/doc/EasyRSA-Upgrade-Notes.md | 58 + vpn/testserver/easyrsa/doc/Hacking.md | 142 + vpn/testserver/easyrsa/doc/Intro-To-PKI.md | 97 + vpn/testserver/easyrsa/easyrsa | 1256 ++++++++ vpn/testserver/easyrsa/gpl-2.0.txt | 340 +++ vpn/testserver/easyrsa/openssl-1.0.cnf | 137 + vpn/testserver/easyrsa/pki/.rnd | Bin 0 -> 1024 bytes vpn/testserver/easyrsa/vars | 199 ++ vpn/testserver/easyrsa/x509-types/COMMON | 7 + vpn/testserver/easyrsa/x509-types/ca | 13 + vpn/testserver/easyrsa/x509-types/client | 8 + vpn/testserver/easyrsa/x509-types/san | 2 + vpn/testserver/easyrsa/x509-types/server | 8 + vpn/testserver/keys/.rnd | Bin 0 -> 1024 bytes vpn/testserver/keys/ca.crt | 20 + vpn/testserver/keys/certs_by_serial/01.pem | 83 + vpn/testserver/keys/certs_by_serial/02.pem | 83 + vpn/testserver/keys/dh.pem | 8 + vpn/testserver/keys/index.txt | 3 + vpn/testserver/keys/index.txt.attr | 1 + vpn/testserver/keys/index.txt.attr.old | 1 + vpn/testserver/keys/index.txt.old | 2 + .../keys/issued/dks-laptop-test.crt | 83 + .../keys/issued/dks-laptop-test2.crt | 83 + vpn/testserver/keys/issued/testserver.crt | 83 + vpn/testserver/keys/private/ca.key | 28 + .../keys/private/dks-laptop-test.key | 28 + .../keys/private/dks-laptop-test2.key | 30 + vpn/testserver/keys/private/testserver.key | 28 + vpn/testserver/keys/reqs/dks-laptop-test.req | 15 + vpn/testserver/keys/reqs/dks-laptop-test2.req | 15 + vpn/testserver/keys/reqs/testserver.req | 15 + vpn/testserver/keys/serial | 1 + vpn/testserver/keys/serial.old | 1 + vpn/testserver/log/openvpn.log | 23 + vpn/testserver/log/status.log | 8 + 763 files changed, 194795 insertions(+) create mode 100644 bin/allstations.sh create mode 100644 bin/checkplayerstatus.pl create mode 100644 bin/checkvpn.pl create mode 100644 bin/clr.pl create mode 100644 bin/clr2.pl create mode 100644 bin/firewall.pl create mode 100644 bin/ftpclient.pl create mode 100644 bin/multistation.sh create mode 100644 bin/resetkeylogin.sh create mode 100644 bin/rsynctostation.pl create mode 100644 bin/sqlite.pm create mode 100644 bin/station.sh create mode 100644 bin/updstation.sh create mode 100644 bin/vpn-client.sh create mode 100644 bin/vpn-client2.sh create mode 100644 bin/vpn-server.sh create mode 100644 bin/vpnclient.pl create mode 100644 bin/vpnserver.pl create mode 100644 current/POSDABStation.sqlite create mode 100644 current/aral-bertrange/current_audio.txt create mode 100644 current/aral-diekirch/current_audio.txt create mode 100644 current/aral-ettelbruck/current_audio.txt create mode 100644 current/aral-lintgen/current_audio.txt create mode 100644 current/aral-pommerloch/current_audio.txt create mode 100644 current/audiolists/stations/aral-bascharage_audio.txt create mode 100644 current/audiolists/stations/aral-bascharage_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-berchem_audio.txt create mode 100644 current/audiolists/stations/aral-berchem_audio2.txt create mode 100644 current/audiolists/stations/aral-berchem_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-bertrange_audio.txt create mode 100644 current/audiolists/stations/aral-bertrange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-bettembourg_audio.txt create mode 100644 current/audiolists/stations/aral-bettembourg_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-diekirch_audio.txt create mode 100644 current/audiolists/stations/aral-diekirch_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-differdange_audio.txt create mode 100644 current/audiolists/stations/aral-differdange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-dudelange_audio.txt create mode 100644 current/audiolists/stations/aral-dudelange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-echternach_audio.txt create mode 100644 current/audiolists/stations/aral-echternach_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-ettelbruck_audio.txt create mode 100644 current/audiolists/stations/aral-ettelbruck_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-findel_audio.txt create mode 100644 current/audiolists/stations/aral-findel_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-foetz_audio.txt create mode 100644 current/audiolists/stations/aral-foetz_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-frisange_audio.txt create mode 100644 current/audiolists/stations/aral-frisange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-hoscheiddickt_audio.txt create mode 100644 current/audiolists/stations/aral-hoscheiddickt_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-howald_audio.txt create mode 100644 current/audiolists/stations/aral-howald_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-lallange_audio.txt create mode 100644 current/audiolists/stations/aral-lallange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-lintgen_audio.txt create mode 100644 current/audiolists/stations/aral-lintgen_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-merl2_audio.txt create mode 100644 current/audiolists/stations/aral-merl2_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-merl_audio.txt create mode 100644 current/audiolists/stations/aral-merl_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-mondorf_audio.txt create mode 100644 current/audiolists/stations/aral-mondorf_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-petange_audio.txt create mode 100644 current/audiolists/stations/aral-petange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-pommerloch_audio.txt create mode 100644 current/audiolists/stations/aral-pommerloch_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-redange_audio.txt create mode 100644 current/audiolists/stations/aral-redange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-remich1_audio.txt create mode 100644 current/audiolists/stations/aral-remich1_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-remich2_audio.txt create mode 100644 current/audiolists/stations/aral-remich2_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-rodange2_audio.txt create mode 100644 current/audiolists/stations/aral-rodange2_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-rodange_audio.txt create mode 100644 current/audiolists/stations/aral-rodange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-rollingergrund_audio.txt create mode 100644 current/audiolists/stations/aral-rollingergrund_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-schengen_audio.txt create mode 100644 current/audiolists/stations/aral-schengen_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-schifflange_audio.txt create mode 100644 current/audiolists/stations/aral-schifflange_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-steinfort_audio.txt create mode 100644 current/audiolists/stations/aral-steinfort_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-vianden_audio.txt create mode 100644 current/audiolists/stations/aral-vianden_audio_cmp.txt create mode 100644 current/audiolists/stations/aral-wasserbillig_audio.txt create mode 100644 current/audiolists/stations/bp-capellen_audio.txt create mode 100644 current/audiolists/stations/bp-capellen_audio_cmp.txt create mode 100644 current/audiolists/stations/maroq-belleetoile_audio.txt create mode 100644 current/audiolists/stations/maroq-belleetoile_audio_cmp.txt create mode 100644 current/current_mainstream.2.txt create mode 100644 current/current_mainstream.txt create mode 100644 current/station_config.txt create mode 100644 current/station_uptime.txt create mode 100644 current/vsftpd.passwd create mode 100644 logs/coloradio/2017-09-01.log create mode 100644 logs/coloradio/2017-09-02.log create mode 100644 logs/coloradio/2017-09-03.log create mode 100644 logs/coloradio/2017-09-04.log create mode 100644 logs/coloradio/2017-09-05.log create mode 100644 logs/coloradio/2017-09-06.log create mode 100644 logs/coloradio/2017-09-07.log create mode 100644 logs/coloradio/2017-09-08.log create mode 100644 logs/coloradio/2017-09-09.log create mode 100644 logs/coloradio/2017-09-10.log create mode 100644 logs/coloradio/2017-09-11.log create mode 100644 logs/coloradio/2017-09-12.log create mode 100644 logs/coloradio/2017-09-13.log create mode 100644 logs/coloradio/2017-09-14.log create mode 100644 logs/coloradio/2017-09-15.log create mode 100644 logs/coloradio/2017-09-16.log create mode 100644 logs/coloradio/2017-09-17.log create mode 100644 logs/coloradio/2017-09-18.log create mode 100644 logs/coloradio/2017-09-19.log create mode 100644 logs/coloradio/2017-09-20.log create mode 100644 logs/coloradio/2017-09-21.log create mode 100644 logs/coloradio/2017-09-22.log create mode 100644 logs/coloradio/2017-09-23.log create mode 100644 logs/coloradio/2017-09-24.log create mode 100644 logs/coloradio/2017-09-25.log create mode 100644 logs/coloradio/2017-09-26.log create mode 100644 logs/coloradio/2017-09-27.log create mode 100644 logs/coloradio/2017-09-28.log create mode 100644 logs/coloradio/2017-09-29.log create mode 100644 logs/coloradio/2017-09-30.log create mode 100644 logs/coloradio/2017-10-01.log create mode 100644 logs/coloradio/2017-10-02.log create mode 100644 logs/coloradio/2017-10-03.log create mode 100644 logs/coloradio/2017-10-04.log create mode 100644 logs/coloradio/2017-10-05.log create mode 100644 logs/coloradio/2017-10-06.log create mode 100644 logs/coloradio/2017-10-07.log create mode 100644 logs/coloradio/2017-10-08.log create mode 100644 logs/coloradio/2017-10-09.log create mode 100644 logs/coloradio/2017-10-10.log create mode 100644 logs/coloradio/2017-10-11.log create mode 100644 logs/coloradio/2017-10-12.log create mode 100644 logs/coloradio/2017-10-13.log create mode 100644 logs/coloradio/2017-10-14.log create mode 100644 logs/coloradio/2017-10-15.log create mode 100644 logs/coloradio/2017-10-16.log create mode 100644 logs/coloradio/2017-10-17.log create mode 100644 logs/coloradio/2017-10-18.log create mode 100644 logs/coloradio/2017-10-19.log create mode 100644 logs/coloradio/2017-10-20.log create mode 100644 logs/coloradio/2017-10-21.log create mode 100644 logs/coloradio/2017-10-22.log create mode 100644 logs/coloradio/2017-10-23.log create mode 100644 logs/coloradio/2017-10-24.log create mode 100644 logs/coloradio/2017-10-25.log create mode 100644 logs/coloradio/2017-10-26.log create mode 100644 logs/coloradio/2017-10-27.log create mode 100644 logs/coloradio/2017-10-28.log create mode 100644 logs/coloradio/2017-10-29.log create mode 100644 logs/coloradio/2017-10-30.log create mode 100644 logs/coloradio/2017-10-31.log create mode 100644 logs/coloradio/2017-11-01.log create mode 100644 logs/coloradio/2017-11-02.log create mode 100644 logs/coloradio/2017-11-03.log create mode 100644 logs/coloradio/2017-11-04.log create mode 100644 logs/coloradio/2017-11-05.log create mode 100644 logs/coloradio/2017-11-06.log create mode 100644 logs/coloradio/2017-11-07.log create mode 100644 logs/coloradio/2017-11-08.log create mode 100644 logs/coloradio/2017-11-09.log create mode 100644 logs/coloradio/2017-11-10.log create mode 100644 logs/coloradio/2017-11-11.log create mode 100644 logs/coloradio/2017-11-12.log create mode 100644 logs/coloradio/2017-11-13.log create mode 100644 logs/coloradio/2017-11-14.log create mode 100644 logs/coloradio/2017-11-15.log create mode 100644 logs/coloradio/2017-11-16.log create mode 100644 logs/coloradio/2017-11-17.log create mode 100644 logs/coloradio/2017-11-18.log create mode 100644 logs/coloradio/2017-11-19.log create mode 100644 logs/coloradio/2017-11-20.log create mode 100644 logs/coloradio/2017-11-21.log create mode 100644 logs/coloradio/2017-11-22.log create mode 100644 logs/coloradio/2017-11-23.log create mode 100644 logs/coloradio/status2016.zip create mode 100644 logs/coloradio/status2017.zip create mode 100644 toinstall/logrotate.d/openvpn create mode 100644 toinstall/vsftpd/dks.passwd create mode 100644 toinstall/vsftpd/inst.txt create mode 100644 toinstall/vsftpd/pam.vsftpd_dks create mode 100644 toinstall/vsftpd/setupuser.txt create mode 100644 toinstall/vsftpd/vsftpd.conf create mode 100644 vpn/.DS_Store create mode 100644 vpn/aran/.DS_Store create mode 100644 vpn/aran/clients/DKS-VPN-DKS-MacBook.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-Solana-ExternalMirror.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-Solana-IM1.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-Solana-Server.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-Solana-iPhone.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-calim-bascharage-hourtrax.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-calim-creorga-server.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-calim-differdange-hourtrax.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-dks-hourtrax.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-home-backup.ovpn create mode 100644 vpn/aran/clients/DKS-VPN-kilian-iphone.ovpn create mode 100644 vpn/aran/clients/dks-laptop.ovpn create mode 100644 vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.crt create mode 100644 vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.key create mode 100644 vpn/coloradio01/clients/aral-bascharage/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-bascharage/client.conf create mode 100644 vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.crt create mode 100644 vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.key create mode 100644 vpn/coloradio01/clients/aral-bertrange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-bertrange/client.conf create mode 100644 vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.crt create mode 100644 vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.key create mode 100644 vpn/coloradio01/clients/aral-bettembourg/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-bettembourg/client.conf create mode 100644 vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.crt create mode 100644 vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.key create mode 100644 vpn/coloradio01/clients/aral-diekirch/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-diekirch/client.conf create mode 100644 vpn/coloradio01/clients/aral-differdange/1/aral-differdange.crt create mode 100644 vpn/coloradio01/clients/aral-differdange/1/aral-differdange.key create mode 100644 vpn/coloradio01/clients/aral-differdange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-differdange/client.conf create mode 100644 vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.crt create mode 100644 vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.key create mode 100644 vpn/coloradio01/clients/aral-dudelange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-dudelange/client.conf create mode 100644 vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.crt create mode 100644 vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.key create mode 100644 vpn/coloradio01/clients/aral-ettelbruck/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-ettelbruck/client.conf create mode 100644 vpn/coloradio01/clients/aral-foetz/1/aral-foetz.crt create mode 100644 vpn/coloradio01/clients/aral-foetz/1/aral-foetz.key create mode 100644 vpn/coloradio01/clients/aral-foetz/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-foetz/client.conf create mode 100644 vpn/coloradio01/clients/aral-frisange/1/aral-frisange.crt create mode 100644 vpn/coloradio01/clients/aral-frisange/1/aral-frisange.key create mode 100644 vpn/coloradio01/clients/aral-frisange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-frisange/client.conf create mode 100644 vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.crt create mode 100644 vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.key create mode 100644 vpn/coloradio01/clients/aral-gonderange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-gonderange/client.conf create mode 100644 vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.crt create mode 100644 vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.key create mode 100644 vpn/coloradio01/clients/aral-hoscheiddickt/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-hoscheiddickt/client.conf create mode 100644 vpn/coloradio01/clients/aral-howald/1/aral-howald.crt create mode 100644 vpn/coloradio01/clients/aral-howald/1/aral-howald.key create mode 100644 vpn/coloradio01/clients/aral-howald/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-howald/client.conf create mode 100644 vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.crt create mode 100644 vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.key create mode 100644 vpn/coloradio01/clients/aral-junglinster/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-junglinster/client.conf create mode 100644 vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.crt create mode 100644 vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.key create mode 100644 vpn/coloradio01/clients/aral-lintgen/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-lintgen/client.conf create mode 100644 vpn/coloradio01/clients/aral-merl/1/aral-merl.crt create mode 100644 vpn/coloradio01/clients/aral-merl/1/aral-merl.key create mode 100644 vpn/coloradio01/clients/aral-merl/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-merl/client.conf create mode 100644 vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.crt create mode 100644 vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.key create mode 100644 vpn/coloradio01/clients/aral-mondorf/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-mondorf/client.conf create mode 100644 vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.crt create mode 100644 vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.key create mode 100644 vpn/coloradio01/clients/aral-niederfeulen/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-niederfeulen/client.conf create mode 100644 vpn/coloradio01/clients/aral-petange/1/aral-petange.crt create mode 100644 vpn/coloradio01/clients/aral-petange/1/aral-petange.key create mode 100644 vpn/coloradio01/clients/aral-petange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-petange/client.conf create mode 100644 vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.crt create mode 100644 vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.key create mode 100644 vpn/coloradio01/clients/aral-pommerloch/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-pommerloch/client.conf create mode 100644 vpn/coloradio01/clients/aral-redange/1/aral-redange.crt create mode 100644 vpn/coloradio01/clients/aral-redange/1/aral-redange.key create mode 100644 vpn/coloradio01/clients/aral-redange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-redange/client.conf create mode 100644 vpn/coloradio01/clients/aral-rodange/1/aral-rodange.crt create mode 100644 vpn/coloradio01/clients/aral-rodange/1/aral-rodange.key create mode 100644 vpn/coloradio01/clients/aral-rodange/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-rodange/client.conf create mode 100644 vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.crt create mode 100644 vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.key create mode 100644 vpn/coloradio01/clients/aral-rollingergrund/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-rollingergrund/client.conf create mode 100644 vpn/coloradio01/clients/aral-schengen/1/aral-schengen.crt create mode 100644 vpn/coloradio01/clients/aral-schengen/1/aral-schengen.key create mode 100644 vpn/coloradio01/clients/aral-schengen/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-schengen/client.conf create mode 100644 vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.crt create mode 100644 vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.key create mode 100644 vpn/coloradio01/clients/aral-steinfort/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-steinfort/client.conf create mode 100644 vpn/coloradio01/clients/aral-vianden/1/aral-vianden.crt create mode 100644 vpn/coloradio01/clients/aral-vianden/1/aral-vianden.key create mode 100644 vpn/coloradio01/clients/aral-vianden/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-vianden/client.conf create mode 100644 vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.crt create mode 100644 vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.key create mode 100644 vpn/coloradio01/clients/aral-wasserbillig/1/ca.crt create mode 100644 vpn/coloradio01/clients/aral-wasserbillig/client.conf create mode 100644 vpn/coloradio01/clients/dks-rpi2test/1/ca.crt create mode 100644 vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.crt create mode 100644 vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.key create mode 100644 vpn/coloradio01/clients/dks-rpi2test/client.conf create mode 100644 vpn/coloradio01/clients/dks-testrpi/1/ca.crt create mode 100644 vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.crt create mode 100644 vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.key create mode 100644 vpn/coloradio01/clients/dks-testrpi/client.conf create mode 100644 vpn/coloradio01/clients/rb75-lintgen/1/ca.crt create mode 100644 vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.crt create mode 100644 vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.key create mode 100644 vpn/coloradio01/clients/rb75-lintgen/client.conf create mode 100644 vpn/coloradio01/conf/ipp.txt create mode 100644 vpn/coloradio01/conf/server.conf create mode 100644 vpn/coloradio01/easyrsa/build-ca create mode 100644 vpn/coloradio01/easyrsa/build-dh create mode 100644 vpn/coloradio01/easyrsa/build-inter create mode 100644 vpn/coloradio01/easyrsa/build-key create mode 100644 vpn/coloradio01/easyrsa/build-key-pass create mode 100644 vpn/coloradio01/easyrsa/build-key-pkcs12 create mode 100644 vpn/coloradio01/easyrsa/build-key-server create mode 100644 vpn/coloradio01/easyrsa/build-req create mode 100644 vpn/coloradio01/easyrsa/build-req-pass create mode 100644 vpn/coloradio01/easyrsa/clean-all create mode 100644 vpn/coloradio01/easyrsa/inherit-inter create mode 100644 vpn/coloradio01/easyrsa/list-crl create mode 100644 vpn/coloradio01/easyrsa/openssl-0.9.6.cnf create mode 100644 vpn/coloradio01/easyrsa/openssl-0.9.8.cnf create mode 100644 vpn/coloradio01/easyrsa/openssl-1.0.0.cnf create mode 100644 vpn/coloradio01/easyrsa/pkitool create mode 100644 vpn/coloradio01/easyrsa/revoke-full create mode 100644 vpn/coloradio01/easyrsa/sign-req create mode 100644 vpn/coloradio01/easyrsa/vars create mode 100644 vpn/coloradio01/easyrsa/whichopensslcnf create mode 100644 vpn/coloradio01/keys/01.pem create mode 100644 vpn/coloradio01/keys/02.pem create mode 100644 vpn/coloradio01/keys/03.pem create mode 100644 vpn/coloradio01/keys/04.pem create mode 100644 vpn/coloradio01/keys/05.pem create mode 100644 vpn/coloradio01/keys/06.pem create mode 100644 vpn/coloradio01/keys/07.pem create mode 100644 vpn/coloradio01/keys/08.pem create mode 100644 vpn/coloradio01/keys/09.pem create mode 100644 vpn/coloradio01/keys/0A.pem create mode 100644 vpn/coloradio01/keys/0B.pem create mode 100644 vpn/coloradio01/keys/0C.pem create mode 100644 vpn/coloradio01/keys/0D.pem create mode 100644 vpn/coloradio01/keys/0E.pem create mode 100644 vpn/coloradio01/keys/0F.pem create mode 100644 vpn/coloradio01/keys/10.pem create mode 100644 vpn/coloradio01/keys/11.pem create mode 100644 vpn/coloradio01/keys/12.pem create mode 100644 vpn/coloradio01/keys/13.pem create mode 100644 vpn/coloradio01/keys/14.pem create mode 100644 vpn/coloradio01/keys/15.pem create mode 100644 vpn/coloradio01/keys/16.pem create mode 100644 vpn/coloradio01/keys/17.pem create mode 100644 vpn/coloradio01/keys/18.pem create mode 100644 vpn/coloradio01/keys/19.pem create mode 100644 vpn/coloradio01/keys/1A.pem create mode 100644 vpn/coloradio01/keys/1B.pem create mode 100644 vpn/coloradio01/keys/1C.pem create mode 100644 vpn/coloradio01/keys/1D.pem create mode 100644 vpn/coloradio01/keys/1E.pem create mode 100644 vpn/coloradio01/keys/1F.pem create mode 100644 vpn/coloradio01/keys/20.pem create mode 100644 vpn/coloradio01/keys/aral-bascharage.crt create mode 100644 vpn/coloradio01/keys/aral-bascharage.csr create mode 100644 vpn/coloradio01/keys/aral-bascharage.key create mode 100644 vpn/coloradio01/keys/aral-bertrange.crt create mode 100644 vpn/coloradio01/keys/aral-bertrange.csr create mode 100644 vpn/coloradio01/keys/aral-bertrange.key create mode 100644 vpn/coloradio01/keys/aral-bettembourg.crt create mode 100644 vpn/coloradio01/keys/aral-bettembourg.csr create mode 100644 vpn/coloradio01/keys/aral-bettembourg.key create mode 100644 vpn/coloradio01/keys/aral-diekirch.crt create mode 100644 vpn/coloradio01/keys/aral-diekirch.csr create mode 100644 vpn/coloradio01/keys/aral-diekirch.key create mode 100644 vpn/coloradio01/keys/aral-differdange.crt create mode 100644 vpn/coloradio01/keys/aral-differdange.csr create mode 100644 vpn/coloradio01/keys/aral-differdange.key create mode 100644 vpn/coloradio01/keys/aral-dudelange.crt create mode 100644 vpn/coloradio01/keys/aral-dudelange.csr create mode 100644 vpn/coloradio01/keys/aral-dudelange.key create mode 100644 vpn/coloradio01/keys/aral-ettelbruck.crt create mode 100644 vpn/coloradio01/keys/aral-ettelbruck.csr create mode 100644 vpn/coloradio01/keys/aral-ettelbruck.key create mode 100644 vpn/coloradio01/keys/aral-foetz.crt create mode 100644 vpn/coloradio01/keys/aral-foetz.csr create mode 100644 vpn/coloradio01/keys/aral-foetz.key create mode 100644 vpn/coloradio01/keys/aral-frisange.crt create mode 100644 vpn/coloradio01/keys/aral-frisange.csr create mode 100644 vpn/coloradio01/keys/aral-frisange.key create mode 100644 vpn/coloradio01/keys/aral-gonderange.crt create mode 100644 vpn/coloradio01/keys/aral-gonderange.csr create mode 100644 vpn/coloradio01/keys/aral-gonderange.key create mode 100644 vpn/coloradio01/keys/aral-hoscheiddickt.crt create mode 100644 vpn/coloradio01/keys/aral-hoscheiddickt.csr create mode 100644 vpn/coloradio01/keys/aral-hoscheiddickt.key create mode 100644 vpn/coloradio01/keys/aral-howald.crt create mode 100644 vpn/coloradio01/keys/aral-howald.csr create mode 100644 vpn/coloradio01/keys/aral-howald.key create mode 100644 vpn/coloradio01/keys/aral-junglinster.crt create mode 100644 vpn/coloradio01/keys/aral-junglinster.csr create mode 100644 vpn/coloradio01/keys/aral-junglinster.key create mode 100644 vpn/coloradio01/keys/aral-lintgen.crt create mode 100644 vpn/coloradio01/keys/aral-lintgen.csr create mode 100644 vpn/coloradio01/keys/aral-lintgen.key create mode 100644 vpn/coloradio01/keys/aral-merl.crt create mode 100644 vpn/coloradio01/keys/aral-merl.csr create mode 100644 vpn/coloradio01/keys/aral-merl.key create mode 100644 vpn/coloradio01/keys/aral-mondorf.crt create mode 100644 vpn/coloradio01/keys/aral-mondorf.csr create mode 100644 vpn/coloradio01/keys/aral-mondorf.key create mode 100644 vpn/coloradio01/keys/aral-niederfeulen.crt create mode 100644 vpn/coloradio01/keys/aral-niederfeulen.csr create mode 100644 vpn/coloradio01/keys/aral-niederfeulen.key create mode 100644 vpn/coloradio01/keys/aral-petange.crt create mode 100644 vpn/coloradio01/keys/aral-petange.csr create mode 100644 vpn/coloradio01/keys/aral-petange.key create mode 100644 vpn/coloradio01/keys/aral-pommerloch.crt create mode 100644 vpn/coloradio01/keys/aral-pommerloch.csr create mode 100644 vpn/coloradio01/keys/aral-pommerloch.key create mode 100644 vpn/coloradio01/keys/aral-redange.crt create mode 100644 vpn/coloradio01/keys/aral-redange.csr create mode 100644 vpn/coloradio01/keys/aral-redange.key create mode 100644 vpn/coloradio01/keys/aral-rodange.crt create mode 100644 vpn/coloradio01/keys/aral-rodange.csr create mode 100644 vpn/coloradio01/keys/aral-rodange.key create mode 100644 vpn/coloradio01/keys/aral-rollingergrund.crt create mode 100644 vpn/coloradio01/keys/aral-rollingergrund.csr create mode 100644 vpn/coloradio01/keys/aral-rollingergrund.key create mode 100644 vpn/coloradio01/keys/aral-schengen.crt create mode 100644 vpn/coloradio01/keys/aral-schengen.csr create mode 100644 vpn/coloradio01/keys/aral-schengen.key create mode 100644 vpn/coloradio01/keys/aral-steinfort.crt create mode 100644 vpn/coloradio01/keys/aral-steinfort.csr create mode 100644 vpn/coloradio01/keys/aral-steinfort.key create mode 100644 vpn/coloradio01/keys/aral-vianden.crt create mode 100644 vpn/coloradio01/keys/aral-vianden.csr create mode 100644 vpn/coloradio01/keys/aral-vianden.key create mode 100644 vpn/coloradio01/keys/aral-wasserbillig.crt create mode 100644 vpn/coloradio01/keys/aral-wasserbillig.csr create mode 100644 vpn/coloradio01/keys/aral-wasserbillig.key create mode 100644 vpn/coloradio01/keys/ban-coloradiotp02.crt create mode 100644 vpn/coloradio01/keys/ban-coloradiotp02.csr create mode 100644 vpn/coloradio01/keys/ban-coloradiotp02.key create mode 100644 vpn/coloradio01/keys/ca.crt create mode 100644 vpn/coloradio01/keys/ca.key create mode 100644 vpn/coloradio01/keys/dh1024.pem create mode 100644 vpn/coloradio01/keys/dks-laptop.crt create mode 100644 vpn/coloradio01/keys/dks-laptop.csr create mode 100644 vpn/coloradio01/keys/dks-laptop.key create mode 100644 vpn/coloradio01/keys/dks-rpi2test.crt create mode 100644 vpn/coloradio01/keys/dks-rpi2test.csr create mode 100644 vpn/coloradio01/keys/dks-rpi2test.key create mode 100644 vpn/coloradio01/keys/dks-testrpi.crt create mode 100644 vpn/coloradio01/keys/dks-testrpi.csr create mode 100644 vpn/coloradio01/keys/dks-testrpi.key create mode 100644 vpn/coloradio01/keys/index.txt create mode 100644 vpn/coloradio01/keys/index.txt.attr create mode 100644 vpn/coloradio01/keys/index.txt.attr.old create mode 100644 vpn/coloradio01/keys/index.txt.old create mode 100644 vpn/coloradio01/keys/rb75-lintgen.crt create mode 100644 vpn/coloradio01/keys/rb75-lintgen.csr create mode 100644 vpn/coloradio01/keys/rb75-lintgen.key create mode 100644 vpn/coloradio01/keys/serial create mode 100644 vpn/coloradio01/keys/serial.old create mode 100644 vpn/coloradio01/keys/server.crt create mode 100644 vpn/coloradio01/keys/server.csr create mode 100644 vpn/coloradio01/keys/server.key create mode 100644 vpn/coloradio01/log/openvpn-status.log create mode 100644 vpn/coloradio01/log/openvpn.log create mode 100644 vpn/coloradio01/log/openvpn.log.1 create mode 100644 vpn/coloradio02/clients/aral-berchem/2/aral-berchem.crt create mode 100644 vpn/coloradio02/clients/aral-berchem/2/aral-berchem.key create mode 100644 vpn/coloradio02/clients/aral-berchem/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-berchem/client2.conf create mode 100644 vpn/coloradio02/clients/aral-echternach/2/aral-echternach.crt create mode 100644 vpn/coloradio02/clients/aral-echternach/2/aral-echternach.key create mode 100644 vpn/coloradio02/clients/aral-echternach/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-echternach/client2.conf create mode 100644 vpn/coloradio02/clients/aral-findel/2/aral-findel.crt create mode 100644 vpn/coloradio02/clients/aral-findel/2/aral-findel.key create mode 100644 vpn/coloradio02/clients/aral-findel/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-findel/client2.conf create mode 100644 vpn/coloradio02/clients/aral-lallange/2/aral-lallange.crt create mode 100644 vpn/coloradio02/clients/aral-lallange/2/aral-lallange.key create mode 100644 vpn/coloradio02/clients/aral-lallange/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-lallange/client2.conf create mode 100644 vpn/coloradio02/clients/aral-merl2/2/aral-merl2.crt create mode 100644 vpn/coloradio02/clients/aral-merl2/2/aral-merl2.key create mode 100644 vpn/coloradio02/clients/aral-merl2/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-merl2/client2.conf create mode 100644 vpn/coloradio02/clients/aral-remich1/2/aral-remich1.crt create mode 100644 vpn/coloradio02/clients/aral-remich1/2/aral-remich1.key create mode 100644 vpn/coloradio02/clients/aral-remich1/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-remich1/client2.conf create mode 100644 vpn/coloradio02/clients/aral-remich2/2/aral-remich2.crt create mode 100644 vpn/coloradio02/clients/aral-remich2/2/aral-remich2.key create mode 100644 vpn/coloradio02/clients/aral-remich2/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-remich2/client2.conf create mode 100644 vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.crt create mode 100644 vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.key create mode 100644 vpn/coloradio02/clients/aral-rodange2/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-rodange2/client2.conf create mode 100644 vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.crt create mode 100644 vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.key create mode 100644 vpn/coloradio02/clients/aral-schifflange/2/ca.crt create mode 100644 vpn/coloradio02/clients/aral-schifflange/client2.conf create mode 100644 vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.crt create mode 100644 vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.key create mode 100644 vpn/coloradio02/clients/ban-coloradiotp01/2/ca.crt create mode 100644 vpn/coloradio02/clients/ban-coloradiotp01/client2.conf create mode 100644 vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.crt create mode 100644 vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.key create mode 100644 vpn/coloradio02/clients/ban-coloradiotp02/2/ca.crt create mode 100644 vpn/coloradio02/clients/ban-coloradiotp02/client2.conf create mode 100644 vpn/coloradio02/clients/bp-capellen/2/bp-capellen.crt create mode 100644 vpn/coloradio02/clients/bp-capellen/2/bp-capellen.key create mode 100644 vpn/coloradio02/clients/bp-capellen/2/ca.crt create mode 100644 vpn/coloradio02/clients/bp-capellen/client2.conf create mode 100644 vpn/coloradio02/clients/coloradio-tp01/2/ca.crt create mode 100644 vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.crt create mode 100644 vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.key create mode 100644 vpn/coloradio02/clients/coloradio-tp01/client2.conf create mode 100644 vpn/coloradio02/clients/dks-backup/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-backup/2/dks-backup.crt create mode 100644 vpn/coloradio02/clients/dks-backup/2/dks-backup.key create mode 100644 vpn/coloradio02/clients/dks-backup/client2.conf create mode 100644 vpn/coloradio02/clients/dks-homebackup/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.crt create mode 100644 vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.key create mode 100644 vpn/coloradio02/clients/dks-homebackup/client2.conf create mode 100644 vpn/coloradio02/clients/dks-ksmac/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.crt create mode 100644 vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.key create mode 100644 vpn/coloradio02/clients/dks-ksmac/client2.conf create mode 100644 vpn/coloradio02/clients/dks-ksmachome/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.crt create mode 100644 vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.key create mode 100644 vpn/coloradio02/clients/dks-ksmachome/client2.conf create mode 100644 vpn/coloradio02/clients/dks-laptop/1/ca.crt create mode 100644 vpn/coloradio02/clients/dks-laptop/1/dks-laptop.crt create mode 100644 vpn/coloradio02/clients/dks-laptop/1/dks-laptop.key create mode 100644 vpn/coloradio02/clients/dks-laptop/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-laptop/2/dks-laptop.crt create mode 100644 vpn/coloradio02/clients/dks-laptop/2/dks-laptop.key create mode 100644 vpn/coloradio02/clients/dks-laptop/client.conf create mode 100644 vpn/coloradio02/clients/dks-laptop/client2.conf create mode 100644 vpn/coloradio02/clients/dks-station01/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-station01/2/dks-station01.crt create mode 100644 vpn/coloradio02/clients/dks-station01/2/dks-station01.key create mode 100644 vpn/coloradio02/clients/dks-station01/client2.conf create mode 100644 vpn/coloradio02/clients/dks-station02/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-station02/2/dks-station02.crt create mode 100644 vpn/coloradio02/clients/dks-station02/2/dks-station02.key create mode 100644 vpn/coloradio02/clients/dks-station02/client2.conf create mode 100644 vpn/coloradio02/clients/dks-station03/2/ca.crt create mode 100644 vpn/coloradio02/clients/dks-station03/2/dks-station03.crt create mode 100644 vpn/coloradio02/clients/dks-station03/2/dks-station03.key create mode 100644 vpn/coloradio02/clients/dks-station03/client2.conf create mode 100644 vpn/coloradio02/clients/maroq-belleetoile/2/ca.crt create mode 100644 vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.crt create mode 100644 vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.key create mode 100644 vpn/coloradio02/clients/maroq-belleetoile/client2.conf create mode 100644 vpn/coloradio02/conf/ipp2.txt create mode 100644 vpn/coloradio02/conf/server2.conf create mode 100644 vpn/coloradio02/easyrsa/build-ca create mode 100644 vpn/coloradio02/easyrsa/build-dh create mode 100644 vpn/coloradio02/easyrsa/build-inter create mode 100644 vpn/coloradio02/easyrsa/build-key create mode 100644 vpn/coloradio02/easyrsa/build-key-pass create mode 100644 vpn/coloradio02/easyrsa/build-key-pkcs12 create mode 100644 vpn/coloradio02/easyrsa/build-key-server create mode 100644 vpn/coloradio02/easyrsa/build-req create mode 100644 vpn/coloradio02/easyrsa/build-req-pass create mode 100644 vpn/coloradio02/easyrsa/clean-all create mode 100644 vpn/coloradio02/easyrsa/inherit-inter create mode 100644 vpn/coloradio02/easyrsa/list-crl create mode 100644 vpn/coloradio02/easyrsa/openssl-0.9.6.cnf create mode 100644 vpn/coloradio02/easyrsa/openssl-0.9.8.cnf create mode 100644 vpn/coloradio02/easyrsa/openssl-1.0.0.cnf create mode 100644 vpn/coloradio02/easyrsa/pkitool create mode 100644 vpn/coloradio02/easyrsa/revoke-full create mode 100644 vpn/coloradio02/easyrsa/sign-req create mode 100644 vpn/coloradio02/easyrsa/vars create mode 100644 vpn/coloradio02/easyrsa/whichopensslcnf create mode 100644 vpn/coloradio02/keys/01.pem create mode 100644 vpn/coloradio02/keys/02.pem create mode 100644 vpn/coloradio02/keys/03.pem create mode 100644 vpn/coloradio02/keys/04.pem create mode 100644 vpn/coloradio02/keys/05.pem create mode 100644 vpn/coloradio02/keys/06.pem create mode 100644 vpn/coloradio02/keys/07.pem create mode 100644 vpn/coloradio02/keys/08.pem create mode 100644 vpn/coloradio02/keys/09.pem create mode 100644 vpn/coloradio02/keys/0A.pem create mode 100644 vpn/coloradio02/keys/0B.pem create mode 100644 vpn/coloradio02/keys/0C.pem create mode 100644 vpn/coloradio02/keys/0D.pem create mode 100644 vpn/coloradio02/keys/0E.pem create mode 100644 vpn/coloradio02/keys/0F.pem create mode 100644 vpn/coloradio02/keys/10.pem create mode 100644 vpn/coloradio02/keys/11.pem create mode 100644 vpn/coloradio02/keys/12.pem create mode 100644 vpn/coloradio02/keys/13.pem create mode 100644 vpn/coloradio02/keys/14.pem create mode 100644 vpn/coloradio02/keys/15.pem create mode 100644 vpn/coloradio02/keys/16.pem create mode 100644 vpn/coloradio02/keys/17.pem create mode 100644 vpn/coloradio02/keys/aral-berchem.crt create mode 100644 vpn/coloradio02/keys/aral-berchem.csr create mode 100644 vpn/coloradio02/keys/aral-berchem.key create mode 100644 vpn/coloradio02/keys/aral-echternach.crt create mode 100644 vpn/coloradio02/keys/aral-echternach.csr create mode 100644 vpn/coloradio02/keys/aral-echternach.key create mode 100644 vpn/coloradio02/keys/aral-findel.crt create mode 100644 vpn/coloradio02/keys/aral-findel.csr create mode 100644 vpn/coloradio02/keys/aral-findel.key create mode 100644 vpn/coloradio02/keys/aral-lallange.crt create mode 100644 vpn/coloradio02/keys/aral-lallange.csr create mode 100644 vpn/coloradio02/keys/aral-lallange.key create mode 100644 vpn/coloradio02/keys/aral-merl2.crt create mode 100644 vpn/coloradio02/keys/aral-merl2.csr create mode 100644 vpn/coloradio02/keys/aral-merl2.key create mode 100644 vpn/coloradio02/keys/aral-remich1.crt create mode 100644 vpn/coloradio02/keys/aral-remich1.csr create mode 100644 vpn/coloradio02/keys/aral-remich1.key create mode 100644 vpn/coloradio02/keys/aral-remich2.crt create mode 100644 vpn/coloradio02/keys/aral-remich2.csr create mode 100644 vpn/coloradio02/keys/aral-remich2.key create mode 100644 vpn/coloradio02/keys/aral-rodange2.crt create mode 100644 vpn/coloradio02/keys/aral-rodange2.csr create mode 100644 vpn/coloradio02/keys/aral-rodange2.key create mode 100644 vpn/coloradio02/keys/aral-schifflange.crt create mode 100644 vpn/coloradio02/keys/aral-schifflange.csr create mode 100644 vpn/coloradio02/keys/aral-schifflange.key create mode 100644 vpn/coloradio02/keys/ban-coloradiotp01.crt create mode 100644 vpn/coloradio02/keys/ban-coloradiotp01.csr create mode 100644 vpn/coloradio02/keys/ban-coloradiotp01.key create mode 100644 vpn/coloradio02/keys/ban-coloradiotp02.crt create mode 100644 vpn/coloradio02/keys/ban-coloradiotp02.csr create mode 100644 vpn/coloradio02/keys/ban-coloradiotp02.key create mode 100644 vpn/coloradio02/keys/bp-capellen.crt create mode 100644 vpn/coloradio02/keys/bp-capellen.csr create mode 100644 vpn/coloradio02/keys/bp-capellen.key create mode 100644 vpn/coloradio02/keys/ca.crt create mode 100644 vpn/coloradio02/keys/ca.key create mode 100644 vpn/coloradio02/keys/coloradio-tp01.crt create mode 100644 vpn/coloradio02/keys/coloradio-tp01.csr create mode 100644 vpn/coloradio02/keys/coloradio-tp01.key create mode 100644 vpn/coloradio02/keys/dh1024.pem create mode 100644 vpn/coloradio02/keys/dks-backup.crt create mode 100644 vpn/coloradio02/keys/dks-backup.csr create mode 100644 vpn/coloradio02/keys/dks-backup.key create mode 100644 vpn/coloradio02/keys/dks-homebackup.crt create mode 100644 vpn/coloradio02/keys/dks-homebackup.csr create mode 100644 vpn/coloradio02/keys/dks-homebackup.key create mode 100644 vpn/coloradio02/keys/dks-ksmac.crt create mode 100644 vpn/coloradio02/keys/dks-ksmac.csr create mode 100644 vpn/coloradio02/keys/dks-ksmac.key create mode 100644 vpn/coloradio02/keys/dks-ksmachome.crt create mode 100644 vpn/coloradio02/keys/dks-ksmachome.csr create mode 100644 vpn/coloradio02/keys/dks-ksmachome.key create mode 100644 vpn/coloradio02/keys/dks-laptop.crt create mode 100644 vpn/coloradio02/keys/dks-laptop.csr create mode 100644 vpn/coloradio02/keys/dks-laptop.key create mode 100644 vpn/coloradio02/keys/dks-station01.crt create mode 100644 vpn/coloradio02/keys/dks-station01.csr create mode 100644 vpn/coloradio02/keys/dks-station01.key create mode 100644 vpn/coloradio02/keys/dks-station02.crt create mode 100644 vpn/coloradio02/keys/dks-station02.csr create mode 100644 vpn/coloradio02/keys/dks-station02.key create mode 100644 vpn/coloradio02/keys/dks-station03.crt create mode 100644 vpn/coloradio02/keys/dks-station03.csr create mode 100644 vpn/coloradio02/keys/dks-station03.key create mode 100644 vpn/coloradio02/keys/index.txt create mode 100644 vpn/coloradio02/keys/index.txt.attr create mode 100644 vpn/coloradio02/keys/index.txt.attr.old create mode 100644 vpn/coloradio02/keys/index.txt.old create mode 100644 vpn/coloradio02/keys/maroq-belleetoile.crt create mode 100644 vpn/coloradio02/keys/maroq-belleetoile.csr create mode 100644 vpn/coloradio02/keys/maroq-belleetoile.key create mode 100644 vpn/coloradio02/keys/serial create mode 100644 vpn/coloradio02/keys/serial.old create mode 100644 vpn/coloradio02/keys/server.crt create mode 100644 vpn/coloradio02/keys/server.csr create mode 100644 vpn/coloradio02/keys/server.key create mode 100644 vpn/coloradio02/log/openvpn-status2.log create mode 100644 vpn/coloradio02/log/openvpn2.log create mode 100644 vpn/coloradio02/log/openvpn2.log.1 create mode 100644 vpn/coloradio02/log/status-openvpn2.log create mode 100644 vpn/source/clients/servername-clientname.ovpn create mode 100644 vpn/source/easyrsa/COPYING.md create mode 100644 vpn/source/easyrsa/ChangeLog create mode 100644 vpn/source/easyrsa/README.quickstart.md create mode 100644 vpn/source/easyrsa/doc/EasyRSA-Advanced.md create mode 100644 vpn/source/easyrsa/doc/EasyRSA-Readme.md create mode 100644 vpn/source/easyrsa/doc/EasyRSA-Upgrade-Notes.md create mode 100644 vpn/source/easyrsa/doc/Hacking.md create mode 100644 vpn/source/easyrsa/doc/Intro-To-PKI.md create mode 100644 vpn/source/easyrsa/easyrsa create mode 100644 vpn/source/easyrsa/gpl-2.0.txt create mode 100644 vpn/source/easyrsa/openssl-1.0.cnf create mode 100644 vpn/source/easyrsa/vars.example create mode 100644 vpn/source/easyrsa/x509-types/COMMON create mode 100644 vpn/source/easyrsa/x509-types/ca create mode 100644 vpn/source/easyrsa/x509-types/client create mode 100644 vpn/source/easyrsa/x509-types/san create mode 100644 vpn/source/easyrsa/x509-types/server create mode 100644 vpn/testserver/conf/dks-laptop-test.ovpn create mode 100644 vpn/testserver/conf/dks-laptop-test2.ovpn create mode 100644 vpn/testserver/conf/ipp.txt create mode 100644 vpn/testserver/conf/testserver.conf create mode 100644 vpn/testserver/easyrsa/COPYING.md create mode 100644 vpn/testserver/easyrsa/ChangeLog create mode 100644 vpn/testserver/easyrsa/README.quickstart.md create mode 100644 vpn/testserver/easyrsa/doc/EasyRSA-Advanced.md create mode 100644 vpn/testserver/easyrsa/doc/EasyRSA-Readme.md create mode 100644 vpn/testserver/easyrsa/doc/EasyRSA-Upgrade-Notes.md create mode 100644 vpn/testserver/easyrsa/doc/Hacking.md create mode 100644 vpn/testserver/easyrsa/doc/Intro-To-PKI.md create mode 100644 vpn/testserver/easyrsa/easyrsa create mode 100644 vpn/testserver/easyrsa/gpl-2.0.txt create mode 100644 vpn/testserver/easyrsa/openssl-1.0.cnf create mode 100644 vpn/testserver/easyrsa/pki/.rnd create mode 100644 vpn/testserver/easyrsa/vars create mode 100644 vpn/testserver/easyrsa/x509-types/COMMON create mode 100644 vpn/testserver/easyrsa/x509-types/ca create mode 100644 vpn/testserver/easyrsa/x509-types/client create mode 100644 vpn/testserver/easyrsa/x509-types/san create mode 100644 vpn/testserver/easyrsa/x509-types/server create mode 100644 vpn/testserver/keys/.rnd create mode 100644 vpn/testserver/keys/ca.crt create mode 100644 vpn/testserver/keys/certs_by_serial/01.pem create mode 100644 vpn/testserver/keys/certs_by_serial/02.pem create mode 100644 vpn/testserver/keys/dh.pem create mode 100644 vpn/testserver/keys/index.txt create mode 100644 vpn/testserver/keys/index.txt.attr create mode 100644 vpn/testserver/keys/index.txt.attr.old create mode 100644 vpn/testserver/keys/index.txt.old create mode 100644 vpn/testserver/keys/issued/dks-laptop-test.crt create mode 100644 vpn/testserver/keys/issued/dks-laptop-test2.crt create mode 100644 vpn/testserver/keys/issued/testserver.crt create mode 100644 vpn/testserver/keys/private/ca.key create mode 100644 vpn/testserver/keys/private/dks-laptop-test.key create mode 100644 vpn/testserver/keys/private/dks-laptop-test2.key create mode 100644 vpn/testserver/keys/private/testserver.key create mode 100644 vpn/testserver/keys/reqs/dks-laptop-test.req create mode 100644 vpn/testserver/keys/reqs/dks-laptop-test2.req create mode 100644 vpn/testserver/keys/reqs/testserver.req create mode 100644 vpn/testserver/keys/serial create mode 100644 vpn/testserver/keys/serial.old create mode 100644 vpn/testserver/log/openvpn.log create mode 100644 vpn/testserver/log/status.log diff --git a/bin/allstations.sh b/bin/allstations.sh new file mode 100644 index 0000000..e69de29 diff --git a/bin/checkplayerstatus.pl b/bin/checkplayerstatus.pl new file mode 100644 index 0000000..69c487d --- /dev/null +++ b/bin/checkplayerstatus.pl @@ -0,0 +1,113 @@ +#!/usr/bin/perl + +use strict; +use Data::Dumper; +use POSIX; +use Getopt::Long; +use Time::Local; +use File::Basename; +my $uptimecfg = "/home/posdab/current/station_uptime.txt"; +my $cfg = {}; +my $crontab = 0; +my $lhour = 0; +my $fixtime = ""; +&readconfig(); +GetOptions("crontab|cr"=> \$crontab,"lasthourstarts|lhs" => \$lhour,"time|t=s" => \$fixtime); + +my ($wday,$nday) = &getcurrentweekday(); +my $ctime = &gettime(); +if ($fixtime ne ""){ + $ctime = $fixtime; +} +my $cdate = &getdate(); +my $lctime = ""; +my $cron = {}; +if ($lhour == 1){ + my $ilctime = int(substr($ctime,0,2))-1; + $lctime = $ilctime.":".substr($ctime,3,2); + if ($ilctime < 10) {$lctime = "0".$lctime}; + print "stations started between ".$ctime." and ".$lctime."\n"; +} +print "Weekday $wday Time: $ctime\n"; +foreach my $c (keys(%{$cfg})){ + #print "Station $c begin: ".$cfg->{$c}->{$wday."begin"}."\n"; + if ($lhour == 1){ + if (($cfg->{$c}->{$wday."begin"} le $ctime) && ($cfg->{$c}->{$wday."begin"} ge $lctime) && $cfg->{$c}->{$wday."begin"} ne $cfg->{$c}->{$wday."length"}){ + print "Station $c begin: ".$cfg->{$c}->{$wday."begin"}."\n"; + #print "WDay-begin: ".$cfg->{$c}->{$wday."begin"}." ? ".$lctime." <=> ".$ctime."\n"; + system(dirname($0)."/clr2.pl -c name -f ".$c." -a status -t playerstate"); + } + } + elsif ($crontab == 1 ){ + $cron->{int(substr($cfg->{$c}->{"monbegin"},0,2))} .= "1"; + $cron->{int(substr($cfg->{$c}->{"tuebegin"},0,2))} .= "2"; + $cron->{int(substr($cfg->{$c}->{"wedbegin"},0,2))} .= "3"; + $cron->{int(substr($cfg->{$c}->{"thubegin"},0,2))} .= "4"; + $cron->{int(substr($cfg->{$c}->{"fribegin"},0,2))} .= "5"; + $cron->{int(substr($cfg->{$c}->{"satbegin"},0,2))} .= "6"; + $cron->{int(substr($cfg->{$c}->{"sunbegin"},0,2))} .= "0"; + }else { + if ($cfg->{$c}->{$wday."begin"} le $ctime){ + print "Station $c begin: ".$cfg->{$c}->{$wday."begin"}."\n"; + system(dirname($0)."/clr2.pl -c name -f ".$c." -a status -t playerstate"); + } + } + +} + +if ($crontab == 1){ + if (exists($cron->{0})){ delete $cron->{0};} + for my $f (keys(%{$cron})){ + my $t = $cron->{$f}; + $t =~ s[(.)(?=.*?\1)][]g; + $cron->{$f} = $t; + } + for my $f (sort {$a <=> $b} keys(%{$cron})){ + my @tx = split(//,$cron->{$f}); + print "15 ".$f." * * ".join(",",@tx)." ".$0." -lhs\n"; + } +} + + +sub readconfig(){ + open (CFG,$uptimecfg); + my $fl = 0; + my @hdata = (); + while (my $l = ){ + chomp($l); + if ($fl == 0){ + @hdata = split(/\|/,$l); + $fl = 1; + next; + } + my @dd = split(/\|/,$l); + for (my $x=1;$x<=scalar(@dd);$x++){ + $cfg->{$dd[0]}->{$hdata[$x]}= $dd[$x]; + } + } + close(CFG); +} + +sub getcurrentweekday(){ + my @awday = qw( sun mon tue wed thu fri sat ); + my @cxdate = localtime(); + return ($awday[$cxdate[6]],$cxdate[6]); +} + +sub gettime(){ + my @ctdate = localtime(); + if ($ctdate[2] < 10){$ctdate[2] = '0'.$ctdate[2];} + if ($ctdate[1] < 10){$ctdate[1] = '0'.$ctdate[1];} + my $cmpdate = $ctdate[2].':'.$ctdate[1]; + return $cmpdate; +} + +sub getdate(){ + my @cadate = localtime(); + $cadate[5] = $cadate[5] +1900; + $cadate[4] = $cadate[4] +1; + if ($cadate[4] < 10){$cadate[4] = '0'.$cadate[4];} + if ($cadate[3] < 10){$cadate[3] = '0'.$cadate[3];} + my $cmpdate = $cadate[5].'-'.$cadate[4].'-'.$cadate[3]; + return $cmpdate; +} diff --git a/bin/checkvpn.pl b/bin/checkvpn.pl new file mode 100644 index 0000000..adb795d --- /dev/null +++ b/bin/checkvpn.pl @@ -0,0 +1,76 @@ +#!/opt/ActivePerl-5.14/bin/perl + +use strict; +use Getopt::Long; +use Data::Dumper; +my $logvpn = 0; + +GetOptions("logvpn|lv" => \$logvpn); +my $vpnstatusfile = "/home/posdab/vpn/log/openvpn-status.log"; +my $logpath = "/home/posdab/vpn/log"; +if ($logvpn== 1) { + my $data = (); + open(VPN,$vpnstatusfile) or die "cannot open $vpnstatusfile\n"; + my $cur = ""; + my @idents = (); + my $radr = 0; + while (my $l = ) { + chomp($l); + + if ($l =~ /^OpenVPN CLIENT LIST/) { + $cur = "clientlist"; + $radr=1; + } + elsif ($l =~ /^ROUTING TABLE/) { + $cur = "routing"; + $radr=2; + } + elsif ($l =~ /^Updated/) { + #my @spl = split(',',$l); + #$data->{UPDATED} = $spl[1]; + } + elsif (($l =~ /^Common Name/) || ($l =~ /^Virtual Address/)) { + @idents = split(',',$l); + } + elsif(($l =~ /^GLOBAL STATS/) || ($l =~ /^Max bcast/) || ($l =~ /^END/)){ + + }else{ + my @spl = split(',',$l); + #print "$cur :".$l."\n"; + for(my $i=0;$i{$spl[$radr]}->{$idents[$i]} = $spl[$i]; + } + } + } + close(VPN); + open(LOG,">>".$logpath.'/'.&getdate().'.log') or die "cannot write log file\n!"; + my $curts = &curtimestamp(); + foreach my $x (keys(%{$data})){ + print LOG $curts.";".$x.";".$data->{$x}->{'Common Name'}.";".$data->{$x}->{'Connected Since'}.";".$data->{$x}->{'Bytes Sent'}.";".$data->{$x}->{'Bytes Received'}.";".((exists($data->{$x}->{'Last Ref'}))?$data->{$x}->{'Last Ref'}:"unknown").";".((exists($data->{$x}->{'Virtual Address'}))?$data->{$x}->{'Virtual Address'}:"unknown")."\n"; + } + close(LOG); +} + +sub getdate(){ + my @dx = localtime(); + $dx[5] = $dx[5] +1900; + $dx[4] = $dx[4] +1; + if ($dx[4] < 10){$dx[4] = '0'.$dx[4];} + if ($dx[3] < 10){$dx[3] = '0'.$dx[3];} + my $xdd = $dx[5].'-'.$dx[4].'-'.$dx[3]; + return $xdd; +} + +sub curtimestamp(){ + my @dx = localtime(); + $dx[5] = $dx[5] +1900; + $dx[4] = $dx[4] +1; + if ($dx[4] < 10){$dx[4] = '0'.$dx[4];} + if ($dx[3] < 10){$dx[3] = '0'.$dx[3];} + if ($dx[2] < 10){$dx[2] = '0'.$dx[2];} + if ($dx[1] < 10){$dx[1] = '0'.$dx[1];} + if ($dx[0] < 10){$dx[0] = '0'.$dx[0];} + my $xdd = $dx[5].'-'.$dx[4].'-'.$dx[3]." ".$dx[2].':'.$dx[1].':'.$dx[0]; + return $xdd; +} + diff --git a/bin/clr.pl b/bin/clr.pl new file mode 100644 index 0000000..bd002f6 --- /dev/null +++ b/bin/clr.pl @@ -0,0 +1,302 @@ +#!/usr/bin/perl + +use strict; +use Getopt::Long; +use File::Basename; +use Data::Dumper; +use Term::ANSIColor; +use File::Copy; +use POSIX; +use lib(dirname($0)); + +my $stcfg = {}; +my $filter = ""; +my $check = ""; +my $action = ""; +my $type = ""; +my $help = 0; +my $writelog = 0; +my $currentstations="/home/posdab/current/station_config.txt"; +my $vpnstatusfiles={1 => "/home/posdab/vpn/log/openvpn-status.log",2 => "/home/posdab/vpn/log/status-openvpn2.log"}; +my $logpath="/home/posdab/logs/statuslogs"; +GetOptions( "filter|f=s" => \$filter, + "check|c=s" => \$check, + "action|a=s" =>\$action, + "type|t=s" => \$type, + "help|h" => \$help, + "log|l" => \$writelog); + +if ($help == 1) { + print "usage: ".basename($0)."\n"; + print "Option Device filter:\n"; + print "\t --check=|-c : name,arch,user,stream,env\n"; + print "\t --filter=|-f : \n"; + print "Option Actions:\n"; + print "\t --action=|-a : [update|status|download]\n"; + print "\t --type=|-t : [audio|playlists] if action = update\n"; + print "\t : [playerstate] if action = status\n"; + print "\t : [audiolists|logs] if action = download\n"; + + exit(0); +} + + +&read_config(); +&read_vpn_status(); +my @connected = (); +my $ftp = {"user" => "posdab","pwd" => "sai4seip", "host" => "88.99.170.20"}; +print color("bold blue"),"VPN-Status: \n",color("reset"); +my @notconnected = (); +print color("green"),"Connected devices:\n",color("reset"); +foreach my $s (sort {$a cmp $b} keys(%{$stcfg})){ + if ($stcfg->{$s}->{vpn}->{status} eq "connected") { + if ($check ne "") { + if ($filter ne "") { + if ($stcfg->{$s}->{$check} =~ /$filter/) { + printf("%-20s : %-15s : %s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}, $stcfg->{$s}->{$check}); + if ($action ne "") { push @connected,$s ; } + } + }else{ + printf("%-20s : %-15s : %s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}, $stcfg->{$s}->{$check}); + if ($action ne "") { push @connected,$s ; } + } + }else{ + printf("%-20s : %-15s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}); + if ($action ne "") { push @connected,$s ; } + } + }else { + push @notconnected,$stcfg->{$s}->{name}; + } +} +print color("red"),"Not connected devices:\n",color("reset"); +if (scalar(@notconnected) > 0) { + foreach my $n (@notconnected){ + if ($check ne "") { + if ($filter ne "") { + if ($stcfg->{$n}->{$check} eq $filter) { + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + }else{ + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + + }else{ + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + #print $stcfg->{$n}->{name}."\n"; + } +} +my $astat = ""; +if ($action ne "") { + $astat = scalar(@connected)." of "; +} + +my $x = keys(%{$stcfg})-scalar(@notconnected); +print color("bold green"),"VPN connected: ".$astat.$x."/".keys(%{$stcfg})."\n",color("reset"); +print color("bold red"),"VPN not connected: ".scalar(@notconnected)."/".keys(%{$stcfg})."\n",color("reset"); + +if (($action ne "") && ($type ne "")){ + print "Starting Action! $action $type\n"; + foreach my $c (@connected){ + &execaction($c,$action,$type); + } +} + + + +sub read_config(){ + open(STC,$currentstations); + while (my $l = ) { + chomp($l); + if ($l eq "") { next; } + my @ld = split(/;/,$l); + for (my $c=0;$c{$k}->{name} = $ld[0]; + $stcfg->{$k}->{arch} = $ld[1]; + $stcfg->{$k}->{player}->{type} = $ld[2]; + $stcfg->{$k}->{user} = $ld[3]; + $stcfg->{$k}->{audiopath} = $ld[4]; + $stcfg->{$k}->{stream} = $ld[5]; + $stcfg->{$k}->{env} = $ld[6]; + $stcfg->{$k}->{transfertype} = $ld[7]; + $stcfg->{$k}->{vpn}->{server} = 0; + $stcfg->{$k}->{vpn}->{status} = "not connected"; + $stcfg->{$k}->{player}->{status} = "unknown"; + $stcfg->{$k}->{server} = "unknown"; + } + } + close(STC); +} + +sub read_vpn_status(){ + foreach my $srv (keys(%{$vpnstatusfiles})){ + open(STV,$vpnstatusfiles->{$srv}) or die "cannot open ".$vpnstatusfiles->{$srv}."\n"; + my $cur = ""; + my @idents = (); + my $radr = 0; + while (my $l = ) { + chomp($l); + my @spl = split(',',$l); + if ((scalar(@spl) == 4) && (exists($stcfg->{$spl[1]}))){ + $stcfg->{$spl[1]}->{vpn}->{status} = "connected"; + $stcfg->{$spl[1]}->{vpn}->{ip} = $spl[0]; + $stcfg->{$spl[1]}->{vpn}->{server} = $srv; + } + } + close(STV); + } +} + +sub execaction(){ + my $st = shift; + my $act = shift; + my $t = shift; + if ($act eq "update") { + if ($t eq "audio") { + my $lfile = '/home/posdab/update/audio/'.$stcfg->{$st}->{name}.'_audio.zip'; + copy('/home/posdab/update/audio/audio.zip',$lfile); + if (-e $lfile) { + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.zip', + './ftpclient.pl -d -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/audio/'.$stcfg->{$st}->{name}.'_audio.zip', + 'cd '.$stcfg->{$st}->{audiopath}, + 'unzip -o /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.zip' + ); + my $s = &execremote('ssh '.$stcfg->{$st}->{user}.'@'.$stcfg->{$st}->{vpn}->{ip}.' "'.join(" && ",@rcmds).'"'); + + if (($s == 0) && (-e $lfile)){ + unlink($lfile); + &writelog("SUCCESS","Audio for ".$stcfg->{$st}->{name}." uploaded and installed!"); + print color("bold green"),strftime("%Y-%m-%d %H:%M:%S",localtime()).": Audio for ".$stcfg->{$st}->{name}." uploaded and installed\n",color("reset"); + #my @stat = stat($lfile); + #my ($S, $M, $H, $d, $m, $Y) = localtime($stat[9]); + #$m += 1; + #$Y += 1900; + #my $dt = sprintf("%04d-%02d-%02d ", $Y,$m, $d); + #if (! -d '/home/posdab/backup/audio/'.$dt) { + # mkdir('/home/posdab/backup/audio/'.$dt); + #} + #move($lfile,'/home/posdab/backup/audio/'.$dt.'/'.basename($lfile)); + } + else { + &writelog("ERROR","Audio for ".$stcfg->{$st}->{name}." NOT uploaded and installed!"); + print color("bold red"),strftime("%Y-%m-%d %H:%M:%S",localtime()).": ERROR uploading or installing audio for ".$stcfg->{$st}->{name}."\n",color("reset"); + } + } + }elsif ($t eq "playlists"){ + if (-e '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip') { + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'.zip', + './ftpclient.pl -d -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/playlists/'.$stcfg->{$st}->{name}.'.zip', + 'cd /home/'.$stcfg->{$st}->{user}, + 'unzip -o /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'.zip' + ); + my $s = &execremote('ssh '.$stcfg->{$st}->{user}.'@'.$stcfg->{$st}->{vpn}->{ip}.' "'.join(" && ",@rcmds).'"'); + if ($s == 0) { + unlink '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip'; + if (! -e '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip') { + &writelog("SUCCESS",$stcfg->{$st}->{name}." playlists updated!"); + print color("bold green"),$stcfg->{$st}->{name}." playlists updated!\n",color("reset"); + } + }else { + &writelog("ERROR",$stcfg->{$st}->{name}." playlists NOT updated!"); + print color("bold red"),$stcfg->{$st}->{name}." playlists NOT updated!\n",color("reset"); + } + } + }elsif ($t eq "status"){ + my @upd = (); + if (-e "/home/posdab/update/playlists/".$stcfg->{$st}->{name}.".zip") { + push @upd,"playlists"; + } + if (-e "/home/posdab/update/audio/".$stcfg->{$st}->{name}.".zip") { + push @upd,"audio"; + } + if (scalar(@upd) > 0) { + printf("%-20s : %s\n", $stcfg->{$st}->{name}, "update ".join(" ",@upd)); + } + }elsif ($t eq "clear"){ + + } + }elsif ($act eq "status") { + if ($t eq "playerstate"){ + #print Dumper($stcfg->{$st}); + my $rcmds = 'ps ax | grep '.$stcfg->{$st}->{player}->{type}.' | grep -v "grep" '; + my $output = &piperemote('ssh '.$stcfg->{$st}->{user}.'@'.$stcfg->{$st}->{vpn}->{ip}.' "'.$rcmds.'"'); + my $chkout = $stcfg->{$st}->{player}->{type}; + if ($output =~ /$chkout/){ + print "player playing!\n"; + &writelog("INFO",$stcfg->{$st}->{name}." Player playing!"); + }else{ + print "player not playing\n"; + &writelog("ERROR",$stcfg->{$st}->{name}." Player not playing!"); + } + print $output."\n"; + } + elsif ($t eq "playerstartupcheck"){ + #print Dumper($stcfg->{$st}); + #coloradio user cmd=grep "PLAYER : Starting Audio" /var/log/coloradio/ + #posdab user cmd=grep "PLAYER : Starting Audio" /home/posdab/log/ + my $rcmds = 'ps ax | grep '.$stcfg->{$st}->{player}->{type}.' | grep -v "grep" '; + my $output = &piperemote('ssh '.$stcfg->{$st}->{user}.'@'.$stcfg->{$st}->{vpn}->{ip}.' "'.$rcmds.'"'); + my $chkout = $stcfg->{$st}->{player}->{type}; + if ($output =~ /$chkout/){ + print "player playing!\n"; + + }else{ + print "player stopped\n"; + + } + #print $output."\n"; + } + }elsif($act eq "download") { + if ($t eq "audiolist"){ + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt.gz', + 'find '.$stcfg->{$st}->{audiopath}.' -name \"*.ogg\" -ls > /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt', + 'gzip /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt', + 'cd /home/'.$stcfg->{$st}->{user}, + './ftpclient.pl -u -f '.$stcfg->{$st}->{name}.'_audio.txt.gz -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/current'); + my $s = &execremote('ssh '.$stcfg->{$st}->{user}.'@'.$stcfg->{$st}->{vpn}->{ip}.' "'.join(" && ",@rcmds).'"'); + if (($s == 0) && (-e '/home/posdab/update/current/'.$stcfg->{$st}->{name}.'_audio.txt.gz')){ + system('cp /home/posdab/update/current/'.$stcfg->{$st}->{name}.'_audio.txt.gz /home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt.gz'); + unlink('/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt'); + system('gunzip /home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt.gz'); + + open(ALST,'/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt'); + open(NLST,'>/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio_cmp.txt'); + my $apath=$stcfg->{$st}->{audiopath}.'/'; + while (my $l=){ + chomp($l); + my ($d) = $l =~ m/.*$apath(.*)$/; + $d =~ s/\\//g; + print NLST $d."\n"; + } + close(NLST); + close(ALST); + } + }elsif($t eq "logs"){ + + } + } +} + +sub execremote(){ + my $cmd = shift; + print color("blue"),$cmd."\n",color("reset"); + #my $stx = 0; + my $stx = system($cmd); + return $stx; +} + +sub piperemote(){ + my $cmd = shift; + print color("blue"),$cmd."\n",color("reset"); + my $stx = `$cmd`; + return $stx; +} + +sub writelog(){ + my $state = shift; + my $msg = shift; + open (LOG,">>".$logpath.'/'.strftime("%Y-%m-%d",localtime()).'.log'); + print LOG strftime("%Y-%m-%d %H:%M:%S",localtime()).' : SERVER :'.$state.' : '.$msg."\n"; + close(LOG); +} diff --git a/bin/clr2.pl b/bin/clr2.pl new file mode 100644 index 0000000..cfe65cb --- /dev/null +++ b/bin/clr2.pl @@ -0,0 +1,321 @@ +#!/usr/bin/perl + +use strict; +use Getopt::Long; +use File::Basename; +use Data::Dumper; +use Term::ANSIColor; +use Net::OpenSSH; +use File::Copy; +use POSIX; +use lib(dirname($0)); + +my $stcfg = {}; +my $filter = ""; +my $check = ""; +my $action = ""; +my $type = ""; +my $help = 0; +my $writelog = 0; +my $currentstations="/home/posdab/current/station_config.txt"; +my $vpnstatusfiles={1 => "/home/posdab/vpn/log/openvpn-status.log",2 => "/home/posdab/vpn/log/status-openvpn2.log"}; +my $logpath="/home/posdab/logs/statuslogs"; + +my $opts->{root} = {user => "root", password => "mai5ia7a" , port => "22", strict_mode => 0}; + $opts->{posdab} = {user => "posdab", password => "sai4seip" , port => "22", strict_mode => 0}; + $opts->{coloradio} = {user => "coloradio", password => "sai4seip" , port => "22", strict_mode => 0}; + +GetOptions( "filter|f=s" => \$filter, + "check|c=s" => \$check, + "action|a=s" =>\$action, + "type|t=s" => \$type, + "help|h" => \$help, + "log|l" => \$writelog); + +if ($help == 1) { + print "usage: ".basename($0)."\n"; + print "Option Device filter:\n"; + print "\t --check=|-c : name,arch,user,stream,env\n"; + print "\t --filter=|-f : \n"; + print "Option Actions:\n"; + print "\t --action=|-a : [update|status|download]\n"; + print "\t --type=|-t : [audio|playlists] if action = update\n"; + print "\t : [playerstate] if action = status\n"; + print "\t : [audiolists|logs] if action = download\n"; + + exit(0); +} + + +&read_config(); +&read_vpn_status(); +my @connected = (); +my $ftp = {"user" => "posdab","pwd" => "sai4seip", "host" => "88.99.170.20"}; +print color("bold blue"),"VPN-Status: \n",color("reset"); +my @notconnected = (); +print color("green"),"Connected devices:\n",color("reset"); +foreach my $s (sort {$a cmp $b} keys(%{$stcfg})){ + if ($stcfg->{$s}->{vpn}->{status} eq "connected") { + if ($check ne "") { + if ($filter ne "") { + if ($stcfg->{$s}->{$check} =~ /$filter/) { + printf("%-20s : %-15s : %s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}, $stcfg->{$s}->{$check}); + if ($action ne "") { push @connected,$s ; } + } + }else{ + printf("%-20s : %-15s : %s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}, $stcfg->{$s}->{$check}); + if ($action ne "") { push @connected,$s ; } + } + }else{ + printf("%-20s : %-15s\n", $stcfg->{$s}->{name},$stcfg->{$s}->{vpn}->{ip}); + if ($action ne "") { push @connected,$s ; } + } + }else { + push @notconnected,$stcfg->{$s}->{name}; + } +} +print color("red"),"Not connected devices:\n",color("reset"); +if (scalar(@notconnected) > 0) { + foreach my $n (@notconnected){ + if ($check ne "") { + if ($filter ne "") { + if ($stcfg->{$n}->{$check} eq $filter) { + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + }else{ + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + + }else{ + printf("%-20s : %s\n", $stcfg->{$n}->{name}, $stcfg->{$n}->{$check}); + } + #print $stcfg->{$n}->{name}."\n"; + } +} +my $astat = ""; +if ($action ne "") { + $astat = scalar(@connected)." of "; +} + +my $x = keys(%{$stcfg})-scalar(@notconnected); +print color("bold green"),"VPN connected: ".$astat.$x."/".keys(%{$stcfg})."\n",color("reset"); +print color("bold red"),"VPN not connected: ".scalar(@notconnected)."/".keys(%{$stcfg})."\n",color("reset"); + +if (($action ne "") && ($type ne "")){ + print "Starting Action! $action $type\n"; + foreach my $c (@connected){ + &execaction($c,$action,$type); + } +} + + + +sub read_config(){ + open(STC,$currentstations); + while (my $l = ) { + chomp($l); + if ($l eq "") { next; } + my @ld = split(/;/,$l); + for (my $c=0;$c{$k}->{name} = $ld[0]; + $stcfg->{$k}->{arch} = $ld[1]; + $stcfg->{$k}->{player}->{type} = $ld[2]; + $stcfg->{$k}->{user} = $ld[3]; + $stcfg->{$k}->{audiopath} = $ld[4]; + $stcfg->{$k}->{stream} = $ld[5]; + $stcfg->{$k}->{env} = $ld[6]; + $stcfg->{$k}->{transfertype} = $ld[7]; + $stcfg->{$k}->{vpn}->{server} = 0; + $stcfg->{$k}->{vpn}->{status} = "not connected"; + $stcfg->{$k}->{player}->{status} = "unknown"; + $stcfg->{$k}->{server} = "unknown"; + } + } + close(STC); +} + +sub read_vpn_status(){ + foreach my $srv (keys(%{$vpnstatusfiles})){ + open(STV,$vpnstatusfiles->{$srv}) or die "cannot open ".$vpnstatusfiles->{$srv}."\n"; + my $cur = ""; + my @idents = (); + my $radr = 0; + while (my $l = ) { + chomp($l); + my @spl = split(',',$l); + if ((scalar(@spl) == 4) && (exists($stcfg->{$spl[1]}))){ + $stcfg->{$spl[1]}->{vpn}->{status} = "connected"; + $stcfg->{$spl[1]}->{vpn}->{ip} = $spl[0]; + $stcfg->{$spl[1]}->{vpn}->{server} = $srv; + } + } + close(STV); + } +} + +sub execaction(){ + my $st = shift; + my $act = shift; + my $t = shift; + if ($act eq "update") { + if ($t eq "audio") { + my $lfile = '/home/posdab/update/audio/'.$stcfg->{$st}->{name}.'_audio.zip'; + copy('/home/posdab/update/audio/audio.zip',$lfile); + if (-e $lfile) { + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.zip', + './ftpclient.pl -d -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/audio/'.$stcfg->{$st}->{name}.'_audio.zip', + 'cd '.$stcfg->{$st}->{audiopath}, + 'unzip -o /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.zip' + ); + my $s = &execremote(join(" && ",@rcmds),$stcfg->{$st}->{vpn}->{ip}, $opts->{$stcfg->{$st}->{user}}); + + if (($s == 0) && (-e $lfile)){ + unlink($lfile); + &writelog("SUCCESS","Audio for ".$stcfg->{$st}->{name}." uploaded and installed!"); + print color("bold green"),strftime("%Y-%m-%d %H:%M:%S",localtime()).": Audio for ".$stcfg->{$st}->{name}." uploaded and installed\n",color("reset"); + + } + else { + &writelog("ERROR","Audio for ".$stcfg->{$st}->{name}." NOT uploaded and installed!"); + print color("bold red"),strftime("%Y-%m-%d %H:%M:%S",localtime()).": ERROR uploading or installing audio for ".$stcfg->{$st}->{name}."\n",color("reset"); + } + } + }elsif ($t eq "playlists"){ + if (-e '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip') { + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'.zip', + './ftpclient.pl -d -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/playlists/'.$stcfg->{$st}->{name}.'.zip', + 'cd /home/'.$stcfg->{$st}->{user}, + 'unzip -o /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'.zip' + ); + my $s = &execremote(join(" && ",@rcmds),$stcfg->{$st}->{vpn}->{ip}, $opts->{$stcfg->{$st}->{user}}); + if ($s == 0) { + unlink '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip'; + if (! -e '/home/posdab/update/playlists/'.$stcfg->{$st}->{name}.'.zip') { + &writelog("SUCCESS",$stcfg->{$st}->{name}." playlists updated!"); + print color("bold green"),$stcfg->{$st}->{name}." playlists updated!\n",color("reset"); + } + }else { + &writelog("ERROR",$stcfg->{$st}->{name}." playlists NOT updated!"); + print color("bold red"),$stcfg->{$st}->{name}." playlists NOT updated!\n",color("reset"); + } + } + }elsif ($t eq "status"){ + my @upd = (); + if (-e "/home/posdab/update/playlists/".$stcfg->{$st}->{name}.".zip") { + push @upd,"playlists"; + } + if (-e "/home/posdab/update/audio/".$stcfg->{$st}->{name}.".zip") { + push @upd,"audio"; + } + if (scalar(@upd) > 0) { + printf("%-20s : %s\n", $stcfg->{$st}->{name}, "update ".join(" ",@upd)); + } + }elsif ($t eq "clear"){ + + } + }elsif ($act eq "status") { + if ($t eq "playerstate"){ + #print Dumper($stcfg->{$st}); + my $rcmds = 'ps ax | grep '.$stcfg->{$st}->{player}->{type}.' | grep -v "grep" '; + my $output = &piperemote($rcmds,$stcfg->{$st}->{vpn}->{ip}, $opts->{$stcfg->{$st}->{user}}); + my $chkout = $stcfg->{$st}->{player}->{type}; + if ($output =~ /$chkout/){ + print "player playing!\n"; + &writelog("INFO",$stcfg->{$st}->{name}." Player playing!"); + }else{ + print "player not playing\n"; + &writelog("ERROR",$stcfg->{$st}->{name}." Player not playing!"); + } + print $output."\n"; + } + elsif ($t eq "playerstartupcheck"){ + my $rcmds = 'ps ax | grep '.$stcfg->{$st}->{player}->{type}.' | grep -v "grep" '; + my $output = &piperemote($rcmds,$stcfg->{$st}->{vpn}->{ip}, $opts->{$stcfg->{$st}->{user}}); + my $chkout = $stcfg->{$st}->{player}->{type}; + if ($output =~ /$chkout/){ + print "player playing!\n"; + + }else{ + print "player stopped\n"; + + } + #print $output."\n"; + } + }elsif($act eq "download") { + if ($t eq "audiolist"){ + my @rcmds = ('rm -f /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt.gz', + 'find '.$stcfg->{$st}->{audiopath}.' -name \"*.ogg\" -ls > /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt', + 'gzip /home/'.$stcfg->{$st}->{user}.'/'.$stcfg->{$st}->{name}.'_audio.txt', + 'cd /home/'.$stcfg->{$st}->{user}, + './ftpclient.pl -u -f '.$stcfg->{$st}->{name}.'_audio.txt.gz -c ftp://'.$ftp->{user}.':'.$ftp->{pwd}.'@'.$ftp->{host}.'/current'); + my $s = &execremote(join(" && ",@rcmds),$stcfg->{$st}->{vpn}->{ip}, $opts->{$stcfg->{$st}->{user}}); + if (($s == 0) && (-e '/home/posdab/update/current/'.$stcfg->{$st}->{name}.'_audio.txt.gz')){ + system('cp /home/posdab/update/current/'.$stcfg->{$st}->{name}.'_audio.txt.gz /home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt.gz'); + unlink('/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt'); + system('gunzip /home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt.gz'); + + open(ALST,'/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio.txt'); + open(NLST,'>/home/posdab/current/audiolists/stations/'.$stcfg->{$st}->{name}.'_audio_cmp.txt'); + my $apath=$stcfg->{$st}->{audiopath}.'/'; + while (my $l=){ + chomp($l); + my ($d) = $l =~ m/.*$apath(.*)$/; + $d =~ s/\\//g; + print NLST $d."\n"; + } + close(NLST); + close(ALST); + } + }elsif($t eq "logs"){ + + } + } +} + +sub execremote(){ + my $cmd = shift; + my $host = shift; + my $uopts = shift; + print color("blue"),$cmd."\n",color("reset"); + #my $stx = 0; + my $ssh = Net::OpenSSH->new($host,%{$uopts}); + if ($ssh->error){ + print "Couldn't establish SSH connection: ". $ssh->error; + return 1; + } + my $stx =$ssh->system($cmd); + if ($ssh->error){ + print "remote cmd failed!". $ssh->error; + return 1; + } + return $stx; +} + +sub piperemote(){ + my $cmd = shift; + my $host = shift; + my $uopts = shift; + #print "pipe cmd:".$cmd." - to:".$host."-".Dumper($uopts)."\n"; + my $ssh = Net::OpenSSH->new($host,%{$uopts}); + if ($ssh->error){ + print "Couldn't establish SSH connection: ". $ssh->error; + return 1; + } + print color("blue"),$cmd."\n",color("reset"); + my $out = $ssh->capture($cmd); + if ($ssh->error){ + print "remote cmd failed!". $ssh->error; + return $out; + } + #print $out; + return $out; +} + +sub writelog(){ + my $state = shift; + my $msg = shift; + open (LOG,">>".$logpath.'/'.strftime("%Y-%m-%d",localtime()).'.log'); + print LOG strftime("%Y-%m-%d %H:%M:%S",localtime()).' : SERVER :'.$state.' : '.$msg."\n"; + close(LOG); +} diff --git a/bin/firewall.pl b/bin/firewall.pl new file mode 100644 index 0000000..bd3e522 --- /dev/null +++ b/bin/firewall.pl @@ -0,0 +1,210 @@ +#!/usr/bin/perl + +use strict; +use File::Basename; +use Getopt::Long; + +my $start = 0; +my $stop = 0; +my $ipt = "/sbin/iptables"; +my $devices = (); +GetOptions("start" => \$start,"stop" => \$stop); + +if ($start == $stop){ + print "usage: ".$0." [--start|--stop]"; + exit(1); +} +if ($start == 1){ + &fwStart(); +} +if ($stop == 1){ + &fwStop(); +} + +sub fwStart(){ + &fwStop(); + $devices = &getActiveDevices(); + system("modprobe ip_conntrack"); + #global + #unlimited localhost + my $cmd = "$ipt -A INPUT -i lo -j ACCEPT;$ipt -A OUTPUT -o lo -j ACCEPT"; + system($cmd); + #drop all incomming + $cmd = "$ipt -P INPUT DROP;$ipt -P OUTPUT DROP;$ipt -P FORWARD DROP"; + system($cmd); + #TODO: spammersblock here + #global common rules by net + foreach my $dev (keys(%{$devices->{net}})){ + my @cmds = (); + ## Block sync + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp ! --syn -m state --state NEW -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix \"Drop Sync\""); + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp ! --syn -m state --state NEW -j DROP"); + ## Block Fragments + push (@cmds,"$ipt -A INPUT -i ".$dev." -f -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix \"Fragments Packets\""); + push (@cmds,"$ipt -A INPUT -i ".$dev." -f -j DROP"); + ## Block bad stuff + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP"); + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags ALL ALL -j DROP"); + + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags ALL NONE -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix \"NULL Packets\""); + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags ALL NONE -j DROP # NULL packets"); + + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags SYN,RST SYN,RST -j DROP"); + + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix \"XMAS Packets\""); + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP"); + + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags FIN,ACK FIN -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix \"Fin Packets Scan\""); + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags FIN,ACK FIN -j DROP # FIN packet scans"); + + push (@cmds,"$ipt -A INPUT -i ".$dev." -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP"); + + ## Allow full outgoing connection but no incomming stuff + push (@cmds,"$ipt -A INPUT -i ".$dev." -m state --state ESTABLISHED,RELATED -j ACCEPT"); + push (@cmds,"$ipt -A OUTPUT -o ".$dev." -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT"); + + + system(join(';',@cmds)); + } + ## allow incomming ICMP ping pong stuff + my @cmds = (); + push (@cmds,"$ipt -A INPUT -p icmp --icmp-type 8 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT"); + push (@cmds,"$ipt -A OUTPUT -p icmp --icmp-type 0 -m state --state ESTABLISHED,RELATED -j ACCEPT"); + system(join(';',@cmds)); + &enable_ssh(); + &enable_openvpn(); + &enable_http(); +} + + + +sub fwStop(){ + my $cmd = "$ipt -F;". + "$ipt -X;". + "$ipt -t nat -F". + "$ipt -t nat -X". + "$ipt -t mangle -F". + "$ipt -t mangle -X". + "$ipt -P INPUT ACCEPT". + "$ipt -P OUTPUT ACCEPT". + "$ipt -P FORWARD ACCEPT"; + system($cmd); +} + +sub getActiveDevices(){ + my $cmd = 'ip -o addr show | awk \'{ print \$2";"\$3";"\$4 }\''; + my $strdev = `$cmd`; + my @dev = split("\n",$strdev); + my $dev = (); + foreach my $d (@dev){ + my @x = split(";",$d); + my $type = "net"; + if ($x[0] eq "lo") { + $type="local"; + } elsif ($x[0] eq "tun") { + $type="vpn"; + } + $dev->{$type}->{$x[0]}->{$x[1]} = $x[2]; + } + return $dev; +} + +sub enable_ssh(){ + my $sshport =22; + my $strsshport = `grep -e "^Port" /etc/ssh/sshd_config | awk '{ print \$2 }'`; + chomp($strsshport); + if ($strsshport ne ""){ + $sshport = $strsshport; + } + my $cmd = "$ipt -A INPUT -p tcp --destination-port ".$sshport." -j ACCEPT"; + system($cmd); +} + +sub enable_openvpn(){ + my $cmd = "$ipt -A INPUT -p tcp --destination-port 1194 -j ACCEPT"; + system($cmd); +} + +sub enable_http(){ + #$IPT -A INPUT -p tcp --destination-port 80 -j ACCEPT + #$IPT -A INPUT -p tcp --destination-port 443 -j ACCEPT +} +#SPAMLIST="blockedip" +#SPAMDROPMSG="BLOCKED IP DROP" +# +#[ -f /etc/firewall/blocked.ips.txt ] && BADIPS=$(egrep -v -E "^#|^$" /etc/firewall/blocked.ips.txt) +# +#PUB_IF="eth0" +# + +#if [ -f /etc/firewall/blocked.ips.txt ]; +#then +## create a new iptables list +#$IPT -N $SPAMLIST +# +#for ipblock in $BADIPS +#do +# $IPT -A $SPAMLIST -s $ipblock -j LOG --log-prefix "$SPAMDROPMSG" +# $IPT -A $SPAMLIST -s $ipblock -j DROP +#done +# +#$IPT -I INPUT -j $SPAMLIST +#$IPT -I OUTPUT -j $SPAMLIST +#$IPT -I FORWARD -j $SPAMLIST +#fi +# + +## Allow ssh +#$IPT -A INPUT -p tcp --destination-port 22 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 3587 -j ACCEPT + +# +## Allow port 53 tcp/udp (DNS Server) +#$IPT -A INPUT -p udp --dport 53 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT +#$IPT -A OUTPUT -p udp --sport 53 -m state --state ESTABLISHED,RELATED -j ACCEPT +# +#$IPT -A INPUT -p tcp --destination-port 53 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT +#$IPT -A OUTPUT -p tcp --sport 53 -m state --state ESTABLISHED,RELATED -j ACCEPT +# +## Open port Apache2 + +## Open FTP +#$IPT -A INPUT -p tcp --destination-port 21 -j ACCEPT +#$IPT -A INPUT -p tcp --dport 30000:30100 -j ACCEPT +## Open SMTP, POP and IMAP +#$IPT -A INPUT -p tcp --destination-port 25 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 110 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 143 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 587 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 993 -j ACCEPT +#$IPT -A INPUT -p tcp --destination-port 995 -j ACCEPT +# +## Open OpenVPN +# +# +##$IPT -A INPUT -p tcp --destination-port 137:139 -j ACCEPT +##$IPT -A INPUT -p udp --destination-port 137:139 -j ACCEPT +# +###### Add your rules below ###### +# +###### END your rules ############ +# +## Do not log smb/windows sharing packets - too much logging +##$IPT -A INPUT -p tcp -i eth0 --dport 137:139 -j REJECT +##$IPT -A INPUT -p udp -i eth0 --dport 137:139 -j REJECT +##Open allowed MAC for mysql +#if [ -f /etc/firewall/allowed_mac.txt ]; +#then +# for MAC in `cat /etc/firewall/allowed_mac.txt`; do +##-m mac --mac-source $MAC +# $IPT -A INPUT -p tcp -m tcp --dport 3306 -m mac --mac-source $MAC -j ACCEPT +# done +#fi +# +# +## log everything else and drop +#$IPT -A INPUT -j LOG +#$IPT -A FORWARD -j LOG +#$IPT -A INPUT -j DROP +# +#exit 0 diff --git a/bin/ftpclient.pl b/bin/ftpclient.pl new file mode 100644 index 0000000..6d1697c --- /dev/null +++ b/bin/ftpclient.pl @@ -0,0 +1,38 @@ +#!/usr/bin/env perl +use strict; +use Net::FTP; +use Getopt::Long; +use File::Basename; +my $conn = ""; +my $dld = 0; +my $upl = 0; +my $file = ""; + +GetOptions("conn|c=s" => \$conn,"--download|d" => \$dld,"--upload|u" => \$upl, "--file|f=s" => \$file); + +if ($dld==$upl) { + print "Please specify upload or download\n"; + exit(1); +} +if (($upl == 1) && (! -e $file)) { + print "file $file does not exist!\n"; + exit(1); +} +if (($conn eq "") || ($conn !~ /ftp:\/\/(.+):(.+)\/(.*)/ )) { + print "no proper connection defined!\n"; + exit(1); +} + +my ($user,$pwd,$host,$rpath) = $conn =~ /ftp:\/\/(.+):(.+)\@([\d|\.]+)\/(.*)$/; +my $ftpopts = { Port => 21, Passive => 1 }; +my $ftp = Net::FTP->new($host,%{$ftpopts}) or die "not correct host! $@\n"; +$ftp->login($user,$pwd) or die "false login!\n"; +$ftp->binary(); +$ftp->pasv(); +if ($dld == 1) { + $ftp->get($rpath,basename($rpath)) or die "cannot download file '".$rpath."'!\n"; +}elsif($upl == 1){ + $ftp->put($file,$rpath.'/'.basename($file)) or die "cannot upload file '".$file."'!\n"; +} +print "File-transfer finished\n"; +$ftp->quit(); diff --git a/bin/multistation.sh b/bin/multistation.sh new file mode 100644 index 0000000..9300725 --- /dev/null +++ b/bin/multistation.sh @@ -0,0 +1,58 @@ +#!/bin/bash + +OVPNSTFILE="/home/posdab/vpn/log/openvpn-status.log" +OVPNSUBNET="10.1.0." +STATIONCFG="/home/posdab/current/station_config.txt" +IFS=$'\n' +STLIST=($(cat ${OVPNSTFILE} | grep "^${OVPNSUBNET}" | awk -F"," '{ print $2":"$1 }')) +ACTION="" +CURST="" +SUBFILTER="" +if [[ ! -z $1 ]] +then + CURST=$1 + echo "current stations-def: "${CURST} +fi +if [[ ! -z $2 ]] +then + SUBFILTER=$2 + echo "subfilter stations-def: "${SUBFILTER} +fi + +if [ "${CURST}" == "all" ] +then + STLIST=($(cat ${OVPNSTFILE} | grep "^${OVPNSUBNET}" | awk -F"," '{ print $2 }')) +else + STLIST=($(cat ${OVPNSTFILE} | grep "^${OVPNSUBNET}" | grep "${CURST}" | awk -F"," '{ print $2 }')) +fi +echo "Number of stations: "${#STLIST[@]} + +if [[ ! -z $3 ]] +then + ACTION=$3 + echo "current action: "${ACTION} +fi +#echo ${IP} +if [ "${#STLIST[@]}" -gt "0" ] +then + for st in "${STLIST[@]}" + do + #echo $st + CMD="" + if [ "${SUBFILTER}" == "none" ] + then + CMD=${HOME}"/bin/station.sh "$st + else + SEL=`cat ${STATIONCFG} | grep "$st;" | grep "${SUBFILTER};" | awk -F";" '{ print $1 }'` + if [ "${SEL}" != "" ] + then + CMD=${HOME}"/bin/station.sh "$st + fi + fi + if [ "${ACTION}" != "" ] && [ "${CMD}" != "" ] + then + eval ${CMD}" "${ACTION} + fi + done +fi + diff --git a/bin/resetkeylogin.sh b/bin/resetkeylogin.sh new file mode 100644 index 0000000..e7c8660 --- /dev/null +++ b/bin/resetkeylogin.sh @@ -0,0 +1,3 @@ +#!/bin/bash +ssh-keygen -R $1 -f /home/posdab/.ssh/known_hosts + diff --git a/bin/rsynctostation.pl b/bin/rsynctostation.pl new file mode 100644 index 0000000..5ef2d94 --- /dev/null +++ b/bin/rsynctostation.pl @@ -0,0 +1,32 @@ +#!/opt/ActivePerl-5.12/bin/perl +use strict; +use Net::OpenSSH; +use Getopt::Long; +my $conn = ""; #$user.':'.$passwd.'@'.$host.':'.$port +my $pathin =""; +my $pathout = ""; +my $host = ""; +my $user = ""; +my $pwd = ""; +my $port =22; +GetOptions("host|h=s" => \$host, + "password|pwd=s" => \$pwd, + "port|p=s" => \$port, + "user|u=s" => \$user, + "pathin|pi=s" => \$pathin, + "pathout|po=s" => \$pathout); +if (($pathin eq "") || ($pathout eq "")){ + print "you must define pathes!"; +} +my $opts->{user} = $user; + $opts->{password} = $pwd; + $opts->{port} = $port; + $opts->{strict_mode} = 0; +#print "con: ".$conn."\n"; +my $ssh = Net::OpenSSH->new($host,%{$opts}); +if ($ssh->error){ + print "Couldn't establish SSH connection: ". $ssh->error; + exit(1); +} +my @out = $ssh->rsync_put({recursive => 1,archive => 1, times => 1, compress => 1 ,verbose => 1, copy_attrs => 1},$pathin.'/',$pathout); +exit(0); \ No newline at end of file diff --git a/bin/sqlite.pm b/bin/sqlite.pm new file mode 100644 index 0000000..814c0b7 --- /dev/null +++ b/bin/sqlite.pm @@ -0,0 +1,149 @@ +package sqlite; +use strict; +use DBI; +use DBD::SQLite; +use Encode; +use File::Basename; + +sub new { + my $class = shift; + my $p = shift; + my $self = bless {}, $class; + $self->{dbfile} =$p; + return $self; +} + +sub strreplace(){ + my $self = shift; + my $text = shift; + $text =~ s/'/''/g; + return $text; +} + +sub dbquery(){ + my $self = shift; + my $key = shift; + my $stat = shift; + my $retdata =(); + my $dbh = DBI->connect('DBI:SQLite:dbname='.$self->{dbfile},"","",{PrintError=>1,RaiseError=>1,AutoCommit=>1}) or die "dbquery Connection Error!".$!; + $stat = encode("utf8", $stat); + + #open FILE,">>/tmp/sql.log"; + # print FILE "key:".$key.";$stat\n"; + # close FILE; + my $sth = $dbh->prepare($stat); + $sth->execute() or die "dbquery: ".$sth->errstr; + while(my $data = $sth->fetchrow_hashref()) + { + if (exists $data->{$key}){ + foreach my $k (keys %{$data}){ + $retdata->{$data->{$key}}{$k} = $data->{$k}; + } + } + } + if (keys(%{$retdata}) == 0){ + $retdata =(); + } + $sth->finish(); + $dbh->disconnect(); + return $retdata; +} + +sub dbquerysorted(){ + my $self = shift; + my $stat = shift; + my $retdata = (); + my $dbh = DBI->connect('DBI:SQLite:dbname='.$self->{dbfile},"","",{PrintError=>1,RaiseError=>1,AutoCommit=>1}) or die "dbquery Connection Error!".$!; + $stat = encode("utf8", $stat); + #open FILE,">>/tmp/sql.log"; + #print FILE "$stat\n"; + # close FILE; + my $sth = $dbh->prepare($stat); + + $sth->execute() or die "dbquery: ".$sth->errstr; + my $count = 0; + while(my $data = $sth->fetchrow_hashref()) + { + foreach my $k (keys %{$data}){ + $retdata->{$count}->{$k} = $data->{$k}; + } + $count++; + } + + $sth->finish(); + $dbh->disconnect(); + #%retdata = sort {$a <=> $b} keys %retdata; + return $retdata; +} + +sub dbexec(){ + my $self = shift; + my $stat = shift; + my $dbh = DBI->connect('DBI:SQLite:dbname='.$self->{dbfile},"","",{PrintError=>1,AutoCommit=>1}) or die "dbexec Connection Error!".$!; + $stat = encode("utf8", $stat); + #open FILE,">>/Users/kilian/sql.log"; + #print FILE "$stat\n"; + #close FILE; + my $sth = $dbh->prepare($stat); + my $rv =$dbh->do($stat) or print "dbexec '".$stat. "' failed!"; + $dbh->disconnect(); + return $rv; +} + + +sub dbbackup(){ + my $self = shift; + my $path = shift; + my $type = shift; + + my @dx = localtime(); + $dx[5] = $dx[5] +1900; + $dx[4] = $dx[4] +1; + if ($dx[4] < 10){$dx[4] = '0'.$dx[4];} + if ($dx[3] < 10){$dx[3] = '0'.$dx[3];} + if ($dx[2] < 10){$dx[2] = '0'.$dx[2];} + if ($dx[1] < 10){$dx[1] = '0'.$dx[1];} + if ($dx[0] < 10){$dx[0] = '0'.$dx[0];} + my $xdd = $dx[5].$dx[4].$dx[3].'_'.$dx[2].$dx[1].$dx[0]; + my $bfile = ""; + if ($type eq "binary" ) { + $bfile = $path.'/'.basename($self->{dbfile}).'_'.$xdd.'.db'; + my $dbh = DBI->connect('DBI:SQLite:dbname='.$self->{dbfile},"","",{PrintError=>1,RaiseError=>1,AutoCommit=>1}) or die "dbexec Connection Error!".$!; + $dbh->sqlite_backup_to_file($bfile); + $dbh->disconnect(); + }elsif($type eq "sql"){ + $bfile = $path.'/'.basename($self->{dbfile}).'_'.$xdd.'.sql'; + my $st = system('sqlite3 "'.$self->{dbfile}.'" ".dump" > '.$bfile); + } + return $bfile; +} + +sub dbrestore(){ + my $self = shift; + my $file = shift; + my $type = shift; + if ($type eq "binary" ) { + my $dbh = DBI->connect('DBI:SQLite:dbname='.$self->{dbfile},"","",{PrintError=>1,RaiseError=>1,AutoCommit=>1}) or die "dbexec Connection Error!".$!; + $dbh->sqlite_backup_from_file($file); + $dbh->disconnect(); + }elsif($type eq "sql"){ + open(REST,$file) or die "cannot open restore file $file!\n"; + my $rsql = ""; + while (my $l = ) { + $rsql .= $l; + } + close(REST); + unlink($self->{dbfile}); + $self->dbexec($rsql); + } +} + +sub dbrepair(){ + my $self = shift; + my $bfile = $self->dbbackup($ENV{'TMPDIR'},'sql'); + $self->dbrestore($bfile,'sql'); + unlink($bfile); +} + + +1; diff --git a/bin/station.sh b/bin/station.sh new file mode 100644 index 0000000..ab9a172 --- /dev/null +++ b/bin/station.sh @@ -0,0 +1,98 @@ +#!/bin/bash + +CURPATH="/home/posdab/current" +UPDPATH="/home/posdab/update" +OVPNSTFILE="/home/posdab/vpn/log/openvpn-status.log" +OVPNSUBNET="10.1.0." +RUSER="posdab" + +ACTION=$2 +if [[ -z $1 ]] +then + me=`basename "$0"` + echo ${me}" audiolist" + echo ${me}" playingstate" + echo ${me}" updateaudio" + echo ${me}" ipinfo" + echo ${me}" dldupdateaudio" + echo ${me}" updateplaylists" + echo ${me}" dldupdateplaylists" + exit +fi + +STATION=$1 +IP=`cat ${OVPNSTFILE} | grep "^${OVPNSUBNET}" | grep ${STATION}, | awk -F"," '{ print $1 }'` +if [ "${IP}" != "" ] +then + echo "Station "${STATION}" VPN-IP: "${IP} +else + echo "Station "${STATION}" not connected!" + exit +fi + +if [[ -z $2 ]] +then + echo "no action defined" + exit +fi + +ACTION=$2 +if [ "${ACTION}" == "audiolist" ] +then + if [ ! -d ${CURPATH}"/"${STATION} ] + then + mkdir -p ${CURPATH}"/"${STATION} + fi + RUSER=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $4 }'` + ssh ${RUSER}@${IP} "cd audio && find ./ -name "*.ogg" | sort > /home/${RUSER}/current_audio.txt" && \ + scp ${RUSER}@${IP}:/home/${RUSER}/current_audio.txt ${CURPATH}/${STATION}/ +fi +if [ "${ACTION}" == "playingstate" ] +then + ssh ${IP} "ps ax | grep ogg123 | grep -v grep | head -n 1" +fi +if [ "${ACTION}" == "updateaudio" ] +then + if [ -e ${CURPATH}"/"${STATION} ] + then + RAUDIOPATH=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $5 }'` + #STREAM=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $6 }'` + RUSER=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $4 }'` + scp -r ${UPDPATH}/audio/* ${RUSER}@${IP}:${RAUDIOPATH}/ + fi +fi +if [ "${ACTION}" == "ipinfo" ] +then + echo ${STATION}":\t"${IP} +fi +if [ "${ACTION}" == "dldupdateaudio" ] +then + if [ -e ${CURPATH}"/"${STATION} ] + then + RUSER=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $4 }'` + ssh ${RUSER}@${IP} "wget -r -nc -c -nH ftp://posdab:sai4seip@148.251.15.48/audio" + fi +fi +if [ "${ACTION}" == "updateplaylists" ] +then + if [ -e ${CURPATH}"/"${STATION} ] + then + RUSER=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $4 }'` + ssh ${RUSER}@${IP} "rm ${STATION}.zip" + scp -r ${UPDPATH}/${STATION}.zip ${RUSER}@${IP}:/home/${RUSER}/ + #ssh ${IP} "tar czf ${STATION}.bkp.zip radio" + ssh ${RUSER}@${IP} "unzip -o ${STATION}.zip" + fi +fi +if [ "${ACTION}" == "dldupdateplaylists" ] +then + if [ -e ${CURPATH}"/"${STATION} ] + then + RUSER=`grep "${STATION};" ${CURPATH}/station_config.txt | awk -F";" '{ print $4 }'` + ssh ${RUSER}@${IP} "rm ${STATION}.zip" + ssh ${RUSER}@${IP} "wget -nH ftp://posdab:sai4seip@148.251.15.48/${STATION}.zip" + #ssh ${RUSER}@${IP} "tar czf ${STATION}.bkp.zip radio" + ssh ${RUSER}@${IP} "unzip -o ${STATION}.zip" + fi +fi + diff --git a/bin/updstation.sh b/bin/updstation.sh new file mode 100644 index 0000000..5ffb049 --- /dev/null +++ b/bin/updstation.sh @@ -0,0 +1,45 @@ +#!/bin/bash + +UPDPATH="/home/posdab/update"; +OVPNSTFILE="/home/posdab/vpn/log/openvpn-status.log" +OVPNSUBNET="10.1.0." +RUSER="posdab" +IFS=$'\n' +UPDCHECK=($(ls -1 ${UPDPATH}/*.zip)) +STATION="" +BKPDIR=`date +"%Y%m%d"` +if [ ! -d ${UPDPATH}"/"${BKPDIR} ] +then + mkdir ${UPDPATH}"/"${BKPDIR} +fi + + +if [ "${#UPDCHECK[@]}" -gt "0" ] +then +for st in "${UPDCHECK[@]}" +do + STATION=`basename -s .zip $st` + echo "UPDATE: "${STATION} + IP=`cat ${OVPNSTFILE} | grep "${OVPNSUBNET}" | grep ${STATION}, | awk -F"," '{ print $1 }'` + echo "Station VPN-IP: "${IP} + if [ "${IP}" != "" ] + then + #echo "Station connected! we can make update!" + scp $st ${RUSER}@${IP}:/home/${RUSER}/ + if [ "$?" == "0" ] + then + ssh ${RUSER}@${IP} "unzip -o ${STATION}.zip" + if [ "$?" == "0" ] + then + mv ${UPDPATH}/${STATION}.zip ${UPDPATH}/${BKPDIR}/ + fi + else + echo "ERROR! filetransfer failed! stop action!" + fi + else + echo "ERROR! "${STATION}" not connected to VPN!" + fi +done +fi + + diff --git a/bin/vpn-client.sh b/bin/vpn-client.sh new file mode 100644 index 0000000..1822867 --- /dev/null +++ b/bin/vpn-client.sh @@ -0,0 +1,86 @@ +#!/bin/bash +STATION=$1 +if [ -z "${STATION}" ] +then + echo "no station!" + exit 1 +fi +CFGPATH1="/home/posdab/vpn/keys/" +#CFGPATH2="/home/posdab/vpn/keys2/" +CFGPATH=${CFGPATH1} +VARSF="./vars" +STATIONIDENT=`grep $1 "${CFGPATH1}/index.txt"` +SERVER=1 +#if [ "${STATIONIDENT}" == "" ] +#then +# STATIONIDENT=`grep $1 "${CFGPATH2}/index.txt"` +# SERVER=2 +# CFGPATH=${CFGPATH2} +# VARSF="./vars2" +#fi +if [ "${STATIONIDENT}" == "" ] +then + SERVER=0 +# CFGPATH=${CFGPATH1} +# VARSF="./vars" +fi +if (( ${SERVER} == 0 )) +then + echo "Station ${STATION} already configured on Server ${SERVER}" + exit 0 +fi +#if (( ${SERVER} == 1 )) +#then +# SERVER=2 +# CFGPATH=${CFGPATH2} +# VARSF="./vars2" +#else +# SERVER=1 +# CFGPATH=${CFGPATH1} +# VARSF="./vars" +#fi +echo "Create new certificate on Server ${SERVER}" +#exit 0 +cd /home/posdab/vpn/easyrsa +source "${VARSF}" +export KEY_CN=${STATION} +export KEY_NAME=${STATION} +./pkitool ${STATION} +chmod -R +r "${CFGPATH}" +if [ ! -d "/home/posdab/vpn/conf/${STATION}/${SERVER}" ] +then + mkdir -p "/home/posdab/vpn/conf/${STATION}/${SERVER}" +fi +cp "${CFGPATH}/ca.crt" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +cp "${CFGPATH}/${STATION}.crt" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +cp "${CFGPATH}/${STATION}.key" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +echo "new keys created under: /home/posdab/vpn/conf/${STATION}/${SERVER}" +OVPN="/home/posdab/vpn/conf/${STATION}/client.conf" +#if (( ${SERVER} == 2 )) +#then +# OVPN="/home/posdab/vpn/conf/${STATION}/client2.conf" +#fi +echo "client" > "${OVPN}" +echo "dev tun" >> "${OVPN}" +echo "proto udp" >> "${OVPN}" +#if (( ${SERVER} == 1 )) +#then + echo "remote 148.251.15.48 1194" >> "${OVPN}" +#else +# echo "remote 148.251.15.48 1195" >> "${OVPN}" +#fi +echo "resolv-retry infinite" >> "${OVPN}" +echo "nobind" >> "${OVPN}" +echo "persist-key" >> "${OVPN}" +echo "persist-tun" >> "${OVPN}" +echo "mute-replay-warnings" >> "${OVPN}" +echo "ca ${SERVER}/ca.crt" >> "${OVPN}" +echo "cert ${SERVER}/${STATION}.crt" >> "${OVPN}" +echo "key ${SERVER}/${STATION}.key" >> "${OVPN}" +echo "comp-lzo" >> "${OVPN}" +echo "verb 3" >> "${OVPN}" +echo "mute 20" >> "${OVPN}" +#echo "" >> "${OVPN}" +#echo "" >> "${OVPN}" +echo "new keys created under: /home/posdab/vpn/conf/${STATION}/${SERVER}" + diff --git a/bin/vpn-client2.sh b/bin/vpn-client2.sh new file mode 100644 index 0000000..7561a6f --- /dev/null +++ b/bin/vpn-client2.sh @@ -0,0 +1,83 @@ +#!/bin/bash +STATION=$1 +if [ -z "${STATION}" ] +then + echo "no station!" + exit 1 +fi +CFGPATH1="/home/posdab/vpn/keys2/" +#CFGPATH2="/home/posdab/vpn/keys2/" +CFGPATH=${CFGPATH1} +VARSF="./vars2" +STATIONIDENT=`grep $1 "${CFGPATH1}/index.txt"` +SERVER=2 +#if [ "${STATIONIDENT}" == "" ] +#then +# STATIONIDENT=`grep $1 "${CFGPATH2}/index.txt"` +# SERVER=2 +# CFGPATH=${CFGPATH2} +# VARSF="./vars2" +#fi +if [ "${STATIONIDENT}" != "" ] +then + SERVER=0 +# CFGPATH=${CFGPATH1} +# VARSF="./vars" +fi +if (( ${SERVER} == 0 )) +then + echo "Station ${STATION} already configured on Server ${SERVER}" + exit 0 +fi +#if (( ${SERVER} == 1 )) +#then +# SERVER=2 +# CFGPATH=${CFGPATH2} +# VARSF="./vars2" +#else +# SERVER=1 +# CFGPATH=${CFGPATH1} +# VARSF="./vars" +#fi +echo "Create new certificate on Server ${SERVER}" +#exit 0 +cd /home/posdab/vpn/easyrsa +source "${VARSF}" +export KEY_CN=${STATION} +export KEY_NAME=${STATION} +./pkitool ${STATION} +chmod -R +r "${CFGPATH}" +if [ ! -d "/home/posdab/vpn/conf/${STATION}/${SERVER}" ] +then + mkdir -p "/home/posdab/vpn/conf/${STATION}/${SERVER}" +fi +cp "${CFGPATH}/ca.crt" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +cp "${CFGPATH}/${STATION}.crt" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +cp "${CFGPATH}/${STATION}.key" "/home/posdab/vpn/conf/${STATION}/${SERVER}/" +echo "new keys created under: /home/posdab/vpn/conf/${STATION}/${SERVER}" +OVPN="/home/posdab/vpn/conf/${STATION}/client2.conf" +#if (( ${SERVER} == 2 )) +#then +# OVPN="/home/posdab/vpn/conf/${STATION}/client2.conf" +#fi +echo "client" > "${OVPN}" +echo "dev tap" >> "${OVPN}" +echo "proto udp" >> "${OVPN}" +echo "remote posdab.dks.lu 1195" >> "${OVPN}" +echo "remote 88.99.170.20 1195" >> "${OVPN}" +echo "remote-random" >> "${OVPN}" +echo "resolv-retry infinite" >> "${OVPN}" +echo "nobind" >> "${OVPN}" +echo "persist-key" >> "${OVPN}" +echo "persist-tun" >> "${OVPN}" +echo "mute-replay-warnings" >> "${OVPN}" +echo "ca ${SERVER}/ca.crt" >> "${OVPN}" +echo "cert ${SERVER}/${STATION}.crt" >> "${OVPN}" +echo "key ${SERVER}/${STATION}.key" >> "${OVPN}" +echo "comp-lzo" >> "${OVPN}" +echo "verb 3" >> "${OVPN}" +echo "mute 20" >> "${OVPN}" +#echo "" >> "${OVPN}" +#echo "" >> "${OVPN}" +echo "new keys created under: /home/posdab/vpn/conf/${STATION}/${SERVER}" + diff --git a/bin/vpn-server.sh b/bin/vpn-server.sh new file mode 100644 index 0000000..4e3620a --- /dev/null +++ b/bin/vpn-server.sh @@ -0,0 +1,66 @@ +#!/bin/bash + +CFGPATH="/home/posdab/vpn/conf" +SRVNUM=`find /home/posdab/vpn/conf -name "server*" | wc -l` +SRVNUM=$((${SRVNUM}+1)) +SERVER="server${SRVNUM}" +if [ "${SRVNUM}" == 1 ] +then + SERVER="server" + SRVNUM="" +fi +if [ -e "${CFGPATH}/${SERVER}.conf" ] +then + echo "${SERVER} EXISTS!" + exit 1 +fi +echo ${SERVER} +mkdir "/home/posdab/vpn/keys${SRVNUM}" +cp "/home/posdab/vpn/easyrsa/vars" "/home/posdab/vpn/easyrsa/vars${SRVNUM}" +sed -i "s/export KEY_DIR=.*/export KEY_DIR=\"\/home\/posdab\/vpn\/keys${SRVNUM}\"/" "/home/posdab/vpn/easyrsa/vars${SRVNUM}" +cd /home/posdab/vpn/easyrsa +source ./vars${SRVNUM} +./clean-all +./build-ca +./build-key-server server +./build-dh +if [ "${SERVER}" == "server" ] +then + VPNPORT=1194 + MANAGEPORT=7505 + SUBNETB=1 +else + VPNPORT=$((1193+${SRVNUM})) + MANAGEPORT=$((7504+${SRVNUM})) + SUBNETB=${SRVNUM} +fi +SRVFILE="${CFGPATH}/${SERVER}.conf" +echo "port ${VPNPORT}" > ${SRVFILE} +echo "proto udp" >> ${SRVFILE} +echo "dev tun" >> ${SRVFILE} +echo "ca /home/posdab/vpn/keys${SRVNUM}/ca.crt" >> ${SRVFILE} +echo "cert /home/posdab/vpn/keys${SRVNUM}/server.crt" >> ${SRVFILE} +echo "key /home/posdab/vpn/keys${SRVNUM}/server.key" >> ${SRVFILE} +echo "dh /home/posdab/vpn/keys${SRVNUM}/dh1024.pem" >> ${SRVFILE} +echo "server 10.${SUBNETB}.0.0 255.255.0.0" >> ${SRVFILE} +echo "ifconfig-pool-persist /home/posdab/vpn/conf/ipp${SRVNUM}.txt" >> ${SRVFILE} +echo "keepalive 10 120" >> ${SRVFILE} +echo "comp-lzo" >> ${SRVFILE} +echo "max-clients 300" >> ${SRVFILE} +echo "persist-key" >> ${SRVFILE} +echo "persist-tun" >> ${SRVFILE} +echo "status /home/posdab/vpn/log/openvpn-status${SRVNUM}.log" >> ${SRVFILE} +echo "log /home/posdab/vpn/log/openvpn${SRVNUM}.log" >> ${SRVFILE} +echo ";log-append openvpn.log" >> ${SRVFILE} +echo "verb 3" >> ${SRVFILE} +echo "mute 20" >> ${SRVFILE} +echo "management localhost ${MANAGEPORT}" >> ${SRVFILE} +touch "/home/posdab/vpn/log/openvpn-status${SRVNUM}.log" +touch "/home/posdab/vpn/log/openvpn${SRVNUM}.log" +touch "/home/posdab/vpn/conf/ipp${SRVNUM}.txt" +echo "exec as root:" +echo "ln -s "/home/posdab/vpn/conf/${SERVER}.conf" \"/etc/openvpn/${SERVER}.conf\"" +echo "systemctl enable openvpn@${SERVER}.service" +echo "systemctl start openvpn@${SERVER}.service" +#echo "SERVER created and started!" + diff --git a/bin/vpnclient.pl b/bin/vpnclient.pl new file mode 100644 index 0000000..bb822b3 --- /dev/null +++ b/bin/vpnclient.pl @@ -0,0 +1,88 @@ +#!/usr/bin/perl + +use strict; +use File::Basename; +use Getopt::Long; +use File::Path qw(make_path remove_tree); +use File::Copy::Recursive qw(rcopy); +use Data::Dumper; + +my $basepath = $ENV{HOME}.'/vpn'; +#my $easyrsa3path=$basepath.'/easyrsa3'; +my $server = ""; +my $client = ""; +my $revoke = 0; +my $create = 0; +my $newopts = (); +GetOptions("server|s=s" => \$server,"client|c=s" => \$client,'set' => \$create ,'revoke'=> \$revoke); + +my @servers = ("aran.sysaki.com","aran.dks.lu"); +#my $srvpath = $basepath.'/'.$server; +if ($server eq "" || $client eq "" || $create eq $revoke){ + print "usage: ".$0."\n"; + print "-s -c [--set|--revoke]"; + exit(0); +} +if (! -d $basepath.'/'.$server){ + print "server $server does not exist!\n"; + exit(1); +} +if (! -e $basepath.'/'.$server.'/conf/client.ovpn.template'){ + print "client profile does not exist!\n"; + exit(1); +} +if ($create == 1) { + if ( (-d $basepath.'/'.$server) && (! -e $basepath.'/'.$server.'/keys/issued/'.$client.'.crt') ){ + chdir($basepath.'/'.$server.'/easyrsa'); + my $cmd = "./easyrsa --batch --pki-dir='".$basepath.'/'.$server."/keys' --req-cn=$client gen-req $client nopass"; + my $ret = `$cmd`; + $cmd = "./easyrsa --batch --pki-dir='".$basepath.'/'.$server."/keys' sign-req client $client"; + $ret = `$cmd`; + } + my $strclient = ""; + open(TMPL,$basepath.'/'.$server.'/conf/client.ovpn.template'); + while (my $l = ){ + $strclient .= $l; + } + close(TMPL); + my $strcert = ""; + open(CERT,$basepath.'/'.$server.'/keys/issued/'.$client.'.crt'); + while (my $l = ){ + $strcert .= $l; + } + close(CERT); + my $strkey = ""; + open(KEY,$basepath.'/'.$server.'/keys/private/'.$client.'.key'); + while (my $l = ){ + $strkey .= $l; + } + close(KEY); + my @spl = split("\n",$strclient); + foreach (my $i=0;$i".$basepath.'/'.$server.'/clients/DKS-VPN-'.$client.'.ovpn'); + print NEW join("\n",@spl)."\n"; + close(NEW); +} +if ($revoke == 1){ + chdir($basepath.'/'.$server.'/easyrsa'); + my $cmd = "./easyrsa --batch --pki-dir='".$basepath.'/'.$server."/keys' --req-cn=$client revoke $client"; + my $ret = `$cmd`; + unlink($basepath.'/'.$server.'/clients/DKS-VPN-'.$client.'.ovpn'); +} + diff --git a/bin/vpnserver.pl b/bin/vpnserver.pl new file mode 100644 index 0000000..79cd756 --- /dev/null +++ b/bin/vpnserver.pl @@ -0,0 +1,171 @@ +#!/usr/bin/perl + +use strict; +use File::Basename; +use Getopt::Long; +use File::Path qw(make_path remove_tree); +use File::Copy::Recursive qw(rcopy); +use Data::Dumper; + +my $basepath = $ENV{HOME}.'/vpn'; +#my $easyrsa3path=$basepath.'/easyrsa3'; +my $server = ""; +my $opts = ""; +my $revoke = 0; +my $port = ""; +my $management = ""; +my $ip = ""; +my $subnet = ""; +my $maxclients = ""; +my $dev=""; +my $type = ""; +my $newopts = (); +GetOptions("name|n=s" => \$server,"dev|d=s"=> \$dev,"type|t","port|p=s" => \$port,"management|m=s" => \$management,'maxclients|x=s' => \$maxclients,'ip|i=s'=> \$ip,'subnet|s=s' => \$subnet); + +if ($server eq "" || $port eq "" || $management eq "" || $maxclients eq "" || $ip eq "" || $subnet eq ""){ + print "usage: ".$0."\n"; + print "-n name -d -t -p -m -x -i -s "; + exit(0); +} +my @servers = ("aran.sysaki.com","aran.dks.lu"); +my $srvpath = $basepath.'/'.$server; +if ($server eq ""){ + print "Please define a server!\n"; + exit(1); +} +if (-d $srvpath){ + print "Server already exists!\n"; +} +$opts = { + 'port' => $port, + 'proto' => 'udp', + 'dev' => 'tun', + 'ca' => $srvpath.'/keys/issued/ca.crt', + 'cert' => $srvpath.'/keys/issued/'.$server.'.crt', + 'key' => $srvpath.'/keys/private/'.$server.'.key', + 'dh' => $srvpath.'/keys/dh.pem', + 'user' => $ENV{USER}, + 'group' => $ENV{USER}, + 'server' => $ip." ".$subnet, + 'ifconfig-pool-persist' => $srvpath.'/conf/ipp.txt', + 'client-to-client' => '', + 'keepalive' => '10 120', + 'comp-lzo' => '', + 'max-clients' => $maxclients, + 'persist-key' => '', + 'persist-tun' => '', + 'status' => $srvpath.'/log/status.log', + 'log' => $srvpath.'/log/openvpn.log', + 'verb' => 3, + 'mute' => 20, + 'management' => 'localhost '.$management, + 'cipher' => 'AES-256-CBC' + }; + my $cmd = 'find '.$basepath.' -type f -name "*.conf" | grep "/conf/"'; + my $res = `$cmd`; + my @srvfiles = split(/\n/,$res); + my $bok = 1; + my $notallowed = {'port' => (),'management' => (),'server' => ()}; + foreach my $sf (@srvfiles){ + open(ASRV,$sf); + while (my $l = ){ + chomp($l); + my ($k,$v) = $l =~ m/^(\w+)\s(.+)/; + if ($k =~ /^port|management|server$/){ + #print "->TO check!\n"; + if ($opts->{$k} eq $v){ + $bok = 0; + print "Not allowed ".$k.' = '.$v."\n"; + } + } + } + close(ASRV); + } + if ($bok == 0){ + exit(2); + } + make_path($srvpath); + print "Copy EasyRSA\n"; + rcopy($basepath.'/src/easyrsa',$srvpath.'/easyrsa'); + print "Copy Create Config\n"; + open (CFG,">".$srvpath.'/easyrsa/vars'); + print CFG 'set_var EASYRSA_PKI "'.$srvpath.'/keys"'."\n"; + print CFG 'set_var EASYRSA_REQ_CN "'.$server.' VPN Server"'."\n"; + close(CFG); + make_path($srvpath); + make_path($srvpath.'/clients'); + make_path($srvpath.'/conf'); + make_path($srvpath.'/keys'); + make_path($srvpath.'/log'); + open(SRV,">".$srvpath.'/conf/'.$server.'.conf'); + print SRV "port ".$opts->{port}."\n"; + print SRV "proto ".$opts->{proto}."\n"; + print SRV "dev ".$opts->{dev}."\n"; + print SRV "ca ".$opts->{ca}."\n"; + print SRV "cert ".$opts->{cert}."\n"; + print SRV "key ".$opts->{key}."\n"; + print SRV "dh ".$opts->{dh}."\n"; + print SRV "user ".$opts->{user}."\n"; + print SRV "group ".$opts->{group}."\n"; + print SRV "server ".$opts->{server}."\n"; + print SRV "ifconfig-pool-persist ".$opts->{'ifconfig-pool-persist'}."\n"; + print SRV "client-to-client\n"; + print SRV "keepalive ".$opts->{keepalive}."\n"; + print SRV "comp-lzo\n"; + print SRV "max-clients ".$opts->{'max-clients'}."\n"; + print SRV "persist-key\n"; + print SRV "persist-tun\n"; + print SRV "status ".$opts->{status}."\n"; + print SRV "log ".$opts->{log}."\n"; + print SRV "verb ".$opts->{verb}."\n"; + print SRV "mute ".$opts->{mute}."\n"; + print SRV "management ".$opts->{management}."\n"; + print SRV "cipher ".$opts->{cipher}."\n"; + close(SRV); + + chdir($srvpath.'/easyrsa'); + print "Init PKI\n"; + $cmd = "./easyrsa --batch --pki-dir=$srvpath'/keys' init-pki"; + my $ret = `$cmd`; + print "Build CA\n"; + $cmd = "./easyrsa --batch --pki-dir=$srvpath'/keys' --req-cn=$server build-ca nopass"; + $ret = `$cmd`; + print "Generate request\n"; + $cmd = "./easyrsa --batch --pki-dir=$srvpath'/keys' --req-cn=$server gen-req $server nopass"; + $ret = `$cmd`; + print "Sign Request\n"; + $cmd = "./easyrsa --batch --pki-dir=$srvpath'/keys' sign-req server $server"; + $ret = `$cmd`; + print "Generate DH\n"; + $cmd = "./easyrsa gen-dh"; + $ret = `$cmd`; + #create clienttemplate + open(CLT,">".$srvpath.'/conf/client.ovpn.template'); + print CLT "client\n"; + print CLT "dev ".$opts->{dev},"\n"; + print CLT "proto ".$opts->{proto},"\n"; + print CLT "remote %%SERVER%% ".$opts->{port},"\n"; + print CLT "remote-random\n"; + print CLT "resolv-retry infinite\n"; + print CLT "nobind\n"; + print CLT "persist-key\n"; + print CLT "persist-tun\n"; + print CLT "mute-replay-warnings\n"; + print CLT "\n"; + open (CAX,$srvpath.'/keys/ca.crt'); + while (my $l = ){ + print CAX $l; + } + close(CAX); + print CLT "\n"; + print CLT "\n"; + print CLT "%%CERT%%"; + print CLT "\n"; + print CLT "\n"; + print CLT "%%KEY%%"; + print CLT "\n"; + print CLT "comp-lzo\n"; + print CLT "verb ".$opts->{verb},"\n"; + print CLT "mute ".$opts->{mute},"\n"; + print CLT "cipher ".$opts->{cipher},"\n"; + close(CLT); diff --git a/current/POSDABStation.sqlite b/current/POSDABStation.sqlite new file mode 100644 index 0000000000000000000000000000000000000000..8a63196d637ce267222f1b66525fc59dbfde05da GIT binary patch literal 77824 zcmeHw3v3)odR`CT!>6?5ETz?IHI!CM>9kGt`yriHOHtHgC9a;lyFJ^H`%z8KX~^Nu z3|G=6Hg4#<;9vwfCqdwxod9RUHvGz6;s8dR*hqXf4#ojVE5OkB!}8nu8Cc$*;6dm_tjs2{q_G<^*^|GyV68ur&ixEnq`qW#1sn5 z+vPID^o=qMGY$XyU$gKq;Qs*s7DCS{k5C8uABHB11I$R@H<+p4>HEgi7mJU^o{oHM zcxozKSIY0_uX6^nF!04|eZ#ZIj~9OGQPVK1sL?c&@bVawgF;mG{W8C{*}sBsHFR98)}HX+%g)CC$+jA z`rw0FbsPWn%4QR-p?Vvv%dTNJ){F{BU-HMBs0r0QPULFc+HxuK3PsxJy=!cn@Dyr| z_uk%Y@QH7Q_}ew3iJllRnDDS1eY4y!Hnys$4sZQNzgY$tPOWMKJY49_^14yCpBQ!I z{rJJw<~j^1??ScO- zmn*hmyA_fT@GB^^RDOn-Kg0hDyV!Fl-a|Z zE6aFHx?lD-5CiI@O-=AgrGWv0Z~#WHx5HJIxw*p5v#^c@pq~E3yhMl!-eX1Uezmo22ig?AFj}Wx+bH7)Jeop?@ta!02T)ZV zS=;qSA|36Iuxyh?jGi6)MdpW~&s#szt)r0#9d`5Van zJ{Td(eHZ+ZitWB3O-!AXl1PorT5f?hjaYDE6h>ce)HY4DR@v<6Ab1V3vF4AQc84~% zQBrYuoml({vXhF#>%`*C_3fnM@H(-$Q?Dcyhu4Y48%8s!IJ{0SzMaTSV>`@@H?+tw z_a_6F%Ccu2ke|+;8yuRwe6+w+Hf{8@@jjRh=n*ym$j^`5zJJ8K{|-(4R{tYx-h62~ zJoNm5*T~JAP7^6NZ@`jmlaiY^Z7w|9GHTwm3dP~sW5)`u_uSz{Otgk;sWlEq)U@{! zCV%&-;!pg+v^iSwXZ=QFeXCY)`m^qvqwoToZ=Pz!A3t$_fAsA6{-N2W<7xW9n@Ssx zc>f76o(C2SLwIs=7d=*O)2Xbv-}@qscHfoHJVxF`|AA56b|=5H6L@)bD9aivFOxHn zGmtZoGmtZoGmtZoGmtZoGmtZoGmtZoGw`A^FbECrpZYW0{OPIhPkj#_uN434@XrqY z^5Aa|e5?Oo_x+E)*9%HPNypcEfB59;{Cx44UK}YhBk)xmnP)D|stj}Dc%g8VIXBNR zs(}>C5II&=4Tt4o@Xfp@j}1eu(;0C7&E`E;RH z2ZxDQwqaDH2C8fc!^Fp839`J<{$J8~9exzG1&LdbB5+ihENEz zfp{eyv$@4u#uloA_xZ}*GFx7(KqSjXyBn;aS zzHF^c0iM%Ec{vf!(EyKNNa5a-Wj-BGSYmx4B@*jN>dnmu@!s=3>ov}g`#o2iByxIl ziGtL2bS;Ebmld6Y)WMO8Y6R%*?WbtNtZmoV*lXm|M9A((2Zp#ZLHbs`PD5;IRtT{n z$|eOd#NR8{x)6bUpS&vziAenqdyVyNzjrI+8L{e`5yEOBQOtyuPr}M~!^-y>Yg>}H z#sKTN;>BCEepS@Sm=zFBl99FEMDT93e8Zof_h9DLks$d~-?t&IZY`Qjo~ltm>x zcuiT5DBW8%s#QF*Mgcdhb@sORNg`(d!(Jm^@({zG!U9&zONiFVoGgR{S`%!VDPf|z zwT?C(z@$?qS~-|ruecv2BKD_XuT1&Ooo$%1&i0ys8-ADDBhck1ih5#~j|4NVWs70$ zWjY#{-sN=&(N}8?Rle^(fJxz?@@+7O*3hPBNCY2Rp$~hF^bwwbcjkuxCR@CeVm_S) zlkqe$8Np}_^|PUAUCbvk0fP)z949W^4}$lJ9Uc0-*N_*z&gE5MLEsitZ9$dVh9x#K zJB-UvIdSK;L81fFrn7)4(FikTDkg1208_A`1A$fI?i_NhYwu+mN8~qpP0%|rf&?WS zL4v$GQzA;BGMaU)C2!nwRR$;l_eC+09w^o> z(QAs>7)89QW#b6eRy%Y3ge3iDGD&SIGHqE2jW^TM>~yt4NV2!V3XDx9SN*q%M72Nd zHA}v+;Ey16LFclNq%LTBtJwz}oiAQW7NkJ+nz|ewX@=5mQLtguYwxq5eya#}tHCy; zEBLXzOrBwh*A^HuF;$H+`GxJuCaPBueEx}w1&fBtX6-5LbPH`#-TOKh7B^#a@NMJ> zd>bAgo%%!OjpEmtsjp4_<*6T;lBUKc|Lx>&P5#v6+T>f4rHTJM@p}_LGjXH%_2PFY z-k&%z{=M;kHvS9ae{uZ&_}Ou0?Av2s9s9!A508msqody${fDDp8g)i5jn0tuQ~oVy zAZH+FAZH+FAZH+FAZOr!7&z0vT2PT`Aw^bMQ{Xu-yds)BYntHJba+WpRBqlYXmhp& zpQIOj0~bUVl5GL}N`|BQ0UKU4A~l}&3&JrjzFWc9{eqfmJKYMN@(U`Wq;xBI(l00? zzH5zhenDP?1#%ZKWv`&*2o~yA@PuE`vh1$(yyh1)ct`A3<8i;BYVmrvg0K1oC8ztJ zKIRt`4BqTk<12naPSVtF1&?|KMcd}O@_58AXi8kyE}ZoXY8Hfvy7bJ;enAEPc(;Nj zzo4jdQn!LLenFnoyGqZrR}lP*W>+vT;euHLeuqhoDz6*J&{{Nl*BMve^sDC`6HZ-d&v=lcJk|4`qj3SVLV6c>H* zzFKl=dUbVfZZ`6zBZyIpk_E~_6a0A-rl|0|2{WNc(>wyl%Pc3b91l+#%L}Z?a|&!Z z;PJQJJ;@hDj#KgPO7PT@XHweDsUp^fUE57lguQHc6lqJIPHea4*an%}ySAIAm($y= zUXWy$@9a;6ZxOnX@cmLsyLHvZc0spxQ>Tgac57`p+0_$~6a1|uA5Lhu#hHpC2sl)P zR9C)rm}DY8T|8^q6#WhD=2;FzTqX!y`NnjCd;@#?cxuUqQray$8s0kNx7#%B=;jO3 zZps9e*lxTPh{v3fO+kBnYROY+?Y123ANJd=D{2DYlxZ-r-9(?L7lgKa@8zi_Po}lo zP_XacZ?`EW@J-vo1??6=%veEyr)+vq#=Q~9d{m1BnzJQOq_tZ$!*T-K%G8*ABg)1k z(ryk!9P4k9VA5mW8mKXoen*ZDRSR88>cgVO)mh9iGFCV(qt| zrU(0c{r`zsuR(Jd{Vn9mVaWqiT(~W-QJ#B@=#j4B`2&0P05Up zOGH^qCbpYsXa(C<`*>=}gK6#N?1&z8xM*M=%ZW`{u_m^g@SQfF1T#zbrn>A~`PKv?Y0ZyZ0s?E*AW|ExA9f-72^;LhZH^{HURJ>xvoOok!%G;_XOm_dezw zSieueu6$;E8ej5vrub#1_+=8~&lusK`opgK1>T>y@#1+1@)qX|#oNRMne0lHeCvm_&+YFYj)QfN&FudR1CE% z;UxZ#3xe+oZ@5TpBZ>dxf}CaJxOHkl690#Sob4dIQ6RM-iT~q*rc8Deq!uLce_T-0 z!7tmTMiT$W1!Y8n@ToPD_&+X4i`0?$KQ2fMjgk1jj_9!{692~qX~7>7|IZR_A@P4) zkQUxJgcSfONQozq_&+H~ap05qKPgD@n3MQFDM)cqllVU=Nbw1i_&+X4bHbANKPgD@ zdXo4*DM)cMlK4LKPgD@T#@)cE=Y3~k@!C;Nb${(_&+X4bB6TI z_pcU7L5lYQ-~Ttpe1@6)2NO$Ue>(b?M!rA%lgwuZ|L?#~|6t*-_i_&0IX!Y_RXp8s zwoRQ~CHDk)XWJM!XL0!iaSc;WxV6viKl1Jk_&}_is?1j1Lv6unwjLgJBVh(nhrM<( zr?Zx0n%@2I}BHBNZyJo4r8 zR5(fw>-3jSGs}c0n-T(THznYS9NckFGau*)U(A$)t&-g^_3?oQK9FVwXLz!mmQxp0 zk@@wj7#mzR-h^YGXP#=x*-pO0*aONxI|h`;4;RNMzvWU+iI%5P{`?La?}_T&qlt$ z=~>zLIjC0N--esmYsS`3j1-Bo={#{ABY)W?pW>%ZBOi`ZekiA}_tY0RI{HF`Q@cWz zzQ6_ftbO585_HAR<}eutddEFFv97r8&X1JsjA>m__wLk*9Q*Yz(-HT3#ZIpX&nEns z@XW&R0}m9>j}HOi@l)tN;q8fb#U-2)t4<^Qxt>Vh6aR}bfzLMO!a?@TQ*MZbpaUv{ zMB=HI&UN?xC`!=1O9veILH9lJ{!Wbd?C0LIsu};3|IVid&aAR zr&C;8TjK?BXQLm)_-wKBbbU;Z+$3U5i>;@L@pC$9zb8qK8|~Q--qUG5Po%4jf9IV( z;5&X&-{ZUFE?U80yhCgj+FrB-zCV;x`+Fk((*yWE722XFh9|H(CI;`q`d?=ze{$l` z*l&)$TbvsHgTfO=AKDq{@B57|>;IjLB~U2yMRmH1Lg_1=V$L1SvV%TRp+Mr6M(l2h zYu?Lu(UXKL5qh9C)DEqoF2G*?EcPERDE}CPd!xQpDW5Uw8z010pq|dqW`MoZsq7Kk zBVdoVk3W$;$cGjq@9yvY3VC^8WWp6@0v^~m zyOBu-HiM;;cJ?umOvuG$*XmA$#})S-3&}6pE0Ec*abRR#iId4^y3Y#KBQM6s_|DSH zL>1B*BNIu^Scgl~n^3M!1B>9oOp!ZpG3#qZ+5xLXxdXQv2T%mfNonOy;h| zWKPOBex=x~E_b7`Jug$wdnMAif$FLErmnze&yhtjXY#x1#DxgE&x zq!1kj(>#7JvcD7}t4ti@St6!6?YKpPY5x4~NXGW~uH!r_9fGPYWM6R#WEI^py3dCI z2Uh#eC#TM=p6k59*pH=ot9e&U@oJv7?cWzuoCo#M2kv6tbC*R%y5}ZLT+Mr*C79&x zUhG)Q_aHQs(J`xH$83D&NtECxlSG0$Z%mFzFpfqnxuGD+y~%CtZC8m%7PHUo_T)XS zDm$0+AjMjy6%a0%ITqw{5SXEj31A+UL>+gZ#+dg)5tJh#Y0N)|Tb%dA`P&_u1FR)I zqju)?%x+i@eV|D~=l>7k^Z#8|{P{;Y133dZ133dZ133dZ133dZ133dZ133dZ133dP z8Us^jpv99%CI)wyQ+>b0^!?JHIQ2u5zd!Ju$;QOD2fj4%g$Zf=XUA_3yfyayu}5Qv zMt`^ezl?5<9xHycsEqu_{=Yr)H;4cC@UIR3@bEJpHRcZd zf9v$%;O^zS@XpWwjoP39K- zfBiTHi!xk;>{l5Fdhdj%6EINPec_}Us!mur9s*0dFx+ohde5%B8dOKURy;#>$3oT7 zE+5ZO-7BH$Xjhcet1EtixlKj|bcaN{$edE$-J^kS&Q=#qH?Pcwz|t;7r?d_xkCm50 z)zPj_r&l-jRc6`ej=Etjt-3pOm$oj{~i`JCniW zovkv8z^sgWV6*HwptTML*;uGL+D&@&>L%Y{-f2(UveWp3&}K1MtPQN3^1$xKdP=uZCWap}#lBB4{eNZR+2l9I zwbAd6e7^4!Lx%^x^ONV_}@@^%>rOh4DvK_G3FoJgQuL60kNBS2*IUiDrc7=@kUr!8dL{tV^( z{dL*SfE52}fy<`-@EMR?`|aqjfykwwT{s0fyibu6U4$>1>myO**5G^$BH6qnLU+CW z`oP4lb7Lo5T99$t@J_~d6}ri<7tY~1<4%gc3+4>M9nH^^$emqr98|YshY7C+@6X@C z_gU2Hn+HZ?{0K zCtjl5HJYfh>D21Y$dG;DzdbNf>zpV+g4C>bimG~}mU;sC+ACd^o_8UGcVJ7R`79F& z+^TKh!$!4^nf7k`^?^}%uftpc3Z+aZ2yj9F1VLBD*FHCZ7sWg3F(C6)QS2s-f#pn# zr6rQNUVCCxqi2C{kXHvrVuH$pWM0{httuJMyG#^LFw@L?BJ*D1J5v`X-=Fy9@qaV^ z^4QAg=ZpV%?7A;kf$&P0-75Uv5 zkg0SalzW5;5K5#V5r{WN_L7az%~ynT8peQ3rURkebBuw|HhKV%AW@+&S_DXH0wa?A zDi}d&z+3;_%sG& zAQcGho_qp?a^pfeki7|1kWw)Qq(2=9x%a8KL_;qq!0}#wiCkc>ZzT@ zG1j|pB=#NRJRmyLj>@W|52a$f;Byv;;{Q2yGX3 zB9Mcz5>BQ9p(Sv_Kxmt`6M^hU1GY(s^~hW*5L$vM41~6eARP$yX1FuVuAa!S$BH5b zq?`(bmH-O_p+)l(fe??3hJj>#B7KNE!_DB0e~bY+kp_gCpbLOdW9o@O_9I$tMH~b2 zS}G7)0x=AP7VJJ4AlQKr19ChS2ra=G20{y`CITS>g`LT+Xzl7LeXzfp3WSz`4FjQ_ zZAb*NAJIw&ax4`HEkPUxLW_bW0%GIO|Z zgn{*cW8&Aw|K0epvD>4q;_r<7`3N_>KJ=BrKkEAzeItV}4cy4E^3RLBune@WzC6Bq ze6@5=EEHBRl~mpkkt&<4U~wWVNg50?L*ZFbmvzGiwJ2$Bt|&O#tY}D3WeL*!S&&1P z=aIx}h7Pd=PBat=+!Kza;A1imjm^hsvn-X_GM4Q?zRTEyAzcu-nL~;u^Qr@JiJ&e+ z<+x~FkY54+@*}rG_U`h-PcOjz!}wy=*7Z^VW2q#|9MorvtR_kpD>)ouHB+)#p3_v# zfY7dJOa2KSMYA=>QMvG+)?_LArvn&bG7MOh2{V&>f?+f)ql$baAW2_aom(xP#T~L( zf*oi)G8B!KY{g_H!Esm(*4V77af+hI0&m+qK|;<-DViZUs=$Y^mZmNl zp>X;IS%Lp%rZYlmT|YAZ5om5HV{=^rBJkO}QQ})yX9FY`OO7I`Fnc1_5g<9UBw8^0 z2q2NNrb`;+z2*(1hKbir*$^V~iy&8X=U8xw=hKK6xaq9Khmow@ytVAhPwVPTFcL16 zG|>=vMG{$AmK9dgEXbNIDF$n)jt%Ll9g9PHFcK_B5wyri5G^YP!W+;D;)4gYa6y)4 z#&*>o-hf`IJZ=wz*79@!<8sL~BwG++-<4y_4lBu;#_G_1);0uF)+~5og!GanBTJ9; zg{0_dFcLb0cvde+%FOUyU|hL*{rb&zcPzg|aCpO6w-kk!c$-yho`dc%WmW@K#d2W7 zSdz}G1|L#Ph9!txM88^~r;=qVK`-IK411WknTcJ&@J0t{*NrVPz;QT?Lz6&>nkIPS z4H>bpHU=D)=&*o5Fim7C$aY5unJ0Rslt%Z0qhpj`ITYZySW;BcksM2d0JsSgg{2Fu z2}$T#1Kh@%33A1AA-U?+7$4dLj>s5aoFX9R@f>lnWU9!5xz+~uWl&Xysj-F%IqG4W zGi**rrfg}!7?&Me1uYOvv>MDYF`-(4&5-4Up#d@_fjdT+8Qc|y#oM=+A4F&D8eG={9xKP1>OlTK+ia4SWjuD8lUChS^`Kjvz|21 zxr&ODW{SIl@nCxkkviE(cif%`pxi1ckTr^vVdmg1ta43RV08|R4_i}pOXEb%Q9>%$ z6l^`x9i|HR7IltsA4)=xU?@B+Q)UKs4~512#3sV!aRP^!gqKUQ07}T#bk;x!q)QSx zR@WUE^p*tSE?G5s(F}SU>J zaEyj==$s=c4gwsS03!v=4pz4yBe|~If*@I(WjS)tAF3=$I1_hZqHBtn)*mTz2-vpT z%=jK~@KGFBivf;HB>`qPT?DPgSug=gjv=s`t|3+sk)rAVI1Jlfgp+*Iw9#ZQgLEb>ofk)zj^@y&_|U&4IXSCMZCdR#{y( z6foQ*9;uED@l4lD@UHXe;rjl>uB0_-eShsZS)6%p3S_8;=75dBn=tage-36F51>rR zk|kTUWkYw(Hg8qjGe^adeFM35I_Q(7lC6t2QlU>Y8?>9`;N`twf$0VY0B@=iQbgiI zDYyHiXU>Y_dxFwoOLwh#7RcDTpRVCRraz&lG!k z4@km_ef-V|9V2T*$DYuR1D zcu=CgmYXLD7SGqB!l;D>yvE9+01FojR)~hIbI>>7xE3u0?yn9kz4EubwyR!A7O|Ui zVJxzWMA;F+jjbVK^ee0`Ko99WXY1HgZt5NLM6Y}<$M%AyW0ts94zOG-i8^oS9PhA5 zfk1;~n%HpxZhB6ZLA}}{WD9jC@3xHf%I~tf+1u@x=tBPl0pj^AM9$J+_C_qk8U$8S zcnelACM=Wi%Yz;7a)xJcbgtPjE*)KG;S@cr>Le9xCnD205)ba%2Ugu^TI*%F8LfQ1MgsgW zk+T9<=3z^da6uAZW3vh?>s1DIU9UkEyzG0cS}P*)xp{~*Q30Pb7fN_Wpxrb1fi0i^3f;EcFb!iJaOI2^c!z-pFwQDRLCeE)#U zF%8YqWzmW_BYNiU`dC&h>HBiHFcQu-4NH`e+kQzj0Er+7EV2bj=S*G^RXc*DXH);_ zy&#E9{Wlf}5^r%S2}px&6#@%UFmQEo5VttBV=(=P$cs8(5RJ?k%9Glw%l*n@I#@Rr) zaG(-4x~R}4wg!V-U2raoXBGp9#)o;3YS44Z`YR(rB~s~vwMIN4Ofo+HuKYMpD?zOIhex0 zkL1V}M8gH_91~$h=70&JL3eQop~#T$Sp@m@2$a^1b76)*yk?z?G|Rh#A$6~#D=g8# z_QVP1Z()Z0Jw-gsbdsaM)(M#QV6&qRE>+kA2!UT@BG~?+c!6!-SKTYuP^Z|pZm@w~ zSuE)vR=c7dPh;3qkMWf1 zhr@BIBMF?bRjX_^pTIE&alxu1qxp29R$qhL3l>ymK@k?tATthPhxrZY)%{c?nX^$ov9?Q6;F^O>W>57NWj| zNk&cBezp!58Lpv7&RaN<;k`bvWTTfmGPY_9TBcm1P%dMt(Ve$W0)MBAa!Qicj?D73 z>;Q@URl&2mhBhPQ-FDv{7;`sb%*mOu1#1hkpDZ|ArrY8F%1n0<*s7i(oH9&tq{xhr zuX%=_U1gY~#|woL5$68VY3AI~EOSmLr{F+lA(64rM2)6xRI1Oms>ZV_>|;B>UfV$D z-QwqsZSYf*=>>bgv-zfd|FbY)uUlI|&Sar{#;9+6pq?ep@ALlOYry@UyddtpHJ??4 zvSgC!go|$wW$P%O>HNO??!ZLoLWc;c3;4nS8Qk{X|8Px}4v(U?AaM(Dm|YbX1a3i9 z7bM-|E}ICAeyVVKl|5g)oNWx+0^B&-<+9~O0yitjMs){mS33scyP*#bjLOdB-P(el zaWv}wXxv#m4N^uSDNyu3U?lw*gNF$%z4^p<3qz~yx#Gocf<`!G;4}m*Nr@t< z(xtX%`g}^;`v>bb2qK4l77Qx0s|3-mv`+D^ZydlkKOXwazD%d3&ul_@Py z$`;-@EK-X(k80(<6tp)sL{kua7q&j0A<|)8K(yPs%N5uSm#>QX`qH9qM&vUOhHfw5 ztXias7$At@)+;s--uXhN74P7p;6~U6sJ4zu-=TM&ob#jL^%P|5T~;GCw|Q0j3h+UB z;^X>rHPTlCaXg7{yPj-Gg)5pBv&v9t=511AY2N zuivXDIxB$|j)#*WYeDKYPBoZDs{#{E5tuKXyeM=W*N_1=Uc*m`$7qyA=d8k{?JHLo zj%-foQmMRfaM`(Bt=^f*4GAlF){Dy^hCeK~3c~^@BuBSbxW_7;Ebd(3LGWkG-^`2+ zOR@w2;J-;vpzO<3f|7m`bW3`%e@h>VlKtj$OZxcKVb?GyIQ)Ac?inBns@y+%Kh@8H zlk?cs98IKGA=Y8)L7<58B74joeHnDZfXr70y~-6625q@qF%(AipL&(+;+MVW&v{}S zMtL>;{f1i&awV$o7#}$vQz6tU}(m;_Z^M8{*}->UTUa~LyRogO&A|LS4cj; z2#3=aBnIJdP{bLkjl?YOOk0?SswjQ``pIVg!MQB*Bc%I%{zw$xNaz{@i!kyFu}9OB zXKX4!Cim!(M(&*BhulnwkVhlPQj3(aB# zj6|a@47DgDa8&unMk$nZ?njC(3T=!VGFIN;)S0TpTTx6MF>?FD7 z@depQ2Q=sx38&#s&GjO^it^;i)y#j+*zY?+Wt6+krfA?E^_}VmUsI-bk&851L@k-c z*%YJ9AjO*2>3wt865U>-?a-A3H$!3_y-BGb8F`{Q)In1x?57<)O6{=%u z`-?L~9%rW%8#F7up)klS=wUT-nP8k}CR*HaH)6?JY|S$9C1?Mbhvh83mEzB2ik8A4 zS*Mpq@r%mBOQR%8o(T(z_4N-x9|_oR=?PVsn><)tB$Blb(K3I|Zb$y6TiJqK4re2& zniZrU26VQ_Oeu&HKB|aFrIiuA(AavFN@#?|zyu20^@puxCZG-AL{C-E_RGL!9kgDw zm0Giez@_nFtl^nBzC=a6rSk%iSzQ6bi$$q-QALNr`fg;y9FGI$B<&zCftE)(F1yfo zE^NJ{Tl4zURc9o!QE$^VL%kj-eNl~L%55i1{%k?L&L}o*-vM`)0o#)>5H2puij7jbv=xTC^=Y7#7iR2GIZX}`?&M< z*!P)4cJ0}Z?IT(#7L_!nqlRs{lht)LbK&l&mZdBt?wFbuqnZg2 zxG$db3mYxd75%7Yn=?a|IY@r^XjK+eozSL_e zTOs0-x5#x{F*?Xr6hjvi-*xBdVA$&k>lR)JS>-JJFKUkioH5J*0V<3 zDO|}(nxr<+fW!%YBw;2_Smur%j-FH$5T;l5YwZ6$IRCIAnf5 zi3-0@kczZN#BHky9+?2Ay*}JV)DL4nA4FsdHs*fuOxnR8t?Sso3ry@Ok&^Y_1Qz&b zfjd#D7(ep6r2Nxh74_E2>hr`Vs4nw2hqWRL2kmBVQpx*Nq?QwIj?X7sWFO4G54s)^ zc&l7{u1lueun==BJe1;cP*ZN|qgN9c;5Qfb{y0(C1K`xjGOGU!z$*KbPvei}^@qX7 zLa@9#ht0ksjC_OxA!%4GgD9xoLA(?4i8P!Vsym^Gvun@0mHLD_FPwm7lZC+!Qo`s5 z8}faoDEW9i?jtKt#3#M!cV`xl)>tohaW{)W3f6KggLT{x9W4eBuHX`I%X*Rz!ZkrX z2@Kq`o4U^JH$UF**@-%M>V!n^4VI@eA&dL~v`I>#Z0KzkgF>bn2;NDFO?!Sx*1047 zIBZrhr+1zME862ZzZ4E-omQhJ28`Zk_qaLYn; z&>dKzzV9y?IvC;Pj}U&xzR{IoLbxsvGWfc2e!IHPLbyK%9uw(;x4H5-ECB6yiSL9_ zy)Q&b47gow1^-#%|Lm@QD$At!a~@CV>h3Icpu5J!-qljH+^VA(oT7dLrHKn*3kZ5 z^$kch5{|AQn0Q!3@V5TKJQe*`!#2?onZkdBOC9ka{1`4~Eh z+N+cR-r9mInFQb^VPUZ8r?7H4m8P5^dwK1yd=J(FWWGMer7Ff`cD}uPJU%SC4E|)2oTchDlaMR+eMafHS3%ASC zAS81URT|+wz1njfFEDJ5UP9|^LVXUG-B{@vr->!bVg%vE?B3zf5P2(COyG|!u*;=< zZ^dDd)qy9ACxcj-JMf;6Jd3ju{UpDS_%DI?EhP9bp>qUC83E4?OuM)mQZS?NE(H!@gfTs z)#On<*F#1~-5;fS@1AX&CGYpXe@3}w!FJcBMWtb2s48G7b>QU3w#D6Nn7FkifZaPS z>+{h>9R);pU8eWcpUJa>WOgHAW7<1spQ(_oP8!p^j^kl`=2XG{G9a1aUEx@g8B&J# zkgtOtW>*j-nZESZaP>%^sFTV76{%iL21qq@EX$dq%V~%mRLSqBGKH4eVB1qJuDNH9lD^bs@SlAp*wkVJ^FU`5q7}TtL-X22 zt2CD`aWo`Y$rOT)5R{54Brpiu8s#@p>!iiyQ(|?fMBR&xvLJrN2RfY0jUGvN)9FI2 z&__Lk(MCLva+hwWW$jqB*NZ+*r1O>kh5ozf`=3N6%TS_Y-i~nLe-u5nQv)?RM}B{R z`2a?mQ&-RHfYz0%ts z*?B)$IkWsl=-0!G#GqDHqw5b;Grz!*p4g~z_CDRwR2<}YMbLVNK^IBn}6#eK&byeSDM zpC`FT%G>q35SWMMR{|j;E{_ehR70C>jf+gR#mFIZT*d5q+p3mzakT+Nrnb{@?Yxr_ zxFR(;%W1RY!UcF7ap<_S1Ih##=DEtN`zMho{pZ^<#4g!vy1p#{A3qpSQC$5F`UU)5 zajt=j^gNW}ZMXX}k$+VD<&t9?QEK&i&HiPmxy69xD4A(*C_`xj~v-a=hB>~T#ijU>PaxKHPgk`DQ zIe%bMsy|6;2@2@{26BporZ-c;8Y-O=goA6FH>Y$yMdKjQ=>Y8MVN=0R633P2+!UK) zEDUq~-AE4b7(53vF2kT1?m*olDs%{v?X~vS43q6QM4kw+11xmFKhKxw361`IAG>lL z>+PE|+2cOA_99KV@Jz&t<+6&X%8`?bQx6q}uv)^CA#fdVqAsi_?T{-{r(VGP{pERW zxOy|AmVXC5#S&JqsJuABGo6`gcK(mvr+Bg;jRbvfI&--Dp+^sWYZB!gwcWWL2&8ISXSZW4r4}q2!%%bO4f1g`J$8gW|N7x~#WQ3=1aelS_3k=MKZP ziRYID!H@XfXuuJ~p^~>NFV7@G6)RNgb%bZ$>uyPmndGuv!iOugyJXyDv46~09?~4Y z-O5$~d0}C&U%dFBTyp;F5aV~H*@dRWpP`gKygfVpg~k46c1lHbqGl&lgXWKW0#NEO z%=skYkmhAM@eRiv;;58}lhsgcW;ms@nfMA672xqK$UAAnCX;TWO{2yn<$KmW&CK=7 zxo5PC1y7#_KKNx8sa6ci--(obI{B3bnsK3+arGm&iRmk-%Y4%nz!JVQ!V_BiesiB= zZw_b}_8c%J$3Qzq!HPXf)f9fnYd8`eqODQ%h|P74>CU{puwd;mI8tFQ#7S4d%4)&$|PsgnJX( z7$NyWU3nL5D{~FSCy|MRpfQoqx8EMCkn5VTbD%Y17vZ*4rMeqsSA{2QFNN?=So)q; z#9^eCejhyXnt&6IboTFs1_C2uy70a*E$O%8ibv|7tKB>!OpLIp3p`A_2%54gkRy|- z?%@~DogAC?Mmi{o49j_GdT}^QdDywGp_>%(X({ymoFsqlQV(g4(AyF#+uO93#!u2<0IW=|krp@mCSDSrVTUl|+;BHZ(^l7qJ{li3ohYqW+ zUkyX2g@>cYF5$23TB&o-q>Wa=#o}KN286xdRo1F&v%QJ>vNy(jJbAdrcR|jsCf?Lc z15+(+P0=)s`w3Jl+Rv|SdC%o4DiIn6-Er-w3g3A-rs2TG3dOpIQO(9&7o3aWQ<+o9 z3emtVhp5bH$s6OKfX7!01FjA1LokIl6s#*!@Xa4)d;h5d{6SrHvW|+zah>9Q0eNSR za6)Q)3|KRNh@DCfeiF5YcpL?WG*#$G`aTf8V!0t+!rm`-O5Z!fT|$ZAZ>f&M;bOOo zhepoolkhdW0|gT%=Ryy@$o$+ql%1r_`a>L5;ve@`9uli%=y0Oy{<#+e%SJga5N4{V z+|M#xx$5k!td8|047)DWN<~@BKSOJBb>bBz*zt!E@gR;_MFMbDK1DBts2fruZ(pqs{7x|(on-P(Th|6YYzBU6PB|d zWgZ(hstAuuA(9$JsIr2gB}JN4;RMoKd+Sbcm-5UoE4P^UNWVB5zR(%-(BNbAM>>^r z`jj}*U96&U10npcdfaI2dSlF$oD5;M47yxnM}%Y1MRqVA{3juCpVMtV5r=F1G8M$A zW?>m$xJGAp7vA%NXTlXImaVViCp9v!Lcf+dng!|vaBE!oetbmHWi7}3Smo#2@K=7U z@PnDpwD|R}wD{SlRvmJMG(RJ1`ez5N@qsMv<)3pBt)}9rw*dW60|l2)pG8J2`ylZ9 zl$g)#B+}ntj)e}CJ`mR>)l5Y06xM!zaP{NbK59~sTk!?5W|Lzy-Z~!j%>1f=2BhlD zPnK0-ShMC zC@K;2*=1`_Ys(En(K#9HW{|1*do=GKeq+9g=G)bm|DSnQ>VM{Bn1g};_X3ld=gO_v zmJlaYPAOEjn^W4ThAW`v^7`r(%QmORjQdLk<#)N@gP|3@q6!T?B0)l8hK`*>uiXcKgtW61aKG3NJOf0_ zedv{jg)>BIp-fysRuloTkdHr98(WYiAoC`&C3$E z4xR`{Op9%CNmvZ!6i^^s489FY#oaAyweLa63g3Y(iNTn5614DyNb_On!qBCKEGpS% zFF@a98tdFU?5UTN>Mu#arRHz;dAi$tsKOFS!>wrIHWA}Ac;7Y?PE+^GSKo^|-eWgX znidTHc<~6%Q4%qu2DFJ?>)OUG_6wp(*2&@*hZnu2)Hup`3!$t$o)2kr^%$hyRI+X2 zDqi0Uq`O0d6{20J^)97aHdZG=JAdn|^wz#uI@%QF1GdRC{G%F3m<%2HW6$psi&$Kt zJ{yo;;%e=yi3ovq5Pd-Sb=tHDVbtNMjO`n&^!)q} z|D+~38S^)d8h151i3L&J{iCLMFsNlDdzJRWK~lgp_MTbsJP$eJz{~T1`cb(WO;f_2 z-CU)U7n($U`&?R?WVw@iS!|;UC@d2A)4u%M_im}K7)YIKiQ$-6WqFF7TLZ8dh>uK= zp1Wj21R4&|$Dz?+R#XME*hH2W>UBUagxBC?eXB$=0Rk0=jbghc$(>;h@gJIUNv+hO zjs$FUk~R?Gac>Zog({ULD#Nm+Qc1bWNu1J6 zN_qQQTy@iVuR4P*Iu23-10XARfCHsgTL3=%j!?kS=M0jPm+zgZ1fexxU1^#r3>~15 z56|QfXF?37jSbGS?86pf@-Ufr%MwE(dzQ^!o)Y-Yz8d1>K?}t#dv*HvsJYZJqxDV1HAY3xC&n z^6tX_2;KHCp&`D0pYC+$R?JUPst96K9n9d(M1Ihru#Vi z@xH}iatHo0#|yeJ*d>l14a;~iwOuh~4kns579p!bc*rB2vb+r6tCxr>CLp~u*#IIY z2s}kw+ldV2_dfanu)nXU`9skM2^l*<8&kd$j@zG=#J3xlh|5X!Dr$c~RI_K5z595L z+@_DLqiMvdaKXH=-N9?3}l9q#Oa9lw_DZpx2y51gxp=0bPl~9;WbDr8P z8vl7yo@?rN1-l9(`O3D`m(4DCoQ#Un&S9SZN-{H3>VctcBN~02@$Rx%5nrvEc(yZO zm5Z%N){fq8Q_b^Mjpcei`|*|csh79LW6>So^_M7#BW_Fl7XbSkiGORplwB6S{Sl~S zOvy=dTIar4Etv5Mfs>u>j1dmh7-eW(12g6;h9I@u|$q4Y==cW`2QKijM>*D3@u)SZsGY-V5xM+6PAJK*3W*1_Zd( z5d&_L!yJku^ZY^@!y#z%@J_c6^9Hj=hl!yz8!ZR;%1Y>h?bvn6(^xj@6er|~X)hSr zE`?YT0B=!)9)K3tX_<|El!cr0hV`F|s%P=MamgeN^7jwOI7;KSs0pdXMi8M3SCGe8Ke_C~mS(5*7)}B1Df%wbaQm-e-v;lAF zr9^UTxW{15@~Z-^ptHkU0lbi4U|@<;*Z$Uk#QzuZ`kMi%5Yc|KT6*MfUcn-O2re8!wD9MEq>CS7-t7v;31^a}{6uRDE39t)$zI&% ze)5SKrL8Oiz68RQP48eM5xuWym&)`C_W7vIk=V8xCpuG_(m`#Np4QT14P@ib)y&lOetQj>OTfQk4*xI~;w^Erqt zb7mHCO7oRx!#x>SJ5pJgozGkP=NpIoDUBN8uVKW-24iQHEz{%aqx55ria#356N*$B zj1#q;ZPp4yOJR$epH)^Q8SFwC@541?^|ZzqGHZAdxee|n57CQvr%fj(CQL{m#;5N$ zBr)nK8)Ayr!J4fY*Zw}&M8CI8+KBtm=O~q6w`1@h5mo%3EfZMo`z7ufS`rkT?4em` zni-?gPSX}lW2J~%@jnZstJg9rbUFdj`cjX6tg6*TlpndKrYaliTACCZXtRvAp4mKP zoBptN`5-_AVH*M6@dgj1Bz+Ga;FGM|d;GYDt1Arm}s4qLKui4gd_hIFcDH zmMuixeK{PPsdy3YO7tNJ*?UlH%knIRTrozcF=*x&WyFDugXoqywru}P5>)NH95q-~ z35Ou!f^7{Va`0WO*%f`)3K&a_*@zar3D@>w1ajykb5dzF<*Ddi#z{9Zf#`Og&yL5b zbsKC{TY)_W@xFHoiZ)_nS*yY-urTL3okb6mi>)VH2@}N{#Wn`U<2UofHCn``r^;0*aU=Kd$Xl;Uq&VMLWyJ|&fAr#)JIE;Uh`rudbVi6mtb~XB)e$- z$jX>dVZ5|Y9-UPR8Y$UrQl{cmV!zI z{_(U~RQ1X9$K8_|TJxc<`@#CvUz)<5vutNC;0QeaeGjtTfH*mBg`IcU*1fL^0)jl^ z_P*!_B9ljaUr~2Bf*$y#6U^DDNy}T~8`7QN%V>a?>p@v7A7L3=bU!tF&skCl@+%*{ zXX*~qf{VGx+pq0+56DZ`zaZ}2&(nh+d$y2PSW*=Z^#R#%;VaG?{3QjegYhQRY2m7Lj$sKH{%h@cH750HsYFt>kc~iAD0!hq3UHMs$OOsyE^-gxs+$U z(xi_Mz)(9`Q8e=MXPTo8mlg@^h1|oDA)rLyYjv&4J%Upkb5(}2TRdf4rwCWqb14_- zvfm}26X+7Z`vE?*Mf=ky65laV--iz3lOCEAd}{89%v|zPVg*G{kD+@*Grm{KL8s*C zc9KLi8W_Q0wUr+dq#x;gD+>m+O%aPcDwq-#5B})I!Iu^>00Ca-Vw5dB2Myoo8>V1)eKylIqSu{?h^AKPI zap%vR;6-Z}pvUkb4avhW=dcbGEUs7z+x(TRGxKf94ZmcqKV7F!|8ACB$x=9{3WtW5 ziV02Eu?)|%cAm8GFj~b9!ziR%IJ~z_O+TU_BK@-zhty!T54OWXx%?x!yL)aTE0t&G zXAf=}aI93tif#tj7q_$VKjNsuROx>O@1F*o)jFKvcS_FexFr5;*`h@WChD}DqW5`- z;kxlwH(R3DwpVwrEgbYKCiY@nQl6ODWO16X=^eC{n|XU_-5OF@YL5z{?y;_$eMNwF~kjXehR zWKwYM=NxD+i9(^0U1y-&r{W7=6w;>TdL(`S&UO#54H>)dZ-FQsHkitNOFFpW=P_uM z+d>HCSM(VC!?T8(ib+jFew^6Yn%J7qYf!a(&3c$4RuOyf$(;{embPR-D^ucop|FUR zal%bSCyJtW{GwK$p4L{Rw2kPpzyGS?y+K2)Q<1KNxYSM;pVc+c9Q)lLD5F&3< zlAbC1X8njc!1=x6UNzSh+-MwgOJjk5#8JNuuqw)jik`eA6sS$$((_r=Ch#Fm6mB+s znzl6N?oY(}XU&ZHA790X%k)|dHXM@gsOt+mBnb{2HU!Q$C?D?ozCV18pJ7Viy@L%$ zmOuNR%r?A?mJ$}k&h+^4Opqu|=p>roNRwK>HfoqDd)6Ns&R>GbZKoiU2oEHl0funR zaq%*vCy_>r^x$KYN|%7T)?ri@e3A(QYYFD|MP3CIQ*z^udoKVgNCGn~69VtWhSn1q zl0k_)ULfk(NY)~|7SOn&r0HF!%H09*jHDq4K}TU2g7;Wio+`r>V07-txajvz3cUsQ zihCstKXAv`$VgK$z}4MNlcN)!vRrZF%GfNie-1{srL$6!rt+v>bKn%Vtzsd6Lx>D} zTPrXK!nGM{#+@Yws^CAA0VqscOc&^~yzbs2+XngNt>3i%u z-6s-wc;A?O-(A&0s=Dz{`UTC%w6T4{iP~R}dPvW9dYy{XY^#pH!Hdg*>v>pD0_Ql) zPFDJ}`GlzEuRomJ(zu$DwhwVTQ}aQ&q5lY?;{Sz}qyEIo%IYV@Hvh)TE*~bW|HR7t zkz-@)Q^j5=4i$8@+HdT9htX`Eapq&#vKRh!58!?2k!Ib6LajVK?9 zg`#`yb@mFj#6;^#GQqhgq~3>QNu-GUyI8Q@tZX!5U^l1J(?Uu4wsqj2Vzb9BR_T&D$6`I%3?$zXC531SS(7r3;}#2I+K)blk`SdA=L7fc}72Ch2oPv%459%rlW$DvoX}M!fsGeriV!Z z9GZ@_XilVWO#OH%1V%S5_IQ&=jq!zDlYX@uFV`LNE-t@DOxHHQ9B^G`o9)2_zv{^{ ze0Qq~yU?e(c%!s!{Li`OM%%vt)Za|4h5xzuNe!-#aQ`33xEeg2sLSfSko|1COr@NY zEy){YimeF>^3I@G)JuAEz&|vr{?_3_HKl!T;nXBc=uhhvhtd{#XZYnK>o6+S$WrcodJ(K`8RUk8%v^Z_%ND@I$ujH8-0e}ZzygspbP9^E`2TpUoQRF( zQ8x)JaFJq#F}5SFVK6Ci2vhP-31z=^d|d$v=#%kiWTD_eKe%p8+@)In3j3|oVxYeT zyCBI?gn0#?mgxP2&m_B_UvAWKW}B}@*O-H`q|rGZJpt-q>ZO6O3!-WC;7{Uvd;Cg6 zW6nh3r9a(95#0V_$gt8{JOcN@RK|xz=daX%zQU6w9&rdHyBKl0yA2Q=v$RH!#*;gP zhphJPtF7Ge@eWonz`c8X)>~8FPIGYyI5Wa&_4k4c+jIu9>2^h&hjcw8d09{Bc*608 zszg?*pxVxBKQG&QnvVN&1?%9}+Ae6s4>Rq*Mdn{v>2Ide-?Q&8C-i2D=XmnctKYh5 z`ljBN$ID`BzE}(`0q%a|80ma1nLUqkVN7$XK6FSbut}-R5=8CoY$o5iE)+aPxvC<~ zLb@uztV=Hp4xGEO&1?Q;!nle;c~*QBd0mnbcl%fv$NR$IE5Xl>g7uAw6ocV2-hD`o zS4MC?_NiBS0=WSwDA2z zdjU@Zze`St8t^9j67%N!8ZeiK63QR7aho;R=t`pcr>%#%{ISdNUPLVpPufq%Q?$MZ zkB2FmuIw5QnVjQ)%Eikz652hAoNk z8%sX6i&4~y+(?|z2hk=AfMC@(OfU}_%Ec6+(@p{VCaSdLkFry!B&Tx|CG+dLc4@#? zCLHK~5_Jahq^INuwY}pWGWq5C-m?L%twMV@AiDeMLLR+MPqwotUnMJ_0xNU8Sj_m0 zS=~o`R*U6H`#C3su2QBuCXwkEr9pxZwv1BY_*GU|DsvWG5V!Gn4)V<)TX>5FXww2Y zLdyRjp#hUDVKQ!4I6rP|B(8SSF(=Z&f}cc@e`NCeG~{i#&@>h2F=6$G0byzQvwDVS zUTWVH1_f&gJd50>pXsiF9yySZ(?>sbyPmAcE7{Z;v}?EyC|&P#IToK!_*&Q#^$>Au z#Y0K?a5xtw@W5?>|DsBNmwkU1SU52-X%2<|Pc$Tz)#zF?QTYG3iTi~<^qbO+zJi{c zXByOOL-HiNtBf&+oE&AMv1MBhdQxw8N?L-NjLywMWO%7Nyo34trdA1{3uiC*FOT)k zViQS$;ac^wT@VD&qB`Y`v~uY}Jf24kMsW`3TkUlE&~O_#L7m|_SMdE21%4QU-Ozrx zB4S5jgrq5srE_ipwL@>9yF&Yg5VC=2u(g%#dR!oH ztKpz0usO&`QEr+$e~r5zCgZS>o0%T*2^{_Bf^a`pjGtZlw0#R})7z6OSvylkLKMa% z%Bo7L0^VRNrwT@7#_lt$YSOCfsOX?pL*7uQgdu(v;!^Yc#C%1CdFMI>!>_2MV5#jz z2N56^7-TsA*%WZU7_oJ)$)`7P@J`=GS2TTcwHbHOW}JXj{fvR%@iWTcVwGexeR}jb z{_P=Wzq=7v+m_YY{7uH*mYD#W4Ie$xuxC~y3)EjV><65m8@IU4TiUq2|B3Uo{HlHD z_9*nRzzTRX>?Yq9`X9km;eT%Cm0iv>zdm5*!6$$2ztH0HC{xW9H?+9VN`@0(L>f6m zcaU-!_}Yb-t%vowh&yr5yzoGy`yH43K9l3R^1QvJ%f0L?6@;G-hA>9lc-YIw!Q)BK z5ZiCwbYtdPgTh`#=Pc+8VK)vAJmivIRGE|oFqnb8QN7GFNH@iYN2e0SKi5GC0_Zz% zrIEVH+|0I1vhu-%nYufzfG&da(wQS*b>Dp5H9%SbB~Df+kuoq#Xw$r6FRuMHBT1x( z3QfKBRrF6===0S((O$9ggSs9-iZ9jdO{TQ$lLp4GvjoCamF+s)&;KaqOXJ7&@9@+g z%GSnhBC|9ZLB#gOCd=XO3#m67ipvA(9$_~|*G-9koJAbg>$$-x`R{Sq?K$vgbeig8pk=mTlzS#CpH4HWk=|!8 zmh^47`gH@|sKF>AisKE^S{y=TkrdbG{movtn% zma_HSV=FC4{91}>!ntu^Lfw$nLCa>5b2x?b>HO@QbMaF8*Yt!x9_H0$Ex&LfQs9`R zmpyPst$93R?yj{g(zy4`6C<&p9+7%o-V9_wwD#nxFug8U24|d51p$6yT`GOUAvuID z9ctl&YNqc?!&A_UV(t}EVkNLPgol8EtH2PBP{xllF~B|;{L0xnyqi?DuaNJ=E3hPJ z!O^&BY$f1PXLQ`yDn2`mAY}u=T#~#T|0G5}Cl8$=*u~B9MNlyE0tzr3{SlpWz)wo4 zPl1@;Jb!OC%8@3!hz(;C6I$0b8eiOcag$O_W_eRHagwkL@MJLa0g>zaa+yLsc!fVapt4hbnGq zv2mn?0eR>dk=pms2~O4sKcuM9+Tq1Jr@`srOW|f7R(5f0Dzd>QJF$e|_~#aF-ov*l zG4Sn7+fDq2-B$N6SoODw8g)wq!~g%cM9&sj|Nkw~C9`{SZc4^r2E23I-7qnRQc=B+m}Hh0L)mp*|1bT`v&DK37y z;%R4G$Ita)B7QQt<@Y@dIsLrWQgn;jMgl}K!zMEb?(m0_YaE*bRu)QZ2jR^)5@Q!2#zA=KGcn5h86QiELbnGJ9*#I2@Lu;8hoaoASige| z%L0*4UMPjDZx2HM466|TaiXB?GCwo^?-PZ(nVTUOEO~z$YocI4nOQ@f=*s&1Iwfz zL8J~J@=m{JFT{fMYdFeQ5e2dEXGOJKxk)*s03v)CUL~o&ul1jEOS(|HXiD&NxtnZcLI z(}w*h*TD=^(DzsN%gMH7x<)&|Iwt5Lf|CoLtpnm~$R2#5z$#9Z6J?Y?Xpo3CHfA_c z_q4yFY=18WoBcq!E5od@)x+IV*etg=P_hJXlio z7$^qOiZ@WJcQ<$-+qCz%QREl7-LM-qY&A}+Ye()8AMnVqnLaPvtL`Q77;YCY>D<(D z!-GDfH5sCBac&Q~p-2*cP?z{ON*OyOmNd)J4+&US6$aU0hK;lAJ&p;C6Hy6nfO}vD zI_2!sxO1)%7^S+zIy(C1oBYuwd4Hy8eoLq{?$eQO2@LA$uz8h<{xqbPzb01a&`EE5 zrf1nZ8hK`A9wakert%koJ3j<|l2|l9e>-Ssa7WeE76Pm$7}?VRtWZm8TS~gM`*!Jj)bcng2$n;Ko}w==#Qj`GV-g~nfxJQNVS7}W2FR{aYQ1FQj@<||^c+8Y{ z)WaLZ&@uOu${(%Joc&eq`^36V2R^^z``+j>&V;{?&m`MR{y;qrS7=95=${L-N1`Y> zti)03WN>?Eq~^0XbT%*HK#&p=f+^KRBiViOOragGF+~XMf_oP_o#iQA8Mi76Njm85 ziZLN0WuSZq>=2!pWKUcn5}rtsM&-_deDzs0T#SOIH8Nat<4r#La67C<@r8~N_#IP4 z1X9vpik@QZ8t;Iv7~MrhV@V;&W?P+qGFbxZR|HMj*7n%>#sI?k^i5g<2rHIj+VH49 z1V6|>p5AU*N6r%0v6GBaYP@WmKduw9)+ZDEuoAr%jp!0Qa zZ7pd=?6Ax_9z$(_UbI)zn;J&{`P4V9{9LFO>I8K`?J`Pr807h;2Fp;zdsI}%(T2M5rFM(*`Pw=LaPxzh33?caV zgp#sj_gVVqnEQWpMlq#4O(y%1KS*j;Is!cfZG@~&WlFqz>Z z?SaIjUex|MflMmc!{J55xH70jmk{>4GRs^&>5xpGTYje6=A z;1bWtX#sQrgI&~mKmJqxAmxSs&E-v8O=?mEc`R2lMx-rNasGvxZ{B%+Yj z-ngPzmVlkC+ZgH+8w%RMv@n~EIwNAdws^F8y@}A$$=$o3L+)~yTu1v|HbV-wi$s*W z>R<_r$4m1&>Kt#>nyuqLXM{_Hj^$?iM&Bz;=3DSPHmdc7Qt1hmOQS|rUZE43+We^} z3s_c9Ee{a5iXXI?ikY4&i0yU+@sH@p2Tn2?hg-;-g2U0q*5eL!hZIGS-~<~CJx>%i zL7A4UVI|p2_$_;4KJ!|pqFi*|L*b!=ht`;DqU6QIk-rvVL(3X)(*SJ+-Mc360b#~C z)Zt;WEQ|jFzP>xPA^h<>v3e`}PjNBQxwh$3CfH4F<|7E9W7JzIp#3Q3H9yF1?@wP! zMNS%OZBrM|Q#Lza24SzDwvNuV?PyJB?NEqn?crYTr7&H@PPyjYztuMrUH;@MM=4J5 zpEpA&g2nfLAXvXS(i;i9?~+hN#&q9z`6PT#ol^v}b8^iELZI%-?e6H;uleINu%VXO zq|bq*SRO&P_@rLF#-67A>)@;jmCIdJNFNyyxL0D`ymY~Nn$28rtgq?hg!NAgD{gAM zgwzZjs$vI%&_^Oybc4IM?QqITbIn0p^&Z?GNoJ6gY@sOTeuR$}nqq}-ZoKAh8Y5se ze8-a81Z8LS@S{SoezH>1TK%}_uTX%GE(0)H(Y*@e0p+CQ& zF>kzAES2efC2P=LvWbo<9qTM+d z5Va8`_`OtbnWuSGp(F?0mi!-?*6%^Ce5U$ceifZv>C-FUwRCasIxpD%kuzSjzQu5M zGVOtbWUU0xp`{Slfx+942R#jsTo2_@PDk(Q!>YjspVLO7qf&UY0R^Etw!YKiSF4k) zDG77ou@8QpfqELELmb8Qw(-;*V*BVFnZ(){$%zk?AF;j&mF9X3QGWCav_WO@P>*Pu zsLSB)@OQp|XpWCaV*Z=M`rK`xp)h_o>aw0Y?t0#@i%cvmgtBv5RM;P_z#P&?{6nE2 z-}-~QbrqVRs2{3D`|_;V7#GatJ=KqRN618twh@_IXHQh~luOL4-o*&EGF3xn-vZi7 zwf>~S^V(3W|AUlDc-W>>Wx zVexcE>-=uasv*Xv+u@?>G@$kzt4i0bk}=f$aMSqhDZ;J;HDQI0F};$u?GD|QcCmP@ zRl|tKqaMC2Y|`R8lXAX++%F=;?pV+!FUqoe)n=Ap#gf!%qmrf3bND`AXRs%a(SH1; zYjSp5-168kY&t}lFROsX#8=1FukyB0hd~6n8IMw3=yv7)N5F-0Ui}+?0C0Lt?wr13 zH8l=_>K(_bx{%lNAB zCM<+Ru>)P$oSE1WWnH^yO+h{SxP|5Vy?b-YD)5r!{g(d!C#wXFSa{N2W4?}Roy$?;LSUh>)16#67fykO*V!3O_@hzO4gJa zsZ81HH{(eJl{wo zC-bER`rC#@)%}7b%XfA)0P}7P0&Y-t8MhA@EA~4Y;Dk6;@o+#x*V_jmi1AeJO|H%} zrEg9Yj5K|dYQwzAKj91dvOZa0TxR~%Olg1lcAWQnS;9`UH?+qCec+~dqob2)CQ%sW6`b8lYbl8INLWzk1& z8N?EG*dIv^K4}!0C$~@s`$;?vP1Y9j@B8drC3Z|HVhOD51fuPJmK{^E5C@S6v!NVr z1&&5A9vgYMf}0xpv@&;F!Bs5gFWFJj^{tp7g-7E8c@Qv0&IskPk6im5LxIAkVzmfq zq5GS}WN4YoXw>6JLy3aT!OrE54=>^3PRyTe1bSP*9ED1TR6Z6%QqcDbUN1YQgbTk4 z;Ra}Oe^hOjuwoBk!yc@=^I=7bkDv2tAL>mjZ`ierHulCP)de`czpMD-%ErXu$Gs+r z-Q#D_1j)oYuFhxbRaD;c94Sw3vbsD&b( z3oWOwUjw&N>R=0(yNbtt@$kp5qMEfE_f+lX#s42;*Zog*|Nf1GgM*Wioz1Z~2W5|} zW6u<__nswtWMv!@viHiK*_)D(6;jBqY?6H6r~CeVy6bb_kNf)%_`!9q_v^Zz*K;VZ zXE@dU0jgKv( z2Nk7#&8T~g#W7|-tk$FTo#hhj5UAMa-)xC}&HVoE;soyTMx5blc`Jj`r8l|q_oUZ0Ti0#w;}A`Rf2J; zf1SIXjvp^Z_J!v%xM@%~5sW5{s6JWV+!J9Sh|mGFBKwo;ud<((F7z>@HKHrSVaj z<$PJai?wuB*3cCs%?9sS#j{gJUv8k?)E-H?GLds5w$)#zIzVh)4Hs-OAX!o5K4Gpw zlJki%XU2;y$W^_2nT8ga+`lNIeW-n~RnOKRMNnPG>ASt4ckQSz!fNa#N+W!w+!N&Y*Si z*D9ZV{(MOH;t=lu_))ZL9tSC4?uIAPzxYmkyjZ|T3&**GW+-qaeOw20E42~c$80l( zMTt+Wvf^-)_^M5aHTbseEot&-MYQ*KJ)z-wZMz3En7pB442BVU$dda)`!&fpZ8lsc)ADIP^@$H@s zEw|n>h8rRe_1)UJo%GQ01{K_Bzf;1wr7N20F`w|nq0y%r!HY+4e%vIZ^QqbwU#OW3(iGnt_1+$X zKjiI-CJhMcoszq2mGn|OiN(~El~*i@*lNy+NTbM?=m&q~|t!!@Pf zb4jFk;4It{DE!X$afV!NnCIB#*ZGW>>tpS+zpMC9xa=SClu_p%6g&PR`VcdLIMQHF zr!+$w@Xcb&V&)l$XGLh8AJOKdB#guB7`Z;$UOTx{{@idZ`hJma>MPOyyUFBptoPo1 zl4?A6tXur-bC_&5?#PB(3To|Ms`#w(u5Pdr#OidYTfDH9Zr1F#hPJRQaS3q~_H&cn z1sS|IqyzqjgD}vQ;kY^Q71>1v>1QmBTB_LlR>E_N?le4T5#VW2^hq~gbL2wsy{K9% zWTqXpss-4+VijUwS4$J{u+^*%DF8DA41G@ct`c5lL$s=NK!k8M9p-rr@YoJL7>n~) zjHTAUMVQH(KUe8MumJ?6l)}L(b?-XFrviMo-HB(bU!5~=b**pQQh^dnENMOX?b>l_ z&{rQ1lwIPtS6tv>*t)G8XF9qGGHahm zl%2yn7;vYQ3C#cYNRzCaTDOSl#TN^x87=wolh9_ScP5bK}GZJYyF^F3RO@z-$&$9da z6$*YaiJl(yQdgYn;4maTtV&ivGoG;MGkOZHondRScWPU>o2iTnY{+YU;nug(RS$J` zsVd&R8O{^u5id!z%vNey5rXC8F<#QL+%cTNxiR6BPsX9{5P41KJgt#9v_`ny6|_8Y zR%R1sXCX%!%{5n9M@>-*vN2nkt%01&96E!GuO8U9d;-xv2e4?oe|^q-!rsDk_O1>J zQ|dSc?vfK$Q`lxDBcj+l8eR7lUxYT~aAaJecvZab_qD2Gd@`8fX+s@52i1<&#Q@V06Vnr}>5}kC- zhF%oIR(rx5hn>r&ix|ZL6lmx_J58fN<~$Xixcid60ypHU@d2}X{@E9Eh@!vqjsira z<4V^-WP-A&MK8V@5N7*_@-0j)gA}ubBNJCP^4UQ7$MCL z{8WK6k+_oPK{%b%`k7hlDdISXYSj!E5@ z?Pi}mB{S+!KHwr#NUHSls~MHARb4t>JMU2Q2I#kuUz(^Uj0w#kv#W20c)KjYQuB=` zK6kNU9|2i#0ji5%(K~`MWS?#G*g&u0%B~OO$Z!^J=Rb0f#80aXmp0!*0u($Ztc*pz#j zcc6ZX^hm&JtEf|K?Q?NzH%&a@#GU-g&NF0l(^)hm9XID{b^kCInCA5N!R@#wi~ zk|Y$*q%;NXJk!d|>JYBZlo-MCE6?IKE|=?u={jdW0=M* zW+SPs)18r@nAPvUeTF8GX+^@(ixzjS#e$;m-Y71aAR&?&j`I7#A;VLp2@6G zj;>Mg1<|ji#*eKQN9|sq-^a6mMaX`kfT=jOO8xXetT(q4@cXf2ivwUvO)vEwig}F-7u>yCo|Wppkj>JOlKsY)JuV4>phiLY(?A{lHl|; zxH5AructIA2!(o^o4Q=$8a-Ys`c`PT(xX5Jm=Z%8wBxK_Eez3NOMIRhxI@*2eXp2; ze#DkGhivl54>84=FHEmvmXsH#V@8RlvP28A#z(43d`2q0q}Qy?3K*OFm_*gWWlf;klfn3R4hJ!}*o?OdT zzJebs2~ucY?zAKK0URF^NrtQ%>6)e=q{3nuC{EPUSEL}Hq8O7t43BuQb(4^S15{Z* z8NyY}qYB~U34e|cj$YeG7i3Bo8@jkwEx(T@tL%5_+C-2|T&V2ORTLTULkKPq z2H2S%r8EN{LD|m((trrndVL+fEpREPe4`+ari-Hb5|bvJe#dKa9XMP2lDa9*>b`0G zst9Ls!ub$m{`8TXJ~D}fwak*X!HUQhl>b0^igU3s$b?Km9xMM_Du<80nBzLGm=~m6 z2ECE*CCf@!?za-FC|lnZA*Nz?LiNw+m5%<{1v$ji;aO-|=d#v2@~sT3^@QIf?qf!s@m2(lyO{+x_+D}7|^6ggfl~&FIy0cYJJf$_**mM5&e>%hgjCug>j-Af}=NR4+Q3Tn1vnDfkW5x z%|)4X-xo0(mxD4ucUSgKd6K97*4^Bp(cIO4_aXm@p#4M90jSjZEy_SE0Ph4HV>UXu zvBjo~XL}jFee^1~Ln2FPs)3`1l!#qT6}J_}jXB9v%(H`a4L$vHbv@@PC#~s7dmosd z8|(p1Mx=!fO~-?Cca3bShIjQrfJ%ICar<3RzdRB7&QXfLYDwc~+}--kL(q~O6wST} z6!zLnt^uLRB1iE-O&t!1X;h5HK5=2+QWg?793nn8660+z@sjl#g~o;^=RW~MeIR#1 zhatqIGkp}H4`%~IzHk*3M9nmci@Xdt==s9KeE!Oip@^pFBVTGd`u!WzWD{ANc8FzJ zI)0aG{FMmmPj|aUxr*SSYHs(bT#<(Ii*B`t@s@i6%8d(4e!Jm|j-1o%S=dhK+&tZ2 z>C82HmM`2qi^^z#DciM0F2|@kTu(U+h_OHx_j{q7K?1P)-?9fg1DO_@<&P>)v ztH~E?B`xo%W=?{7)GAws5eZ>oM2IOXuT60fr+qjH6Fi4v)7+@d%jQLVoc{d6&S%lN zgZ+|q%4)BALH(fjho>zd)musrBQWrMxRv$NKl`JZz!o|nds^q;K6K)IBew!a#GU;1 zfP0iJ%b*_c|M{x_MAZJ_0WVA)wf`YdzQ8-d#CWjUu92Hj)I8qq80RQlYdPR9cYdTt zWla16hG{f+=Y>rAz4ds2m@-!Dnd*|{+41t~TOp0VBIIGscZH*?H5?F}l7vkYp!66=-AZCH8_K|Gn>va(wKGgi zW&<$1A`7j~0|!NDbuf&iG!lP8mtORj=G;0KVOGVB0`$S+Ppm+)@$avx4J4Tv5)f;4 z`;O+=Kv;%{P2SVffYvli0bk)aI@%PUyLI8yk#7P2Bo1*4SzN%mFa-h?=D<7Z(qZe= zwJ}IN2d0EDbM)s0hU+Z_<)AAvd0z&^30V@|mpdtskdili@5tdz>>IO7TZ70f^Rnf* zIx%0jeIk{MUzxd!7^aT>$Xmo(Dp5xKWmo6a>~ z?oEF)^^L()XOf;yQ1m9kM`osc2O(M7q2pZ@sz@e z#PRB3H}2YRAUS(0lF0@r_4;oN!GD)J79xS~x-=y659h7wKtmM6SJ>f0KpOk_4xije z&g){I>7&NY@jepQW!1pl8GVJ8SEG#YNR4WoMsDjk*0J7`$Xa?-T;b>c;QqtxXyi*A zscrOeimCO4cH<)~r21ZPRcB|pGra8v77H=0*<#qJ!Lj$qno>mZC6)Kr#Cr$oPP z!2B#ZdJKKsD{Dfj81boGfqXh|N?C!Rhfl@i~fj@Prg_Rysd5BCz|xJJ@%8BVi`c z7wNXU8}}T|kp~?wMg2d#0|;a+b(#LK=o2W^RSC+`)tvkwu{sOa!Jg<2=S&Zyxgg2v z2ht>&)4_x%e5V~a^&Oum63DQEyJ*6a{$v|GlMAD#9}B{EG;6(D!wX^A%Fsg8fsrNa zQHnRu2;nxBpvzTnMhmY&E3wHN-QU77%B_7P3rINRT1N?AI<(8r2`OI5A`_Y(;qV5Lf$p9jww*PBl2duNM!`D zg>X6re6#9(bS6UqR~?D$>(poHX|eACLiRDMjRzEa@h}ASrKRHY6yO82Qb0h@iG?20QE+KP*>?waPsJeHK z0~_|JNZ1An3k9Yuw)`yj!S`EX$`m}W*sX3&k!YlRGnqjd7|>-qY`iN?%?*&1 zFkS>N7Ulf1b_63<;m|6|PySnUHU*Mn{P5bi3c?U?E1H8qB905hvfGx*a18NC00~Fd zb$cku6n;M!i;Ah0yynSa>r%HHG8lp~44*i5=2ZvCR~x;Jk0(Kf+pdzWfp>X6gt)rB z8g9VnqIngvM1IKAaB1q_sLgag#B1K*UA=t6r928(Utx|(x|>`jGR!eA&--@E>y|8POA2gp z8!X437e0Mmc|T0R=NQ*Q;HD9}*8n^_8QtNQwDtR&BW~?#gEcJ0UnBJIS%`NL+AvY( zBt@6e#^)I#mOMBdDzQ!gFD=5FFG;7O@ns4_w+8lN;oqymviTy|u&lQIMk)6=t~O?d z(pO3ga}Rg~q)V$jT)GxUXtM2xV!@a3t0lj29s! zyMDu&6I57Hx5YlpknKGvxWXJA!x!HRBgk_kTQ7&<>vxZ~`rkI_-U2SoE5Nu!c5GdC zFF~DY`zb+I$|)K|@g$+OtzDT1&eA=HAwJeczi^wl(ZVq13KAoLb{US*L%%I~Ozi%Q z!j>vm!VJ1^8s??vR3;U*nvolKk*z}`#?BAyTMzu#Vb3#y8gd$eoFnW4diprWTU}Pl z2;{vG0kpEUcPnY90iaQ8dc=^h8QW6{O0de9{uVa;)~fFHu$U+JR=ASnLGr4$C^LU| z_lIH!B}wz%Qs7Pnl99a7*Kysc{9u+5OPQ_doK7DEWaM`7INN9#QkyK!J;XDJcC6Jr z2v*FIOZuvey|i=`&xU-YIFe_Ec951`Z1?(_JDB}7i4N%UUs zH*@xOpV2#NB+L4(J6`0!Uz($|dsk45g8%tK|3owYc^^XAl>TWJKC4}};P9cJ3h3S) zG>6Bx1-L}M9y<4@iM;Hh0K6;D1kNunUqr!&^_6R*Ct-*K%jCgr*rPk%{o7Sh`#}E& zpgz%hxP}em3Mgws#emb-jVDgyYR9v{D8EQanqA1_lAYwIio` zbv`ynhHp%3J*HtXlkV?7|3>iK2;FS?A7evQJO6(GOu*yiXR=4tPgLu_%n>6j3?Z=t z!1XTs+vWG&)hDw>vIRy@EHj?Me2lVok{$ z=TYMY5Ceb?<3R^N5Nbf#nkX|11;ngPp=MAHz_dy15Xf*rQG3@$*h>*WbW0@6Ty?I6 z7#WdI7{LcE$Q6hJoO~r=8f>ERK?617Eo}5aoXd_`OKJic6KHKXuj|WwGUT(TsDiyC zKFY5fF$e4=DDTZoaHJCXShmLEvIO1W(dU<*GU>2LH&t4lqwDLaB03^s^89daDh7CZ zMU2=-`hQdxdE_Fcgx}CGPKbJ4r#(36mv5wDKRzA`(xenKWq9i$o20|=r0W2}UE(G2 z`9^+bdgR1yoT2BT3d(EcljgS|ymzpKNtp-^TuG7Hbtv}no=vXt=bW5A`fmrJx;hH) zA`;@4cfDlv4*lSdL_4_k4z1wBfYY#NvqAu=2RYe644Kybw4mjBxaqIJ zC3)mE_xnIA@BFg&044rc;4%(SM*Th02ew!IH^zP4Mo z?z~61Yse&^o+-Vj!d3YqdL`@X3`FI4Q=}uomxz+$Z@5dLo32;ZLEyEQL@#?U9=2^k zz22~8+jJo!s}Duf=zguCa0JaFO27C&ukOEMlE30Xqi0A>?Sv~>O{LrPKc~l zkMz71hX9AI+4^xTsQ!9b>m%yv&}lOaG%SYPhS0}3aD$giFWslv#?q-G)?VC9V{x>O zd>wj@V}47oZ3{m)#clr{%|NTziwG#ACPA=@Gguy{q%P>7X^P9yM}D^Gc0>U#x}V;Q zFX66gpphitCe-ucJ|F7ovARhS~90d(n~!ItBTSc~WBzHS7pOZc=ZixWw?&96;e zX5zH!2-QB|!VgDRj@l^`*A&v%?YxsMx1BoXthX&QuJ4wu-%fG-O!w({Pvd0W3W53{}Jrtl8KVA}s?hMbA&jl7Zo3$hxHSWV1MyWW!0GCn0*da!;9~ z=)zFBRlH%sJR2@dnM59GWDN388nITRbGc|SDQ5gLJ7?}rPfg4D+GKVza5uarCMa=p zx2Hs|gGzAfV^>1plG4j9Pjq}R)XCAFI*Mb5mAw_q2lla{jXD`Ap6MCbkY&X*oV>@~pF4Po z_T0V6o~t1Saj9$oH-p1;DHRE+2cvUue35{0L-ge1QRN`ED&gmDflnEb_a+LBKoD zeKkiNh6%^VmfP*KJ9T=s8d*eZqq%CwfNti8O>{j*g~UcO8`C==$MAl=lZ(s#yD*b) zEV^>Wqv)~dqi7WmiGln=;(F~?Nk42rH3Rj(?Zc=t`{J%(MC6w#-#h0MgSFiF6!<;0n*k0VBZ0^eHL#i`pDYrsivg)l`frY^#GGq1oR%Z!;vf6SS#Wwu1s;}`qC}_erQgk$~K6(=rNFnF#vLuQ{>PVZjydX znRykxf22OjcNFWbKlMVSM9KOJk{56=0pfa|x?5=u2oZi$I()z{bw^h^w1y#X)cxw~ z@bQ*9AvcYf)4QQ-lzfGaf{=XKt07cGu7sZ9Isul_FpE`Y8JzH^l(&HN2TG0i!&^j6oOWEz z&s@pu6c;{MCIX)848>o^N1Bg)bTHyHlf_XM?aj|?1ugtm1h4^eKAnoMPHNM4*`b?q znsLvEhf3H#qYJNy3%_6Ah7bs-^rHibzbgGIr{H5YLgr#!K0IbKOdVLb4Mf;LTbRHM zj%9;aIDDqe&s`2xA>|el6maM89=GpwOe)$b_$QKh8MD5wV-8ibgMbl?a(MX+WJZ(iycmd9LoypX#73sFuAFs5v5c9eJlD) zMCCtkMZmQH6|)k(gO2AmA;NS*=xwBg-6m0!(sM=TO@}Tr2H!k&qx(i_A{ORo@P;a)tZs66@+zPk=3D7@xQ@u|1_{ zm?(nN!(Ibrc-wP-TNZ9!;tgy{+8!LefIWin*h?Nf_IR1JL>b?Ew_-K|s(*l0339ZU za;C@k>^`9D%RfV&%y~25$(1mM%KG7w5DVA11{oe$uz`@nC0P$PWgBY~MjR~qU* zkfy$8ZW0*C_6)oxocm;7A9WwV&S6xf_(r1y=qZk&6o4183?LzoVm1$8tzZwC897Q| z)>RghigW)OL8a#&ab;W}UWYMu$qq1d{~`@VSj%65`}h{f7BVt-xD}8p%tMByqwxEx zs!opRda1~Hsy^JmX%5q2lgcvL+wDrTQjk8(>)xMWfq6&>36jVd3F7co9i-i<7nIW; zlST=N;r=&e9^wW2kSWjo@Cvabf(%LRdTCL`CMb{0j`hXaR5&WLzlYd%5vJY}{u-0J zD(zyifXdMUAZZn1r&hv*xiFSD7V}-*^lXeQM;6s10-{CCq62cLh^%+a=if>`QdaY8 z&1VJY3b>a&@*EJ^q$62qWKxd`r*UfMUYFC3f7E}(Z&@P`h*>d2PV;MLa4&uXog4C4 zN1k7UZlQ`%{ibLYWL;=piE6p8Fj>HTQk(=!^o$m(5^;6zwV;Td#@!u<&18 zk@HhBTqH^7cUc2ZhghIZ%ZH)lt*BLZ{G6Q_<>?>JY?G`Oaz}YaCaKzL%18iwIpvoT z9GdgM0_C?K@K%tX8V@6Qu0Nh0<=dYwO}vHPC9E! zup#K+M1#KL>K%=q*ZRh`sQ*Y;+4NO0Pk`&>fm@5>wv{pusZ5GLqMM@FGaG}V_(l=$ z1jnZT!c9Z*COvIlvKTazj(DHp?bFGj5`XbQ9y=I7`|obK!B4MSXbMD;Qj@6fQc#rX z?J|5@czOAok94L@JIm9*`|$oN9EFmn{nu>xrq_hX_fty0#f>U`?$+I^OuoHe%WHaKReSHgKRgUD8&>A*Y7LeAfm2WdIK}R+ z`T#5aVJmR_sXkLJiKtJ-q`>s1q}T7e0t`~BwuPPnhgxH-56FrOoETJQ$3Sihvyazu zzbOJ=-E$Ah?fZ~q5}ZwR^#S;RRP@-vkNL!npC^{P9}FOe-H-9}=#PYC9{u1?VQ<8v z1^-FDa;NiooXbgB-+g4`U;+$cl;~Pi@l-}&4!Y0A#{D&lnpy_Q7`^yyIm7}%KoX*9 z3P8{LIDtDc+Y(ICVU46hrQ4brZ{^}g7)zjrIhMh7?th?>^N70u_VZ3*45a@(=n=u21!Jsy7ncpirTt zB(-0c@JV95lc#X#gE>rn9Jv8%$2u$o<14Qm2@0n~f z8<>0Rp@Do>q9nh$!k-Ut8TAkLj_JW}$XV~{sH^PZYH{9gg}fEP7%GAiWpmX`f&}>W-^Pb{XS-&W@utKf&O=@M6QI=!!$?c1p^5k8BCM)?(#A1FQIQb+$xBE`OL)okJ08CcgIJ}Am%|QIn<&}I2fyRqfZ$y;ZI3ESqM&lS$^!w*bZ{oUX`J=yS?B_ zj%^LMy+<_Ws&dPHM_4f!jm`W{bS^$N{*}!sc?ais72*jdC``{R`WqHFx9tqu!-=o6 zvy{>KEk?%FWCFK=mYJYL>|5v;UScyI#LQ2(HCaTQFHrH55N1`C4}q z$C|A6OYxJFr59gfceMw!^_l02EZ+*OC_j0=Q$7=rf&{Mjk*5Z}<`ZLa>Nv(Ki!^|j zS|84-Wt7x>*;{JFN8b&vNq!9T7^wZ1nxri0+1n&r3{HJ$13|Yzj?dC(4c_E_-R%J^ zBfii@c$q&8ZP<@9s<8B7SOufYqUoHMiV@QrQnuGkoTW;`pdnMPQ?IXLd?1{hvZbEN z<}N7^{CI5}>-qa_t7?efJ8^J!*hw0L1)9^X^~W}r){fAD<*y#p@p){$VbxU3r&o&_ zN=*4^Cgrvou{2`Y2a6sANi(k+UN?4Pp)eMQ7wtR`0G}9cFW)aeG zp2Yg1uc`JiZMbrVNqv?^@bq>JjEjL$Ob)C_A;*Prutww4BAiwW?Wtt){6a6(vq$$F`MgC{U*{OP#xNw)9-*+R=Sl)&2fB%%^*+sYn+6 zdB0ntkImJ@+>-)`eEIkn(u0TX-hA+We^t(IU#waDj=KpI_;OR1?XlSv6U@Efx;R(e z|LrI=YH9uz<%Re=Ud8{fcom8a33TrtF)TMJk`h+4RN95eQv5}I3I50e2UzX7WsC|A zTt^_9Z>vwA(C)`N0qxtUTKgue^28`{C%H-P=s`)+#lh(0>p=Ha@k;az!mq1(2LP@8 z3z60QVC1*>YDO@)-Cq2dNY+Lv5Qinq9s$IPcC1gy&3{3q+<_|CyRJu*E!0Dq9jn4J zQ3?i!%yb=4*#7DXl^-Z1Ntc63S_w@ABn^YJ)5U@1mFb0M#I+H446ITL%oeIFndhEo zO|YT(dU=OH5WriHvVx9+$5}SBND!N`IokH9^wCM}SsO^xEQ`-RVFehkw90|_$K}* zi4WKHB(tN>x1zxMGI~lban-QPKg|iIG-N)$Jto)K#VCLri}lpfSyjKd=(%V5ShWK3 z{RvNUm}miH`s~RgfYf?Fra=Z650q?PnM7{8Q0uN(2voWdbXNN+{myS5z`Tv`3sm>_ zJ?Jmm(*GCIOzLC47XKfoOQBoF0;F-@{o7PU_>GE%_CPcrN4M{}sASbJT5-LsV}7gW zXlmuB&En#9a7R@62=K`}%%*8U;7Isj!WeXY+=t6Qng$K8(v2LR_?!{gXt)|nzoKLU zKWYl|R*{elo;GVl=VD@}k1eA%OsMX>IjaTYY~EzJ2@CN?EHmN;&bl&CU}0$X)LJQC z5z1eaG`PH)AI^`#cokjz)Ad--zIdjb#ziQ)A3gngygwy>gyx)mmBpj|wiPcRFqBh{ zV}+oF7^s|zGMEx&84(sQ*IWerQtaniIWHNcMd8xDqVC+G+wRVahJE668{tXr5;Fq6 zKDe*Y7Vcc6Xlr8W3^?g|vS_x95h4?>_MW&>c7Q66W&QsMibXaMzoA(N=hKK4Q}ZLZ zqcvT%n_oYZtEQuiK93`?aR+}VmOQ(T**MZRuVhvd9qf^F%cK?cd(|;^eJ6S#^()+{ z_(X*ir4#)n#~V1={v}uPpTE4QG5JrOs6*Rdga}3d75fi>CO=M1px9HZ-}d{*iZ<^i z6(w`27uD&Bo2pM*raZ5VIq^!Y$TH0mdH+n>98ii@r3?89f57M41h%2A?>uevFTk?6 zhQi|lV2_aTW=T}M&iq$5Al-AAy-k@#oDbWPl<(0stfxR~JF*%M6$mj4<5vT{k^e07 zcHaE@Lne#8M>Rar>TV%Z^D2C7AzqS-M#N8t82EgPm5V|7SVFPxDzCIb!ad~WI9uA1 z4Pd*zemL>|5W9fl1*VpZ@Xao&2!1J|v{*bH``N88^Ul)JZ+xXW4WS(4^TC(aQ##Qz zCHJxn<}w8q0Jn0}bhmy%l|91ib%~sE>m?C&6XrJ%L#3Q&PsJgf?psfG){FIMn#Q0u z!KuqP>IfRf!_%kqjGZn(F8rG!>RXC6wbW z-cpJSL!-A8PgGaDd-~c86`Mu}&Gg_Jh62DRxaO1mJIqvZ`Fx5rEI)~rB(8i;jwm|I zwvK`azugZKMhSxpfQtW;3yiAxzf!4CJ|6!eW1!)3)!Tj+-n$E&hR7+*c5785`W3U6 zoXU%o|4eS*fAvD@G79CwM1_Ba<&5>V6Y&+NyvI&wt=#!9fh+ykWeUv81bzAj_B`$tW;P_oA(ag)JfOgxFK*eWneq10t0|%g%*v8e*m7I2CNt z-!#O*#~c> zu#sC20Fb62;m3dlb!GpTrEJQnp68sKi({qXjKIVjKkd%NTC&-Abzyz~oQq|N8jHXT z|3EuEi(i*JR5-3bRVK%zs?gfmQ4u>qf8h2hXQnje+R+snouM0)Mf0kgXcC#~b&wJE zHoA-MsMXB$PiOFOT!k;%C&%<&&0!(pQ*2#t9mU@PzagO1-^GXQFe;Fr9pEZ4%QeTi ztC*H^HVR+l8NSg<|29`Cqv@cbl>h(J-T%t3ic9@VYHSL)u=;38xvhdE*_)_OdOCrg zL?2KQ)|bo|jFoD1F=S`HyL3q|%rnHT8JSj2cj>pzupSoid#m@kjbl!-^ZIUYvAmr= zIMmrc@j2BQ7C?*4b@B;(eEZ7uOqjokFp38$fQF?di;DB$Lk00Hl7fxd7isPz>%=@n zkQ6`GV9mZY6EG!aA_-WSlkbHi=w5(Dfy2v=avQ%Uo4kGI3nUEh{ldFn7MT%))0)IjaV z_p?%82Sz@c^X@J&k6tGGotciICw#T=@A~^+(XC%{0)P}*@a}(umQc1HK+w{ue`e}n zUaSOhc~OiQ)vI<7CCfAMmj}9B$&M{A4c@9Tzg_h+=-3&tJO^TUh=997G9!Rx?XM0G z`TU_H1hOYXs+*brdm!X`cvW0RFPb>0WQ2%Sp$%fZiz%9>=YKrL@2{F3YI(lV=1d#af1c;(L&oR*sJ{dP~ z?n#v~A|Wlzz)mPdAWA1Osk%!#nJ&!LV1V62Z8ZA4W&{DnyYI$fhugSJu(*_nP{sJ3 z5N%)mL0$M8z|M5cyf3ZdlqnVwCZ_B-I!7tP?UG-K(Tk>e?cSsS6wa;roytV&)(baM zBh9=qkfKGvOsFs^1d z+}h%c-YAqD0f^3?QSrVQSEpLO&(~~k8pwb4N>jS2^~s}zdvif6-S?R6HOU$3T4*{> z!TbBQZ~?&*mG*bV{)uw^IHH2N@gxU8{vd08_m>*&s~ zUpo?gq_6un??vO>XqDfh@Z2%Lpri|Y%l>&4G#xUURrw9=MbRlg;@uLGJZOuUUTgk2 z)($oWDg_+4G2jA5)K$SQW%HhNkxa36Q@FuGdKw0jfpAS{$xq+)N<-wVi9l@*v2~n-Q8aS+up#@)_xDaLb0aH zfmn-GLrz)fsH%Z@pIE6I1zTG)!bA}sQ+9|l{ScaUw~)9>Q%yk_l2+fih=y}N*PnVl z0(+_%4y2J@$p%OW_tc)H3Wn|jcGZrNDrXx{_h;E~z1$m~b0d@#?n(^hj30dd3aU(w zvHGH9HyJTC%zY1e0GUnSa1poga$g**9*q0q^Wt~jbKq*`tJ1%#@4w<(g};8l>+84M zlf8}DSa+{Q1y?Z0uvP$xJa*+ODI7Qs66lfl-M?Qpsi#KYW$0t%O!90YD|bp~dAk~5 z@Br1!`(K|E0s28BPv;5=Kq~lkIa!nm*p3;l*E`YC)k+``KMwmLGBB_#76r%VrD92h z0yhq7G^-ZJOr2r@7d}Dufket7{BN*G4sHmq@@*Af6)?-()h<3^~RWFW$ zXA5E6z!^?wSX0G!Whh;1T4)~Ig#xY2rlTGLil;)>0n95Uv|E`KcY{hk3Idq3A|p16 zBJc)Kq7PJj0^%{bhDb_BTDEKbjTMA;V_2VS09k)9tRGyDpXh4~Ah}pM&2*&BBRj_UUpoi%Dr@Etpx~mvi5UcbVqO2x(7)ac(^#Qy z{|zlA)Q^q3I$3t{HC-`DqUR13s~jPZ1DqA}T6LXUAV zdThVSB!t~41)>B#L6~zHoA_nSh`-yz8+S`DfJjNwS->wTI0u|K{vL&OjHb2-SvQDu z5aR4e7V55A7^$Mbr5^WDCf|b5v-=-W+0i-J6WlHkmMj6J2 zt8vyJomh<8Va$%g&sbISAtn&#f_7FQT+623nu<$1(r;Jl>14WEYcv&FlZJ=7qL-db zJe@Y(NcNr&)5`6l3wVNLBzO6HVAI$$U3JM-Ai;+f`=Zh5-LIR~)}EIK zipcRlv)4~d>mMumS0cyG;iFIgNh?*pyEXe7NGqLO(T3i%S}^K2I-T@gx+ho*EjNiW zajv~vLpJ*3`un{6j<;T8fba8ngMbV9M{uZ}f8q_JBf_+}JwV!tvM&avtc$5bvwD%2 z41DkyfQt1ojtVf#gLI|C3b13tA<8}bG1Ud>?;G4{ftYVg0+gP}yyF-t^sx;(EWL0A z3`TbZ5;mF%uk_OmRh1pTA?l|hZ+%w`r_-hwVdPGKIAgf?NMbA;=I{ipvY4!Xd+@b_ zX6uF#W)mcu|EoD#ea9vxRAuoB#xsbKrkz#|-Ckb^c!aLft%m9Py_+g;*@N6F2M-V7 zf-pA?ZmT|ps*+}*05s3&{AlJ~^ZBa@Vsa|lPjoyZ=U)MX*pykIAcsmX-#z8RtL<@n zpMiP$sdZ2)QWg7i{a~t1a#GSwYBi-5CC`90Ry6}~y_*Y@Pke6)ynLQVp{*Src{1g;R>D9TRMcv}mvcyN=%hgwu@lW*1&WVd+?!qkeiA>JZGG^Kr`M;a6Uk*wq(MC6Ek$ zrQh3F=U&_oD8>IyHjIhJMT#KB$ggAHuxYAidZOceU$s9C+{7EDSr^IY}~ zWk&L8cWa$By^_{UB3-7b52vlR)+~vWode=x3@bICRn{&)NZr;M*<870fi&ekVC^w> zDCoE6e?FFm>^Uv|Q1zlAs3m#G#$(nybI@HRJ*m`$J^Nbv93G1^!?(~qQ=0N3WV5y& z8NJ|)4hQ0r7n4cL0I90jxs4II562(2c4;(?%C-@UtetDS5KEhH>$kxLIL|s%_lW%^ zQ|it<@JDMc>(-B%0V8Y8?`mo~tG}U|xo!$^e}|j=yZ-aH&8pt&Zyx4cy+TAvsD|ra zG2LaSQ?0I}fo#RTkn)T~&0L{Tt*Yel+B)FXab9~pOobv=K7upj*{Pyw#V~1HuZg$%U zMMLIuyxjcnMP&E_us|i0p~nq5Jga9D>X<_&!(wZ@O{v|K5e*Jyh4y%3`??jS!s0=u z%%tm+vZY{3f(yfGE&0!$>xhXyrNXGCp+Ant!!hrQ@FPZWdTO6390tC3sC62$2U9I+ zeg6$Nncl~Pqeih`yIkO}GQ)r9@?UXmbmF9s|HZKxe&X0E6RZyUBe?KWJIYrtit3mj zB@1P-ymstBT-`RJs?48J-)m&gJDNOLnGOVeF_-2#=7W>8_3n|k+wS2~czw@R^9X!= z$F)`!G1s56@q?L{L{R`b46TRsMAOsPm(8=t{D>?DafaIk$qc;$XXMRZy@YP^_8R&; zO~!dv*tpyg;<4H-We4!(d=a-JzEpj2Au(R}Xo>TH!B3{hw}(mE6Et4RloG+{H3v34KIT|fY8_o?7f^{_LK*Y8#>GQ8PUuu9hWC`bdHS=l?E$Wz!yR-h-C&xg zkjJ5dxZy$e0C8}+fRzcq;r}W->!>Q$Hi{p*;SkaYNS6X4DJ>}7-O?$oASJ1^w1jkr z2oe$!5|Yv>2r80-k|GG-9B-UK{MLna*ShQKAHO?u-q|y6JkQ>mhS0u4ilWd+#$g8B z(WhM9q2%q0{b@4XTv+k-xbJcX6IvGhIMb#Ws!DyUkHnW8J;EWZj%b5>ez}_lMEzg5 zYx8E&hVN;3I|CIy$)op2?@sOrfBVfgQP*;{7S_#w@&gVGIDDh*{|xvEiQi%XOZ?y0 z`cPRstA?UCBJTdD!y{jc=geasw3|V1h^?6Qt#PaN@V-CUuJmZ=b0gre z2vqLOgsjbUQ#ad%<9)2_M00x0az~&qsm2-EwuK8~n-z`9NepzCUJw@}m7gY&frX2x zB0tMnrIFEA<4(PUkBA+S{@hf#KroWykz3Bf;ms2CwwlL^&(X)79acTHjG$9D{2QS_ zPHFd5l@RHx-*`BPyIx_!sw#iQqE0_W$c%AbE3tQU*uzF&zypeF08e@r6=_?sJUN-} z$wf+;!g6s~c#}?y$YVEciYOpSNC;RTUA8p~m-qTuaEUpQ8R>pNDi(&gxdkl7sbK(p zMX=uwafI_dMIn>CjG9D|Jlccd1ISsrL#>5hC z3(P2V+;T-!YB1}U?c~y!Rq}bC-QrKdD?i1jT*r#;_psn*9vGCy94ylS5nWtPkQ_eq z_(R+8$p$1p@pIcLx~Wfo!IdNG3SinkHPrBZvj0ESpsp4ocb$Lpx)4?p60qANL>k-O zvN4_v5jrMaN!vf}$CDfKPOaeY%A&tAZ1AMKAlxu&bozN{H&AjLdr;C@J5R@qBIv1d zNXSV(Be}AE6j=(HByWCPT+0V^786PET2eGm5~h+5I0Zu_#Gz2s$?d|#@&np6W`BJB zyK@X{g-%BVan1}t_n$7Z-==SdsYY56MPal#5<4=X072qZM7S z6(8m2TeL@)V@?#ToL;}<``x~q*{yx8p3AkgdBe66`as-on^ zjQ!dun}6Naol67CDP;8!%v@)nJJNpKGLAd6Sj>cbWy<^3IM)!ut+~%ZU>ghYj^b=6AEE$Qx-9g>e14tTB%mB>~U z_1~?!Ul_Zmw&i3K^8={fTN5GUj<5Ff^5gPQTchB7@=kK)=v!tj-5NS#EAxKzP3SJN z31?-BI413WyR;+jUaGsSK#Ca4fMIigQz*Xt9x&X`0{v;^EhrJ<=Ouw79y3G=0o1Bn zOjVEzsBuJMa!@}ic3N>h?1hrsvhAg+N2V)AN}=d&kHsL=>=_nZd2vd!NjJk)%#lrS zUQW|Xyk%vA-gc_)z|f8NCC$$h;NyE^^@4L^20Eop9n6mVdDrRA10CF>)U4EiRmz5i z%$#ak6+XlZc(n7ExS)}2mzYYcXxuCZ-WyT`6yeg=<8tbYQ3R>F+NVGK7)Q*Zjb&;} zy!JZIKgN`*)mN>0OTE{iB9(ML;|`ImGEa9n23vEmAn(O zPIS9HwElqf4LN~XYtfhG#Ige>4P24_CRZg^(2 z>!uDQ%u^o%0h*lwY10UCaYe#)OEO`1o2@oQySHKH)s`-O)_JuT2(55}5he&Epwgqb zEI@C6AnJgqIX1!O6$wS_@?T+^{x+{`P#1v&On)E&b9G=U5wcqgd{$LBo-}h&yWWIK zi=~y0=d-B1&rJ3pP-V@ErFzS12W*}lM@)|IWFC1x1U&Bc0$|aaX0lf>=3N81_Y^Sb zw4@g#GW3Nl<@st~+(gaEAs=G7B6;;dyd7z(1!y3yLKBCh6NMH(;X?LFR!4Zy~{#uFfn;qA>R`dbaI=78ys#PH3r z|0`mk23HLG?;70e1Xlml;Npcpuns0O3zq&eewSb*B+m0IrnaN2x3|5ejBcAXF_ToB zo%^zTV$R@Y&q=Lk2dq=VBEpo1`C^$LX94SaS=muagYA-bG-IA0A>1=x6x`dpp8exb z&I!?zxP`M6gpK{{z5UA-0LMm*EeJTsV!j+0ULg}{Lv=^>SsYaVq8mj( zlar~c_q1By#M@mCY`V5qyrTS*xm;S;t_dG- zD*yZx3YY;jM4Dmb-eCJ!_x^UPEVs?dP2ilVDmDCZwD~M)L|;Kibpc}@t@=RbGF1kC ziEKe&_*@cq!PwXwC3aQXbG`geGBiurqAoTEZ*&l^ng~>R=`Mr>aXAQ#j#LuXb-Wbd zrcu{>d$Y@RRZ?$&ZGbu2kE7T2u62v@q!mZ4QpfT3(XfvNtd@{2AcOm!ZUci);j@|= z>{%cY%GEIH{TgtVB`mEi%3=OhEUgVF_3KU{e4504Z|nYjf*(_(S5AJSy|6M&VfCCR zk1c`0hHs4hA8nsJwj4-c-Algr9O!z&5^A0@Ps9!bKGD-q1%)(od8KBPSG|YFqVfqj z9;p^i6%jFRj~znk!$OzLwO*}v7u*9fzYgBoJhbKV8#B(bmw}{4B-?>wP)eP)( zD=*bnn$7^T@=>(Txe^RTlqCV-fO1-(yrig}=hg)BePFPyX>Yv=uu-3*+>TExH&-qY znT_XkZi#;agzFa0Wi(`9w+TP6QjWNOZ75KJSv1%JGE`1WhV<=bv*pdexB0%NI1-bB z6R*%l66maCUls+8$&0_nUwk8u^6^EUiqA&!M2l)abw=_-<`ab|JpO66=l-ur5I z0PhGdI-n+@*B}EcIGU{LV!qTk5CS<*errYm2+w_~t0H$vV;I7Htj}hn^y!mUd{+j6 z2&}b+^cB+808Hjzt9zgU<{0^B_oL3*%A64A7!r(lcfgVpXu?YCB9m;lhtx2y^WM{) zWgPzTxS``7O8Z7rR8Pg=^xOl%P~em!u7=fX(E>Zy-ZDxeMEEH}ToJl&=h1Jzr%}Us zHTA$KtDo3P0Y(|VY4(3cIU)h@`49sd7XhCSKSn<>+YQ?f5r9*Gk+EM@&t)=VV3gG! z`4(2nSI8`*7=7-2a#fBTh{l!S`*u0B(mQ73BhS>$sF2NNW$Axn1#d%u^4|3wU}% zx7HziE@);hHSMp=&861b&kbKv?IFHet#t=7bsvhJlcNJ?&b(i-J}0;Q^2}WQC`d2I zuYpwPJkd>W{;sysN~#aPpsUvDYB%YV9-S5%-H}-A$1Yn_OF)u!a8$0?uQ=_&E`e)H z;h9>%7MVRA#9l|iafG?Zyi-A@xXX}^EXH4H-a4)1g32Mz95vO|cp9f*#a@iegdgjc z%CBW(=rhdRYKBb4Kd{tGE?BG~6FFRYdf9NgG=JT-_6`5njh4Nd7TaLijJA^c3LL|0 zZ!5pNA)Ojx&iG0VS$%1MuFvPWS0vAGgXI@CRh-P&EUV`HHsa@R>+I>D_hVq@c}l-O z0{^+21{fOuTc03Cm=OmPx(bjTgMzAEzZPRMxHK#@ku)-*)1kHu==|td^s060rxf~` zwi=bx3teTmh6*13>Te7WJqW44`P&oFRRBa#z@C8B;%)y*b6CmZ-aywz}SKjJoP`LuB|L6dun)8|PLg2hU8AO4#;8?O}PCk|3JYujAP#&@M=Q$*C3a?qN+`&CWFeYQSgRZ}PDt*OXz1 z*S@spp}ZCfBpg4?6=~?|0A@r{Mzp5)={?qQS_F@oqOL z!&+7#aUZ?p_3NC#NhT8TEQ~t0tZCns^vm46>WCge*vWkZ|T5ALHj^dO&%(L{rB^3(MWA zvC0(%FnY2^cohM84q>LSfCe+N=lP-+tWiB0J!)QQaBRRjV zF5bMHqi<(Wd^k?nU=%|Dy3nGaFctC(>Rptc(-)!8$ z+n&dnc3yjwS#Aw|W!dG!yUi5czZI(t^W@^g`XL|uwkG@Ue#rO}P3v(e#PCIUGR&h* z+P86rA*E!H1t=5!vCy}AUoyG;l7)4zcAVLTo?`llqNN?>CaRSJPvGRMPAO8q9X;C) zjkuBd2!m8%oz~6QH}UAw8hWeoXLkropq-L?n40=BwQMqr!#=X?16+t%U^MCg23cd^ zAvdO!7+vjpiyU)*AeDK30u4k+yINX@D=wdKLX37FXI^={^G7IY1Tkton*{K45d}iq z<1y7$Rb>SMdvh^byufIej?_q~8cQ4bj%!LZ12V!?3!=>|E&^1#J+5Boo!-Mj`Wx*1 zL*-#zZ&sdJ<8cM{7Lwf*Gv~#gyif8l8c6J$X=tpex1>5!8QZ$=d>>eInG&znu!PIr z3US7zpzjk7K&E7(V5^#0>5|Pz70af~fvvhOLDYxR+_dVchOx|V>afzM(g)Lr>*rUZ z6bc0#y;ocQsq#v0eJtty_)yA#OS5`_-2ER+pE`NJ%ow6I?8Ln*V0(nwjRx3FNZ0l3 zGQHZ~&AV#ce^U4vHq;bg2?anMzmzA0o&eqYS3*Iq>Yn0t8GTBj zWPYhH%R+w9(M$YvI*7za+lRA<(Hz5lm-?3IdvRWf2tR( zWo-ddwZW;8kmv@z9i$}eZ4>>2@6j_(ntQ1>+9Ng)+ZGIn09_6uJ#C|3xd||bE3D^{ zee*W(+Rd-JFJT7PX=$*SPpuoKsi^lE_^EHl`SxCy1d?T#1ARkbN^I`}l-RSNezEP* z&HLg+senV$lqsF-0?SiH-e+d*Kw1>eL^F?8F-h;$fPLOjRbuFv{`6nrFM8{(bC=3! zke7Z1209vKD-1(0SA7gP<68EFGj`ng@VXMQbHuN9yMAH``3m)c&G=A(vv++~CJJPR z?%8p|KDn{b|_Yn`^LT8f;$Yb`J}JfV_+Z zSg6AO1*>6zyWwhA164-(Vpr_v0XJM;j$)V_t{&iqo3~tzNM??Rf=Cb8;rbqlb`iat zvR8kuVxFLdRwevN%KeQGRF6NebKMjV~Kn%Fr)J zT0y1}q!CPdpuwDkE$(UdN-E8h1}@3g!z&o6Na@ISu|dX5FZiPA*J8e`A+;I#@4d88 zga%#k8gndJ?fh{EW9;tS5fn%V?B>gh6!72iZhk>!-NB&SE-1c`n!xq_vhfwdY@!gZ zK!n406Bh_9ue70;wd4wy7PDSJB11@<+woWXSQ7QwsDBuUt%)7N#UEI8hmN$ik6JI9 zd2sAMaiM<$A=md}g8a1n@m~CyW^B*$w{iG` z{qLlQrE`r4ST0zud$8Q6TefO{A{6xPT{I1bPCMDb^LPe>1^wm0egf0w*FmrKGN^`L zSGeDv<&x?*@7)#7Sn7oa>CvVI#kR+nt;Z&=D7?LDY-;^uNT%MnHix#vc9JP-z2^gt zJ*1BRI|^n{ykNaZBT4tupG=#1Gdl#o2M}R%tSHt3Pr&c9`u`68Oam+{fFk3Ljq6e# zell`<`G0a~gd*~!YNw7-ZN~oGuWa&Ssm6MIrA<(;Ozt^L;%Z6nUonu~z?|-v|Cbc3 z%FrxI`W1r3uP*mj-LNcQzh7PM5>7G&K!);7pmc?t#yKl+Rv{CkG|mAR@C~}rE|#D3 zg+_MbDF&N=h6PG+*90{Dui`+a>9EYTA{!%b@$l+b2gIX-$5(n~w0aibMYkp^E5qWu zE@VH`L*#)ZU;k;y{%G%+u5SF-DJJnY;Z_#^iq)lHHEN(+587Q!ckk(2AABF2yN*Cj zj7Q~#5xZYLkf~GiK)K1}*aKgsrniMJNv*ZRwBq)07;Y5@2w>lg%FgDh-4F>fvJ- zXHH}V%)3kCn7gl;KaQ1@2hR14#gJdVnh&OL)J=WM;`XT3SVD5SktHj0ygr-fTd`rA z3&~I@@nEml6MGT@#v4qqv(qS`@79*8b;bFv=xWBf*c@jG|#@s}o>i}{t>eILwu zjO;!vSd?WcY}fV8R_nX~%39tH8bwU?Lv_`7oVIW8Fd4gMP=8!G5ONdO<_@GRx5{XI zFz`JRJ&#@CIUZvFN=z)ZMUaSJ)g0i_IVe7mI5kQ`lVcfZpYWx^7k#J4QAB?+Cp(rO ziNP4<=LlNvJ82(IH1t?%9_U!M4>RDjo6-X7?vZjq%Gr(Fr9DVUa%q$p#=yr&+~`u5 z;MaNO)O|4-n$hPSRb@`KZqT>CUHJWAc#Gf$eU%87AUVJ^$NDV1KZq$Yi``Wzj zOP+E*e%d9Q4XnbD5TeD_6!lqz>F^^gGRa)~K+RWg9_pO;&tggHqXiaNag#IM`}{TfXK%-e#{q zam6Y)U`Z$70;`@gQdI}O6n{VAa954WjYkLDH{PfQb3&%{mD8nGP!{wJ(SQOKAedFY z3>FsG+kQz}l(O^drCVLWeY&i${&-!;huINUHXg0rUK&Bw3(BZnFW(6wAzPcgszC?B z)!*r=xGu|$U?tY#`#X{=#=w>tL@Xpap6_W4#ZfHx$0WaBc+oO?e8)}P3TxfE3Yf>w zJ2CTjj(3_1j`(yaip{V2h{S!f?p`YV@>6{B-iPj`Ac@*5QmJCZOfnmt)#0ome!X4gPHl$;|JK8qKO16ijXIRk{D15R4(cAR~Shb zdxD-X+z?huT=^n%c`GkY7?`453K++d4|C|}G#z>+Y^gv>5z+oj9;S+(ln88cmz6AiV&k%5 z;Zxrx=y$#+dC7@q-w)!8qdqyWqqttk{|FfHyT7m3{&TM`H(m~Qh8Fy*Emu`OHo8J7 z=Wh!PKOlLk<%Nxs5mSLit}CjXjtTJ*&z2~S-XnX~3iY*^(K=|#?VV_%uGLpw(}^H!NpB$C$4J5knhWm#-CSUE%T~aT%a{&AaT__%a6IiH4Nw5H*ijy+DLc;e z)|vN^9%wBS+iVf;qAw!NOj2?&3pbM-jX}kpfQmfI~rwxqrs? zi(lpEs%;j%@8dRlHnoo&`}fi754lUWC_{$a9KG?Z^ux>ihpGm7`Mr>gFUu2)XM`7; zLFrR(zr#VR<~XDjNEsdssE&|)^+G^T7bs45d|4|%J!)**%Q)f<*i?~l3lcI51kjnp zE_^m(mWY1uvXKdtx7s5I6#@Ac#5M>(6>BKuvCd6lX@?ujSv;vcmw6nduXBH{7{9wF zy2)M$^UcDCvaUoR9ba%t58V%em8PPZ-m~p64bPW`1R5n<8wdD9dgju^6DKcce9jJU7_ww#W zvE9zF|H#?!{WA7tl3$x^#7ufvVyP6GNH{eQtR12ZIa8U0Gw{vWy}xTTv4whnqxhC2yMO$t^Gf*>t;bGfW8}Ex49nd|FK=nx09Jh@o*gLOjz7DgOffOePoFxlFPBRg zU5%8K*&>h^aoLLM4$Mw=={&-|mu@Ggy0o9+*Qz6zH}LQ?-~Ef%-EIP5?YVhcq_5mO zzK+ozrpNteQ1oq_hOy`m0}g85{6D+xurrm{u-05JsqcQWP7)MLfDt4F@Lwjp^SA%9 zm#`jYfofHkY-;kw!xvA<-dYq+m8e&D579SH76EJW82il%Hlw@d6+n@yZ&nj|l^*SO z^}71z+BTXo_dwLn7r+Tpyw(IAmN#{UrsN97XnD~N;FC=P;q65?Ahkxe4KLkuN~rvd zD)0y&cx(3(@B)#P2(*^y-d`DwxA6R*VDrxl-(yJ4rt{-aoJAK~99!$&EIeeON~0Y} zZxp$~vgnmTyDgl7<;Fz%Ir2d`e#srgeoMfMR;a+n3&P~=+Gz1#!GF5U z{qvZ&17BehRwH8C-Z2%gMUHCEg^)2HH|oV^cY8*G1xfFe}=2z4 z-Ty&gP&jAD7@!}d)<`18Zygn7v45{WcXT2TfvEbD-2SqLILBwZLY)b{IC_!AOPdbY z%r&ATQ!96v^F9%zW^=d+Whl${4jnI`qQW355&m(y>#!sQQ8HvU>79pWNGDCLfdWF#-@YVtJ{amd}c@6cLC?m z^dnaFvKyp!(_tS53-31HmKPmMS!MH()_zKu{M>F7z5jtFMDqrQchc0wlCf&x8!+!c z^5!-kHqo+FW*`PiPq=G>i?Kx>GacvNkEQL0rS?^oVj_@Gx@_tb| zQdB32+)HuZZx=$im0#^G>)-QS*F5TC>jHgY1=@!BE~Au;F6H%XuixyBI0+-sUAd=oVjc@!|&Gyjm8I^+rb?8nC3U7V+TTq~e?m0&=LnMDTxP zM_0rlJh|)X#FnnlNL9W=R=iw@=bGPN!UWo#Hzy4o6g0PCz(08y{xd7x>*^xzK>3z8OI3xIVf_QEA=V+wk7XGFjiK!Lihx6vHiZ2B{2ddpj z-%pvl_H6@62@MN9O9>unb|ku&NBprd7gh~_MNUzM?&*;kaM7BW7#O7YFzk>x={6=N z?lGOzx+yUD^KYAd#1vU*dXo?hIlt4M z!AHI02~hb0B!kZ0|Hyr%x;RTe9!Maozg^iQRo(M+Z>Q%~zxy8E-6)s|Y%$D&?9I~> zpgFALJEx+NQ9McD4nroHRw?DLu7hA^1QSksBTir|1~4hR*vf1^C3(x4cUczjfR&6X z7si+MhtT=~m4|rP=o-=?7PrS#@Bt$-^GiS}1o{J+T7{ZQeQBcoD}b*y_3B0dDam$J z15n5)FRsoF(N!cH(T>`5_7q>RL^kKy=6x!KWRse9+wbVxw9ajNYQPc}2wRVtSPC&! zx{f6=S$0+NfjNXZo|l`K_mz{nrZTIV3%h^*2zUPWJkZv~g|04{hJZ5B(hvvOMw-`s zCZ&=5XgShDB;Ey>n~{F%)kN>U*X>F*mwsJ7MX7{kM8#Sjb<~gw4f#z<#e`~50~r}t zFDHJS&D(=ed?x>xHKOL)ep64aG*Vlej>rWI*yVt%^}D{$n>xstZ`+pC_DnEPS%pFZyYS>l!(uN0NS z32oo_Nwkf0BQ#Ak=ViX?m3lVTFEh=???@?d@>C9%@5WeFl@4*y0Y@s|m-qX&C>k{n z;)mE8ImV{5r>Ms3_=(>ujjk55M!tXgN@O@+{G--24#;FaV0?2a4Rk2#AN4eQ&TF%B%JeID zl9l>xMm5YbQ`O1v(o`+Hvo{z=IJ%I~@H*6`)`f`l%0O%V{n*T7q``iAajUKea4A z-NSv|hO4#VhCSCNf+Cw}c~c8p5O!{(Z4DLGn)1ta@MHUl$f{P)ueb%$hrJ2Dx>F?n zRp|aAUC#T-TEgVa{hdp`rafz+;@Yz>LrSQ; z8%WdNvxSrpihee>mK@Y*LF=YCDSn9NgPC|>^n-s}oN@o>mRm#|tiTbw^H)zwJo#8c zD7+^{1?Wkccp?1rokqMMPz#5E=2LM@-9K(qqq@)f-eOguuzEr8ZTH$wWpB!&5-$&L zks(XrGIC*mAo86rzX_r8@x`&bKn@v|u?yZn!AudVohK=BAcy4A>l?sy&R!ANap$58 zY~gK`C8+L_0rH=PZV|Yrrt)3=gxE?bN&1=-Qa7-Th;G@9u2PH6Bvsl)B)2Q+ku(5z`-si3AgFI znG{10)B0M(d{BKkpWm7j zU_UCuiDmgV@hPzLqH42YaP*tBDLw~8!tylGe%o5(hHtI?pLzSqS)9GL)`a&heNt9} zy%%oN`bKf0cl;Xg zLC4$H%C26XTeN@-SLX=?f9hHRy1cWfKmJ%{b8DI8OeK%z&-PQ+Cs<*z-v(NP2_e<; z80gv7!PjM(YYASVzZxwAauz7!E3Y~7$QyDK&71qQi=RzbVTUIy* zys?`Wo)3|dXjuhAmR`_rg@$!g!d}f@nZ8`kWlTeS+p5__Bu_B>+4n-HC8?5i9?lVW zd4!=qbs08Fm*gJvY4J%@btJO%BUVA{nTlu2CP6j%DIGtEv{hI8v^O^zSez-)P_bbC z{GrO0ebeGAll{jnJ?Uq?GQi=Ay%m*y@)pKP5o7qjHiLb^PtDx^b4x8Z0c_*$hsC^i z?b`>S8j3_vY-Y$I_ycevUYW&3kv6o1!T)vP+vgn|ofu-LnA{Ai}8mTO4N`i28G3eO-37DKhJsdsu_LT+>ldu zkps{lVMv>M_dxV*UVdOS7pd5M!mM$W#6j#UNbMbgP-{dxA}Y$`F1E&$SVqY&)jnq3 z@l|^VO3gwihd-F@h7-0%&y|5x9d@YW#*c5DVaHlagUcpG<6@*=VNcJ3?^ zSG3}-XePU=gY6yHDH|;{v~)j7ALmyal?qQSMlbi=-4~GwV`NL=QA++ap6M;}LS}1g zzLU_wF5gEIPF z@*kYq?u0JHZKV1WzP4SEen?PMkQ$b5DYklGP2s#3k+lH@YGH889hN;?9BatJhk@Ok zP3q=Md+KSW);rng-!uZYXoKeue=1)iQEw&lk|_)@FZ%!9kprFp;OHFIS-OFMc*BP3*-Icu_Sez*-$Al^u1ZGcEk{I` z84!gS1eQXg4n<-f-*=k8co}S$>g%F*W3)q`T4(uBEk;TclwVyq(F0Q3TV~|d&E6*~q%Df~f z`RNHOc@epN2*Ou`AuI-!qkfaRT0;IK%x)v>%P6zJ5qjehUbJDXOvC3}HYwIvmSL%$ z^i}<-&iWVB)$``unt=c}2K2;_a|$NUjqufnE<3pa&(9MC0cDf>)vSHEE{QTWiEgYH z;$At`>8e5Rhy#ys0mjzR#d652A%6SAGiJw#ISDy3mn};t^;3LVuGr{6 zgi?Yzn-a@NSsl?Ah9}LUHb@QQdfxiRHfoA$-Wg()DQ(AD_^k)+F1s|x2qFYRNC<)8 zLMS2JoLsydT-+T0-DaAbC>NV72IN-m6MaI`Zl_3GO(^U(SFnx|;>S^>Y$2!7>&k!2 z9O^eM47`QzB^m8}e1GNr&WE7ID~RJxuSddE$M33I)=wSk+ox`?_9RyAr!32J@K7!| zYzVwp-$i@j!Yx|CD(bsQjgBwzMtoz}(G2F#5CE(Cj7}h1}n&-kvcF{u0`#M%*wd+D4rRp=C zVZZ)d6}A~)0%uigsOB94XXT$OMMJk{Uby#V7-L@Tx~A4~ak8!AR)a<8-4dJn-yE#CeP^L{CToZ_Kn~BYHi$*l7?hGk1ihh ztuZ0}9ZgkI`KTI?v5OKSjz_<}91}MZfBdOX7?kPye?E`73BYm1Ken){Gzf6-UsOj^ zJDwzIpqkA3N3pA&oDKq(ucyzJMX>ARPfjr%J@mRIyfW1~IfIOz?-G=zxu@REykB2Z z%TVTm3QNOS1pft12^ao&iMJzl@qtErgL z`~k7i-cas->|yko2eHvYUns*Ju&WUQeb){(qIvw9_XYfM8c-JLwXup?U(TY5VUEe? zE}yZVyV`k&P?)i#TbR#>#TQgv_guWZB1#D1k^_p$Oe(6l#sQB5!HR; z>3QV%8Y+lMYMc}vCubezTnGI&$%-JLkf^VqD{~j4M7H~`aFAO;Z@7V9g8#6DO4W># z`SshiKO!yoQTs+3jpRBOpI3&X2_BUmt)il3VVcOJ2GCIAeUiEpwB}yCb&fCdyvb_ zK<=%W_mq4nElvDbiz~v_5%-fy(%i4Vt;@ccXYc@l=t%1m&B%V4ClGFgfOrv!2x$I5 zhaec-mMwnw5lHcXKw^G<7D<7>hd_WoLUJC!{_EE}l2hQ{o&gjH(jRKeerMvy+@ph) zD-8cyFoT%~z~BDM{QJWTF#oV`_B%8AiDWm7`B%$0n7Im6xBbKXr@;Aa*GWWj>DU=y ze*G1|24+s9fS7;h8lUYt<0c|!V3oJ8PThMv@PGODI{z-yJR1|=MJN`Q1$dh24vgBr z%)j>{&&DJUAZvm*e1Y#>2MfgfdxPt2%vF>4XRz9&(_Vcp&EAtM#)n*}4vsV0JPMr^bi_AH@87Wq39w^R*E{AAq@a>RBQI<{STx z(cjCBv;Ce(D}yPpH0Hnhw7~a10|@wECR|5n_&t&24z&J!?=8e|=0B&FXS?^WTkG_& z>pcB?76TXk&vpKDE_SwiZ)m}J0^65qIW_5EHJW zGyIN@IuP?*Iufe=)(JDHKmB`#GJu%p(vhj0KpyP*j5>Aic1$4V zxpZ{&@<1lcEYUNPv1Ka+uuws&VNl(&ZZ;#i;4E`0JG-Q zvjpV;G2uEo!}ICe?}-A7%{zUa{g**ZxQ@>7d`=zf#lpUu{ilA+WZ3f=bBcMF2gE#=j%FFPZDH?_!Bb2fUJ&zKIzoOv)&RTC zfKyC9eh?F`qchz5?Hs;$ZUD3V)U!k;2x6W~N6{jcl(2E{JawI8LU88!=5>OGhh4BJ z^wZ25VGt8OuRFuNZ@!ITfIahJr>^s(3wvK+^N`a_VmS~KuA?(BS*k8Oz^=3P)V&|cgP7;ik>AZZ z23R!`;i)lNRD?6nH?O-PAGi#AJ~2))rbLr>``{xQ+WK9qguA?)IdzP_+Bg_TsG&4#Y#DweU3{0$W zpw0i%+k)9$15z zaBZG}`B3%sN7y_0^u1fzf|zh^p5a+q3Rr&m=e41-J&1WOZIXmsboK(S^RGY`@EBda z17e;_nQw0Sbm8O)4xhcnMN zS3H><3}*V=12N$`I>WPcGOQNNH1Y&7&!wZ2A*o=dkQayv*U=fS^JI7@n7QW-VxCJ! zC$l2K%y+&ZCR|5nxXzQwgkWat0}%6EIyxDI2WI96fSBjf(aGpFF!NCmhzZxx8SedL zTO~;W|3QxS#Z~ z1TzP6K}@)g&TyS4%@V=PrhE_+uA?(t=SfdKFtel(#DweU4A*(m0S?TJDF!j&IywXM zq@@^`8D9!wo=Zn3?W(}ch-Yx-`Q~*e9gx7x$mbyDxpZ{WbO+45Qwd_8OGhUiUBFC> zDi9N{qcc29Cp|*IOsg6Y6Rx8(jQdI7i4)A1Am+Jrbkf!U%rvM6G0&x=ldbb$ra~i# zc`hBD?9K)=MVdg&bLr@0gD{wh*8*amOGhVrP{B;dYd8}$uRFuIpX_o3GdJ5n%ya4J zWEUNn`MCqcgzM-G&-}>_EiiNT4TyOz9i43Z0W)X1K}@)g&TyS4n@PaT>0S`?Tsk`0 z!vJR1_Jf#k9i3s^Pu9zWnHd8h=DBoqvIrZ@OdkR<;W|3Q?|HJU7tG8Y0Wr^|qmz}Q sU}n}BoO!-^-N_0&F!R+UhzZxxAMYIn6{rS*xB&k&FhC&H)387N56G%3?f?J) literal 0 HcmV?d00001 diff --git a/logs/coloradio/status2017.zip b/logs/coloradio/status2017.zip new file mode 100644 index 0000000000000000000000000000000000000000..ef9a19444f26de8fa72ae19d9330a581edec9c97 GIT binary patch literal 86889 zcma%@gX(8+_lr zpRN0SzGoi?!#{A{_qx|QuWS8Oo*^RP0{{Rp0QlTgJ}jX!I1vZ{yaEFNm;f>W7YFAP zRt`@1ADg|Cm8J$N0MYOKqt5-$!wVe%MA}9K0Dk?;O;A-1;K1%#y21YeOl+G69gE-@ zrM7>*kifFm(sRX+cocYP%?xM*v&GIMnz?R&o;(LdF_qh1p{#Ks_ zZMmO6PMtH1{3Ob4+wy{`yeC%?IY_p16<)loZl$&-LFmXx7P&&n{D?P^k)ts%BIWEk zmFi>g*c7R>-3zGiL~NbQLGFdx#Jv(p^+ne|(%f0oI@1itAZz#(b2ua~3VMyRNy4Q= z!&-*}yGAiF(hT15w@%0uVnZ@Zi*g+r=kyN?qj|>fPYx1uFk3aI3ftV}FsZf#GxXcg zyp|+F+MN2B+0MMRa>|89YmDw@twjjQ*I~65JSDJJI3Q2z_2Vj)x*Oj#RMgi{AC8(o zEYxs7|6%t-SJ$n)M6F%bM670>J$WKI5#Y&3N&@Vw2hwlSB)T=K;jo$SN-S##5-e+b z=o(cd#kp~edv>$=chtg!a?gXJ##iTc*dktVDne_s7Jq~>HFtkv5|_ym9q)K4oXR!w zcyNFdp+nJ0#!ArGoOW+r*ZG6??k9lCZ|csO<9j#2)m29QLtU;mX34#&C`XR7lesf#!AVxj3eGaAD2MIie2=X_>oNvP-DJA*l;Ipf zR&V!2Q;tmboReBT@t8ptG9=G->X4g{tmch$#WTa}41N1Zd-fPpbTM!%0&N@)tson< z?Po;Q^?7Du=Q*SF2J%4W)Dm+jV}DJ7O!^{nLV;SRF3qL@vc-F#kXs0=g#eDJ@T*G7 z_>LsYiqLFF@xn(8s9%wp3s^{mt>*;7r^dc!xbLSWV9v2)Yfu7Q%c}C{>L!4utpI4= z2~?|Ox;UrtGMjSJuFPP3UUU%bQp09X!df)g0>)dKbRAKDB6t3>ikaoLGq@~oCOivw zT`HW$xKuKd#q5&&_XF_aj=#1LegKgEJOJGPcmNXn9bp_0sf!!5OQ3Aqck3DDTt@+d zghs5-Vmwsh^zP%YeYvr0^b|1?8>v}b&94mS7A@`_Ev#026>KHEdBy z1eGq=_S`Whjy2yDe!p38k7-QsaFDXa5b8L}>D;?%k))ZYAF+QG#lFAhU_zK{PcW`@ z6<4M_+Mr*Vi{m*2oO=k4%zq}o?aFJ@LHQZUq(WNHo&-rgM(d}ZEoeDPgda$c(pN*6 z#QNG&DEj6AnZ#DmtS3Y0Hp9NyR{J@|Y#sDdW0%fHXdk16v>*gJ>-s8Lb=5la@eq}+ zL~c%k%fiI&qiq#(8mn?n?)Z4L4IOMtGGq&04Loj0A9K%pTLGmDtEl)nSn!WAA2M$e zRZM;@vs$+s-#)UW!a;GB(lD);FWsT!gVJ1L@xlV4QULyr_0wcq*81|Ut1g=X)fq3v zS65|CH9D{O$v*P{C;PN5z2os84F#X2>8lI{_n(V`eINBb`CV|Yi37GgxZrnx)^nbJ z6g;6_DL@Q6=uiY%1b}MHl=xDyStsD_MIgEHn8imDLQ-EJBF@UZL9Vw9%N$0pZ+}|R zKO3c18s(dL+MB0v!quC_Xeu8*Dt?Uo1YHpN(7JwhZ=MZA1)YBK_TKzQ)uQPX}(l?d_TT6W-`GnXrQ zO=hemzHA#|UM*dX@j)-$IvJ!kt-?&j6KO*cb;&3wQYf?P+jAG90K7q6rHzsk41{$L z{`@Ll{VcoGWEwUS58l+*bQ)+om+&_$shit_F5V=B?H=RJdyR%30sah zx%vL`=Fr_2;diwc8qT*1;A*4(dA%S1x7z;jm;3(rzh3VFNBHXvJM=}n1jve+71Zbd zD({OJhHashBc=~(m5ms-qeiVAo(Tt%{iyjmxQDN6n5&y^$* z^ZJ#~bi*gI26-I%nF#OWk{^P`Tul^(!E-6Ap>1FZ^yvr=DQtOvj^r+!9PFyOIk1w) zfX!yj8aE^IEV{9_seOv&)OCRg(i9^862ze-N>c7P@JLB59sB}GyaYjm)=W|HgeZz|FyN?{E|Z% z*q^cnx&X!tP{D53CB;^g2+n-dayNa#{Fymg-xXfAGs5LNw)6>Jb zY{r~z->Q#Eityjv%^BwFR?1gv>e1S?_J3v@h<$$C$i8%LQT6hbj~C`A++1A`#}dI| z`R&W)IHG&0sb1AMI5|yfr=~7zK>fzJ;gVCHHXd++Rt}O?FpBjsf64s$nX~*XVHT{3 zq9d7-tP2A3!r?Y`3z|;aaPu}jg?@8i5}+`#=Y2||6@XxGtT$@bt&+!!c}=v|nvtI6 zJ_axhY5blg+MFikqQ!4d+=Y+SE^Fp>;8=$wVZ*l-ePZ!c>1=LGe6HK1dCC$*P_^`~ zj0D^_0~AsYOFgX{(E@T8@LR|S_?Q#ADpSrzL&WG|uAUD?AW~BD*ljO42$atJfSIGJ zy&Pg4Z%+utqgGYqjT%tr-l$|82xTOs)}R;Jjga7#0qXd4&#ILO+ ze9O$p;;p~sOC^66$2!3$j`OCD`pY0wR?0WYNE+kZfHs$uuwn-{lIx8G?Wa%P$lAX< z?*E2AGVyZ!@#5VJ4??zLnkAG2YRykVn7H*+3+ zh^ZSx7Q1P7<608e*|~PZbWOmh5X!MtHx$P}vj~jiytbZOSj5+c35#0;<{pATna%V( zX0xF<_kFs?XK+hO2Ut&jA>B8=`f7ErfFl*ZE`ZTwD5TmLn-{4aZ1zr41#JBi%UWu# zT#^_6vu!jK?OUxa;n&2ra7SW5gxP?^85iFpa%PZU>}iv(G$-w9mX4Tn#}AoP3(coc z7=uz%iXgM815s!(hNh}|0^(gepR$b)>KG5-M=KBv z?L<)l&p11P}i?yH@x3P{Ydfr!+k6EzaD4)e-bqp-irMa^;av_#ac2y z^*PLrG3 zk?w*Q>k(fxeCC4zjSI>Y=}89C7Um;V;)nw(j~8!}%J>BR)qw(o*ka2_K$B>XAq4PD zvPy&ttF#JQ4N=<-t^$oailM~0q!%SP4!KZ2;PoT!@&tKC0>%K_bxE`Zd!3llW}*0v z%4TZ4ZSao#aQ7u6e`Yo}roZ379_klB!RWqEBK8^0GzW6HDw+W)XbvDDKhwa2V@aR= zE$jVrN|Urb#-PMy1RImZOI0>v<|)Dr`~sLfK?$=@@*;+!CP;+;hV+aq>ax_M1!Cn{7oTU6HIE?ry>tLvzU z*G=XCpc)5PJ0gg^WVQ^he6s(8dN33=OEukN$?=}arxvrp^| z7vE{@ml{(AK2E(_Sax#CnSV*`<3`x`;n{&OmKA&+PjKffC%^flYG-X7^4_cc=cL8S z@!x9yUDZzfpHFj}yl%t)ewrO}9W*zM3mKN9l`HR-KJ~`dgv9YE#WCt8*cj65YDhcH z?fB|TZNTLoe1nEBaIimqdJjt$rONeQAxLN6ci&4E+Nmi10sqx=k3(Br6H zLvU(9cu4CEZK2E^zq;?qcF#J(`6-Oe%x&@v9K|81iUkBJ(6sW3wVC0Xv=|Q=_@3;( ztxeha>P1VeXFY&#eu7e2TJ-#^Q>EMEQyIr3GRJLTLAU;xJNh>?nspXGUBzVFa4foT z^9AbcOBWuLYLa--9RC)HNGWX%17c+Oob7F6JVeaQJ#1U(kF!KV_J;JTpC}`arkeTe2upZBwO&&>KN#^G^OXGn4C44M(^5Us6Ojl`J zjbcs!4pbt=Gi&(EKX$z=>4!bI8@xh{9*a8L@Tq^dsO8;vd`;L+7f@013}^lv<({-0 zj}aZ%;u!FVXtpRON>+kz`A*L%PtU%;LHzx0Kbrw>e1NNc`A5O#{6Ao`|Ecyc;eTqx z9P$fC*FTRc!6Zex&hP%K6Wf%lD?Z5@tdmP?-cPykjT?s#)+l##gEkD7!w(dWi@F$$ zxvrwPI&T(&5V0BELpcf^zmmYn#fkSvBjAT&VT6;9pxp*2Y=wp!ik_KaTdDRA=np%V zn8t<~lAtC783Xp`Kcngwf#E~;c}4d(pDrPlgbY2efoT!kkoHSUO025>fStYTW;bd(E@%I*>9$FPk;HKEedQTY;EcOf1mtkvh5=CY{=JnI6jBz^6 zB}A?TEfs{6eRsC5?hk5{B)Jib{#T~+`R0CFc5mPf{)8+jq%ZQr>06&qIh{IXBEEcz ztlNAdFXB%?@&=n67wjRH%5uTW>j9mnLzF6g)CcmXb5fEs?J(2u=TZ)?XJ{6x?%_cD4RRGn}K( zQ#PBSYYC9uE1YxS)lUzCbVmyJkQlMUV~ZQcJ9s9_u#4qnjFS5goJg}4QWsEWuJbf`0!(H{pdz+>rS!_ z4FSAqF{bdM_ahy~L}D2TuM_4qX*0~cfaG9+>I63KIc@;9#*;`(jeuuOSWuNS>-xF<16EohX*Q^tXvZyq zv_+V7!{brJ^Lpz_`n-bJcxKc-?^>(e3m?Ak-XQxN^>y|>RLT7x?PT@G`b;fJ;bGmZ zHD|dx>Ccltu{ZUjAN_HYn-=$W!{8E2|0(f560(Sde#Zc@{~}~!4{P?+3sc|{Um%(p z$D4rOXR2PEdElPqjxTF|F^zmxUcS#Fcfu#P=1xGjOTBSa5&vg&_o!Ifc<&8w~H#^B}`o|Hepry`5 zSpKdDB(edP@l5h~ppn>Ws027^;^DBR{{@Maomm0eqiUWF7UA49cd% zbbWsP((Nm4(0nD>ZX4A&EN%<|J1M&TBLAD$+l+91+6kr--wg(PWPC>i6mZo$i@nnp z5-EO{*wpo|Q00{1?^Lh~(zgcBVB3^2wQheLC(t997%ElNLYNI2U}fG|NxC!7KG zsYPAQcz$7p>DJdof$P;zRtvguD!6#~PdL+hC|M}pUhj-wZ#!&8_3d;`ew!b-p0#wZ zx_z?oN8?2luIB0tm-Gnbck0dg7X$m-TYF!ev7a9Pf}Zc_sW#GOTX+Z(e4cm#A9YKI zjTPKn3PdndN!e))pt^Y{r=?Y%DB#=Bt5wQZX);Y(Br;eWw-$?dYO1w1A7HI$XYtq^ z=H;Q3#yduecyk}4bC7h(%pDw2eOeL1A%lrOY575s`EX1+(ioxxGFFr=0CqA;##g+> z%ygeaV73vg4{+t=!CuWazZcZQxA($M&AmVp45tcgTZNXmEWzEvw)>XnYF6~qxN0dyU z&v`6_*)QIpRWwLaP+Q{QXR|HI6O$2I(>C=b%oP)eGg-qz2~M5uLKIyjnd)l zl0>~-=GUA0lgOCsGMH=O=6Nf?J`oUUkPi;P6>jnyo|C(8uvWLI;VtwSz-JJfcJDPR z|KqTPdG}};%CejJsk6*h4v<|=*SSB(WFUu$wi(PGwZl3XsG>iz1b82C6a>4fM9)LW zdI1fR*=7WXeA651eMacYLK)?1Hpj zJ`-%iRF;;878vVkjP3AQRFHmnl?))=An?E;F3Mjf+X5-C5(6_!ZdB&WpVeD!tU_=2 zd(uREpi}A5L=BL|%1Qq#L&l$f46a?~l!IPy$>q(t!tavN4!bJn{7bTCD1lja zmkr!sNFyuK=uIw#A(3742y*WV;aMcV)xejlEBl<+cbp@?`0=c#PN^tqYC+^$KAxU@ zejXE!oc7xpoTOg^>D9e#=0ru-pQOT@9sr`1Irij7n5DcvzaOVD2^510XfnP}nFXV^ zmELT7!#$`@A3n$&OdjCe14CaS3)&~LXUyUywh4!X(>+zS7}5@Lcz(ER6jXOBALt?C zk3$l;9Y6t{G9{Gte}~$PGPYbP%%V(J;4WGVaV0Fpz)Cn=@5ULf_cRtO2pNK=4iEkmZIO?lJHW zK_f76&LEJ4qh+Ph&(*BiFWjb^hP4lP#&49G!QvXQo+~8e3}u!(&Bggko3*d^Yppz;P_!a6O9I?v!iziFx_Q z+^K+{(f%Lj&VNKlxd}t}NI3Wx5>5c$NcOkHdFnFI?>}r48;_>M({fN2{g{>~pVmIA z)JF9o^@C^%t=2ZR7J6;Os%GA#Zt7Fr)4HLh3-5U0PeSBd)mucl2km;!BgGRRpsLDP zYso#q>zEadDAwbis(?gR_d7~T_dNRqXoV%Xl%fEnu9+tkBsVCaPMRLjI$Gu@*YQoQ zH!aSYcd=0$h3!2KrH3!2W?KbMUn!5 z9q}f9iz$9U<*c4A@lF(H1EtSW8v7bungx~i2%Vp^&kdMa+}Y>xqH10TU%mJ?6&UrS z|G~+1^c`Y!T?1~9x>SgHKvQNWz>7OUYn5_A;@7e-QTKYC))uOi`)I~f>GITV+wr{D|a zvnNJkwvZ8Z?Y`6C1%3bepn%R*?c(8^`=>p%RxPkm%s_n6^NH<#<5q0(<$IQ~ZL zqLtpz0B+|>p#0*(j;B*|&rQcm)aj3E_WT(3uSCACzh@j($nj1z-%Xp|s}h=_W4}7~ zFrshj$q$zNp^st1ioyZ1Kek_o`+G17hq<|wYqW|+kZe4?6kJ9{5czu;ZOPTJTl@9)4j4zwhiQc>%iNXIkc8Or zsR~@vG%-m*exs5$e75W6RD>E()XLm3@-gNq0n-nw6kTN(BfG9D zWijC_DgV26CYKGWj>j-VxwJ0=z2uLPx|UCI_6QQ?#Y!CDxlb@x*+-9|_w5t8s>EjZ zFs#h(c^aJkKj(|J?V9MT!=~FK^rr-?csv{~Dl!u*;L@|Q6SJfn*R#d2iYO7do$2?t zb}#7U0E`P; z7Eu6MgiK&()%a~s`ss3--JH=^fChyZ$q=^oDCuO>*CI0%Blmsz3 zSJgGJ&QA1Us%HVg5EVYfj>xR+CR^XNFv}k->76j)Krs9+|LO5?{l$|0rgSI#W(O=E z5H^&*C7Lo`Z5ak8v$B$e-rE6X`2&zMB(h73%b_QdF&oqa$2E+x_Szd)%#Yx+jo{>A z&#&1=X+=GYhpD4rj!M}u;u=9A@B47wr%#U@!B|Kp&TfKGE%}dD6zwy3sUQyLZg9s+ z;;@3vBL)r-3;Ohl2_KyU7RyQ-?j$3EANy+CH=7*J7|lH}Ob`Dv*B8$(&Pm_ToxW6- zDW6f~j`7AH%Tx@y#m6#s*{VRvS@aiLj34SwggHp0doY#b(wvoJ0#~FF7iqDK3e7A66v$#a7l>W=wR)cre)Z`4J?fj+iz{Dn`V;TAAns zInxmDeBEwQe!sJbHyX3=;Bq$o!Hu~7;zoaaX9w=@Y|p>$EQN#W!Q&%S4EjYPVtCLd z2@)0|(h}xihB3&+u-wL8eHWER8(Pf~+DVI%rTEb4gc0?4*}{Vk}HJyg;qkVkDQqYMe2#gHg0q8o=|DA;}5YaTVE zl_L%b7h}xCSD!>dIHC%SgSkb@Fq?NseQv4j&Y;|^;;0ER^B+cJ?mpCL)>|_dOMiDH z8hGOet<8{6EuulJqN1#YWxKanP!?EY7{6!8gqI3J74%8s_(F`nm?tt44SM}~K=VcN zH;iw5%5&=Wo%(LNlncUnKzl@HkiHq$K^dcDRDDn&^UW)&-9+^n7?W;57X8kef18k!GFk->*)uu&>m0L}lQNgyy;<{%jd&F7EQ) zMfmhO-|Eq`E820jD5u}`U9YZ!Gx7hR?>|DM-=h{{HZ%VrYEhG-Rp|B|mG65mobP)k z=19TGZ=#HxVcr~9Z#I|Doc19+NA=;JMX3KfF7@<(Iyp~Ztm0ey>!|Yb6J+E8)lD1! zHgP%u_)n?80k)SsveW6PBvKV>?=byg3-2qaz=#=^*Gh$)vnEv2c~)YK;%)rH@Ca!P z@TW{fv56%Ffi76XS>wyjy5CODz30R7WsSi6J}aA)1y8zts1El4DkQ7)>A_>PyMa0J zP14RnFLL9X;PC%#2HANgEanks6E@?^%!$`oVO^3CH5@L#y;Zwm4svu|Bl1w3c* zYxdpEyPtj4;j=Fn2*HN$q;R|a!|L6gS-*saH5NwA0zdKxP(dA>ZLlD+a$*8w7tnc2Myr=tD*>u^Q4~gJcu3zc z7$vezxmMpI;vfS_fUKQ3R0X`(UJ^gxkYX}E(b_Vd*q>{HWD6dMDhs?0&ol`11Vfc7 zXMbLqzwl@&f5SLgpYi5!<&~@n^~Jb1c84sH$pX`i1TiM;uMVBf2Vw5Hg6X1U-{k$`}h7>8FfVCEeU~ z(d<-LcT8i0L(Z0WgOI+c#ixR!Nd>WX8wKA;DmXcFZJ3JI9Z9ZLXWW~I0L+BosTcAI z^9q~`E>CXm3`PH-Qnq3{3-`6T?N4R@nM(Z@lY-S%oG;2XmEgsB!c(vCnK-U&HvRSX zaE?P!z)Nbfs1&o4ZmVsh^dLugV!v-DlEIS;AyyZf(cM>TVun4+itJpwz_X z28M>jbh8MkKjr4y?OzJ^yD>HCJF555e&o( z7czAuf+%#q5oK|@PWW@pnwm&B98TpRE__r)Rfn|tynh*z9g^y5ah&0>%hBp<39^tU z0ue?t(B%{MSm1yVWY9Nu!Rfk48zrL-==IIdtk51;CcWY;Q*S6>kK-CYfRP7O$|pTJ$4Y`AOl_E}p|fQS$84mrnzEt$FVbNVLgl5*4y zY;9YBS=%j!vpqbmyH_sC@pTma@CR<^xyq_-!#*fM8U$TY6d5v5?>TZ z-viovLkEeO@0;UVK#c&RLzt=dt2pr59EES`2^A#&=vVGZC(T1;Bi(Yh0tfqmA0Y!r z;j!YoOTA9Ru~slP(-SaPk%QIw25ec#bC#%APz#bNF5D;7N1d@Fl%bhr;#|hjM{Gjz z0w{N6@E4cJgFR;pa$6w(s4r4gd!vi#{fe6j+XlHR%Lr$ z{JnGHW_y#X3cOLa6~HiYI9Ya}`V{wkljzAO0hT1D^QMJAFEHOWU-bP}%KvJv{(@Tn zpVItSbY}dy?tk^lZ7RQdWq67?%$jFL;XU5QFnik1yPq=V-Z7Tm%$Ra@k4}8wZ^*rG zepvj`EFoTbC@TN^Bh_SllVQaV4F7e1iyfUl6Nnq&?QlA*gS(*?fP)Z*Q%75$VTaep3yjB%eSinMyzDOrtz{QLGd5XOn(=G zf{>Z&0Q8O)qM z8K%y1l*N1msD0G6kZ9*sV#DFFB@gIVd|VCONJkyWE*}#$<3|!3$O(D;R8TY!QxN3m zI=3!9H)!&Ty#&%{JA8Vd!F*D{ccqJQWX_(|L^VxQ(6lf{-AKXa3V(6QyBX5yq}+9> z?NdrZ9N%}D9C?!QPToo-@AlsPK{c!uDEaP91GYcQ^Is6_Z(HZzf>8^B8*r*IUh<1- zF#c;2sv?_Wazns83H*5%6>F6x%N_G=lU7h;RmZ|xjgBH|cXK0IgS~vnX{9oKR9Xq1 zR$O2BLeXZ9M&!`c6MT*7T#o`L8l}LLhti-GS$I`Oxv$CrR?bRDC??~I>{+n2i0@Bv z?h7>IiaQP1AE0;$EVcImt$$FeleGZT&Q~tNW-SJI_HfJ3@k>3?;U&1hR>mr!Gf|uo z+<}y?D<_A2&mcOgHh%{3_beFaP;uE3J&A;NyR2i!o0Qg}K@i1eEOI!TVhB|~#yje_ z-8kij>~4gk(m=`Cv^d4$EyT~hOU&mMteKV4FFN9!*{3a0KH;TI(R=`k5cG5a z7tK6q4zBb>_k^HL*cVJ3k_(giF`J#=m+xCq#_S&J-L^ZfZ-p$Aj0zFYxH%{_@RwZE zfp+8?Q4D(01cx2sX!W}?B#*D3^@}x>Z~S2zz#M4=`49kr2#nwTRqns2)Zgfrn`Gpa z!hzqlbip)@5(4uR+xb}3m(yB4^{+`Wb zTEZ@R!W5p!RfW*f@HkoNVBeo^M$*Se+jHEvCEbdp(iMb3TTPmu+GS{7zstP2r2B~^ zD~cGe?K##^c+h6;uw!QI%;m4{C!;h(X^-k3yf~hwLu=2(If#@$G2B5-Wu#$-W*pT0 z(}M0;itYi*%Fvq<(cNecaC~fngz^#Tv(Qv%c-djQzV-`n1Rqn^ktN;UOQZMOw#esTmXLn1f((!`c|tY zVpi~QG|#4udyXYDc|9Jx+m+ckKWDaY=qv`9sWxfWm+C}})HjWTpd1|Us!7WCUP4_2!4hL`A#L;@f^Ee?1`dD_QKezEWJV)i0-lVr`9!X z>W?IDvk7#F0>np)4cuxHgA5W%H7qb5Q_IhiCZT7pXTA;0UoYpz##~#v-#kRwG*j)- zm^SY;NA$(IQY2GThXiAnB5F@h61497kRsGaQH*2gi4Zp%XQY+e$qv?GaEugv?%>}N z_<3MdkDjeF@32?I>b3c*cK5w=X@n{H8E@NY>gQ&#%O=-MrdBS|5=?-9v9FEXH#h62*&#qYYyX_yndQRT)X7MCX4H9C6 zYk!Tcjgis+-bmspqN&eDgc#z1?*Y3d!YiWXo_N5+L0ji4n@&>Lu%Gu%C1RybAOPuA zl8t)Sh}Sf+zl@{p=2hd6miE1vZ0{MDcMQ#y01P{2L&{fOV5QlXx=&h|CI zw%=wjcF+wR;8-&F(}VME;@+gHt+8GlL*%2@I&gVy3OpfS1Wi+^ChCI6^}bdMnTv}V zevD?3KtteMj5)@aD|CH7<&Cf(o>K57fH5E(r1DUr(Cw(ulv36~Ceh6Zhp!c^oKr{6QC56KX$2!Jok2XHTyG)7tIOeKz>t9qj(C z_H`Z1o;a$$9p6qgKFD9qbI^{_-vm>9 zdsa|i@ZMgri-2dZ>y=3miv|((x^|E@Fn;x=9tJ^Q!ZmW>=(Zs#zG-$?6&~_G*2ek* zPRR*B5^kYI6z|m=WZi%E#N-OAZ;JBUxHyyG3xBt}^u7=j2h!l92v5rrMl(p+hkj?W zurfB^d-8R}%?)1+F{vHAi|oy|qcazocK80Vesl)v=N-z{-^hW7k;YBvdoW^UF61|r z`V6p6lz*>G;v1BO_aOiG!4od)UyS$fUdDt0`A#ux=%I+zE2uyIgbe+lp%RLrpst+H@N?oeMNK z69xN4AbSvT978eOoqO9FzFS^Cj%+f34HCs`uPL=T7jK&}aNV()*n*=32Ee)kC7eJ6 zvB*z9RTp2fo$AD;VjtVb>L@FESZoA78*mo69_Uq$VWf{8l>8CW9V5eCIXl~>;aWz) z@YK%ONfr~BWsFUeq3M6|@#|H#PW)4YP`=d(>nVA#ZlAmft1xiyXju=)xK_0Ce76!0 zyS~iR+EQ102;0ivGib-e!pAa|^f3%zwvRQ9Zn^^UJYE~YW_Mv(Bik)3f_4-+Cypm; zWE&$K$5i3>m zLtWB(e(3%*t%wzm?#)DVG`GI)jAF(AK+@$=_xL$V{VU_pEfY%Rx7E#aVOtXv*C};J z&$T|Y)5+qk_*~_|2{3Ps0sD(D48MykXZJe&J~8RD0YH4n6J%0y>bM_vYL^U~tr5AcGq=nV;*& zSM_WNo}$h%W+qa_eK!?nloLd`y`ebjn<0$WMa{J-Zo-T%?n%th!JtaO{6-h|oTG{2 zov$W&5xbl_WA7{6l9M-C#11W&O6EW}B9CSrHijW^2lj*Y3Nviku#9xC(%$XLlZQdG z0|mtRMeU_Q*_bC+SV+GJ1@a6|bZ_a1SNEDiF90oK9PkF`;X^6WZgLil<$PG7g4PE>_dK#*F`Tdw<0Syg#81CHn zLHa>;fecOyD+50~$&HEJ#ZVVw7`!}EG276qvcJC|mt3DNb=pdK{aRn-kL2050-|mB ze=5g+!QQ`_H{n3R_E$OfMY{s{H@=zoS(0F1FwMNMmc}5(BQZ-l-zIHRAxxA5`EWfv zUh99ty#(K*%+rmroTHu7`dQW&3ePb`o%K}S=a@F*?i})J2=J^i=)K2Q(K+5<%e=om z%B)A+I{+dCDv`pozA@s{c(C@tba?n|f2NDyTiO|0dIHlsx+42)J#GnpUNEHz1^u-x zBQcyGZn4xmb>Fc51eM+pv^^xEA)zc{sYbLA2wRDTk$jLRCb21hlnF_Kt!?>u;gqld@sYQ=>OEOcFjya04`)Y%(903%eEZYf;>~v|P{wj(PBNunH{c{arg4 zzY7THn2vaKsSLeu;|x@RJ+2q>qgmw@jq>m&$y&K zjuf+7g%|hgPgT&#H8mUys=n@mg}nsNa!!X0Uo>t1VbG+ST)Bk6HT~UhgJ08s z#=F0wY5(4pOn}w~p8Zb{P-Zl^z_!I$XdP81uTjqX#;k*}^q zHt%nab0H_yOl7GnkII_OG(X*?Vs(QdG` z-B@Y>R2`cP*3RSGjq9o1fhhG|uK`o1<5vC)Y6r4^w3x*^I~>$k;zXYl#UP6|QKiuD zAM<;P1T>#KwMzxPq~W9BLz|dha{cB{iI0#h0uY!uMF6u0(MrqJPGBKsoMjP5-2+<- zS92ymXAqAu`q=De)_36#d7*q-6HH4)kwU*Q?s`S@7l6R4JeK4rnRIX43fq}FB zTMpr)@FgmKR)A{jVB+^If)X0mWK}Ko(HKssOR3E31U86m#J~`?ftBYw8~sc&k_kO> z66h|eccu#Y2xt(b4f<%FyT%cu>}6CvPdF^L zFJ|@-m=ukwEo$|>^HKirpmvT2x(~?qalRx`Q9P|^{nWy=h~o(Xn$+w^qk~@talqc2 zR&-CFlOd;ezEt9N&=dA^TaJU?IEl6A;)b6K)1n6Fq*`(=!@@uMKis`+y+w4H?74NK z7Ws_-P1Lqoi&vUBrNWpU9F%Rqymm#PSsoHA?hafHTfVmXb`9PNJv;I4M$KeG^@+o$ z8`8DoV}1rt3$8{0K6~4vtWRw`W z4jL^YhzsaUCf|kr{5%tGiaL!7PE}M|l~hxV_#!ktoGz)F$J!ZUxu8P|YL8-~;k{j!W3?8J{Ji}alB~z$z_0cEw_51?4GQ;JG z1t%|~ZS9+jbFPLA3}UHjMO{%DF5tVl6r@Tl{0GBc_P=lVj4qg5D*L{QouqxBzz4*#F}G>0k*A;&iU3 zs43Q5!?mNH*mU-VJgKMw)uoaiC@btiseaSg;ElGsc^8W0MMS-sQ^=P@e=n@O?goAi zN@Ptnl0686mLelNJ=QF9uuIDjBnBrOM`#E_1(qQC3NV*oMTA>ZfB|}3&C?SSTqqP)O8wK@tCm>EY%7w^)NDb@xMOn z-wxMRZE$!@#^Xv$g_Cqc_@Xw%i9yHlnz~V6qB9U!W$+$7aJ1!xjLoV)!H9`Z{1}qX z?(**bj~~dtYrCHBH5&uh_VsU&5PseN5do+DwtBOC9sS>7aGikrWHFEJhgPN00+gD; zB8KH<<<75rdiM;NdcYH|?TO<1(pWC>pL-X;BUyT>HgTHOp;lc72wuW#-UF%gp^`f%)*{*v3u&Z>Izn*9u zibF!@58hU;0xiaIyz&qJeYF$L<6q<~q@=5owzj zj&ec_Re?B@JvY7VSs!oZ?oLGg{&&3N<;50iBH#ZW! zttv25oDUlbrj+2&s3eQ$KRnxRr=pqL7l!WY8BbD;t1mYO2&ibFN5SfYT6gp5&L9}>*X&E-E5U^eRlS2>|j z>|~xYc>lSaGU^={Hx(UN&vrl%?X7jm6jb3$By_wW=nZv-J$XiqML$%f*Atq2bcyHz zK|hE)5}6Pk+a&2^E%4iNctXX}gD8$X`%{c{5`v&w^ej58-PXt$!#E(ja8jJKZ(hD#ii+U_hUS;JhQ_waW;hIvQPS_@dDLy$ zPT-Ny3D99YRN(u@Qg76Z`^jWdpAnrcXwop(5Ong#jV)89V~vL2Soc3}?Ehf{HetaQ zCI*3jYzqGzi1fyDYVwNpG*6%9^!0c_XCyan58M9O6D`KvIqM9L48wJr^z~G^EI#yX z+VE`3*^MKSs8~uY!^p1PO7Jl}tcd5ED5+Bj|CSV~5a}5vG30c(t_7aq1zg!dB`i8{ zD|Rx7urVQ-ZZtUV&v$qBkW<4~;GZzqS=H=F$1|g<*P9{KLJek@_=^3@F4JUy=0I{# zc>GEmYhJ-65eHgZg>*1vY_l+&WNctX}3{4ZzjNeqc8JY-W1 zs51M1jJbV^G%NGl@U-AGAyC?y~W2nf>B-5nwd2qN`c zThDp)@O;nvyl0FxhU1*`#~R*y&Nb(KU)Se?JknPOp`~(L7HHv_a7X#U$I7@cwb3XU z+;l;v&f7U>_qyF-qBT2co`-hbWK_r}s7n(?*`1K2*KS0XFQvZRvQy!iFDb&NtxdP< z`aj#PFduu@-#iMaV{_GibQ0^obrScG#+xbjnPxF}ew1KsOQE|xcTY9JcU1-71HDas-?bd9DVwz=udlI`amkOMzl@0i zvc$CfK^bp5mU#4m{9V(Mx!|ES$|m@rpgUeqURhQYiP)e$_Zk(snF>y@Pb2lHmw0)- zrddAMH{1SXD>gg5M%zTpdR=O8GedrB4- zhBDE_-wmf;RyW4=!9~WY;aI~2BR4Ygpl_?8yGV$Z%EMKln*@K{?~2#MRf1wu7_s5r zUgogjiv@N1x)Opnim9C63+kW8Tp|7QQ#)hAYa9p^nEQ5te|N3^Wk-(r^QI*KPTyof z$o9F1+1O_)m!HR|OyC&RT&_{Xq@waJK(*oKNFZKpWg<=K6KbxB# zoB;=Ks`HFVp;MG6`c4PBl`I79n^+zO*k2WEghP~0oT)Z}DFAG@K_2lac=+`_H(qq4 z++fyXIpv=6^r;AL%uPW98kT+}NpC6sldGC`>OwArlN6Im#iE6&ni(&Y2|mX8?f9)h z>-A-gdm4oGC1|0^R38YPM|DXxzgEwbAR&{W})ZM74BGBG-F$%~_+H1-g_R=USB`p)fWH(|2pLsJCKYD<&e zE!VgD7+MAM1TfKB=j}@V&(_q7Kg}TWm-f3)|2`0#{pUd3Y&XZWVRC>({(a-}au#3^ zL?^MR95XPU?pozojEX)L(RvidG$$q^MtM~tp0^IW^oASPe}{{fy-_P}X&)dAHd845 z(1b%{gSqABe~9~3=o}Y@{dxnj#uG-@XH-I!=;V_pu1p{_K%u&k;@6t2`5|FrX?R8! zR>KxNs}=%hCrdEzj7x&}RUD$Pg~vX`Lj_JkwA7DU%{C@s^uQ(78t2AJ)DUTHvTP=h zcom){{);Rybj%!j^!D|ND9MechWnC=xRoXY?=Jyd1pF)xxNMFvUciyDXr=}CT0B~s zyPu8+0}HR+@L|FgosJ5~SMVg3l) zjC&4$!hsx5Oa8MN@BcJx!9;7q_eP5Q%IH+~vCjLhMg1C}bg@6{28M5!k#A5Yp9Fp zdj@PJ0UZNo{0&aFvJ5$kEM`og-yqX7JN8rqF$6rE)g$#C_w91^F$uy+QBL(0>SmYC z9$j`LcYxbBtx#5%ax4VUw!Pzu3B#jfP>SnQn|=`=1toP71G#ZHbn}X)b7Dl|=_k>z za`+MR?rYN%yLYozXBSVH(?F`Hbd2EK_16XxkBhQx+N~^ z#VN4O@&buTI&ei=~aw32bHLt*{MWg+ecrzU2QH|PCtG(Y4LF( zaT;BU6eNqEn8sk#z}%22;h^zgCImI^WXLiNM)|Hla59$;^Ln$}+s>E8S{iafEUmh+ zbc_TsmPg7TA_OD8t98l~t|mb0OYdb@kZksEh^J4PJ@I=%%%~lTeAfL$mG!QGqDe7# z!Kv)F98x@5-nP+2IP6{v5Ev&W*w4*`ONu>^K70y>qVS_O_q>^14&6w8rSX~-a?G(Y z(e%1ss7sBeWKErY2;c(N+|lS?@evHSMW{@9oEDT9xqBe7S50VmWcm%;gljC$WpO>I8R4xVB9EO=1>8Pm=tVG#C8#wg+$5uCA``sHf~7D) zVy&IJe}p8tY%?7o$eD%BIgFRIeHTwTQ4Xyt>g4)-@;-9}fNfWZhe=#AfG;reD( zbQS6RDV&UG;1;VtfdV@wT5-YIB%O_;FW=DE`O@u$P*za|wld36rg*$!@{k784iHP5 zo0!|!Ac0ik35RI$XxEX-cv{g#A|P3i7bU6r9BA|(@ZU8}nLj&?!%)Gt_7AMDZfzXI zBJTEC?5StXb-qk7V?fL$XnNW7jq`_T+!tIKUC@LNu&$9-X=guxlii+1gM+JBn(~US z@P>O>MPEmbn?qDZ8Ui7g=>;KzTE0<6$r^?)N(VF>$NAdiqjoH3cY#u499SyE3QX$+ z-|3reARMKUA`3>@IxV|>$9bN7wZH?w8U}27&t$&)Lu)QT77uCp z@ChPX@l%?iF^6#;|v#3H}&&7>K5na`1@SX_0n4%&kpB( zbezsEj4mzEQ;Z-d#h;~5?I!6>wx0Edez!OD_M?BqF~B?sY~r7vkDZ$@28_;4gnb!+ zI`biwAVg>R##S?S@1?3?M(Jakur|?}_>A{@Af4#HAp{Q4i6e;mJ+9>gIdF*qxpodC z*G1|E{IyW?KqGBAhVK2^J`922%cm*m$(UT zulJzTceBcp%j$kExd+CXU$+CI14AkdqMt$7)95y3J@_hLU4}byDJ4A9TcZHSJ@!@X z9yIsS;1glRGm-HK{36Fun}jBH?xOL5#>8?BV>$H*^Pfj&y0Js63ZT&cWPEY4a{lg8 z{ac|^f4Xmbez|WUS5nj7^ar&nN^>G$M0F{R^lCfrAIQznc|p`1bkrM*OP?I01gmpu zf+&Z~!V05?rJ@0g=fD)d(I??kcJ^KDRqcG9DBNnhJVoQ^OE@K!Rk``CYZYm9Au2kLn+|I-0iNn{7$A5ag2Z3&OZVKw z(|zWaAd%i}MzMG)S(C>gCKc%*kIF+XQ|S#3z1Jeq3<&@9N~SQra< zC5+$A25gL8xTgAG>+V&PuV0A7Ev3h2=6-!E=yfs`{U$;&Y1uGc%b6^FY(&9}IxnE)NB=+`044vQ{i~FeR-ow&{%|IW>;p%ulq5c@S*EC|Ue?lq zs>{hIs8n&fyAQUE{On9`@qV-A5sP-AO@la~x8=fSuInHhLm_GL-ptD8Eu3JAS27r8st}l9 zv7?rt4srkUFT)lz&;&4l^=N=>P_b<+lbJtinOgM9J&8(}1~J`TxqqlpJ>^-tEstb* zK$nN}fl)Cfw5|t}_0AO7y(gH)UxZCZ#-BkGq5Bc9CtY|nQ|m8x*Bh?VDdt5F|M~rG zXrA4&{}~6LQ-^4v4JjCR!(f=(q(DmNi43%X z(??grKQl1d!Md#;17FmJ?xO2}{QGjtvEM(}EPkVu9qb5wdvpH7RQqph_SYrp*P4}& zzcyX}b1?YRG2cE?u2C{vrdou0bJD$RZSb?ROrV!oHSkQ+s^Xth13+C|4`X5{KBj5^ z1zQ9<%M7Luv@iAo#fja=w~2y1L__uPB!SUAl|JJlxvGJzW7=Y9oIvp@fXXFJpl3Fb0#wibxvi_SQT91wDyqXAqO|H)@O0#b}Bk zNtw!2DvQ;qBzK9BPl^K^?9pkFfv!ZtkLHk4v}j^hsdOd?HR}-Af}kG~N1H0TZAtFf z>4UGc2we3ecLMen)ib`Mu;e!~7E&)XT`V%>6YVjSpjA(qvMz_75dE{ld|1yqhX8?K z2=1Q(K`z!m{Ivhl&`3!ehy?_yp=U5Gazb@Ld^JUp#{DEF+m>y!cj)&?#?>!QJVL<; zNp8=qQY={_u^4Q2OPe^zga!4v{{F0U1Wp^EB4 zV&&gosi|0tT4+AI>J$S9#swG77rM}wLwRzL$W=<#ZJUE|Un?o{QDx|ur?GxXtUVY~ zv`Fnc$sgTEIwZ$(*2?Twrc&!9qzkW~kmPmI$AwVB^;srGM8bW^tJbLR}oD>}_f{#V#oxw7Q98#qukDiCl%R>SLIT+lL0f$QT-;=ag zr$5L=M?i)yG&|PnY$72PIxL}I#W{;24L_E|Bbb$lFhfwMvy*2>0&PSaw7CieN)7M4 zj#pk{dg~C4fx>}a5T;h|@7zn8KIoPg{w+*usux95ARMEYJRP5?jDa9pN1ZL8yea<1SfLR$dE63y-#}2rw0aBpBaDTm>y60T<`&-AzpW*SutIwPykVZc0&cb4hgxNW5Uppks((4k}pe*BhC5jeSJ_G&PTqT z!Q|<6)%f?%Qw@!Fsnidiui=<;*pb>RWL3p1 z3cLees5hGtXxRieuCY8VB=B@(va!yP^AU=Yc@}r>nvKcGa@VEPC$l!_yK918K&s;X zkS!|GB@}XWl)BCfU#qYu1KKW_Zw?;dV@<6Sa#vDpv442!@wmCl5FbmYqvVF4Aqy_S z&p0bP{`%J3MVDXT#s}E;xNe-suoXH# zOEM&RqN4<$TLiwF0KAPfxtk2R2vZjD@0SGwc@J*2xD#7sJBQgH4X zm>8^a$vM8lWNUiy^iTzmiGksS3xx)uMT^5p5$Y!w7vO|xw})Z#4lDI_*&DOc;ut_< zK@lX*TXhU>BiSx19)geF7cRCw?azhgW0GUKjk{fV0ktaRwD-L$R+JuiHL0gs<^LOEV-w<}AMQMXf>Z7@wZ+i(=OTBbJ~W zgA-FmZ=hHErE*iqWaQ$mWyU-iCnBwzzjT=tY-aWhIq$X9Y+yN)HYH$CrQt`;-FA-( zJ_v#M;+%T<_O@r%r0`&dvxn9=MM&9knG!y%&1~IJWgoL&Yu5$uk-SDe>nL5u{gx6~ zaFoFXPNok+w6u#FXj6$6(onAQL4ysih;zNUAj1+5W^gh+pyW8o!x{Z%LlCvC)0HP* z!|xYzdtmlr=w)e~i}P~eJf3*}#M+*BnFt@Jby92@q|T4@cat< z%2fBUuKR$xs_2C?vG>1Su$iE~Uw3CHa({Oam2!ZA~B3l$?U4@#q8)p=3TPH0_y*Tr$AZC zXHBb>E$qUDTdU!SV3nMNdtYg&rk^mta1W-`U-vbnUnzp(;(HrI81uJDS3UC&^FNX- zsAt$K+%}hvZn0*}3G5nRZvcmQsy!Q_N-#m|(nco66@7W>% zK##4Qo4b)Luf{6nqqzD!J=$K?QI{n(njiZ*B>p(x+{G82XFPb1)Z?#g9P|A@Ko1@N zD^iGBT0Qb76k?L#LG$oA3UZL_yz~)4fG=x zg@dkw8!3s4K7qm~A@Bq&2IGtcbNzHDG%OYP8V~5%g98Kj!5|upib!V$iF+{9ng@U| z>*EZtPL;sPB@@misN`BxS;XfdhmMTu?W)P3X-^cPe|uXdLlARqNg2JLoGfdw{HUpA z&bb&Zo)VyVKv8xQ;D&xO*Y~%dCs=Du@MQ5ieP4_GZcTE7M*6t>o9G*_cizMXjj*+9 zo}$kv-p7rqfF{J@+@R@~>#I856cVZwrTExNoI&pgm=MOBxjx4~#+cb#X=-W;v$0A> zycudz4cU^48W|Mi5&P#&0j0>6EdnSa-|c<(ccboKi>M5{%!izbAdA4^HYvyhm-(Oc zR}^d*;Flw2ZhYGI2OcAZwN6@ySd8_OH%;wZz>OG5-KS&O#s-seD{8mvcxZ@!H%es-lL1q0rPTsQKW`c~(BtQSuSXJp0`<<7El)UrC3*%^8L1!=^P2;#P(E`c zp6LB;?6SS54{jC?>$Sfq0^AkGZ5eT)C*sWW0qW?JQCQztfF%paMo-v;QPShRp~fl{ zXlsJhA3^VtvL8ri;~~MsT%~yoz~wtqK~L_a+qOG2qx`4uLg>9WF&XSH-+?im%+cq@ z`n+k_O@s7dUzbf-ZZfC$NP`XcX_Bep$)deQhvz%|f@*97sse-iL-7*L6 z>LQ4eZdGceugL;TFAKHhZx4?;sxN!5i5q*-mKpiD=g8ee1)lgId2#A ze>UX)DOLc0hBJSCNdFGc06wI%_u$81;TiKmVzcdjHz^?u$C6t|qRcu5HA{q#XZgGr zwI8)G%>(kH&+8?UmdCIWXs>bQ54gb|;GEmin(!cak~fd?ST@Fll^?*O)%$a#6%%1} zhC)t!Bc+I|l-)oI!&`$mNZX4HB}7(lz_b$8{ra1NCXmt?@o`k~l8kKlb8|-PaPC}q zgS6*5bqX(wkJYg)uui;%TFU1hEawvwHRp(CVKWYjj7IS}-YHEV5(XzvNqskbNrbE} zCM_cjW5^~G#GZ!{$EDa589R z7c_Em0~UYl5)#PK+^A9%UP_;|SUJ!_SN_BxqLHrT5xlvgzk8T_H|1YD|pTIlf#F5(n19(UCEzcq=p&4CoaMao7Ss%AL zOqma?&=lPVdf8fi0}Z~5QwrYzr~e&4I%pD>lM^bCh2nYm3wp;0#A7TkZCGcmWsU!Z zNkXiqCX^ud5CWk933QkyPf|DmOHCIsyz+3`GWd7|pndiOxQ)-C@UiOYUI~x{L~x?6 zUW5azg%5p9k!z;Gru%hYjU*wGS0e2l_v2hpYaKc;r&>Is?CD_zl=4T#mNRs|iYme0 zOloHyw9(SX(TTzvtAOc(;l362oF~@04~{ht*NMuLwJfNLXDIi*Xt-Z1GS(gI64gAr z`MZvkb7jz`K590{#N_=k;_OmCFhIea1frLGZt7rcQ$_}b*yc=>=bnB(&jZWz`eHuF zdStONo4p{XU@u6aWVxg4DKg3R!-aG~BBRNK9*%BC0@i~Idi50{!W_(Y|LE4ycA#qM zAO~#R87iZB9b)Ang)zM*R=s$;rQkQI_gi4LY~T#aRSh@f_H49 zgzg%;$lZGtpVn0>s*t+0_>#Gr+E963?xx|U$B#}`w2xMD2u0SA0+Y`qQv>f>9%>#S z6NRHFF;TQ0G`?lL6EJvP;Ib!$s`tuyMsnlk{+W94N7g_la{b^nHQ;ocq7o#)Y>z&?i=@yt{zuAOrLrS*N5HUb z1*oY$`kxIpZdT6U*H9Y69^DbOp4+)&F+kV_;J}3uwgCsOS|PsBTa>nY{tKrnQOpq> zbm;h#xmQ14`ZrYLxwYPx3JY6xwz6UDzfvhRDnoY}`DPqdKGMBAbIH#aBI@JkC6KN1 zy<2+yv32+XoH?iW@jwe5Yqy|5(mUTPYB87WBXXNCBp0rOcakaiOmttin;M7+p}3{P z%7ns*$CZ{oAp(3u2FKWIF=tkLtLVo+PGiKigQ*XTC%R7L$La_X)V+qudvNlx_I5dcLV~J&Plr_V@%cNk&3A>=*pl zGBvm&BA1-p%oedliXYnUq_wGrF0-jV)zK}Zl5A1Lytda2w|hTGBWdOAygv9VozU6g+%7hQ)pmvs1Eb4LZB6%Yt_d9r6d8S??;07a?spiu}U7o#gsVDcd zagep`U2@%q{Y?hZSZPk#-p6(b#Jh0`yu0?SuC-EGy)@4GWaVuwf4NwNbbfN}^MI1M zoL28ST|j0tnB@7x)z7%0exgRPnn~>6U-&V2fxYTmR2TiG{_t!B2|R*6S6;a`1+r#S zf#-L+Ebu$|efi;=@6{y(o?H2J+*}+y)4Uv0ygb?*9F1H&^;`{F)fymAOmsI)jcQj+ z^dnRa^az;fvNEEIXFzc4J}C- z7kRWHypB3DhQOqW6z7$t4*&BN#xgK@Z(BOSPrH77iD=S!V2B|U;V!c zgRe}|lHa%cM%?WckiKX1dSZ2kAGt=hZmDGHNmM{g-sfD|#g!desS(2w^%eq}(Q}C= znbeFVywH05xw_L0P?THQ9HF1S4bPPspNJ@r5w0GQHmv@VtH&~hv^g70+#GamF4EuK z`GDEBAdhNsrzUKi1r_l-d3&qerwx-+{g(u2uX5{cDlMe)8<$rus8R90H&&D9=oF5? zx7CUWeHWe{p!HH!8Ot-S^{6P+bl_!SZln)GF*TTay0EvE@~>UmW(X}X1P zRPJ(AP^toe$NG9nak54c5mR@XnD{V}3;F77)r28_Cuat;Qu6^>QB} zfP8Z>`n#K!M)1J>-arJY`pvW~A@*QBtZsuo8S$4_FDePw_#4iQ%yGi)9od)A)yb{J zBA7b$-aMfk!Vf5ly;fq1bkYds^XE&Y1VpQ6j2N=R%A0+mR0zKW;l{MBoLX(>xcI-yrh)W6vNp4uU$PG$+UduMB&B z?-{^r|NaODldkE)o?EZ|YtMlFpAb$?K^}fVUao)NGt4Yq&220l|G#&Pr!I-m5N^7n z8DPf{B>d<5{Gmk%Lpaqnx&C(heX3@LU{f#T6`!0yQE}QqRfMG&*;&uR!h>uRL>)M} z9`^}RpBKf2@B9T)n=_+%ahaalI)#+~Ie6qbH@tPY4P)|DDu!}elGntqK&~YmK*Y-&}NP zVui*xR^cIyFP<%N%TuPG3RkYI43ku|0Nxs+LtjSJ)U&|DDEv>2cRTsnir$TFdQW*6 z8U@eFvKVK;9cuc$-MArOk0Boc3y!Ojxp%#`ceLllq+B%MhYc zzfe&(jYM5#5rq9Q%yB?CpJl4<69}I@=Q;LA#9n<$*}AiL4Hiqpsrhk~a3BI*LSE=4 z==IpQ_3${3hD0&0tA^Sf%Fl1Of}bGi_xT@B#HulOJ*FzAnd{dU9^M4u>7`kNhBe_@-u(Bet#><58q774Hs7j@aR+t}ba>%DZ+zi?aF^it8HReQ zix868d#Y3;GF*#3{!imt;;iXl7U!&ZhaANq*_m2TshE59fin?p40$3jr|M;Tv{5cgi?>*Pm z-V)ZkwO&)6FFVa~;D;Ta;m;yMx;@8Uwq-IoJwR(%%=}KP%a7)o1;nR*EDgpbUC23v zi%|Wrog;RfCGzsftXr?gl`-4moHc3Iv-P}n$-?zw|Jb($y>s73USe#4Q%~G-{>&6HVRTLlHLh!b zJgA+i0#AlT-Oy{J4_=UPH#y8)+kB>5pUh-%`9cKIoLAa26(3mKwL=^raY4mePp z-GQin$=pqWw;m5b1Ol^$Iym|y0;{tsRD(w{oYU%{`pep^^X=`dFmK9Zwk$9$SL375 z2sPcp(aoZqLg2r&(PIbmCrD(z$6j6VLLO8) z)Ku|0&d`6v$DT>n@4+u->?^Cr;#vP@h$^9`_ec8<8A7Cy({vk34K>9zn+hO_8^caEX_D??b z=U6EWP>VnDSGc;5(n`fc%jPfGA>z2eN3G0sAGu?EJuo=!-9%P{c7MrC`$xAr+C|62 zI^~RV9>%DAB`)pquC}KO56Xpw4UG=4QJ=aBkdbMTso73At+NupBeX&_9xAvq=dV6T zW_gAG+Ra2owU*|TkNLRn(WlJ$eW4%c0dDS+7g!Um3$3hoLv=CCUC8LUG;`pL&k@Oxr-mr#L9~`LypY*D9L7SRPkpDZqt;)E-P_XF- zFyZ)vu$W=D^pjN?p*k%2H#$>b8Vrv#b+CN%I=R7K{EiI9Fs3Op7u)bhg#_@7f&|By z02Rjb-7)nC>kGnYpN|yp@41Zc;AADGrMS(n%#L{y;PCUJ=sUq1zz4+8f~-mGFReAJnqRIg&$9RoyjvlXdy{_pM@GU=S)hquW^t z{2;_`{~&%hWAtc5^)P5fZ~q`*B7j2J#r+)p2%g4N6@_nse$1E;hk4V<84*wckS5uj z?N8(3Tc#+?`v5WkyYljZTKsQ$l~|I5n?^J$%8XIP-+i2NK01zGUVi&REY`9)Qh{8F z{6JXm8)~)gT36H8Q(0s9*lDg&w%oOO)k?D)8&>4Yi zPXDB80ffnw{&pl@xPWaNi06ibt?N)KY;R|3s&O_$&revnK) z)x_bu#atk(9JBi3lz#&ihfaccq*9nQ7y{PO8<19eX~&J>e;$2+->-AR*Dr_=+axdq zr~VnM$F>>+?zPK^D*One3KZG$b6Z1na>QMv4w4anM29!`<~h%htT0U$RyY^U4lxuq zD>Z8{*U3JZD9~X_!p*NvwF7oa=m}x#CT*1+E#0T0*~K&>UTOyQmVu9hFP5DLHDi-2 z9~$rm4*xAD142mA_NV-{qc2PCO?12_y6;^5`(8T@Wdm%#XCpz4;x zX7#K>pd=_^!Q+5(On((^Rz%5fI+@KVS#13YiAh*!@Xce`GnWDRsFm&uTo)LIzNh#gPym!(`Sx=EEi2IL5!Z7Y6Te;hl*ylf1k^7V*@3`( zYXn>C^NaccK~CEF4>4@lA!}?s{g&Dnted(JgT=1!+g=v`l6)#fl5I%(va4ah4PD_ zwpzS~jz{RsYLBr-!kf(@T5p36yu}^$Kq+4qY}=YvJzK#75+?xD22*NAoqbh2y~nI+ z_M>bDI8;j+v1!49hz^tQSr52$wJMms%+IV9g_joyw7tY-nn9WDr7bmyK|linL+Xdw zFj79l#hy`R^mn`010jFM5}>P%3|C*1e4b7kIFNp zDc@dP9es&%@cMqdQss>cICUA9AFtXoVJ~sK5J97Gn&I$w_NMatLuarq@DUnIX{7|q zf%>mf|8BL-5=rXSvP#}AbhkXqqLRqJ^Aw&I~Dz%zgHcKO3ct3d;Sz}G9a^vug}b)2HnJjST3#o;}jv!bA+h>myRUO0H8SjdQ@943E=l_&)T zrc4dbxk)%Mcvree+(dG&4^yc30dA3DbHQ&p(Y3kcsWskfWZR;2n@V9;YYG~PZE*TP zy7wDb(U1IX=i7&j%p>zVWhfI*-0di7p$I&ZD~yc2j1wd!?~ZEeN{8DAEkkJoGt6Fu zeHrFg4cVLQeS+Qd4y;w291tWi+ytJ`7;!O#UbVbu=2y|90a5AvE%It(ULYTu3`^kse^5|15oE zw*dqY!;*n6T0R9s;v6vb$_uP3(<+ASt&JC<{Vj_jc=R-U=?yNR^oua=uNsNTvwdj}uzw_W=I%(_sJgM2M3?Y@*PA9wS8%+GR{rLBQma>_qzR zoLEGiK~Jo{K9WXXHeyPsf}HO@?zOZRc=D!JBpaCE5CgNC&a$PC)3vnRJMur{qH@(T zUYp+Ye_N%ekYB(OTbhLGQU&`@kkkeXVjvgRGT^Q zq{$xa+KX$CkJPYwAhTSah#YTYE8tt3CWpEZO3zEZ6_QqP1{uel&vRm90YGf}GEtuoT^ZG`IiRV)+wi|YHEq0y@1t8w84R}zFOP->qF|q& zfzIef1(ciB!ee)CMLG{2Yx)Msw~=VeWd$$c7w@Grx=5=D(#V(| zNQC#_lXV@SdzZK@=g+x9h8<7@fWf-E5;S0(QEG^>Q14>`?&e6$9_;3qL_ zC*Jproba$LpezA z*{smy58wrbG`;5&>;$RD$*j?gO4Kd(>3R<)LNF0cI%1X&Tz;&4Pif|;p-g7~qx^HhR|zLw?G0G2`>38YY) z^d+qw`uA;6YMf0!I44=%$^ue?2I$q$-H}XGqetKx5TkK|10fhzo=A+r4yscFvlq`z zk)}nY!M<$ky3=vr?n++|jr16A;d3T!EUELoj}=!k2@=zM5<(I~h|&TA(hvm8kV`@0 zGH~@s@G~8_wKJh_iabqwaMaR0zoR0}bs*SLBATY(e}vP_)lVA9OhC^Pp*y|?!XdLH z(r6D!6$@NErB=1Mk(|nN?&8i`sN&^?Xo8sZbD&SrY1RVKiH>>4f`3RC zlcoj8m-Uws06vmIrLs;NwU|Lh2B{c?NAif{b2`mty+$UlZ^rb2lba^DcyeRVfwdcp zB2leS;VTKh59(G@UJDnc`T&QvoOcUloK9s@0Mr*`UsOj_))l$6TBYI9HZnb)fqK?2 z6H8-K_I7AhbU5gS5_ERf|HqJHU0?!AD56nb3KUxYR-ylJ9qGN2*P{=S|L;QoA!JE- zr;s}&n$m2`#N_el3mkCqMk#^ij7KtUj&jlfoA{Q^){+-wtP=LcE(E^V7W>N0N_>6u z4bPTS`?k(EZHYwbpmjS7x{qNAeM>;pn=cUc22ib*mLtf9Ggh=<$loCUk^SZY;^4KP zE>IxD5%33IA%eBgRTSnCf}Gj58(1E15=dTh0T@uXqf*vZz?_FSWI;=XG?Mrsd2~Ki!OVC5LCG*y8iuicI&5Yd`!`BC#$o35{w}dQcA3`}PU#4-e8T z98|A(O5wlj4GXjW8$Sv8KTl}8&z0i?j+Fd+9g%pFO%o% z`_OQ?0Mz^2f#uJ71K8$8%f6O`W&b`fO03cmCnR&Zp=OYX|!MgcFa)L#*sAzPzP(L7cSFS5oqutx{C^hwzIQ%8(x&2on&QG;`cAirJ+tiiBBVT*6+hx_M(wIl=NFhtZn9#g45pKX z{$&obA(n6-Y1L|VxHd%J)NUn~O8}c#EshYZ=FVAko89eVkpARmAg&*VV~Hfn=>Tq|CYe z41o1SbbR}uLtcT)^wlS=3zi*es6<6`J-G0-wZ5>YXY*-G1Vets0ptTt^%&J_mpG!Y zMwrKBMd56X@n_ZPTd1};SNl7F^l885_|BhO`4qG;ID;3~Tf2Qq`$I#Zr=h6Fz@YeF z75_7JCDw*7TW`TRK+ZRDN*E`oC6+}BfYGlF`h`G3X3<9M59bk4Tui+ zsr7*)%hb_drTLLX+-s>_&o9&`nZ8UhEzHM$Z?plCh|_m96UL2xaezfv zqb&sQx+6I5Y^IEh06!eS26RmDAa|j}ea$G7o-cUEVEzr?DZ+*6;A6GdSR)`62%6=& ztv{!*D#J%_)cy&=F7uQ3xt9}?+~1VsMLNEMY?Z*IIShc`+g80`FCE16pnmSL4{%g7 zp+%IYqtP}(jC~Y_x7ic;Bk!FKm0YcWw%!)Q3(ZA+%BOA22mY8ru5CJOR<>2o-aU0s z-s}~=O6Sq;*n{S~B#KhsKleB&+pEe>$0nk|9H_YmLPpaLx{p}1U$qi3nrW~I0IIgRM zn5H!ckP7CG08LOl!0KRh+CYM_IvP53MjFOWs%3iz3Y#FG%IzLr{l&0Tp?s@Q(TwGM z#b*tbjnR5)dl`W|iyM!l#@&Ad-YhZX*t?VOTf2^Cni&B9h6W-laR+b)Z^dzMiGISC z6|$9t)K6rT*k#~?oUz}#WHYc(z?K~;2%4IN8VF5w;S0HhQXo7e5~00h-+&d+}-`GjqqK}x^@;e+=hk|M`2 zJ7XFAhm7)6;HfhWoCT+)0^jzkZ4=;6a)9UR_0e9ikq*+?yh)tK!+}4~XsZ%4&<{F` ze!2fwk$-p5tPoZ7=m(T<7dhr9it=yFX#Dlae-^gMf2c|}+GY0pE1E!1oWphcc^_h0={=~2%3Q9F zSyvW}qt<{m(pzgOK862YUB7|2;HNl-F_%cBb~!zQaI)3Mxw^UK=!z!3 z>x^k-F(DPnRtfv7hvmK%-_e={{Ci8n`WN7LC~}%WstqY%`5FlKtBz9r8grLNJliO+ zwjymx7I1fwp@byvd#0d(3r*U}KHD7!6W}GAg`6-C`qg9{Ne=rMAr9Y7!?TnqD=wO< z3uk$m;!L&!9aAhK&5zC%Oq|i2{n=EJn1y=r z9GOG`b@uv)Qk9RD>vs!nPfJy=m|XS0>--N#M=j)UFs0zn#XPz*KED{#Cz}OCdXBJj zU$v9e(z32u+_m;f{#4HMDv_l;zftPSx3pjnFm&vQWitLhwyr85%68on0}S0rcXtX% z4w54=qzoY-DIp;tAkrx)EhW;8(%ndhbP6KfpdyIW`NqA^FY@mj?uYfgwVoA^yMR?1 z{-F9NN+c_goz>bppy&4tmw?^%6XJ1&(~(Y(<9-Zc$+gws?d>bnn13`4g{FJTun2h97*jG6TFqvu8g_e#$M=4$AT?d1+ZKo4=pOeSs{LvY;y4aH2!_%9uQubqWe2X_V0XxWz$j6Gg9UO*7TxDb6j=bK6_r>_u==-3oyS?U^`4k?irC#JS( zsWhnHWK$$zKqmhTk9LLdK3|9+T#+765kKr_O&US`fRZTn`4_Qet9S?@`od9~3j3?- z0=9Hy>h7#Q5pCo1_{q{ok!vA`4}!&s5P+k>aZ&S_QgyjsM*2n z0oEFE$k?>9dD2Q6Tkm^e+_|4Zl|7w0Fvemya%Do=SgqSq>!s#Zrls=TZtwMpbuL_q zsI=UnzMYBfk)SV9*6OF`zY_(XKN|R%8*EwpdX#v&v03|*bQ2cNGW%JWdpqSE7c{|od#blL2dCcL0k^IxC?123Q+@W0M1Zl3>94>*5Y(SgRD zNTbcHb$9UUN+=9i$;_`55D8ihi_FC~#Le~t(+(64v~OwMFSUWUGn)Phzx+po7F5M- zU-t2ZMKE3_<%+?}3=wj`0AiF`8`m0OOR0OXz-aBW3=RmaiOEAnXE=k*B(A+{l0`UV z_Z`)ryTzGMmqzZiq!P7R$V1+U;F^}@Ju7cCu)Wauph-K9CM?Z_rA4*pjRhfw^! z&K-QMGfivFwg9s7IyTTOU$iTAJshCV(XldI8_)BMA&ut&4ptIHEznx{C|-}1!OL>c z8fFk=QtB=N#B!1SurfbbTzLK?dB5JIfc;%dpvsk`pGMUq+}qYq9F|vI*JP|78R?>* zZTdbs8>)z#Zgq^lvL>93b34GCh&|AFzfOj*YdPyISgGnSF5_b{&T2<|pn&V#H`^#ZS~+ z9Bc*<6%|+8Q?{+O491J7_y@YK)T3%*Z3vxokCijfH;-1ghd`b(f>HG!@GU3N1GUMb zE57|yQW+1)netfYGN_YTRwu;rDM?<%$m=kv`4)X}QiaG#=Z^g7m`cK&5H{EV%UbbF zEVH*8Y~B+x8^|aDMaa*Vef|+T{IjhMr5O~4e zaBB18?~bt7f(-#8#rQLFKvAWifzx@4)+`N=@&fr0U4Jqpc`u%_`yhTGaaw6#My>1_ zj>|#v-k>J?75lehE^j=s2xky?Zfc2)WBo~$_>0CB_xY@AZoL)p1*lZIuVB*ug7^6OOIrd=vj6eY_N^kkv>@G#4ySGG{5&9T>Fmt@h48@rt;a0K zDh(VJ4lxlq%IWxP1DUE3p*?5jK;ZjO(UZFi{(8`9wzrZLr|3y(orvyFMI+}LAVdo% zEgdprOkDK6DAD?NR7+Iie_qmM>4bQep4`3+A8vKtxoS;YAhmulN^$;Bf!ORWq0whl zN}yp5oa=A^w4(C^V~;Y#BxEJFgLwTVlsTR;aiuac%n^p)6k-+MhyI%}sT34o*978} zlF@@<*(kg#ul&#US((zt;LlEOi#`)iY#Hl z+PIdQxvA(*r$wqH{n?~X@qN}5?O${3)OS7q6hA^DLmVo};d!L|V3i+9@6M4}x*Bb> zDtN%SFZ*@jlUt9LzpalJlYF9FJ@v+Xel1#QMSKxjZm@Wg3*f7IV+mg?7KAVA!da_y zZ{nMq@Mq2;%Z!6r^?S|%&E3bPZHp)$T@tp{FbORp;-s0^0_>P?yRWX2`?T~Pk3Edb zS7|7nc?YcoYFLhYPA&urk9$_yeTZHfIS`=F9&vl>o)hzrcC%(nKo=H1TXLzkv`Mx~ z(tL81dQ2%Dpq1gvK-=byn>4UFG;u^996i*h_`3wuHLd;L3>t|*zz$wO#I9b%d1zli z+C$ypZ;)&XbXm)k#k0JC3hR((%I_4~=wy&n76C?E7u|9g>|R(B3L^qBd|?(S0@^_Z z;L!~tn;Nr&rX1~ccVZWuTGx5^_DQnQ%t5P;ZIWP4qv`Y~VPU5Hf*Yl-qgu`!)`k&T zIW;fjP{qK{O-dD$%`2v3dCLk5*N{GOg^v0x_a_bWw1hFmzJz+fahMVGm%5~N8`)tf$Tlrk0<-2 z&a1ZmBmEU-qoK<(elfRiZ-2_4`0-s^u)XP%>Efcv$t|e)uL@+2Aa4BQj&Dw59Qm7M zEC;e2BglS{HaSSHQB@D*yjc0Q2$|~Mnd!y2D$Wqb4Z7$N4=?!FX;1kWQ+<<71m&Q5 zdo$yI@fWa`vuwLWpLiekYt9CldxlZ+I`;UV#(|sz7Y^Xq}&$DFk!|y9J^_1O|+qL_8KN7y}d zZQCd@crMWz-saPSNb$RLGu~m6MlS|TBtWiWsVL$_N&BVCaIugr&5=dk_QBVUd3c$I zmpv5(54L5#0USwA<*W=$=paHaNyA{>SknV_)$GD+oo>B%QaIE1+T9GY45cCXUj7z9 z{qMj$0QEltG}~ADaMt_!H&HLW=9+I~#op)b^-*i8Lnl56R?kGF|JxjG@x-dZ+@Zv3 z%6^^C{C!)JS?9$T>=zQ`=Z$F(o}5H0@%1eK(3d}58Sm_CPF%=)NW+eH$4hS)m4Ew_ z+V-zwRyfjrB2tK|1LgRAT;*X)w;JR$sdf%zntWV(YO5e~&9n$?l*|NOViSV7nVqBy z#+bL{oyqUMyyfrX+*lf_MU}Xs#P^3L;!{u1QJBA?Y3J)V8%-BSDe6YC)e}LEj`usq zn+)t_A5A)=I3bD0KugxaK8^G)dY|WjoPZh5^b#}dA!k|T*95e~s1YKu3_mjmTvc+Y zHbZqKHu79T^d-t209Q00dNN$rEOOwIlTq$x2QTBNzr?~K9v2Ws0i$wVc= zHNvP<$RxH_ibE*<9GX2Yt(%4S`TZ;K2N+n#tLUrwH)Tv%(Gx5;9brF)u^VfU*ifp4 z>V#0D-&@6a^4vn-wU)gw`bxJkwi(aqTrgbBroHZV{^p02DaS(Z&mV(LN&~4DkKKL- z4mFu;HBKTw6`8(1u@ql{I_lA4Al_a2f9>P|%-49aF*v+fz~Cm#h;W4ezk+tI{#(J3|NuA5~$GZZ=RWYgF}WD44PJ3{k~Ib|z*vg`M;)Mw?okqQ{@0ZAwhk zn<1R)hstM3PBrJRY8yer61Y!!)j=KN3RE*xf-jIX`NKGXf~1~0GwfkDrEVk}v^9?y zm+*L_=5!JL}k_@wm{GG-Ey+GS`^Ki;H&)JYfj%4@m1)I zI{QQg0D9z2(EspcaArd|>#u)-o`AT4|2IrQmif7y%^wL8VwTyCIKJ5mY;}aKI2n+! zeZ8K4w_=Todq{j{P1QB;6ML{CJg4Ls`t1Uycy<>~d%;D-euSQR-|e;hdxK{viro!1 zhj06C5(Gsf-%89zP2ZC=J#4i_Tke0?voG zD5&{dii|1O?6N$EVqt{M1*Tyc9bL^Jw+HH%ScCeSv*)l5D#G-v`*M`pdbXBEXD`6s z$+3YwuVCX9@i1_K1cnWWEuDk(W9t)Pzl@GqeJ7L1@8TQ~Zwy=33+FI4j*hcQ-gld06h?$YCu2C{@0> zVSUaA^FjfpLY%nZo9i+6ks#w=FYYyH0%gB7V!7YFiToetY}U;Po`28i=5j~$=K=9W zp$Fa(yU1AKXKaT1G`kfq@!UO#SOna5GsL(6XN3cM&d#b04%UzYom{I%MOd6G;o0Xq z5%=L0!^@WO3Xby^XYO>C^B2!It{B6$_y`Pig;kD<*4RufN?zQ#Dpd9HWqZt@iiwzh zdStHpDWL8J6Vd0?1~nOyRG^l&^CRKQV@K`zU>9-gIy*sze_1hV-Qw% z33UW2YHakt7Y>KV7$p=W5SVoQk#mTs1v5+IaAn@CZrrkv&L3Fp+{4%)r?7a>22g>il zV%Nt)ms`aG!2RQMp(wqTs;W}WcRCgYL}Qqq1){C#7ZzbTT`G`s#50o?rHATkVZKJN z@n5(LgQ8Gmrm;fmLvKsH)#Y5t-t}%XI_1IpTq*qXj>s{)+tZ6qq@Yv%v8A(h;~!ry zFBP9%yTGl8uR~KBA6>o&K>u5D2<-9KxV0W*IO`kZe}Vp&2F;Ib=AW{GKUrjcd8OOb zl4^2T)ZhA!ujX0t0Ly0s8*ayfH1ybvdN=U(-Ak|Dzzg6kAN3)-$Rm*g&hn>v%QXC( z3k+^gyopVa-DQwMC1o0z2-qjkGvh3&d>E?ArBz*MdQ=|`!D{G>p^0n*U^YZF*^27} zIYHtY5V9JJE2=NEQKALpL$Qd89&}(WXED;YkPEgLG*&Fj`@)vTHJGB@48|T#wbIcx zImZi}>Fk*##1MFns4+%?>Z~CB2?>asFOofHLRV{kz47FHS+Q04P&HZ0OdjHC-asp~ z&!$86Mtjn9XfWU#dVDF`L_oHRyyx9}PUyvEMyWQ~A=C^VQH&?uS|>04npD1g8paHC z(RXNjUh?_X-R0*jUzlUGN0PpgQLd@ZA>9_+23}>WrJ8t6?%^D|obYMCoot|TuR=9Y zl~gQ|4LwN9YW8X5I|j`0cjLG{wDX(3QH{A(G~CL@R7ZUCk-t2XD69o={DNJ1zw(6) zHoi3yNvqp22bxs^#jw{z3+en08yltn;#oGJiigjf|K~1$ja?%*f#>Z%xCwhy;`LqL z>G}WK<+Vu)9R#g%l!Jn0q&_xz1}axROHglRUf8YNlP2wx_LLww2xXj=0rv1tyV>`g zvw;Gparc>IkmIB!s~q+ZK9HLF08wQ_MQ(Q|1N5Nx**-1-x-?93F`B@#GX*h{uJSs1 zf;-05vuI{-TBByQNRv5$3Ae0H?{N{cZ}1?vyujiXPwAK&Ze590o;?_P(115mS7a$$ zu+NUm7R8NFDlvjqo~fq+(HT}8w3zaHZN5BjKeF3R6kw!-h`wg#>SCjc5*IvAT#|Cl zr2;;cf{^2-WYNrD@P7WEU+A#E$;#&Kf(6Nc5O4$^W;pEe(@Hy|>y%dgtg@yzkxxieL!_DqpQJHTXJ{>7=C~qK&C$Y}<5Y>TdtS2Qk*3ks>Z0Y+ zct>;Q!heo`ZxR(Ee3bZ6>&lRA>tP(vZ%M;W&C_|ZzI7nWY{P^FDz&q#@0PJ`pnJgU zIr#jlZ2BUukRpQxnGzUe=;P#D zxLFP>ST>PNU(OJ7sH!h)C6TlfRIq}pf!jdcC|f@&E^c%bgDX)bF{>EdIcgy`;ovxi|BclPh9(BUf9 zt#jz2eXb+}1Pxe;i7Clp;t55q*vqVp_`IRmq9_}EA{bw{USo(3JU|GQ&Yxp?=+iE8 z>28ENH)ZYgdJI0;-uZESE!}(tvISi}m!5bD0PgFeP-~y7_*yzMB)ybhpLsT3Zl@Aks z9Yp7(3eG1!N{{dBDgPy@r{Y;s6nDjf68wMxD1fM3HGVI3YQs~2m*nz7!@RA&H%d= zw>9DpCTRhgfl^3$=2642AuS|>@*#dusK|tplkeMsxE~GM@7zHU=)J8_p+F*ePBAVV{T6GJgkcj?zxK-A*|YO| zm>OSFC5Q{=^Q)JhGi?{9KYM|wrnqnMXp8RJ6I^^7dXOdEmjj>*zHwQ**3$;ZHHWjV zJiLi2FcbTuOj4H3tZMccI^7Dm9OBz5zmU}Gwa3?$d z3VYa?aoS!M^9-8f*|Lubs1ZonLA~Jl4;6mrsqQi{Kl!H8_VHJSdeoc~B!EB%^ed19 zi2g?~BEeo1B*$0G+X5WmysE?CtwCiu1h;PU#zk;AMkT5+_;Gt+*+Z%ng1(1JI}*c2 zeKwHo?u^D%E~Y*)bWb_0PsHg2Y2~>6&Z9Aym> zD~RNBct@x_2PdE?%dx{J5M9CNDByVYwWJQMgoT=AZ%Kwg=KHp+lQ@;?XH?FWT=OB> zjBV}=vIhjb?{YH+$6rrB6HQ~9j$1YFO?)A_);Ub}@y%)c3p77LiRN^aMia%9GTuE?`zYy&9wCmmCP9SU;yGIqw>9&I(J@!RvFmwkW! zslInv<`s)a3(p&I>@{hl`tJ)eF95EbWdTxKOdLYR*YS(Y1EzlV2)6JI^5kc z%ewC~a`x;cSme`U&aL0+lRVZ~^sB94L==@ZsDpVf<_#f~>Q-KzeNOU9;zxQGc5Ax& zCyWIW@6f^Y7OVI4Sqj*5h4_PS!Wk{D zc0>VnOazVr#lz;2d?@$80jpYGZ^{`3QAV@%FT?d~nN5izUGDPj(xXgRpshLXK!wf+ z#~d6L!{@?VFn~J}G}G0gPRjI{3+$pHn?Zw{vAnk#niDT$#c$@QLIEM)O-DhOD<~G& z*{XVcXOky>fRZ0QPm#_EoB>le!~sv*xnd0TXXJ=?#Zk(UiDn0BqU`E>i~S5R>w;|` zQ4T7}O0lT2ney?=Cq_!HE=m|YU>^TmCF8QC9y^xItklBo7gg52dRuWTk{EO~_j*{q zyryhp<(JguwF4LEG4Eb&8}6uZ0XDX0ThZ%UGV&>`+XPp zLagcSg;x_p7c_5?61DwgGnY}y>@yqvM^f4eEp+=_tWm|b(5&M&=Ff5DHZ5i=gyg8a zX)5oSkp)o;Cyd}e4OYeU4UPm$7c>9h+)|rH=G3lvAW&G_2xS*JOD8O6BruRe)9-xF z%dz$0?Y+UTJjiSK=`OUeE9Fx!s1lMtOD%_K{M&>QyS7u;Q;w+7;V4M(07m+CT6ZoAhe(aLUu#!0)?1N7dd@OZqt`0yTsFFsGN?PU zYBE$gfR&9^*~985Cz5m9wDobpRdfg1;^&CSJEt-)oSvguE_P0&1i~%_`kIus=tGdp zq91RcHxD-5>RRh4o!Hsfqq@F(??EHa?+_t$#JD$+zQ(K}Tf_6Ft^S4de=ObqEdaY# z4+Z~EJ(Lho09Fx&+3oZ&e7q*mw?f9(q)Bq92yQS`!Kkt^P-2wlS)uws@5fG&dLp1X zv%AvH7^z%TSHp)wC+&^Dm2^p%3jV^kY?x0ykI*)Ha(kr&(exIAoOFd$vh8L3RszUm z8Mn3$0=nGb1mEqEE+p@k#RwLF0hR>=M-KARMQ(Kz-XF$nG|VVAic}D|!u@XUr*XQ_ z_PwkYU>;5W0~;FB=Py{Q&@+*lb=%vO+&rE;+u#v!hI{%L!FVM(pRJ$QhV`ivj9CB* zL?0#Iu>rbzDXrfPZfYMlgRzWX*hW~bhxKX;)(*Fql}jLo(_32YdJNWyX+*1Pn61l) z_uLs_&*^?Q(D{#PW0xj-Ene_dol0psB2Ibt^7|KI90kGDFJEklg^34mHl_JVibFYF zfQ~5Bb2Ayu&G8JMZ6Ni~189_r?^BeZCbJM%=izu8wUqT;r@eEjcEv5+ury2kYT6{M zdBjYlXvu#TIHo_b^F0Pl zH;@dCIIaJ`t>T;YKW!Di#b+w_9W+{zil$11!h_^_FZ+(I&j5xyRFk$_g@8pNjf@aG zV#&dzq5O83@nb^|=U?K*a17-VQO)h*cr&4tZ28>{LjMzy{7do9X zM?l?=F(=8Vo`Ewjz`oFlZukE-v!!VNS|We?@)8Pr4W~SiUamru|1OmBI>p-n_F>uVVHyDWdvF zFLI>ZcitYn+>G?4=-<}}HAHd<9k4fPlM>_{UkUK*{0e%55v*0e?2f!Uz?G2Zr_7sc zBGMQ(R!iy*&3W6@n51m+z-m&Qw<99swkIwAE2pBjPsF~5eGGeA;Eh^P_tB4a)h{dQ z{7AV#{jyn+3T!(l1FDVnvWbB)NzV*qmb(#a6%j}IWy`*`%G04pkI2gr;eN1nH^a&n zw32THCm?93 ze@k5t^%lA2v>4H)VE#jhbRA(CNd z4HoUtdm`tfO!XWoSJoT(-g_n+&@^!Uw&7!yrxi9|+sjEX@cVYVB1OandxQvNiro{< zL~I4w($t#Yj{x_=HIqgICQ2bxn4E=}7w-&c^*#s&I4ycEbR~6==jN@yTy8PG-^CZI zX)c{)hNP3X#Wa_xXdGD0Kd~NW46;<&Z*i&IN0N}VB}C3rbR{FvY{?sxnpR5JP{)Nk z=LWo%WMIE<7;nzJtWK*ojz*=TPYhz1C*!Av5(h)|7|i$tta`BeM}XPr%K~e8A8Vs@ zvot&+6g5X=kylzoy+6ai90ij<<3AOKD@Q+sEQD2dn(nZ~FJdfz0EFX-`!*N%O}yS> z1|7O2RNh)PNpE1mHJO*s9NYLf`nl8u<8mOaE+u~o|Iboih8#i%62Z-}z*2v8^Ro7b zP_qHq!C41wZ{l5=@aKI^uSK0g*T6?a6%p`ZF`O-27kFRug4JKm7iGbs9GLY~$i6>X zZx)S{G}leh<=~35ueR#CGZ5$Yt>V!GQMHQa&%9sBjO>cGCy*Wd!J>+PMhQrG$Y24t(H>{k z{Sv55W|g&U5J1t=uBiEBIn?aa^MQ{in>)Q7y%X4>opp^0fo`E;Ge>F$IXy)lI@fHp z2}ydpwIOfpsg8*hDLle>Qp@4?&xhN(i%nRV65*QTu-FX5tPHPinh`}OuK7sH^e6ip z_LF$-7ifjvfw$Eu6E*$g=0ZBOJelURjh6GwCRFY`rPh3Kc~`M_u(8^CIOz3z>0ce- zehCw@HobIe-qiR{OFxRc`rxOMA4T0sq^{Q+R_cLAJPpH$BN!NLCn>&pK` z!jD9*#+#~rmLLs%#JL+R=M0&d`teShi9m4{Z#QzJd$HTTDP#ov&ifFnp7orxg8o}Z zY)7#?u%NUeiY4mh!Lx3DW_Pi3b8ys5`3R9^@Pm>@ZOqEBvCSxwqqO$Hrmrw~7-b_} zR{3kLc%HQ~xo3L=LI22Sqzr*2@&9q;aagEAc!7W zEUHL`m4QX~vCm0kgDI7dEjwXYITEYLJ2Rfq?r{IWJCtDg>&CjV>6nNxv6b=Lg; zf#i33a(|mP19GY-ZPEd;+PB7>tb3Zfh8UHyIGgW^_vjR22qb@ve}$>EORv+)Ey1;J zbuR#E&lFh%zn8u6v)_}LIyJ(@+qoWQG^ao!^%(9W-~QZ_`=?Aiaq`wvrQkn8~e+T`#rynidk34#s~1w_g-rwspet(2hyX8af91wOy- zC}?W4*m19cZuwFk43>Cye-j?iu2HG5Y}Zq$QI1&kF??=6kOK$^hkc3sP(Xz{mNJf+0)hJI zA!A2P2;uKAh5|F#Y;-|4-0nT$RS69ZI}=ZXm?H(#lWppw1SwMqVDHA13)&vvM7#8_)h&iR z_qRP;3=txa89~WGA@l;Vx}{o0We|GPoUri?cDUo1eOyVl+EF==Os!>=r;qpSsYbX~ z58@g|&}?^#3$(Rns-FA=%HL*r{*j#0voRmJeUS1`i*%HnnwAN$h2;4O zCQPLhZmm2$#$V%b!OBW-zF){~T7Z(eA=rac^a1^IIZzz!&&glljbX!_udRnkQGEOo zAk%17JCQU=_57dk>m2(5MP&QQdZ$~Nx5haF&fe836?VSn2(bHICZ@HRdgu_b^cLLl z&4s-{CT4)(>%H~M{_|_Q`B#A>XlO}*>k|NPj2q|lH7lnjuM?b=$mw5r$A3mBm%4u| zmq6L2j~6}4Qr*O6e1zEqgjrou@Brn~9S)u|?;e&_Df6EU2I zr%&|tYVF)iJHH}h2Bl=dQL1lt9SH2Ton zFu2x!CrsN8sC<;-@C1bcr(tIn6EOe*Mg*!PY<0T)To#NZInkIgN}TY8Ar5N|3lXp^ zW@v8CK(V>;LmW}7(PWp~wwbvgqhpV(c#x%&o>)8~sDe|`@cr;(Zt^o#y)IBRiq6xr zhj9D>aJ1`^@BYs#G5X?%W0sK>Icxqzi^HRXjU5H)yHYk>G{cUb52GjPkkl*=C?;!| znB?xB(ov?fhfV1Dg=eo$1h8!Te6n%jOyC;|j1CKl4jRQ(QZkxWlI64&^!0Fkj)B~; zh-yH~5@_%kd$Dt*0ky~y3K>$jnRygRs0HhLxwI0%Q=qR?hl}he_x!Jo`3JPCVqp|9 zywba|RIj@-qnzP+=Fb0u?%D{0UTg2q2;+A#tFf99rf7pNnE-qrmOuz3{K^7?BVIZs*EbMVmzJ(#3vq>prKHD6~NjE@e~!y1=^ z^*(dWFl4X>z2by}5)ffGYA}_gLv3Xw$f<-FEU%p0-HOn)4rL?b{Vwf12nvC@*Bl^M zmo|cWQPGfZxp}D8IoA?NzrWl|B|3gBAa@V2V|OP+|LCdtYK`e}K=Jk7nMt*(oHRM9 zK%r?de;2W$f@)D7a-_#XvRv0nQj|>M=NYdOja~g3W?|U{z@V-5E-R6qFF=qOkVzM^G9?m%{QB?qw}XnZx!fX zS74O3%kvpLM^bDCVE^Q(&IhjGvKkYEvNKRh%!~}cW~!yCXpvuYbOtl*X)x;km~ewBlb7HHy1vVp22yylIcQx1$lSUUsGEGD$upWYwC zPl!>2lewSf5+w4; zkx5@P`J|z}8i(Vdnr5Es;h78=kHk%-=cd2^eqDhEIe{WA=?Nk-Gx~0B(tmieEooPH zKDz5oyh|rFH2^UZ#-WD{+H)i#Q*-(Qp|4#Os?Ye2{H$_Wltwr6YpHl`6YWwr$7k;P z*4te*Td5d)P$9HVWuMi1^nfL`AR_(b$3V-=B0wu1crg&&SBGqmL7vUl2V`IMU4kb+ zFIu#BWLR^7hZVeqk<~9dXQzK;w#b6BZ9PH*>e!oAwZ)4Zp+G;uO93PS5-vIdPIK16z=`ddZS>S^_&b zi@4vN2q_+v0di`?BQsIfTYqWF9Or+QoCgxH?GkZE4qz*sH3|Fv2AiPsk=s}Ol zd&E%VCIu?^hZ2JaxWU=<-TnnFAT9*dMj=3|rKca%VXC_9EV_>W{{!uETz*ra>S38* zn3dD!?n#Tcw$5-56blz?=`q90`=(Rv6YOJOJ6trB#tqfH^VpAbTIEzAx0G1zs{{g3 z!f)SB{`7w0Vh^{mgXC5cP?NWC%kuxr5LL${vM%~1sXb$?J%lH~3 z9I!*n2u4fZqG%7uOvDZ)Oo&v(4t!G^8yoS2!Igbu$r9?A0py&7*D-lN1R_erP3a)@ zZ0v09Ml{dG&w&zN>;g}TAO=r$H#FGA*Pr;}>KjZ$y&Ou_i1-wSBmH4=EghEX<}hIx zuH~#n_jsJs}C;%m7XvE`hVj$~} zh|Tecqv0o#d-RR9KKtiq-!)@?rQdNVTff+zkm_Fok0*!1CcFMe%MWqiQ^=rwIjMQ} zSESh~^pzPtIl@r?uPyrz|1~@A4$mue{~tJC8&pOoR{Rg&t$}bUrOTmNeho0x*n93S zAG_`x+r#)Gc29cfI6UllbUyQ`49Vyv!jb9wPd19}DJGDO@>^-Z{Z}^1Dee~-NzXEd z|44DsJzs+E27+~e@Yw7qhNc@(z=qx3R}en<$eu?H8z}p+w^0n6eCgiK3}lup*(NP8 z4)WxbFSU^WpwN7uJ2eQ7XOzmYijRA4v|V5Mj9HKz?Rg@us$GqVz$3Z-%xXTsj3Fq3 z8h?3Ln}eknNTi$2iKn51di97A&uS6Z^S(DFa0!4F=OG)JG$hNF`X0RQdI%JxN1QJh zP%^Mf@!slXBL7ap;m_VKzIjgqaQT3t@3nq$U(O$>cD}^?mgM<)LG2zFIW$hu^CS6v zS(ryb`ZKAIgbz!>wKs27({f545^_MmION?hmo)#)px~ zMQirtAC;7eL9?!21p=6sglj3~M)~(3(BZS9*JXQXD*> zQ_sJRb4*#&|C?kVnZHxN&(Ko{K|U1|rPBPzFtLi)gPkK{-E*V<%ju-4kjHMav$n8+ zU#mnbq9Lhyw=*b3BKlE-M1G`d#+AK#k4YAV&T3n@n{EHlRBaD(M#|iMXDT@hsw<>5Mn?g`IR^}LCD z={4&QqKM6A=D+T}-_{=l?!X&5YAil-PtO?ng=fm?mC#*;%buGR9?$*FHJOdMKl`=X z*9MNP^RHWGb~1%|jE^T_)om0jlf&{K16l%KdYvs*)HgE-4KGt!Ym>|`gT_X_7O81~ z3nQ`P81~{b93+fonNFU_&GwM)LBP@KZ7zAeYs?Xvvq)cG3OescYqszszgbENaj$Uk zDoG%y0l8)?^`+sKrZG)o0TbX0qC)GYcaSqnXYIV47$lT*LGui*$%0g*{)8MF4jLOm zSWEXOsR;~&RMsnG6#-?HJ)$y4YeUH#G%|vrP<{{X!G(6D*VSYDmcjyhNkUM;+#Mv8 zb)J>76?f7LBInGaiw)H$4-{xsrj^+o)1d2c8zmGK0=f4MccD7H!pvPD3W_j(JIoqs zFMeNoBO8M!Tp{4NcvB7sdr4W0ngB~xm$GO|#n08r{4<<)j7(-h3}q!)oN{m4<;D-UA!3SpaoxXKkiS*L*0y>Pu*DDPu}P^YSn)GhwNSvKZmBz zzW$UC0DhA+5&T1u!F#>nZ0Ufz@F_MD&{vI$g!KClASU}qERIAZgFN;>Nt2ZLmwP1$ zMl{*eQI)7mft=K=0xxTlb@;X>rG3DO!)ZBB;1CdeHT+Bv$Sp$Jp$%D5E8}Z36~^an z>9(&G6NOzf?%GNdqdB(CN<12X2st-C@GHPnZLhL4CwDv50A z3xfESfT>1rH!ifGUKvkO4IAUWyERV2LP#x7hD56nOSYW00I}5f<9p>8Y?&#NkCrNQ zZ9cycS_v0y4v#u}N~zhEHthX4D}GKs0Q1ZAM7&YN$!12yeg7$boo&B2p(HLX-Ic#= z-{1KFqX=r4_KQ6&sfu^$WwT}trA^l;#HqnLs{QfoOM|7V?WYx<-CEWmqf0`Gqp?z^5dL-K?jiCnc34#sIrMVu_-rmVA6^c9q5C}b zA1&GU7O&a+DxOzPC(3Vs)Y*Oj8w9GPS3Sj0RrF#XH#S+rZnMH9U_UBCw?~jBqPK#4 zbfxq@gM%OpExbL*02qye91`Ya3z4ul%c&L^eoGw$sf9J z_a-p2M#z29-d*6wDj~Qg!vN;EwU^K1A6ug;m`#H&>yRqV_{I=@EGs2|=nVn9pMksX zRoKtSaD*b;yr@^q?bYL4#`8)KMW-=JG@>%VN!?+M!`5#aRW+kX;BF*gg?UGdNPRMU z)-CGE6YyOZ^=U#QBTDgU?ZP=S{w9?3_?HG)hRsR#dYdkahb(maqi@^$a%|H&I-g2Fx5zR{ zwuv)1(+LoK25Q?THZ|1sm^{M)2R{C_Ok?(DgFgT^)+oR}3f;2Wm~~E6Qde;r;dmsW zOh2dsVUwrOt$Nr@k*14h=pIXK1|f(PX63X}nDv(5ZD%85H!nd)o9Q5V(MPDg3R+)! zOwNp^2{ZV_k3>0rgh?Ps*He{vMK3$I>AvcHxK?2 zt6V|NG(^r3;)VM+f&NosHQV$Yo)`Q4CeWpce+<1yM9~CV$AuGW+M2+q4(PD@Z*Zwx zwlK7(PV0W#!}QC+XTEXr&SZ-4x`;rVH$9JNSs=7c`w_LqgsVVssrOl5bYIydpa}=6 zqA-Y?l#h|gkB%91p7_50*$KlZBQ$@1qw@A#v(es|!%oCdJO;&ez_%hwU;Il=c9q zbDVhKq6JmwA;H+@U0g%)qaT2L4h%IKpmkty1s zq?D~HGL6cv_*vM!NB4l3ancjm-8oR?hWv9({{ta=9M@dh@~;^%+T@UB&Gd^NSS`ti zmlMLbLU~MS!}KWa2xVIfS>r$2;;xTpOS5i&MyuqM#JeYFxO<0;2F#gOUtrg^=9kV9 zuaM8BA@ZOZcB+|8E~yKf6##_EQ=2XB*63?Eyi4>WY%%xa`SLnh?@<>A632@34e8M( zyXGsdHyIHmzTRe~o&~hy9o)OrRSj%Gim1z6MuMti2qH@ubX?3FkL-_|KId!d^=Tl`cdj;xXb42 zQ|rsiP6XzSVrKuryd;~^Yc}!yydWncc;)yt)9e2Ruf(`Kja&|nI6919HBZIlYv=qU7_?=QpSx0lhem-n@7YCYr;US^I7xj%=dz))$CEHmzn#UB;NA7hz@R@$NzWk%w=IUA1yz(J z5Iad-VB`z*(?k7+{K%|KHsA8cD;VIeGc8GzDn$7;w?&T%_S4Cr&iQ8qY^ph>hB5eL z2<9jVpfv=@QP-w#%N6NsejUZ)>U1c57A_~~+jg+`sooj?8E}^~douVYul|X`k6&%M z5=c)ryebx|9DkhP{`f1$7WG~gXjUCDSozm-|3kOJ%LCx7p#e9c|4US!K<{vaUjL5( zRdZ6kw|!ha7l^y`y}ASvcMLzIDl|ndPu_+*niD!?pBP`319pDkKEHUy^Gkul8?oN= z)^3?joY7gP^k4`em*gV>)TY^o26knIm`IMHns{A{uJQ@^Hvn-xz} z?bHeqG{Aqk5ffAaNAUa7^SmU4+FUDvL0=^^?cJY$92A1ouh`=mFO^I3b7l^HEzH3e z?p6kgOj1s^=?Jk{qhJK536reuoxRA?c|Or^N0@F$CMm!s4tT-7Vc%Mu;eJYYp7r$g zaK71Xae~%yr^Pk+A%E2|^ABNxze77f_co~=Ps;yw#siD~4;wp+5(Lkm3A~B?^)p_U zc{eE9>Me9Zm^7h5lpk>YDg{28NN-VxO(<_A!Cgr!mbSbvE2C5uT9id!xF+Njm-g0d z3C^+}G%lOpXP$pOz2Wn-7?!Mnh$?1tRP;e+?K#YLIQvPT9b~Mz`+_U$$z9pahN;PR z6UfvlxxE`*z9cWF8!$Z;94jdl1~c#v(C>d9l34V8g994V=eU)P|B26hQUREDh1W0U2vmy@p zw$en_y|bDw-uhAa?s@tByazNt9Tma-*oU;L;pT2YFrrYTU`T#Q#zcV#wXn+vf_QR= z8D_sG>R7FnXAx*9cd(|7Iey`Qsl`ki0h`{?nw-9Mg>wa;4bwby>H_xtto z`hce_fWad+ znrUvYUE^&Rx;57>Qqq<9%WRENzuU5`DXCPJ-?(8eE%dSE21!sPVHv@T~@a#lR17nCQO z+6qYp5xcZ+>)z#<7~|XEX&0R!kTvhr8>9}=su#6t;N3VY?8{LSBGtP6Bah&ckpV+0 zRDZb43l#8Q*p?rBv9c3=k%!ti;?tr?9;;*%=RC2EM%Zy7FFIqwJPH@e!Ig-0Aw`P> zn+(=y6Lnp;^Y%1zgwuqq(<&TR;SQr3Q#tP(`PliN&$S937OrFr>&U1gHnegjjHwd&O!N_q?65T~5v+Ru%pBvtV+Qim1Pdu%E}iI-^>TwBW<# z*@QE<*$!H<+a}Ubi#}1ckPF{;aY9L)2`X#x%8DKDZwXlWkc6sg*j;ZEyKGCgQsQAb z%5mq@<@&MAuQNRT9@ny86G z`p}gfvMpS`$IE!j|B84J5;@k_+6uC6e`9o?WX-78I{vlqP{m3U3uqu}5v0nKj;P73Y!t*NfC?K2mAAOJ@ag(^(fiFU3Fo_MyW3d(}#_$11`c6f-aE{I4XIS+S9Y z^{$piDM>Vvca3f@eby7gjmh89tD>%!$zgA~PRT`}bI|Hu^|TRQX<9qu5t3Raavt}z zTR#MK%Z!W~6T&)KLyB%va@!hQp%OG1@YBi3O=Nd|OeA1-gj|4M9HdXW98{+Wa?Pqu z2e;xrb-#&AeI-$Jh{MNaGNPKXcH9MMaCJ$!lI+inBPmv(6ihw-NMh*C4MM9!F81Xt z!rWa9pf?}oA6Rd4#M5&0buwzx`SSF!$z==s^2M@elb6;w59Rzgr#EmnNF;>KL)3-x zN{N8$D19|I<(F44ds4^>WN+a-VEU?-qsAh0VMwrle>CTgR2Jg>vsV%l_r0567G9?< zTA0EeGAb1AJs;38o@PffCoO%ir-PhL`*B?QMjaF1y?vch4q9CgidWFtnn`(LWYeY3 zN1?+zMrfn6u@>v$D1q+qy%P*qa)1u+dy;cM4JT+%=!QPeyem!~z}mcSFM#YjqVMA# zr`>)j>)e_y<5J$b`e%2+-0d8}*kw9WdSR_OyMcmN>9l7cZ64NlhESK7rIo2~3fS}W zHbui5AUU-kOdoK|N)!~NOgUaWNE&FDywjdMaMGMV+veMthb%d2nbgra#}eF_=U19( zFkbFVGFl6Q`oR3ihr|-LH|Y!BL9=m6N`Jz(*zv<;UBqJO`EJHx0U^?`7= z^G=jjnGv&&q+o|P7W~enmqwjp(W3jHL6TbN8nd4A;#qTQVF#&e?zcaV2gs?bBPPNE z6-N~gspMAw5DIl+i#^m&!Sa~sz~jWqyf0T%%c2_`ykyge#E(R7CHUQ4NaEGf;xCiY zKW6(zl`@xT`h|u;y)e{UevG?VfxMWo2qh`ZZUySfix!>*8f*wUAkL(bj)>c7-XBqP zp#b6%cFRB8-o8nCtRyXTp#*n5+M6spLiZ*M{_hyZK%gmVsJr#5~m zjUho+8_v@~CL;xVKiJR-*kve*qo=J?p{x_m$@!L*+6tYapeHf>&Zq##hvNMPp#UIWvYZ@teia5p0 z(>&D^Ip3?Nr*VwyAK#z`UXtBtFJZd+&G9eOe;5fb zVxeV_fvktbXP2#6^KATa{FLq%SBm zSE8Kmw|*pfHWz+}_N8zb*$Bxsq2TM0k{2Xi(5iN8eU;rOKw0eW1G@jUY-hQF@9Ve` zOXH9B?@d2WOD;^UT}gUPFqq;Psqb78e}|5{S(XVeu|h8V!;kKwT79wcF=b@q^87(` z%umUaB2AS&4?hC)|7(U8Z0hI?t!3JE)PW1vG3GxBW>BDWB<`l|f9JT1I0v7{68$ug z$}u#4b*|AXMAixXVM`Lk9 z*8LOIQ)E>}9=mfQ^~a7Fi#6k6=vuvLS0vV22qmdOO4LxqLV^6vBP0IEql!z!0@#bySF3B@m%I*ffI2~lK zfN14mV5hIPbuGp_7*gT2yC!P;po3QUv>+Q0W6{=EBRq+^z!|-oaA)=;bDQqro!)ao zcF)pjA6YU7^A?a#aa}&fWW24>5mZY2GF|8} zZJSr;cd)4HKu(dJZGYAa?=wGAX1lw!nt7Fpw=SpJ=Ee9Sxx88P-cyF zrTfJ{*S#NM7R49)!8Lv=T`orURh!T5{ZZ}orK`;~SrOdvSNQp8VXgrZW{_e1{Ul$K5)?|+|<9p$Sue8?Fm7L(D`ZLJY|osL)uXyuwJX_ zS!kitq}Ic}*)X0={=9;(eZQ&EI}@++eBuOsmemy`;`#ip0VRt(|8tcy^Q0pK9ExHk@al}QhD1x(|){qIidYHx%J;` z14}9U)Kc-i9dH=#G~&DfVp;0nZ7J85yMcULdoP8ijVc)44t}o_5eg;} zw;m8FS>m818E}-wjpl#yowiF%Kkz<_-E#J(F~uCUr&PzgH}!PlWt=Q^{xL+Wle@}A zaXOMLa#r&E*U05aD4aAOU6nH-R~TfYx6u)59rg4RDsaNtPIfLVD;c;qA$BlhA(+l+ z>|LshPSFj$2U2BTV=27g<&PND@#0MFV_B9}bT!_Rk~A((;(B*}0bW5RPmT;?Z|F}wNiWZ3h*LlRS;T%2cQZU;({zD9vbewT3BI|@&+P4MUs`&Z zq3%J?7o>9Ei&oM%o~x%a4Tv?5FlZ)mE_^Vb-7M?5nwfrPR^U#+yMTb~mp)_O&O|Ox z>~5HD<969!Vm^F%+h`0Y_8zbcUAB09E<{&Fu8BJ%eJ00GlS{9VEy@hi@hXw)nqx9L zTPr)t&u87nWZvGOR*}fYwXkr}cyRr$tVXJd#|PH0K~){Y`3aQn@ALHnO-m;q&jp^N z2-Nq^Qz2zaDt}!NXdpr0_G7>JXhw`jTbL|CibeAWuI$S;b&p%K^SQo$kvJR1RbzBP z*PBS%ips?~`Y;7k&0?(<^+~m>Y}2(m1WY%^)W08;dl`z~RObaMu?C!QBRbn?A2*EI z=ty;BSRbLf{r=)-QuR*tOX{LkYGlbV?TSlPOeqs2m-rc~vy(p(YVf*Po@|W5Y2kO} zIv7aHU-ZECwW>=PNqc_Q!j&GGFb~!-uCuqfDa_vP@8*%Jne9;6oR@bxdL`zR>e!GI z14HQ84$_+A#4GRcn~z5B%;mCf$5(%zsK`Yw=!%kCxy*@0o)2G`xi=%sUwh}M{x}?vdMrT9?I&a?>QJqptE|j8L_BB+t|J9AO^1UqeDFm{AP3;%b@Q($ZM`d&m4T` z8I_hK-V8qem^%xcny&IzKh&#nON-*OT>A1&jILd5;~i)7TAS@X<^5C>w{#K&G=Y)H zbbI(M<-kbqqw?WqZX>e?B%ab!rQBP8tNy*L$4T@hxU>n-A*jqdsKt zom6uME30p>Jl;s5_LI&f)QXCe5DI;yo3jdCA#f>SnKjGLA5%Yb zpT?5N?pWm6+HXruw+N3FZ^#Y{i$^PTe7{JD|5=R-@`bZY)=N0TD>!ZuX38AQPwGrz zBz`CRhz}9)Gg&iY)mJ#FKosP`tU&kf71%5+T5-xrZ{7+!NHTrnNpO9P`b#TUA;VKZ z__d8TG^kc=5Z`Z<#QEV{t2)s(yP&i~{kMTK%7K-W?)2l{BaYm+8+D{!R>7uzN|h3MnDm`8R5VMsck0nu zJ(uMhD1rJLd#Aqqmp+!1EtUI4Mu&i=@)+f5P>qup<1}#e3P)~n`HSJBUqcS#i8%#3znCs1RZJnT`y#IQ&`fhX49Npf1g;xw_SN?~E&q zr!td2(L?R~19jd?hAM=%Cw4c@1*W{}1R)FEjZ^y9oBaxQoeoCKUshjvpug6>m~&B)zI|tYgJMU^$bDvQ6Tw&?DUeSwp zIvAht+;!IalpR-YrhDGYt@5+*kdf#kT4&M&^J(&W-u=TAwJjJn+mhuIi*mc@k~@dxFO z>$Wt~i}BN(6aUhe(Bii+cGZiZbcou*!q*Llmpm7b{7sOsd#OGRwX@2;!WG=aNL|+B zq&mSK(Fen%gq_|BvC&BDf4c{iNSOCWONFv(=Mk2$1b|>V>f=Ox1>U5%ZUX-Ux0hR03^@}JydWUN&ppyG5c^~ zm_)AHf}bVwMf$@^f&ViVb$V6noJeO9q2frg z*F#kcDg$+;v9Y9<!iU(?{&sLB;rl=K4D0oDer6xb+H1m zqwRnM7qa?*#pW3>;dO{u~o}sWb_%qw!WYhziZ6yO}$HyhUbbb&y9X z5Qn-*-$mcS{Zl?N_Q}QUBOlCOp7NG)rM*RK)Ug_|351`Xw~{zNvv8i-xt^i&_2?T& zEYdE{;)x-*!!Ds6r1WIF)m#{6gjn&}U3-1~#Yw@u+rbgsw(6uC>NlrN0;P+!#!Ngr zm{$-#_{djWX&#!~R?_7-D%RRPy3L?`)oF4~q~+ee56CkFH{R*~6oBe}c&hG~10OZA z!*@|1s=dUBeso%IxIZ3MSQ@`~{(sHnU%>mHf<8=syGYPkSh~Kz2l5%6efgbAq`Tw9 zgHv{zap!zckC3Qpb>mLhjcoe4Db3GRk8QoEN*Xs6>v3F@aAHrE zJ3lTA=LYuQ)N3cai|>LW9oZ{BnvOPCQi58(+It}KsjKCOxkPru$|Flbr>Y{z?(%Jc z;ID)_Rr6)6l$#XD&Ib_Xg+7rDy1Ch8MH3OEB6!!N_a#de{|UkASR9{=eLQ$yRb&ch z&gs7!xxpUbQk`&9I_+nZ`BM*_7e}^eX6#v18}yo_o(Dua5XhI6_v4x5bM_aLl4?g9 zp1X;9f64W{GpQhV&HKLO7wO4~8uAuFIIa`)WG`4&RZgiK;J=(vuxmh;r!{rTe)xrg1$?4@_#$zPRTQ?D>sK+X<6t_Js9vfdFKk@1duiJ_MUl7 zU=GBulWf*t{cMx+G{~ArGC!#H(t7V(9+vGBNJI&2C1A|^FSVC)r0994uxcH26o+ar zX=1KxwAJ_DwR-wG>*Z<++x4K*zZRxDw%Rb zJYXCc(l`_sfTM*-cdV>Xt6TSVB^(j80&Am)?G8b0*^ZVwwWRPqwL_(1loZuxh=sx% zK0sf5sW!8B3B9{dkaw}!&bUTsJ(9rHtq;(TyMJH-*G@2mb++_+_lI+`o(eqo6To$D zA|LWu_U5Aag9SV;`2lTS6H3X-n@XBO_m`eM+NPM|R-#rP!0W+N*FqTM+mr1F28WFy&M; z-TB7GlQ{fzU*DWaRFaeeIW``%E=Hn2V)>rGYdWP7Dj znaiz=Drt21a+R=38!NMdd_l1Iiw8HDG~XO5vnXN#X&MlT(B5Ag#^mu2iwiV z&O(W~jtNnd`zoKtpL>}7&L8=0MueVN<;1i|Ecm8Z;N0z>9V71uP3g>@Ruo>}3FF$j zZ4FEBd{CuBx)8?PDg~iVzcR< zlY-m#q#6g&aop6Z*l#<L@Y+~VgaC^=Hju+id_6)RXMCWsc78cn~_ zG>z}RbH9>I<>f-qbXm#O!jeJYZ^lDntA2*0YOvE@ptk}c_9McI-&*aTyZV^GG7=ro zx~70vDS#964d*2L0>O|$d0-TuD`^YVaF!co_0G7a^8L}ImDL3465CJSrJD zC&*&SY`mtYc9{BBZY!TEVwDvxGJP)i3Gc1A7~zwUoXZ~d&d|^GGs#B9J+T;_B#WvG9rPcEL#UFN`^mOApvQL#z2fD16r#?W&?;7JAp<%Fi=HIrx zAhi;5yG5Ls=pi;$(svtjHRjsXf>&NP&Ed6uVGgl<;=10r*ovyRV7$Df@4<{iK5Zj( zWKiV07MF-WU%C?Q?%05(F#C6A|>Hd>j(v4CzqR`j7 zuxK^kNdHEC&-Hx$(`#*Sfu+Veu+-S)!wc0XR;EYo2o=0u78jsI><6$s6m`G4^G=Hq8Jkj;b6Z0~U7=s2&WRzoy#2 zdjLhP>6I{g-Lrg(Lafx5+m$4U(L##G5)s0ot>QLv4L7InvoANUhAx+uOMYvtYO$at z>%{7E^VM}4iJ45+S;dlQr!Uc5%%IdZSUzchFy5HgyF;hkyZ^Y-b5F_DRIbc?M+X z>WJ=rFwc7r@378h3)eK1fLhw#c`gU0SKvocuo#u>Y9ON^RbK>}l%urIFGB^=Pza^yuu+QGccW^Wh33%14!sY`&bSb!sK8 zC5mry{7jm18|bp`tc6wJG|H%C_ofq7a#-ncC6EK7x~xUcXI2MpfXw~c+*K9OF;$jp zMFQOA7+XJzr34j|mD3l7Tb(d#Nuu}A{8Stl$J$HC%fOy^-rWGfA~w@Uo2dd^rF()l z5pu^m<){^Bu8xP9njZ9ec+r z!^r(;mg6DQt;4n`5@?orS_`7T432Nosw9}Gm)~M+B*3$is2zS;4^5LKuGjHE{r7$E zdOWXNwXM3kB8=tjBt&cV`&9{hLA7*GF4D?iy;)s`zav|~1}KH?n;CpSW-|u5oFi2< zBQp5&*AhJ18ts$`NV}Y+|PWEF}yS9Je!8YHa*GpP^fgExtmsMkSgb`{1>=bt2`r;w+JczyZalM z{p?UvI*Mp4eeVMJC(!@xiqv&^P;T>|Ino=qyaL_nLQqsKDNHbM;jI4Rz75;W-EGUV z*O%+YDnfMLq^mzrDm&cH?RS*%P#cf@kt1VSTW2DTDiDuLgOB?4ec=GYyf-A5fDb9p z$GfD{m8FpSt~Jh=Gl7tu#tJKBB0hh(#hj_-qmZ71_W1QumlL;7(bsPWk)9QS)OksK zWauQT@33&^CVu2ebX>~9sh3MtFz*#Bt~E5kmlbdAPm{33GY0)`(Z?Np3pV2L9Hwu# zseB~W06pyDW8;Q+-vZN0^bsYmvswM}%()o7FZ!L@%+t+}qYQOQC{dLXN)THWCeu<( z5V3IX&UnG`Ut=6wQA9%a*Eju)=>fEiyrKoi>36@qK6bGzs9JZ?1$Qb&)7F+&1fM@J zJIU88ThHc|1arXD_QMD9_gHEeuH&AV#fh0B2+Yoq4YWy8Wm!6*TS3lCDb-=iRI~tY zaJvExmYH1x+Ic!twY2U}s#zU5FgeNTlyYnB%lg~eTi0fuc&-clY?hk~O;&Dx@TikL z>P+#Gi(-nK0^Z-pW}c|ehff@z9#8-BOC25)a%yvI_#xN^_9km3(HT1w)oql(bjIFQ zP@XiZ540)TK+^tlAb**w`u(iP!#!QkHr1$l%W9{fZ6Gs-xoEXFE#)Q-(^lWE_Hmkd z$us$fA=~Lv^Se$>k=xR>{~`ix06F;J(tq4fw?Kxwqr?QX?0LM}yo z*Y!<~QQF8p5sSknqK*Y#-k-9#7Pr`4Tc1G6+?_glSA`Zdgm9g7N6SjTg_e5aDe$`i zRrbrtlH3{wonhp2A@XU+l#K|IDxp5g12eXz5nLC-cKRiQ8?31hSy(XePbPWxJ1)M= zNRdjon;;s#-kW&tnZUyoex@i^h7>DJf#=t)`_tGZXaZ&M=RleMA_*Q-8Ib&DUjCsm zQGJ4SUt0Z1f)7cnE!P650uD8ploJ7&N#- zD)rsdly&&xM*GaF#=P6=8U*Fv;V3N28GkV6;Nd#i9xZ)~P5%NvsJ60H{A#WBeA+T^ z|A(YopTnba4Br3^cMAsGv+K(Ibe}h7I4zQ<+4B>;G+w<<<`)s7y6q($)50=ab71`r zJJDmK_}0}`rRMK+@@=)tC(<@t1#prnTULy}{UXfIj12##xKaz&z}}mDSby}8RVJ!X zHgoS9fZJ%{(5CSHKko2Ky`o3TD9Dw&yLMN*p)y>%E_*{s%c529mR#?z)k96^d|v$k z&2)=bqr}Agh(RhglOcdOTESQ6)cAPSK@}g|!H+(czTk83I@{}HN+2tD|K1tscwgUe zcjlQe4#yoz!2?Ads*ZL;`SGD$70k3eT zn-ZjG{qC)=1RY<86L2>wD@y3QhtH;CZm?7vDBN2jogX($O0Scnu`H@{ilr8Jsf;8n zi3{f-b0N={5NpzFh9?P!W438u&r%!oT#&Jf31&PTIL7DulyW{yk~JX)e9YStvLtHR zAZl>%5_#238Qyz6h^6n~Z$Tu|z{%)73rXgF z^;B8u4BLz}8bM@`TdQs+GDM zcGA=mO%7E3AQDMU&UVY6f3McElH5f?a~ZMUAXnxT?#Bz~Su3(xyq?Oo$ukQ#wuuF` z)HN7Z8uw3=Jmc)%P^|@pdXJ>0lX4tOy!p;{*E!GW=!ut?7izrM`Z zwPVf!8VqA){_!AfBZN2-pv5qjuTBz#d;`Aqe^6ybzBuUt}$biZDt^!d8`t3%34 zXLj}TL5rR5!CMFB?X%q0=LLoi91s7pVIZ*CxH&?+YY}q?GB{0{GVDD3*!C;Xgk3yX zh2xqGDzGaq`Iq_|9LrnCvw@8A@V;hn>%Zs&$3YR!jza`3*$YQE)tDD|p1UdslkkuX zYo+ZAQnhbMqmbm)kk-}jo}qi4tDu=T^<+N7VUlzL_hm$eiq{+Iz%F*e#HTtoPswG4{cZv@t>^)-|(Ubv;_p!Ev65jSlxQ@X6lyvzOWAcL5XVD zVi5}#-y9u23cF$XsJjW&*Al^PmKq)7rBX>{&ai zv>=(-*c2g91CIDXWc9T=n;`gsZ=jaPb;n~u_VnL9&RbvKCKYV)6?nFuXZ|iVImFCQ z0oSx6>(PZ&QHfpgdXllm)3VBw4F?+EGkse-v0xW`8CIG(rOJjBtFHTy2NuEJ8#_sK zF3-g#7bS2ockd$jwKOxZvC`uV-J!exeg;@b(#PyvYK)7CN(U_%q;g%!>xC zL#-$p{&dOFBwfbDSDlY8jhY#5eE)i(GK(TL+FwaV322;nO24YH@c!Nh@|B-ruC*Jy*`2JwU}*4`g18EW-CG1)VE-qb1$ zyyYShU5orwhH>%*Q)WhDG`!3esiBqJB)wmW45|vL0$qhzAW7JLK~n@8ph!cs>ru97 zO3?6vZ;x8irQ^5HAEYN{@p<5cn0sGi7s9cxUC#S0E#8|d;jRw7ZjshU+a#ZvbE{D#Gq%z@29pUfU7(*U=?og&4o(~>fA}aU zzm_+Uqv!hOz)jsc`blzUcZU8mC?+?y6e`L5pB)^_0i!M1cb~CFU(0zT<%3Hv%>V8I z?$=!xpC0l@16D_O#m9&G@QAKwU-BOgFLOT^i%adyxdIw#U99nEPcQZiWgLD|mbaLF z<(JDkc4WE#X=P}uPulxsk1p67D$GL_Ue4P))roLr;6$!%^|$^9ma6sjez~qOtUFg8 z>@TeJz35Pu@(7Q9AL?Odq&NK`*>(@QC}4AZzUGD-quc4zS-v|J8YK=fOHo87sM515 zxrarYaq@b01&x)DMjY$`K5O08r+kRGYfByDq@aU-8Hv1ncJgb%9uk!7OwwvU{b>85mfh>*M1wY?Zf{OA$cIYXVJ-1 z(W<*wy&&JHkU%S(&Up<<=pS14#(-s0`64a>3(bXx*$0jjOf(oMaX$>!CsEZbTcg3B znx{7DcplUBN$n<0qs`2-Am_#RHcu{-rHX={48!A^or0gPnu_b)4x>?Tz4MP{lb|+H zV#RU(E9Y5+XH3o=o-1kE6+bL5%JEsAHEDil4k`+&ILxyW^KlXK6{ z-R3b0>LcU`Jfa-J#pS?X*mD0U=%KT;;795;knIFf2K2nge_e-DV>T~FZ7p$*`-Zlx7=G*yq#AzvLP^J~))cIsvy?j%p6H_=Qa zdlYu>IO3t8?%llgrj8V=I2`X4-11Ujr%kpUWy<}H-7>FaHuYA)xVSt^9YM5Y*P4Ao zK@4!tjm=?^X%=0GED1_`_lnX%nH@=7H_kR%AGoMJrk101{vUhu&=-@$hsy4}$RoCA zzHiWd$&;xgDf?k5(2DjNtoV$7u;{KN=ixhMcDYd~TW;$!R4d5Am6Kt`wOK+VJWcUy zgE0%Rg)uF^A4#2mxCc7=?=9Shbykn*7NQC{3->OJn8ZCroWC^VKo|JUpc!W%-?pnP zkWkxq|GGYHD~j3esWe&cfY|93$l7CNbIT@+xDk|P2XE2~nhd7pxT=~airkRB2=!&m zjjAuqeCAGdmnA5|@ydu*eL;e!cA!(%o;q_TB$o>L3g`_t1=ihTaTLyBv!d=h*mCqG z)rPXhmrfu%JL_tn;ldB9pFuu!jzLP*l;D4cTWqB~{B>?S!w(F4lY0ADPO+4+s0rfz zbk;IH#!hqdc{|AYej$h?)#0BIyj8%P^S}amK;v^7t1-T*nvlI{!ueN%hu;IQB||d` zYP<3MBE}sYn`3qRVswf>Uqws|FWd->RAH&mlK-@z^M>GTC6~8bFJ}>5Fe?(ca!Kus z8*O^a9zEaKH`r!HghFUKbHBUdem*0%us@S&R_-I2)Y+%mH$B~n5r;FDbad~XJV$S% zZrmYY5k#KN`n&)sV=Y)=QhgUUxndx+n#VZe@I;q?sf8zPM;80gN4?Q8y#^s$RbrX3 zcpz}6_Tb3sdEJ>N>T}4G=U3VmVEs5#@|?)w6XSl++~3;sK9EA!>sh83p$@ng?VWpI z!UuV7{*+iyq1&l7@COnLF5;gbJ;q5FYqT|Y{W?F2=$G|M(mjGpd^I(7CH?#d@eb1o zpF|DShB3|bQz-=FFKD%&7|XQanx)%#jH`_;a1S=^VQ3`GLF#n)elHJ>bRmnM$2)ak8u=N1s`X zKRv)Ku1Dbkt#(6u!@bb6eJDkA_NqLDPp*82sWPCi}?3)Xqj9S_{ZGP>wO`|cecmG7j`&ImC|Nev^dYf>_| zXX_s}rH!RU9W&@)oYhzYt7Wplc8uJc_9>3J4wE)Jg`bBtYOu>c=jW0LNnO{Fk5UL9 zJ-q|2?s4(<Nn?8#vU{~rej{1qqv8uVZPydWh0*L_Wh zgMV%9p7|bSmA%XnTY5hzr+ob9ih?u8!2kUp^WQqaKV$mt%GW`c%>)?CaUk&WKjy#b zsy}0199R~ECc#>_t)m3(zk!i&fw4fh#1EFw=@PYgZ}@&r*8-C z&D*~n=Uwn?{O{TS{a*VsCM!u%?493^GoBpA{P+0(XU{IyZ4@5^n7$alXBZ`n`R_UN z&&GL=^HdfzN0`5-B^8YM?>*$7F>~iuWFaQzTGFLKGyf}H|FdUD4v|bl2Gu_>p8YT# zjQQ`L`e)3%&h*W6z7lx$HgeX)WTrmGQpUC6-P|bMjjUc^D|iC z`*7fEz90PMzxDZFG2oxg(J7UE^e%wugu#qvg)#psj#_QGdM*Oy8U|CD9mf2tIGVf= zKym4}%v}x`^RMDak3Rd!@7L!OP8jpA;z*o0MiiXKP+c#)t0rdtE3$jERn;KUniAN{rp%V4RrylJfx=6CFo?@a*{8 zCc`O!*@zKG@;Jn)wM zm02qXWByefJxZ)=z5$*cb1nHQ{>PO3%d?{DG*<}}@0e>zUkS!U$L1gWp1LkqGog1J z=DbTO!u$D5cH{Bxu6LVi0R)aDBDmIsbjgNN%rZL7j zxl{wjM91bIjI+HbfjR*&F@Mh{Eg18!VsonK;_xlNyowP=sX8#`U&ZEkZO5;_XL=xD zOmuAi!L#2r-pT@Gb@c@OmrOmLA>MJyrx!lxKaQxuGej-x+d^7pOS-vLa_?;~YP z7!w^wf5607*sSpb%r6+{WXV%7=3m7T{XKPOXx=fOef2b&2|FwP!8m32U2f?H@3>If zz3;dID;N_UM}M&9&E@2GuYhq%V$9Kk4UG9$ais2(_W;^M{4tmnb}%M7j{abr<@XX& zpmW_N3}(0kjQLk_^!V_SCbWNIGOe9pOmrOm!8j$OrEs9%6LT#oxWJg`IQj!7QGt_K zBw)&7Jo~OIjERn;KVXjW>wkvc#S$3I-g7YKU&Rso;ZxR^0P_<@9A#hlk16$+=cUf_ zu`|#)qy}T0XFXudKVF|@$J`Ke@+V8)1E$5#Ya#fzp{y60DS=*}yeFSy%K-+^dJdM(M0y!bs63<~^nG1~_raZ>d(c#-2ke|}{W`=Xiu6)u8v za(qYM@0tJPKVN4CAQs-S+U0>gL%ZVJP46(<9X&h7-JsB zI72S|H%`!AhMuElk__Z`5D#P~fIucF8KUv)8H+Pv7n z#;i5%L=1g@h~Ey@=RY;d@bx)%?LVfh=zreifJslNwD+z8o}-?W??Pw|nzukwMamfG zoZhcVIn zJnFd$cIHb&?0$PaD8GcsY>$L7(Xlziq=uc@i_jK}{0=dLFvfW=3dTh5^C%~EY|IJO zR|vuAFoy=fjK*LV#K4&7eSYSJ1~%rTY9GRzHS0kjqXpEgXicrc7kc9Gzn9TBg7!w^wL(wMKnPZ45i?Q_rz|_MSXG|fQ z3Cpda#!g^keo&o2$Qk%cLBA&^^HTADOi)*Yj-y#6Gi=OB)ei^`>eVVJmyY=zccB!< zM8}cy4Rfqa`ANii)BVKIS~ACYcC#`V6Bb8(DD2EB#Gt-lKhy(?8Si>`VN7%!q4+GZ zGp7-WtQ`)}IMp%6sZ|MMqT^`D`y_Ve3?i-3X{Q1(G2d~D)i5S3j@nLPXU-zDK3#VI z{j*Ef!kDl)Vm^b7IiWg-P+@B-f$p_2=Ut>8#ze=F{Y5Km%t_UG#D}e;{jq@QgRw7h zG{BhXIGS&_#>$jmK&<2*ZO;cx5{x-oy^m(X@?a=R8|=(Q#G!KGL(rbQgE7wWMi>(v zN5iLWu`@p+aN|2Ta{&_{W1MYGFeW;VEGq4=GnWw2TMD$$yOK$1DJy6)}I$oF_0QI*zQ29kDSdR96uBk%IicA7{o>7!w^wGu2Mmn3(4B@UwSx zD~ySbBgkqVOMM8YtvQ@&-v(pC;s}_WV`c8O&W1Bh+hI&}96?6fSebhbn&C{1P8bs% zN041J7AB?%Fq|pfjb_5mb&w@67Urb1lb8< zW$rbogEMaq!kFkdg6!(BGWVLF!I=@mFeWUHfE5~6=3aj-IMeSPjERmT$ZZP?6Vt>A z&U74uG0|}ZSvp~1PGWcg!I|Fg(M;I64sr&<#+2V{I|FB){s3db;s}_~U}f(0Gl4Tv zQ~xo6SSp$cxtm~R?)A%nGmp){nCRGq+%vE;_Zl(4nL2YYCOS4DTL!Gmy%PU$rrH9G ziH=Q3@E;2kQ#~HeRQw2IqGJ=%lE=cF#Ly*&Gi8=xOmu8QD&^Ri7*g19CgUd<6CIn7 zFg8}^Ua4g`lk5wOiH=Q3co_>5Q@-~X=2sXK9h;DtFBT@I7%ZGgy@qDO&WeyUEEeV@ zhN>u>$@U$_M8^@NF^YwWsZa@L^8SD^(QyRnRbpXcN*}_R`?p|BbR0oKh*+4D@_Xg= z;LLqHFeW;VAhA8H%)O#*a3%!~?!PsAa-#o9xPhE1B;kgYxmO767bYHziH;*k77QzM zugDafNk9N&!r}->PGM#4)iHuIzY)Tius8y$Mp&4b3OR7*3Neg{jw47f2Mcpjb*}~s zoH;>?X2Q;jkRl5$Gdn0@OmrMUf)ZGndj$#L%w8%O z6CFp8JONhb-UfF#v!4dWM8^@-?v9nYw{aTI?4^S-(eERujT#FRvm+PI>|}s3(QyRz z=VD=EHh99By-YABI*y=rPb|zy`MsTlaAqS5jERmTsIL$U6SGAP&a7vHG0|}ZHLPJ_ zVsUF}x#O#`ZGdnq9OmrMUJv10hLL!ju#7PGKMoZw}v~h!k0M7pb DRUJXx literal 0 HcmV?d00001 diff --git a/toinstall/logrotate.d/openvpn b/toinstall/logrotate.d/openvpn new file mode 100644 index 0000000..c088396 --- /dev/null +++ b/toinstall/logrotate.d/openvpn @@ -0,0 +1,19 @@ +/home/posdab/vpn/log/openvpn2.log { + daily + rotate 30 + compress + delaycompress + missingok + notifempty + create 644 posdab posdab +} +/home/posdab/vpn/log/openvpn.log { + daily + rotate 30 + compress + delaycompress + missingok + notifempty + create 644 posdab posdab +} + diff --git a/toinstall/vsftpd/dks.passwd b/toinstall/vsftpd/dks.passwd new file mode 100644 index 0000000..cc13a34 --- /dev/null +++ b/toinstall/vsftpd/dks.passwd @@ -0,0 +1,3 @@ +posdab +lgUpUMfTX09iY + diff --git a/toinstall/vsftpd/inst.txt b/toinstall/vsftpd/inst.txt new file mode 100644 index 0000000..e69de29 diff --git a/toinstall/vsftpd/pam.vsftpd_dks b/toinstall/vsftpd/pam.vsftpd_dks new file mode 100644 index 0000000..86a77e8 --- /dev/null +++ b/toinstall/vsftpd/pam.vsftpd_dks @@ -0,0 +1,6 @@ +#%PAM-1.0 + +auth required pam_userdb.so db=/etc/vsftpd/dks.passwd crypt=crypt +account required pam_userdb.so db=/etc/vsftpd/dks.passwd crypt=crypt + + diff --git a/toinstall/vsftpd/setupuser.txt b/toinstall/vsftpd/setupuser.txt new file mode 100644 index 0000000..928f696 --- /dev/null +++ b/toinstall/vsftpd/setupuser.txt @@ -0,0 +1,5 @@ +mkdir -p /home/ftp/users/posdab +chown dks:dks /home/ftp/users +chown posdab:posdab /home/ftp/users/posdab +mount -B /home/posdab/update /home/ftp/users/posdab + diff --git a/toinstall/vsftpd/vsftpd.conf b/toinstall/vsftpd/vsftpd.conf new file mode 100644 index 0000000..0573e81 --- /dev/null +++ b/toinstall/vsftpd/vsftpd.conf @@ -0,0 +1,67 @@ +listen_port=21 +write_enable=YES +#dirmessage_enable=YES +#nopriv_user=ftpsecure +ftpd_banner="Welcome to DKS FTP service." +#ls_recurse_enable=YES +#deny_email_enable=YES +#banned_email_file=/etc/vsftpd.banned_emails +hide_ids=YES +local_enable=YES +local_umask=002 +chroot_local_user=YES +allow_writeable_chroot=YES +#chroot_list_enable=YES +#chroot_list_file=/etc/vsftpd.chroot_list +#local_max_rate=7200 +anonymous_enable=NO +#anon_world_readable_only=NO +#anon_upload_enable=YES +#anon_umask=022 +#anon_mkdir_write_enable=YES +#anon_other_write_enable=YES +secure_chroot_dir=/var/run/vsftpd_dks +chown_uploads=YES +chown_username=dks +#anon_max_rate=7200 +#syslog_enable=YES +log_ftp_protocol=YES +xferlog_enable=YES +vsftpd_log_file=/var/log/vsftpd/vsftpd.log +xferlog_std_format=NO +xferlog_file=/var/log/vsftpd/xfervsftpd.log +dual_log_enable=YES +#setproctitle_enable=YES +connect_from_port_20=NO +#idle_session_timeout=600 +#data_connection_timeout=120 +#async_abor_enable=YES +#ascii_upload_enable=YES +#ascii_download_enable=YES +#pasv_enable=NO +pam_service_name=vsftpd_dks +listen=YES +##ssl_enable=YES +##allow_anon_ssl=NO +##force_local_data_ssl=YES +##force_local_logins_ssl=YES +##ssl_tlsv1=YES +##ssl_sslv2=NO +##ssl_sslv3=NO +##rsa_cert_file=/etc/vsftpd/vsftpd_dks.pem +##rsa_private_key_file=/etc/vsftpd/vsftpd_dks.pem +#userlist_enable=YES +#tcp_wrappers=YES +guest_enable=YES +guest_username=dks +user_sub_token=$USER +local_root=/home/ftp/users/$USER +virtual_use_local_privs=YES +##require_ssl_reuse=NO +##ssl_ciphers=HIGH +#userlist_enable=YES +#userlist_deny=NO +##debug_ssl=NO +pasv_min_port=11345 +pasv_max_port=11445 + diff --git a/vpn/.DS_Store b/vpn/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..c77d636ce93b222d2fe8a1900d4669eff9f9551a GIT binary patch literal 6148 zcmeHK!H&}~5FPJ^B~69s0crP`3lfJOk_AyDgcOzKus5V2H~`vBnuv`EN!6sSmQs`p z{{Z{}pTZaLIq=3dRhum*B!nuDG=5`y#?Cy;c1%QKI8A(_9ue74M$195MYx~!itOnY z?i4)6X$GZE*q9)qfpU1LCR1-rXziJ5#11BQXWW`NHJ7s?oDY!u3)1BHA704+32 zfh~Xifi5=y1C5PBv_OOk1*%Y?pBO^F9E1u-f1v#vg({qcoEhWjnT39#2>tL7u5>36 zC^V&Ez%a1Mz`m;X`2K(L=lB0+kf|943&U2gDDIH|CE7Ws5+og literal 0 HcmV?d00001 diff --git a/vpn/aran/.DS_Store b/vpn/aran/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..e8b21afad31e15f538123988cb6195fd006edc87 GIT binary patch literal 6148 zcmeHKPfP1S5TC8pZYyFBg74k-B6#SbLHvgZq52NqgoqwgG_gekF)K}K(OSvpc<&p% zFYrFjb7prdYW1k7%)sn#GJiJNU&3w%07R?T_5kVtAW;cRRUBRsij$5>$$2Iag_$FT z9I~B6pGC=7Hak8e1N81Ha0Us)(19oKPe&M`&te00@xKwY#Qi`)_oW#97{K z{u8B%^5j%S%9^ar)Q*D--4F6G?`5s9dq`KiVSW)gdr#}+(GH{ixYIwW&u!^65974c zHN|negDFP`aoX1XmhPqP%*+$mfRt5PJ*od347}B~hVqtHhYdCGnk!2UwcK1E4y$s0 z!Q0$9y}Y>{+zs!4o0WjTuhz({!x8*J;{_|%K{riwdXAA%)hL^h8DIvOfv?7Z+sEYe zS9@@NUS@z9cy|V9e^97|zQe+z**b7AEdXK}-A2%+pGK-t4tbTZ(8)g=;Z{ zEl0m{dA`HKqAdsEnh)XbEL?{o%-wN*Wzs?T7I|a_n1SaEQ16FQr}O{U+x@>u;(-}p z2EHc)qP!h!w{UIlY#m!AowW+}6qSVX3X6{=XqclIbLlAlfocT(iVQ^GVPO$HDEuQ} MXyAbv_)rEO0D +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 18 15:24:32 2017 GMT + Not After : Dec 16 15:24:32 2027 GMT + Subject: CN=DKS-MacBook + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:d5:b7:be:f9:2a:a9:76:89:c3:3d:c3:6f:d6:d8: + 93:00:21:9c:3d:33:99:98:dd:4f:f5:f4:37:f1:2a: + b2:b9:49:ce:17:db:cb:44:ff:59:35:fb:bc:01:f1: + 83:c0:b5:ea:7d:d7:d0:80:64:63:c4:19:7b:aa:8f: + 50:63:fd:84:25:74:a9:44:d0:a7:14:52:53:49:5c: + be:29:7d:b5:19:18:84:f4:90:66:ca:e5:e8:78:4c: + fa:2e:ff:7a:21:03:b3:a9:2b:cf:e3:70:a2:33:fd: + 4c:8e:74:31:01:fc:62:57:a0:0f:9b:8d:ca:b3:ca: + b3:07:55:8a:ce:e0:a4:86:99:99:f6:aa:f9:e8:8b: + cd:88:fb:03:fc:78:06:ab:6c:29:b6:97:84:61:14: + b8:eb:52:7b:0d:85:05:20:e1:bf:fe:c4:71:f4:7a: + 2f:59:2b:cc:13:c5:57:93:e3:a5:8d:1c:f9:02:91: + 74:8f:e2:50:e0:09:f2:40:a5:83:b7:0c:af:bc:1d: + 9f:67:fd:86:60:6e:6a:df:c1:15:e8:c4:75:dc:35: + 6f:27:fe:c6:e8:ed:72:37:4b:9f:42:ed:bd:be:2d: + 4c:a7:c9:82:42:b6:32:51:b9:12:80:03:80:bf:5c: + e4:da:f1:d7:7b:c8:7c:04:c6:e8:74:78:b3:39:13: + 91:a3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + E6:80:27:06:A5:15:83:D5:C7:15:9D:44:24:C2:E1:C9:9A:89:AC:BF + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 68:ba:f7:ed:8b:61:84:6c:1f:ed:f7:53:ad:f6:68:eb:96:31: + 9c:3e:06:0c:da:5f:b3:d1:55:50:18:5e:f9:37:ad:84:ac:6f: + 41:d4:00:04:a7:b0:1e:b2:ef:8c:d8:94:58:d6:5b:e2:15:09: + d9:57:05:61:87:69:62:6d:52:99:bb:cb:ae:96:b1:4a:f7:d2: + 03:18:16:c8:7b:5a:d5:af:ee:13:5c:3f:e9:df:ee:fe:12:cc: + ab:b8:89:6f:a7:ee:62:cf:bb:81:fd:a3:24:87:76:ad:10:bc: + 15:05:5c:9e:7d:07:bb:08:c6:68:69:9f:12:5e:ba:ac:19:fb: + c3:3b:fa:1a:fb:00:2e:72:a2:00:da:7f:02:50:a4:cc:9b:94: + eb:c8:b1:08:69:92:8a:00:10:23:85:78:f2:51:b0:8b:80:89: + 70:45:ca:d1:27:07:02:2c:c1:36:f5:82:43:aa:a3:bb:48:d4: + 36:64:be:72:88:02:80:c3:3b:1d:0b:f2:2b:93:ab:d6:29:3b: + 0e:19:8c:c7:39:ee:7e:aa:43:00:d3:d3:40:87:01:e5:82:27: + df:c0:69:e4:0d:fd:0d:1b:cb:b6:51:fb:3e:53:25:f0:0d:0e: + 18:43:9e:80:f3:69:a4:2b:1a:b0:34:a0:1c:46:c3:9d:be:1d: + b6:0a:52:32 +-----BEGIN CERTIFICATE----- +MIIDMTCCAhmgAwIBAgIBBDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxODE1MjQzMloXDTI3MTIxNjE1MjQzMlowFjEUMBIGA1UEAwwLREtT +LU1hY0Jvb2swggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDVt775Kql2 +icM9w2/W2JMAIZw9M5mY3U/19DfxKrK5Sc4X28tE/1k1+7wB8YPAtep919CAZGPE +GXuqj1Bj/YQldKlE0KcUUlNJXL4pfbUZGIT0kGbK5eh4TPou/3ohA7OpK8/jcKIz +/UyOdDEB/GJXoA+bjcqzyrMHVYrO4KSGmZn2qvnoi82I+wP8eAarbCm2l4RhFLjr +UnsNhQUg4b/+xHH0ei9ZK8wTxVeT46WNHPkCkXSP4lDgCfJApYO3DK+8HZ9n/YZg +bmrfwRXoxHXcNW8n/sbo7XI3S59C7b2+LUynyYJCtjJRuRKAA4C/XOTa8dd7yHwE +xuh0eLM5E5GjAgMBAAGjgZAwgY0wCQYDVR0TBAIwADAdBgNVHQ4EFgQU5oAnBqUV +g9XHFZ1EJMLhyZqJrL8wPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9Sh +E6QRMA8xDTALBgNVBAMMBGFyYW6CCQCutQIacQKTlDATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBAGi69+2LYYRsH+33 +U632aOuWMZw+BgzaX7PRVVAYXvk3rYSsb0HUAASnsB6y74zYlFjWW+IVCdlXBWGH +aWJtUpm7y66WsUr30gMYFsh7WtWv7hNcP+nf7v4SzKu4iW+n7mLPu4H9oySHdq0Q +vBUFXJ59B7sIxmhpnxJeuqwZ+8M7+hr7AC5yogDafwJQpMyblOvIsQhpkooAECOF +ePJRsIuAiXBFytEnBwIswTb1gkOqo7tI1DZkvnKIAoDDOx0L8iuTq9YpOw4ZjMc5 +7n6qQwDT00CHAeWCJ9/AaeQN/Q0by7ZR+z5TJfANDhhDnoDzaaQrGrA0oBxGw52+ +HbYKUjI= +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDVt775Kql2icM9 +w2/W2JMAIZw9M5mY3U/19DfxKrK5Sc4X28tE/1k1+7wB8YPAtep919CAZGPEGXuq +j1Bj/YQldKlE0KcUUlNJXL4pfbUZGIT0kGbK5eh4TPou/3ohA7OpK8/jcKIz/UyO +dDEB/GJXoA+bjcqzyrMHVYrO4KSGmZn2qvnoi82I+wP8eAarbCm2l4RhFLjrUnsN +hQUg4b/+xHH0ei9ZK8wTxVeT46WNHPkCkXSP4lDgCfJApYO3DK+8HZ9n/YZgbmrf +wRXoxHXcNW8n/sbo7XI3S59C7b2+LUynyYJCtjJRuRKAA4C/XOTa8dd7yHwExuh0 +eLM5E5GjAgMBAAECggEBAKhgYJxMKUET3nedr1JURNR4pnBtY9jUm/fJ1f0yR6bF +aBLR/r64ct+eGgxp7AR7DmjhDArrjNJlxVGmIY71oBQmamml/cx749RLtiJYQMKp +164aynGWWuXUt9MpQl4aXYSt2NZ22cQeDx+4mRfYcN5aY5GJT6cAzrW7hmXhBJ5p +mm4TDxNG7GRGNYaZ2UHzHWTbg1+raWJb7bJMGsN4A3HaI6XYxzY424bMBMksxuvU +cyoyPNtflrnKpp9UOf/x14T0z3fqXp9geZLQ9du/jUsCdx6F+0txQYv28fbW+aNA ++/pEJ/BWKLFAdISds+ot3IOnvT6hjrwRVCRVegP9i8ECgYEA+IGPUUZiv9rQz5oj +AoPRLtwgzvXW28HKLyOqv01TGp2fW1w+LzLPznqnXpH80SliRWgR+BW/ySkWY9tm +9fV5xYdLvkrIkUTdmr+ig9vUdNARsUfjDSA2gXo8emFPf3wPG/N2cv+trBXTwOFH +CYgzUc2voaSYMKYqOdl89kIt/gMCgYEA3CmfvGoavHYSPQHTjUQjIbmK5thR+8ZF +Mt6BLQsKA1w/lOqbCqGWO/t1KthQyHouvDy9KM5/ynpmzfP86EKIuAHCj9AibS2y +ZOz0VtuLDr5of+PDC+1fMUlZqglK/CQrCRQIy/BRPT/IPGYwNY0oARVrGZo///B6 +ZqK/5HufG+ECgYAuLk2G6hCh3LUfT2KgLgTqs2e5bkAueJXtKrCpemIuOQqLPNol +hUjO80Y1MeYMrKchhNSKCOiqJmONzREWNjcZ+SmfRGB/do/EGUbHQEv8JUqUamqM +XuciKqggigLvCwv3wsfJWTBaIXhHiNXdtJzs3896t468w7RnKb6qOOQ5JwKBgGD8 ++UCgoYyamyhDELYv6SYnPdi6PUukKcHiIZf9P/kA/4WT4J9LVgqwmQo550SaBtKo +E1DRv5wsVfOu46BSBzbAl7yRHUlpkyhA9tb4uobRPOnyJW+wr3nf7V8p3t269TZ3 +m/RztuY7nfN1tREyUQhBLkBGIqGWh+WFFvIJv6shAoGBAPS8cH4V3xcNi+I+C+N5 +uBrGKCDr5bG8Z71flhO0r+1WUgD84vlbDeAze49mK3H/pwvUiUx50t8lOxwG3vew +JsQLhVlrxbgvWGvOsNqP0qpIJ2Lpv9yIjAAScWlA4vtBconziyVvbxYMKSilsErq +m8CB+n/lCTBooEgUuA6MO6DL +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-Solana-ExternalMirror.ovpn b/vpn/aran/clients/DKS-VPN-Solana-ExternalMirror.ovpn new file mode 100644 index 0000000..a4238dc --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-Solana-ExternalMirror.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 19 07:31:35 2017 GMT + Not After : Dec 17 07:31:35 2027 GMT + Subject: CN=Solana-ExternalMirror + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:d3:43:98:29:91:47:cc:2e:0e:df:04:6c:aa:5e: + 67:16:af:e7:d3:1b:59:5c:12:e0:4c:00:38:a4:34: + ae:a5:f2:c8:bf:a3:e9:03:b9:5e:7b:87:1a:13:00: + 5d:71:86:f2:16:30:0a:6a:44:23:fd:a1:0a:b6:58: + 92:c7:4e:f0:c2:17:c9:53:72:6a:d3:76:f3:6d:bf: + 1b:7d:64:70:a5:fa:e9:3d:fb:8c:71:70:a3:4f:5e: + 19:d8:18:aa:91:67:9a:91:7c:48:03:df:7c:95:ff: + 32:fb:b4:b0:6a:3f:49:d2:f8:e5:ca:6f:ed:30:85: + 82:34:3d:30:24:e6:16:ec:b4:3a:af:0c:4c:25:b8: + 60:5a:23:c5:a4:63:47:70:e8:f9:bb:b4:3f:da:6f: + 50:ac:19:a6:fc:c6:40:2f:8a:18:42:4b:e4:37:ca: + c9:a8:6e:c4:8b:3b:29:e2:9a:a5:9a:94:86:66:86: + 5d:27:3e:2f:88:fd:4f:a9:03:49:5a:0e:db:15:bc: + 9a:de:e0:f9:d6:87:e9:73:b9:3c:9e:25:b6:7d:ed: + 21:b5:8e:20:00:65:8f:26:ea:6a:e0:09:2d:11:16: + 52:0d:90:dd:d6:ea:93:e4:e4:c0:7a:28:fb:e4:d1: + 41:3d:86:d8:18:5d:fe:c0:c2:14:7d:63:cb:f0:7c: + 1e:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + 71:AF:B1:64:51:B7:DE:70:FB:CE:89:7B:22:BD:C1:C2:15:0C:61:11 + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 9d:c0:15:cf:bb:2a:a6:30:ca:42:27:cf:db:02:22:ef:fb:54: + 13:d8:9b:74:43:77:50:98:1a:6d:ec:f5:ef:42:1f:fb:dc:5f: + 8c:42:ca:fa:e8:f2:76:76:f5:95:d1:cd:49:24:ec:fd:47:12: + 5a:e3:f5:88:44:d3:0e:32:02:d7:f0:9c:5d:d9:93:90:36:8d: + 45:c9:dd:ad:62:32:f1:72:1b:10:c6:bc:e7:31:85:0e:6f:f2: + bc:c2:34:51:21:eb:dd:ec:4d:76:de:b9:a2:7f:2f:81:da:98: + 41:aa:a9:9c:26:e7:d8:50:ff:9c:30:d2:4e:43:9a:df:36:67: + 8c:87:cb:b5:34:34:e0:08:96:85:ec:d4:ab:4b:1b:62:72:3c: + 39:2c:42:b8:d9:b6:e5:25:02:a3:f6:89:b6:b2:49:84:e7:ae: + 58:9a:5c:5b:4e:eb:27:50:cd:2d:70:4b:a4:01:76:11:13:1e: + ea:44:2d:95:97:b1:7d:c2:09:3a:06:2c:b6:a3:2c:80:f9:4b: + 4e:44:15:91:70:c3:5a:cc:5c:95:6d:4d:c4:f4:53:5e:39:bc: + 63:8a:e7:be:1c:dd:6b:2d:8b:18:14:e9:e0:8a:7f:c9:50:e7: + 8a:ad:0b:5b:6e:66:86:eb:4f:21:d2:66:7d:ef:7d:37:a5:4a: + c8:40:dd:ce +-----BEGIN CERTIFICATE----- +MIIDOzCCAiOgAwIBAgIBCDANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxOTA3MzEzNVoXDTI3MTIxNzA3MzEzNVowIDEeMBwGA1UEAwwVU29s +YW5hLUV4dGVybmFsTWlycm9yMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA00OYKZFHzC4O3wRsql5nFq/n0xtZXBLgTAA4pDSupfLIv6PpA7lee4caEwBd +cYbyFjAKakQj/aEKtliSx07wwhfJU3Jq03bzbb8bfWRwpfrpPfuMcXCjT14Z2Biq +kWeakXxIA998lf8y+7Swaj9J0vjlym/tMIWCND0wJOYW7LQ6rwxMJbhgWiPFpGNH +cOj5u7Q/2m9QrBmm/MZAL4oYQkvkN8rJqG7Eizsp4pqlmpSGZoZdJz4viP1PqQNJ +Wg7bFbya3uD51ofpc7k8niW2fe0htY4gAGWPJupq4AktERZSDZDd1uqT5OTAeij7 +5NFBPYbYGF3+wMIUfWPL8HweZQIDAQABo4GQMIGNMAkGA1UdEwQCMAAwHQYDVR0O +BBYEFHGvsWRRt95w+86JeyK9wcIVDGERMD8GA1UdIwQ4MDaAFKlRL5fjFcXVqjcd ++ooH8ao6yX/UoROkETAPMQ0wCwYDVQQDDARhcmFuggkArrUCGnECk5QwEwYDVR0l +BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQCd +wBXPuyqmMMpCJ8/bAiLv+1QT2Jt0Q3dQmBpt7PXvQh/73F+MQsr66PJ2dvWV0c1J +JOz9RxJa4/WIRNMOMgLX8Jxd2ZOQNo1Fyd2tYjLxchsQxrznMYUOb/K8wjRRIevd +7E123rmify+B2phBqqmcJufYUP+cMNJOQ5rfNmeMh8u1NDTgCJaF7NSrSxticjw5 +LEK42bblJQKj9om2skmE565YmlxbTusnUM0tcEukAXYREx7qRC2Vl7F9wgk6Biy2 +oyyA+UtORBWRcMNazFyVbU3E9FNeObxjiue+HN1rLYsYFOngin/JUOeKrQtbbmaG +608h0mZ97303pUrIQN3O +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDTQ5gpkUfMLg7f +BGyqXmcWr+fTG1lcEuBMADikNK6l8si/o+kDuV57hxoTAF1xhvIWMApqRCP9oQq2 +WJLHTvDCF8lTcmrTdvNtvxt9ZHCl+uk9+4xxcKNPXhnYGKqRZ5qRfEgD33yV/zL7 +tLBqP0nS+OXKb+0whYI0PTAk5hbstDqvDEwluGBaI8WkY0dw6Pm7tD/ab1CsGab8 +xkAvihhCS+Q3ysmobsSLOynimqWalIZmhl0nPi+I/U+pA0laDtsVvJre4PnWh+lz +uTyeJbZ97SG1jiAAZY8m6mrgCS0RFlINkN3W6pPk5MB6KPvk0UE9htgYXf7AwhR9 +Y8vwfB5lAgMBAAECggEALTX09UhS7h4ZLp7axmbndtJ0MRhUOkEL4RfXB0UC7x6S +2XgxYIul7ZeO++wDE02GtzrWr8EfVqLFERrJZn+9RDwk6Ie+1rxJAf542o/JD6wv +iAUyHAC34j9IFpfIwM9EI8hN/Q4xskPn3Dfh3QroOI7tVjI3tz+LCrThfbQDyemw +ODdMFULubGHKsLtfb60CgJ1m1ymal/aa4ZtGWsCx1eMObvV4n+7zwTZEk0sYZhhc +VYEOLDwuON9Nj6ur10Mk7LqKLDuJLyGqcguOB7uVW9MlUpdcEaIlWdx8rgOW3Oht +63tAu2fDBp4+3wD8noEotouJJ1wnC39ssz0m100IgQKBgQD4blHPdZ5VpDtI+KOR +lrdmPhdyiPD2jtdJ8T9CJMc7TubdoiluA9PwnOGMHtzsjYzxAmNkrqx6RnJFe1Mq +ozvVaTQbDWm/Uls6wNjmp9Ht3JPVFh/8tPyQGpl3vzcy1wOa2Ojb/85j7xvAL9CB +POSXObXjStxmK3xPEjIoT1lbIQKBgQDZs2KXw+yiQrDG85eM6OEYSfnnIt3yszR5 +xYYUlYnrvlEIX35IeEaTwAXypk4JoouZvOT4e+KBmka6imQte23OIc0PT2Y6MZ5Q +2LJfgNt1HWNH9GwsOHD0dg86hneJFb57C4dijTG32P66uSUHzGFHghrjC1xHfamm +DDnCpsc+xQKBgHWupLh2yhNdoevWRH2h/KzFOww5jJPvZFKVolat32bb4Ica2y9P +RuWTG1DqCdNQ1nQQoo6+I9wkZNs/KU1oV96nYFR0TSShWbACTH0vAEYCGFF3kp1+ +Cqokv5A3F2nQ6tc+a0hT7Cvwx5+JxuaBtvNgFiZefvszHEbEotfvhq+hAoGARJ11 +hcAK5Vl/vjUonxEHYVBvo5opukUhVQAcsoAvaE4j3C+87bp7BDaRqVkhX4gL1/jh +cjAZxB+MC19zE6LDiSS+LQUpg04ASBsEnXVPtin9EMDJF2bysxpC0n9vTZW846tO +kJFQClIqd0/DjCGux4sKTmVWQHIq9lsEGYXXZsECgYEA9OSFIO+3wQyXcvSHS7lz +uZfMXbzL0PPKXCJ7ioNbrojoyAQfkN2H3GpkepLLluWpNiAwF/sNmgss0Bwr1e8M +yvs6myNWPoW6/wts2uTPsH/EepGDC8rci2O0kBN3qbsID9LL9fiEiuWf37XYvYib +sby0yCR+8SJqNjTOrX6unUs= +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-Solana-IM1.ovpn b/vpn/aran/clients/DKS-VPN-Solana-IM1.ovpn new file mode 100644 index 0000000..b850a63 --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-Solana-IM1.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 19 07:30:46 2017 GMT + Not After : Dec 17 07:30:46 2027 GMT + Subject: CN=Solana-IM1 + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:e9:06:db:50:2d:03:33:39:da:a3:d6:59:f6:05: + 5e:66:39:ca:a9:14:74:80:12:08:be:83:74:04:a6: + e7:2a:bc:65:fb:1d:18:1f:4c:58:43:43:a1:a9:07: + c3:f4:79:90:e4:91:a0:1c:86:da:96:e8:53:c2:89: + b9:8f:c1:a9:b6:09:3f:d7:ac:27:ae:f0:85:64:6a: + 99:f2:10:95:50:97:e2:56:bf:73:c1:a4:97:b6:bc: + 49:ab:cb:2a:0c:98:2f:a5:bf:e6:d9:85:b2:00:11: + 0e:12:b2:01:8d:3e:06:1d:5e:a0:1d:42:c8:ce:e7: + 06:77:fd:9c:0f:17:cb:f7:3f:6d:45:1b:fd:a9:23: + 2c:b5:dd:a8:73:39:b9:da:00:7f:e9:fa:a7:a6:03: + 16:e2:87:80:af:11:eb:e9:01:ae:8c:56:89:7a:20: + b2:a2:cb:f4:96:7b:85:a5:97:2c:65:56:68:7a:73: + 53:30:80:59:6e:c0:ba:e3:48:b4:b0:e0:10:6c:96: + dc:e7:9a:d6:89:14:a5:c7:34:74:83:e1:dd:62:64: + 10:66:b3:0d:0e:6a:4a:26:08:e4:40:ea:bb:c9:94: + 42:d0:f7:c5:7d:93:13:ea:32:58:16:04:05:a6:68: + 89:de:10:f0:38:4b:a4:e9:fe:4a:96:28:66:e6:b3: + a7:7f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + 4B:7F:8C:C1:6C:F5:F9:44:20:F5:BA:80:B3:C3:AD:65:F5:89:21:6D + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 50:ef:fe:01:f4:da:0f:13:93:c1:e0:d1:80:15:a9:ad:f0:48: + e3:df:d2:2d:bc:a2:9c:e2:9f:af:2c:38:3e:34:7f:fb:ee:03: + ab:03:db:b2:d5:1a:6c:f4:2d:24:8c:e5:ba:ff:3d:8c:54:7e: + a4:2f:95:2d:91:0b:cc:7d:4b:27:38:0c:a6:75:a6:21:9e:e8: + 75:4a:75:43:09:08:a1:cb:ad:e1:48:f4:1d:1a:53:8e:ff:76: + 1e:cf:9e:dd:ce:74:79:ca:50:d9:6a:60:a7:53:73:ed:57:3f: + 9c:92:e8:bd:58:18:4b:c6:f2:99:da:89:e1:61:79:4e:82:8b: + e7:ea:4d:21:49:bb:b3:b4:0a:87:b6:63:1c:8e:0c:1e:b2:e7: + 91:2d:64:86:e4:57:c8:fa:3b:05:a1:5c:7d:35:96:97:f2:90: + 98:2d:1d:a6:9a:5c:83:26:a3:b3:ce:bb:c4:bc:55:49:5c:4c: + 68:0b:48:7c:8f:97:82:0a:40:66:f2:af:05:6e:a6:e5:ec:15: + f9:4c:7b:c9:a4:3b:2f:9d:cf:98:a9:50:62:b2:5d:eb:65:5f: + 6c:5e:b3:3b:65:36:8f:c0:ef:ea:c5:80:07:6e:55:5f:78:44: + 46:4b:57:50:ed:ab:1a:bf:6d:4f:fc:53:cf:e8:05:88:59:27: + d6:15:e9:fb +-----BEGIN CERTIFICATE----- +MIIDMDCCAhigAwIBAgIBBTANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxOTA3MzA0NloXDTI3MTIxNzA3MzA0NlowFTETMBEGA1UEAwwKU29s +YW5hLUlNMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOkG21AtAzM5 +2qPWWfYFXmY5yqkUdIASCL6DdASm5yq8ZfsdGB9MWENDoakHw/R5kOSRoByG2pbo +U8KJuY/BqbYJP9esJ67whWRqmfIQlVCX4la/c8Gkl7a8SavLKgyYL6W/5tmFsgAR +DhKyAY0+Bh1eoB1CyM7nBnf9nA8Xy/c/bUUb/akjLLXdqHM5udoAf+n6p6YDFuKH +gK8R6+kBroxWiXogsqLL9JZ7haWXLGVWaHpzUzCAWW7AuuNItLDgEGyW3Oea1okU +pcc0dIPh3WJkEGazDQ5qSiYI5EDqu8mUQtD3xX2TE+oyWBYEBaZoid4Q8DhLpOn+ +SpYoZuazp38CAwEAAaOBkDCBjTAJBgNVHRMEAjAAMB0GA1UdDgQWBBRLf4zBbPX5 +RCD1uoCzw61l9YkhbTA/BgNVHSMEODA2gBSpUS+X4xXF1ao3HfqKB/GqOsl/1KET +pBEwDzENMAsGA1UEAwwEYXJhboIJAK61AhpxApOUMBMGA1UdJQQMMAoGCCsGAQUF +BwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAUO/+AfTaDxOTweDR +gBWprfBI49/SLbyinOKfryw4PjR/++4DqwPbstUabPQtJIzluv89jFR+pC+VLZEL +zH1LJzgMpnWmIZ7odUp1QwkIocut4Uj0HRpTjv92Hs+e3c50ecpQ2Wpgp1Nz7Vc/ +nJLovVgYS8bymdqJ4WF5ToKL5+pNIUm7s7QKh7ZjHI4MHrLnkS1khuRXyPo7BaFc +fTWWl/KQmC0dpppcgyajs867xLxVSVxMaAtIfI+XggpAZvKvBW6m5ewV+Ux7yaQ7 +L53PmKlQYrJd62VfbF6zO2U2j8Dv6sWAB25VX3hERktXUO2rGr9tT/xTz+gFiFkn +1hXp+w== +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDpBttQLQMzOdqj +1ln2BV5mOcqpFHSAEgi+g3QEpucqvGX7HRgfTFhDQ6GpB8P0eZDkkaAchtqW6FPC +ibmPwam2CT/XrCeu8IVkapnyEJVQl+JWv3PBpJe2vEmryyoMmC+lv+bZhbIAEQ4S +sgGNPgYdXqAdQsjO5wZ3/ZwPF8v3P21FG/2pIyy13ahzObnaAH/p+qemAxbih4Cv +EevpAa6MVol6ILKiy/SWe4WllyxlVmh6c1MwgFluwLrjSLSw4BBsltznmtaJFKXH +NHSD4d1iZBBmsw0OakomCORA6rvJlELQ98V9kxPqMlgWBAWmaIneEPA4S6Tp/kqW +KGbms6d/AgMBAAECggEBAIIYHeCJALxclD/br6W2IZmYshfrH49Qgik6Yk8mjvBA +9f5Xo9v1V2FWJK6lczTNmaLB2k2Sy/5r/jchhMNJL2I9j7LsncsA5LfG++M0dufj +o60ifZGiPkD6pXaPmg4l+JPkqxDNny6CVwUA8/TSp79F0MYFPu6j8+yRXcrfUjPZ +2ES4GJg+8xVt5ZvZx8MZAu/3FLBr5/BW0l+Zc3p/Z5KEiFatmP+yh01s2Ns2n0jN +s29snLtLiYFEt/CBt/T26+To0S5Kez97oCqAlF/3dfntLhhCmtFOinIIvpaaZRUG +DwRpIzO8Qn9c6GgYl7ggPssWbbICBKkKoauCsovXROECgYEA/tiQz911dWk5cPHF +0Y+yORhrYd+t4S/s1snP/d3yYimudbd32K/fW1HWUd1jUBZix+05WfKQuAFA/Okh +nbwdru+1Pjy6PQIurtpJ0Ii//EnR5QcRbDQrf2HezGHRvtrlgumDLNhWLTMizPgq +My2zmwcO4IgUhFA/P5kW9N+ygpUCgYEA6hT/LVhuE9nNehNFXf+vqIP29gOtSIgL +SytlHco4kLBgaOAWtC9aJeedSzwoXkkYbcZZJn+CKqTXpE3hD+mZpzu/9uPHJgJx +NDPqSNm3dTkgSfQgjqlQXqzbTfm8EoO/xABASmowPD85IlphZN4+uNtkvTTnvJSZ +/ym0kbD1cMMCgYApe7821unDzvkWtYRp9GYifSMdr3dybIa0/+znejV2XSqU5uSP +VTGaf9vPP6Zm5v31ZVwslBuSmEGn6ZsbPf/m9gYet2vpem128PmLBHeb7bhI+7mO +T3+1II1P36xw0NkDUleT+TMt8GD91HeqFQpjdeaqDfyo/RcOlzDxc2hvcQKBgQCT +LXx8EFu1033kQXWd8oOJmt+OMyWisxcWvkQnhNwn7R3REwRzakpuBsDZawuerKrV +ap7nG8jF8zs6rVTS4neftGuwWer/NQ3kWrf18h3tcGui1AIccMx9moWQ83KS2Y+b +NuU1ZKrLVp0fwl/2Qd6B8D/YzwjdgzmIO7qy1+aabQKBgHAf52mMON81fkeMVej8 +iakJ7/bOtylVAqj4WQYt1rd8Za3KpmX/irJ8YDKMNS5bccTfyw+E/bmAOibw/Ymi +YDo+aINMjHErN+/O8Q13G481a59WE7lPFRa7/m8zhxMXgDp8G+tFduws0PSEufXb +vpc93F7W7Jh48jYwDPB07TmF +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-Solana-Server.ovpn b/vpn/aran/clients/DKS-VPN-Solana-Server.ovpn new file mode 100644 index 0000000..7af26b6 --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-Solana-Server.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 19 07:31:00 2017 GMT + Not After : Dec 17 07:31:00 2027 GMT + Subject: CN=Solana-Server + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:c4:22:8b:77:0e:30:0b:1c:2e:bb:92:23:a9:79: + 9e:46:c8:5a:ca:7a:bc:37:9c:b7:82:2a:8b:08:ab: + 4a:f8:26:0f:7a:a1:39:45:ee:41:14:01:6a:03:c8: + 1f:db:b4:52:80:db:86:28:62:28:c1:40:8d:1a:87: + db:ce:8e:1f:38:d3:0b:f0:7d:17:bd:e8:d5:06:51: + f8:db:be:9b:14:23:f1:cc:51:93:25:55:ee:b7:91: + 74:10:b5:7f:6d:b7:ee:2a:62:c1:5c:61:d8:75:f9: + ea:52:1c:6d:08:7a:11:67:ae:96:10:b9:3f:4c:da: + 1d:9d:46:ea:99:c0:57:7a:1f:9a:dd:4e:57:59:67: + 76:82:54:5e:8e:fe:39:93:6c:0d:65:5e:ab:27:f7: + b9:88:5b:68:4f:d6:96:31:36:ec:87:88:d5:6d:95: + a5:c7:92:1d:d8:57:53:4f:ea:05:95:b5:6f:e9:c3: + df:fa:dd:e7:1d:16:ca:7c:6a:7d:bc:66:58:e4:e2: + 56:39:2e:a4:f8:4c:b1:47:f1:f0:6e:16:0e:99:cd: + 56:1d:a5:cc:2b:fa:42:6c:d5:8a:95:79:0f:43:91: + 31:c5:17:66:15:ca:2a:46:df:a7:b4:48:6a:ae:31: + 62:08:5d:3c:90:66:41:aa:29:4a:7b:9e:38:56:6b: + 3a:53 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + B3:7F:35:91:61:87:67:80:35:12:89:9F:34:EF:7A:38:C3:8D:E4:43 + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 73:6e:6a:89:32:09:9c:54:a3:00:db:97:39:ce:99:f8:1a:04: + 8e:1b:08:34:d8:27:ba:23:ae:20:f7:c1:81:01:97:60:19:cf: + 3d:82:90:16:1c:43:63:76:c6:ce:3e:eb:d6:b8:52:f1:32:8c: + d7:ee:14:c8:65:30:a1:2b:ba:09:81:7b:18:00:be:c2:30:4a: + 95:8c:7a:ad:9c:ce:1c:a2:54:0b:15:69:56:eb:91:e1:8a:40: + 0f:55:fa:35:a0:f2:c5:0e:1e:1b:7b:80:8b:53:e0:e1:f9:5c: + 21:07:8f:04:01:65:b5:06:dc:da:fe:f3:7d:98:e2:bc:6b:35: + 7c:42:f1:9a:39:10:c6:6f:81:5f:bb:f6:7f:34:8a:84:94:26: + 72:4e:6d:33:68:90:8b:4c:ba:44:f6:3b:dd:92:22:1d:ef:09: + b5:8b:1e:76:82:ec:32:85:04:0a:43:73:b1:9a:ef:0c:94:b1: + da:1a:83:42:79:be:19:bf:3b:04:18:7a:d8:57:67:37:9e:19: + fe:58:cb:ab:e8:03:1b:22:51:a4:d4:f7:1c:02:aa:ba:1f:2c: + b4:7e:94:58:d6:3d:9b:a5:b9:69:cb:b0:39:c9:60:f0:83:1d: + fd:e2:ad:25:87:44:49:a1:17:72:57:cd:1e:a1:53:5d:ec:69: + 25:20:97:4a +-----BEGIN CERTIFICATE----- +MIIDMzCCAhugAwIBAgIBBzANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxOTA3MzEwMFoXDTI3MTIxNzA3MzEwMFowGDEWMBQGA1UEAwwNU29s +YW5hLVNlcnZlcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMQii3cO +MAscLruSI6l5nkbIWsp6vDect4IqiwirSvgmD3qhOUXuQRQBagPIH9u0UoDbhihi +KMFAjRqH286OHzjTC/B9F73o1QZR+Nu+mxQj8cxRkyVV7reRdBC1f2237ipiwVxh +2HX56lIcbQh6EWeulhC5P0zaHZ1G6pnAV3ofmt1OV1lndoJUXo7+OZNsDWVeqyf3 +uYhbaE/WljE27IeI1W2VpceSHdhXU0/qBZW1b+nD3/rd5x0WynxqfbxmWOTiVjku +pPhMsUfx8G4WDpnNVh2lzCv6QmzVipV5D0ORMcUXZhXKKkbfp7RIaq4xYghdPJBm +QaopSnueOFZrOlMCAwEAAaOBkDCBjTAJBgNVHRMEAjAAMB0GA1UdDgQWBBSzfzWR +YYdngDUSiZ8073o4w43kQzA/BgNVHSMEODA2gBSpUS+X4xXF1ao3HfqKB/GqOsl/ +1KETpBEwDzENMAsGA1UEAwwEYXJhboIJAK61AhpxApOUMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAc25qiTIJnFSj +ANuXOc6Z+BoEjhsINNgnuiOuIPfBgQGXYBnPPYKQFhxDY3bGzj7r1rhS8TKM1+4U +yGUwoSu6CYF7GAC+wjBKlYx6rZzOHKJUCxVpVuuR4YpAD1X6NaDyxQ4eG3uAi1Pg +4flcIQePBAFltQbc2v7zfZjivGs1fELxmjkQxm+BX7v2fzSKhJQmck5tM2iQi0y6 +RPY73ZIiHe8JtYsedoLsMoUECkNzsZrvDJSx2hqDQnm+Gb87BBh62FdnN54Z/ljL +q+gDGyJRpNT3HAKquh8stH6UWNY9m6W5acuwOclg8IMd/eKtJYdESaEXclfNHqFT +XexpJSCXSg== +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDEIot3DjALHC67 +kiOpeZ5GyFrKerw3nLeCKosIq0r4Jg96oTlF7kEUAWoDyB/btFKA24YoYijBQI0a +h9vOjh840wvwfRe96NUGUfjbvpsUI/HMUZMlVe63kXQQtX9tt+4qYsFcYdh1+epS +HG0IehFnrpYQuT9M2h2dRuqZwFd6H5rdTldZZ3aCVF6O/jmTbA1lXqsn97mIW2hP +1pYxNuyHiNVtlaXHkh3YV1NP6gWVtW/pw9/63ecdFsp8an28Zljk4lY5LqT4TLFH +8fBuFg6ZzVYdpcwr+kJs1YqVeQ9DkTHFF2YVyipG36e0SGquMWIIXTyQZkGqKUp7 +njhWazpTAgMBAAECggEBAK94WF2DC+hkpkqZS95rN/cLeG59r7XxNxv1A74VwVSQ +eHi1lI/Dv+Ut/rKzcA0XHli6DSRD7UI3hgWeVkBNVhF4fs4AnCUDENI+s+2kcQlr +vv+UW5ijcJY6QyRPvFlknGa/Q05rG0Uw+TnMxJ841il0QD1l/gO7f5MdxvUW5ywR +Vkqwqj2v/FV9stM33KSo4gAixMqWAodQm+SwQnk0tVdPfxVI6LhRCymWZSogHXd/ +joZ+rMzVCrWspEadujrsacV8R9xVbMTQx9M019P+ozuNOembQMpeF+3gxpEJv9r3 +jZgiAs/O9JXnnhKdOzKPjiQj9XHV0g58OKpjKrFZ5UECgYEA/lDPNWfxKXh0M5m9 +b8L++FoA41KsZz5S/Wpn4GRiFGN54+WDIJMd7FO60ZGYt8dgMjqe4HOHQRJhA8c7 +jGB9Wii0O3N7aSAZx5CJoSYcREouoiEzSbe14cBQTaBhLawstGTqTV/0kx6AsyTA +A8Eh1MPXVzbyKww2EPnsoLypM38CgYEAxW8XIBBvYELNX819xrh5oLlUm4TWvRTA +V/Dw7o32I4BtJ+5hrghLhSDYYb7aeYopwxbc9WstVCeZi2IBxmSCPwhM7JessnTD +vwzBXgSRbHH9IROnLFPtUp1kjzWAmL4HA+0nfrJ5LqBw5E8A0HwNEZmsLAWbnJ+i +XbMsI3CFUy0CgYAM4B59f7Ov+882RZRXsjGidTwSRj9AQuGEvvxfWfW1PowPQ7Ft +1sTvEBYnQg3PUCLIqDse9fplCv8qZ83V/5SZGfJ2CBS5b8yeU+0D4aAQvQi7YJ7u +HoTw1wG5zGLfIxZoU6uhGziQsjyl1Th7eC20Te37FmcQUt/x4BVg1exjFQKBgQC7 +YlGHfDHJIf38VHNwvTurANs9c5nAAccAcEyrjY80aLqxMH4DCBptMxxLwTFoM2qp +n7R9NYjjG2aOtKlMm65GluEzmE0vXsU+OaP5UMqZK6L81sNOviU7yOhdR4FS9uB/ +qIFYrZl4WIxtFFKIjYR11O1lJrlnsNcQqXJV/IB9zQKBgQDxdKzUbdgtYKQ6a5j3 +hnKL4vGYq+9aDs3rNHzWsgfPkxwZad0nYprm3V5iirkNPffeYgao+uKzQvD7f6Tt +Wue5olYxIFzfry6IiICCQ9ITLbnnjj2RzcB8W3R5/c2yD8D5nFPjESH6bG1lA/OK +nlNB6cd2MdKKfLFv2z1DatEd8w== +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-Solana-iPhone.ovpn b/vpn/aran/clients/DKS-VPN-Solana-iPhone.ovpn new file mode 100644 index 0000000..bf0aee7 --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-Solana-iPhone.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 19 07:30:55 2017 GMT + Not After : Dec 17 07:30:55 2027 GMT + Subject: CN=Solana-iPhone + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:cc:40:cc:b6:31:84:be:99:00:85:63:c2:b7:8e: + f0:77:97:4c:e3:b1:ab:97:d9:10:ab:a6:12:ba:8d: + 66:6d:db:4c:a4:80:8a:99:92:c4:a9:d0:47:1e:c1: + 57:0f:f3:9c:83:69:1f:3f:52:e2:01:ef:a2:eb:31: + 3c:05:cf:a4:ec:96:18:41:5f:3a:9d:78:ec:eb:02: + 68:79:1b:c6:81:80:d2:8f:61:2d:64:86:f7:68:a4: + 97:37:0c:8b:bb:eb:db:7e:24:1c:08:16:6c:92:e9: + 36:02:a4:b9:a3:f6:32:5a:6a:5c:65:f3:02:f3:da: + 2b:01:90:b9:f7:dc:b3:72:8b:12:d4:eb:dd:77:b9: + 74:7f:c5:b5:33:d9:91:b6:31:8f:56:2f:1c:71:c8: + 03:2e:38:f6:ed:c6:19:3e:ce:b4:aa:ac:50:09:db: + a0:42:62:f2:b2:20:54:d0:7f:ab:a3:61:37:8a:a2: + a5:ac:a7:fe:9d:42:77:d6:21:18:2e:e9:ca:46:ec: + e9:04:8c:3a:6d:f0:af:12:2f:b2:f8:f8:4e:62:46: + 82:ea:9d:8b:f6:2b:48:ac:b1:40:3c:b2:8f:28:95: + 3d:c1:63:28:16:dd:ae:4a:bb:0a:9f:30:82:c0:b0: + 50:d5:c4:64:74:94:ea:08:cd:55:0c:9a:67:d1:ed: + 27:9f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + E6:39:EA:2E:84:74:F5:0F:EE:D6:40:69:E9:7E:8B:94:ED:EC:A7:70 + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + c8:c5:c4:8a:f2:37:4b:6a:22:c8:a3:cc:12:da:0c:f6:b9:88: + 61:5a:7a:46:78:52:45:dc:92:13:51:11:6d:e2:11:e4:a3:ff: + db:b7:5c:51:ea:de:1c:0c:bf:93:71:60:b2:82:56:15:e1:09: + 8e:67:7d:a2:33:5b:d9:9d:4f:a6:a5:2f:31:4d:0c:de:14:a2: + 4e:12:5f:e7:c5:50:e8:a9:e5:e5:84:d4:84:2a:62:2a:51:7f: + c9:a3:0e:e7:69:f5:bc:04:a4:ff:b6:88:3d:6f:5c:d6:41:d1: + b9:9d:39:da:03:eb:39:98:24:fb:a0:5a:f0:4b:31:04:f6:7d: + c5:86:0b:8f:22:74:69:ba:f1:b6:79:8f:9e:3a:b4:cd:56:23: + 09:4e:83:ad:a6:37:86:d3:e0:e5:cb:1b:ee:a0:77:d8:96:08: + c3:89:c5:2b:74:28:db:e3:22:49:ec:98:13:76:7c:05:33:aa: + 15:b1:dd:b8:c6:52:9a:db:62:6b:f6:61:e0:28:42:b7:97:ba: + 74:20:de:85:f8:c1:6e:65:99:fe:59:c8:25:53:cf:dd:ec:d7: + dd:57:6d:e3:5d:ce:6b:af:1a:60:79:73:c1:e0:77:6e:36:16: + c6:d5:1b:4e:73:3b:52:d7:9c:3f:77:9b:8b:33:f7:fb:41:6e: + e4:d2:78:1c +-----BEGIN CERTIFICATE----- +MIIDMzCCAhugAwIBAgIBBjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxOTA3MzA1NVoXDTI3MTIxNzA3MzA1NVowGDEWMBQGA1UEAwwNU29s +YW5hLWlQaG9uZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMxAzLYx +hL6ZAIVjwreO8HeXTOOxq5fZEKumErqNZm3bTKSAipmSxKnQRx7BVw/znINpHz9S +4gHvousxPAXPpOyWGEFfOp147OsCaHkbxoGA0o9hLWSG92iklzcMi7vr234kHAgW +bJLpNgKkuaP2MlpqXGXzAvPaKwGQuffcs3KLEtTr3Xe5dH/FtTPZkbYxj1YvHHHI +Ay449u3GGT7OtKqsUAnboEJi8rIgVNB/q6NhN4qipayn/p1Cd9YhGC7pykbs6QSM +Om3wrxIvsvj4TmJGguqdi/YrSKyxQDyyjyiVPcFjKBbdrkq7Cp8wgsCwUNXEZHSU +6gjNVQyaZ9HtJ58CAwEAAaOBkDCBjTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTmOeou +hHT1D+7WQGnpfouU7eyncDA/BgNVHSMEODA2gBSpUS+X4xXF1ao3HfqKB/GqOsl/ +1KETpBEwDzENMAsGA1UEAwwEYXJhboIJAK61AhpxApOUMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAyMXEivI3S2oi +yKPMEtoM9rmIYVp6RnhSRdySE1ERbeIR5KP/27dcUereHAy/k3FgsoJWFeEJjmd9 +ojNb2Z1PpqUvMU0M3hSiThJf58VQ6Knl5YTUhCpiKlF/yaMO52n1vASk/7aIPW9c +1kHRuZ052gPrOZgk+6Ba8EsxBPZ9xYYLjyJ0abrxtnmPnjq0zVYjCU6DraY3htPg +5csb7qB32JYIw4nFK3Qo2+MiSeyYE3Z8BTOqFbHduMZSmttia/Zh4ChCt5e6dCDe +hfjBbmWZ/lnIJVPP3ezX3Vdt413Oa68aYHlzweB3bjYWxtUbTnM7UtecP3ebizP3 ++0Fu5NJ4HA== +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDMQMy2MYS+mQCF +Y8K3jvB3l0zjsauX2RCrphK6jWZt20ykgIqZksSp0EcewVcP85yDaR8/UuIB76Lr +MTwFz6TslhhBXzqdeOzrAmh5G8aBgNKPYS1khvdopJc3DIu769t+JBwIFmyS6TYC +pLmj9jJaalxl8wLz2isBkLn33LNyixLU6913uXR/xbUz2ZG2MY9WLxxxyAMuOPbt +xhk+zrSqrFAJ26BCYvKyIFTQf6ujYTeKoqWsp/6dQnfWIRgu6cpG7OkEjDpt8K8S +L7L4+E5iRoLqnYv2K0issUA8so8olT3BYygW3a5KuwqfMILAsFDVxGR0lOoIzVUM +mmfR7SefAgMBAAECggEBAMSRTDG/ADBpkN3Of1MmJfgBzQaIM0pkpS18GyQb9sqc +tWrPJhPb8pY2kmtfyAja+vJg1aicfFM+qzzLWieBiQgC/v7SxddMzDzzSVXcTDLP +plREQmovlaTIWZqp4USOHOONnsiNxBmyhL8QhnPr+NOY7qlSsLG7cY4FGWQXqz78 +K9rZkMlAlfJGP8pzuwo18tt0CACNW2wMqodOs6SuXSPsf3hb/PCH5H3A+eB/fXhF +8yvANmrw9TNb8nNpu7ruduU3GmxDVFBMOiWoRKucocbiB4JF0BvRy90c5ZcBDqvM +ZGoEBWPmO+ufRY0Z0Ei3Ig9Hfr54kjjgFQrp3FQKpvECgYEA/5stOyU/s1ATOPLq +0L15lz/1f1lHOMPNIFtcdbv1Q4Qawl/YrjWJ1zMhdIHc7jTGlah0Kr7bYoChL2jt +SHQqClVtgvg1AJoB6Q3yzTZNRxLC+1iCVx35xYk8WWYccGYReqwSkJD1LYFGH0L1 +RZiZw0fVlu9qQm+0qa9yjTrA8ncCgYEAzJFd626gco66VLuxRoKbtOG2Ew/NqaJd +bToU4GSyFmNWCjh/edfeIdubJWJLrSLukrI+gyGgRQW8s6EWN6CA1lZzeI83rG/d +syvlWGamtEiJjB+ku7IHHTUPpzkkdahkKJAK4/gUN+XBNL52vsBq5viAY1KiyJ2S +div6bOxK1hkCgYEAqV6HsCNUfFrZAelk0wBaK3DEGahs2x5TM9eWAqWTNTO6D4Y3 +K+hp9+D3kB3k6SqrU8uVfiWNdU3KgIHEiTgAC2zj7d7OMCHcljMZ6gTLXAcAkE/r +vhIsyUnQZWSV/5yChIi0nHqRG6AHePuDTqR5br6QtzzZakBes/l/rDl8VK0CgYAY +IOVFCa1fFbqgl+rW+DzJXv4MzYZihcYjRgCEXxwqS9kwJ23Rv0ZyE+b+x9NJPp+J +KgD5kpPG0GBrh4qJUSMhJN1F0Q6uBhvOMFVC0gjDpvKiVnElul/gcAvCm5jTT+NQ +bXz7Wp134l+hiv2SjjuNtq3eCTcuFnfZ/GHzSwOgsQKBgQCK4/5dN1WTDS3MMW5S +oljo9fqT/SDd65BDmaGy1+DesQIF5l/lvQ9cttncz7qrETKdEgwVDz3fOs6Uvnkp +h/EejnNA0JiH43NO2W2wX1LfiZcAlgjCFYD93l1UlUCnXfdCLMN+itmPQ6aHVo7c +HeuU8Wt7GXZCkTxBOk0C4Zt68w== +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-calim-bascharage-hourtrax.ovpn b/vpn/aran/clients/DKS-VPN-calim-bascharage-hourtrax.ovpn new file mode 100644 index 0000000..9955b58 --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-calim-bascharage-hourtrax.ovpn @@ -0,0 +1,153 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + ac:c5:41:f6:74:b8:f2:3d:a7:c7:2b:e9:57:95:d5:38 + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Feb 6 07:54:36 2018 GMT + Not After : Feb 4 07:54:36 2028 GMT + Subject: CN=calim-bascharage-hourtrax + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:c7:8b:5b:5e:4e:09:d2:ef:b1:9b:d2:74:d6:cc: + 04:c9:5d:48:5e:71:0c:b4:5b:10:03:94:5e:43:46: + c0:ba:05:2c:94:c6:4b:36:a3:50:7c:37:4a:cd:37: + 4c:fc:d5:e0:40:3e:39:40:92:8b:e9:80:8d:fb:d9: + e8:cf:12:ef:9c:c8:03:1a:29:2e:71:c4:6a:69:91: + d9:15:b9:44:36:2c:01:e6:46:ba:02:74:7f:82:f7: + 11:0c:92:7b:3a:29:65:d5:9a:f0:65:12:36:df:bf: + 23:27:85:25:50:98:73:7a:29:d4:ec:ab:81:87:44: + 5f:e2:e1:76:ce:f1:71:0f:c5:0a:b4:c2:e6:20:ed: + 72:9e:5b:1f:99:60:ad:b9:78:62:e5:74:6a:5a:b6: + 34:87:06:21:b6:52:33:7c:25:05:4e:6e:c9:85:60: + 9d:dd:bc:80:3e:bf:55:6d:2e:49:8c:9a:41:e5:fb: + 4a:f2:50:aa:86:b9:d3:63:c4:0c:fa:00:e0:62:c5: + a6:20:e7:c2:49:8e:d4:3a:ca:1e:28:e1:75:d2:29: + dd:f2:82:e4:de:1d:5d:5f:e2:25:2b:76:07:ed:21: + 8a:53:d3:e4:12:f0:71:41:60:dd:f3:9f:42:a7:4c: + 59:fa:47:40:75:63:b7:1d:ae:8b:6a:b6:89:92:3c: + a5:b5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + 60:7D:70:19:A8:2E:4A:8D:65:55:88:D5:32:A3:82:42:21:50:0C:1E + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 8c:47:0e:52:94:88:9d:52:ab:1c:49:27:18:af:08:93:8e:f4: + ce:65:ab:09:e1:f1:d1:d1:68:34:57:31:43:46:29:85:87:9e: + 02:e8:26:98:f0:6b:5b:c6:05:2b:f9:45:63:02:67:c4:f7:3f: + ae:21:ba:7b:80:13:b0:2f:dd:94:f0:95:7a:4a:18:3e:9d:65: + 23:a2:25:29:f3:01:9c:7c:cf:3f:27:b7:3e:a5:7c:ea:6e:95: + a0:17:b6:a7:54:5c:b3:83:9f:6b:37:aa:ff:cc:5d:00:6c:f8: + f6:d7:28:82:21:05:65:49:53:a5:57:1e:dc:69:6f:c6:e7:e5: + da:c3:62:00:c9:11:1a:2d:0a:46:1b:fa:83:a4:7f:7c:fc:08: + 0b:23:bf:20:25:d2:1a:36:bd:e9:9e:e0:bd:50:1b:19:ef:87: + d7:71:7a:d8:12:ec:58:78:1b:ea:2a:78:b2:e7:2b:43:3c:70: + 51:c8:31:75:b8:b6:28:96:9a:33:2c:01:d2:11:32:5f:35:cf: + 6d:35:c4:38:42:fd:f3:24:27:40:5e:8c:59:83:19:76:5a:73: + 2f:38:4f:72:f0:72:6e:e7:04:d8:ae:c2:d8:75:fc:1f:33:91: + 66:86:7d:d1:fc:7a:29:d7:b1:00:c2:ad:07:9e:96:ce:c7:d3: + 6f:9e:eb:b7 +-----BEGIN CERTIFICATE----- +MIIDTzCCAjegAwIBAgIRAKzFQfZ0uPI9p8cr6VeV1TgwDQYJKoZIhvcNAQELBQAw +DzENMAsGA1UEAwwEYXJhbjAeFw0xODAyMDYwNzU0MzZaFw0yODAyMDQwNzU0MzZa +MCQxIjAgBgNVBAMMGWNhbGltLWJhc2NoYXJhZ2UtaG91cnRyYXgwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDHi1teTgnS77Gb0nTWzATJXUhecQy0WxAD +lF5DRsC6BSyUxks2o1B8N0rNN0z81eBAPjlAkovpgI372ejPEu+cyAMaKS5xxGpp +kdkVuUQ2LAHmRroCdH+C9xEMkns6KWXVmvBlEjbfvyMnhSVQmHN6KdTsq4GHRF/i +4XbO8XEPxQq0wuYg7XKeWx+ZYK25eGLldGpatjSHBiG2UjN8JQVObsmFYJ3dvIA+ +v1VtLkmMmkHl+0ryUKqGudNjxAz6AOBixaYg58JJjtQ6yh4o4XXSKd3yguTeHV1f +4iUrdgftIYpT0+QS8HFBYN3zn0KnTFn6R0B1Y7cdrotqtomSPKW1AgMBAAGjgZAw +gY0wCQYDVR0TBAIwADAdBgNVHQ4EFgQUYH1wGaguSo1lVYjVMqOCQiFQDB4wPwYD +VR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNVBAMMBGFy +YW6CCQCutQIacQKTlDATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4Aw +DQYJKoZIhvcNAQELBQADggEBAIxHDlKUiJ1SqxxJJxivCJOO9M5lqwnh8dHRaDRX +MUNGKYWHngLoJpjwa1vGBSv5RWMCZ8T3P64hunuAE7Av3ZTwlXpKGD6dZSOiJSnz +AZx8zz8ntz6lfOpulaAXtqdUXLODn2s3qv/MXQBs+PbXKIIhBWVJU6VXHtxpb8bn +5drDYgDJERotCkYb+oOkf3z8CAsjvyAl0ho2veme4L1QGxnvh9dxetgS7Fh4G+oq +eLLnK0M8cFHIMXW4tiiWmjMsAdIRMl81z201xDhC/fMkJ0BejFmDGXZacy84T3Lw +cm7nBNiuwth1/B8zkWaGfdH8einXsQDCrQeels7H02+e67c= +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDHi1teTgnS77Gb +0nTWzATJXUhecQy0WxADlF5DRsC6BSyUxks2o1B8N0rNN0z81eBAPjlAkovpgI37 +2ejPEu+cyAMaKS5xxGppkdkVuUQ2LAHmRroCdH+C9xEMkns6KWXVmvBlEjbfvyMn +hSVQmHN6KdTsq4GHRF/i4XbO8XEPxQq0wuYg7XKeWx+ZYK25eGLldGpatjSHBiG2 +UjN8JQVObsmFYJ3dvIA+v1VtLkmMmkHl+0ryUKqGudNjxAz6AOBixaYg58JJjtQ6 +yh4o4XXSKd3yguTeHV1f4iUrdgftIYpT0+QS8HFBYN3zn0KnTFn6R0B1Y7cdrotq +tomSPKW1AgMBAAECggEBALxoGTn+pwnyZZlB6i3RboeOO0Forl0wSfuHQEV3bYt2 +TTSf0e5h3yGZt1fyag+kBVvDJJ2SgOZVCjqM8mNqdrFqrHsr/P1QPkU1f2oihoQ7 +owOBLioZQzgt/XwIZq9w3QUFiQt1WjiCqTesYKIrf4UOMEvSV7eXWI3I4jvc/iqq +73BkLITg9+JLmqOabaWJXG5CXz8RsGtXgy0JABiszO2lRYtNYpDSuuvo3vETU6BS +T4jpM3NCYGSzgSzFx3hhltobOsCX7/HyI1CzBrJUsvQ34HlH5uEY9BynMlSVCR2d +43fX0khfOc9GmnogZaJQdz7pguZ7ZomoPfeU5zrREVUCgYEA5BTKhFP6HbtwKbzt +0Qo2y1zZwl9d9k64c6MiWBijNvpfmm/3YTQMytLJRMDePpV8aRrRs9fKAEA8KppV +tUegIGEeXD0F0RaLqLkotx/xfPQrZWlMe23A15tHgHwZFjzZrOu1ISU2a98aqyyU +dtR0fsNeTfc0FDZpS0hvS5/iYkcCgYEA3/hT+Ur9VPr/dcRmPzn6PUjByXc5+mRW +zeZB2lS4sdFVjikFcTYk32G6EtU4IbAP4nxlriMaXHwqhUKnDqF0+KLtAfrOvVly +HRfms5YhjM94JxaPMpjxZ1l20wWCLebHX9BFRwJSvMecZV8NaW2Ih3P8r6di4wDk +fDOGw45CGiMCgYEAnenjOXFnJ7TB+LPtOCFJRM35mwEqbkGcpbuaKMKOJp99F9FT +xsIh5T/ByE980HnxVFgUPt815ayTu691jfiUXja/rX82isiAU4Y3MWr1aN0pOqKI +KKEZtm21OLkzKVliIL5lfxhjsJYcwc0w0YFRUv7zSSnRrfjqOAxjukltlTsCgYEA +uS2u8I1qC9tDYHG0QE6Fcio334UucLKJetAIXqZx1sPHwzRzhXlI31ED8hJMyL2z +RIWp5GKtpw4acff7/ALOnczHvT1Ltg7AZQGgA5f7wVrAc0EZwLHn1pWHw03opl8L +NVMUFHP9SIyZ6M7AXgzsN2JU6D6zahEQ2QgZQpLaYJUCgYBDUWnP1frEI9s075Mb +/vz5zIysZahoGXImAH77oNNn5leDDgv1wDodQMiLvRngr0SvdhZTC9Qw92t7BAwH +hHhqkLhmORfCoXT1MP4cK21u38tpUs3qRy6oyQfsIMYWoJBnaH3Gshizs+T3AcVO +e4jTrQ8OqFnWgT0XsX1rtkScbg== +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-calim-creorga-server.ovpn b/vpn/aran/clients/DKS-VPN-calim-creorga-server.ovpn new file mode 100644 index 0000000..cd370da --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-calim-creorga-server.ovpn @@ -0,0 +1,153 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + ea:6e:b3:43:46:6a:a0:22:22:49:c7:6a:17:eb:ba:c9 + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Apr 25 13:43:24 2018 GMT + Not After : Apr 22 13:43:24 2028 GMT + Subject: CN=calim-creorga-server + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:b4:f9:15:16:d3:b6:2d:86:21:e9:cc:7d:0b:42: + 10:ad:70:f7:90:8a:cc:69:0b:2b:49:a3:07:dc:4d: + 4e:a8:98:43:35:da:cd:9f:7e:41:a8:fd:be:d6:8b: + 07:24:0b:1a:70:1f:3e:fc:9c:b1:66:3c:66:dd:ef: + 8d:ad:d3:17:1d:a4:80:2e:78:ad:cf:b6:1a:d6:b3: + 6d:94:ce:ed:cd:4a:05:aa:3f:6f:e7:87:40:e3:6e: + b8:57:82:77:9b:1c:1c:95:fc:2e:cf:af:86:7a:58: + fd:19:28:36:2c:bb:c4:c3:f8:fe:20:77:3b:21:d7: + 3e:d5:84:2f:32:a9:9b:11:7b:99:f7:f0:04:2a:31: + 4a:f9:73:20:2b:84:a1:38:4b:bc:9e:73:24:83:c8: + 13:6a:10:be:e6:38:e3:a0:db:c5:b3:eb:1a:39:3a: + 5f:09:0f:42:a6:18:a3:dc:cd:22:bd:66:10:58:dd: + 43:bb:86:bc:71:0b:b5:64:a1:e4:dc:1d:ae:43:8a: + 77:50:ce:13:ce:97:7f:b3:57:4f:82:da:ce:3b:bd: + 20:a4:15:de:62:73:ad:c4:8a:08:19:1a:76:e6:ba: + 26:fb:b2:f1:95:af:e1:ff:7a:b0:65:50:f5:4a:ad: + 39:f3:ad:5e:88:05:cd:7d:5d:08:e2:6a:f2:71:8b: + 61:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + 9A:86:E4:B7:AE:7D:36:2D:00:C8:05:87:3A:BA:E1:81:3F:1C:99:31 + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 3a:84:f4:ab:20:f0:5f:f1:b3:11:cf:d9:84:eb:00:e4:67:30: + 03:5d:cf:de:ce:d5:8f:49:b5:0c:1b:5b:de:59:ca:57:d0:ab: + 1b:45:ab:ba:c3:18:e7:38:57:60:1a:5c:61:ce:5a:e0:61:50: + ec:47:a0:61:30:41:ba:64:49:ca:b1:df:44:7a:c6:b8:ed:c3: + a5:51:f1:11:e5:ca:e7:e6:bb:be:39:72:b6:e8:a5:fb:2f:e3: + 47:27:f5:53:c3:3f:4d:8e:1f:c3:a7:2c:ab:36:f9:44:2b:05: + 9f:96:66:f1:d3:6e:6e:7c:24:12:b5:e0:79:ae:18:68:b2:1c: + 59:55:05:f0:1c:95:a8:bf:c2:6f:cb:86:f8:50:38:1a:6c:52: + 33:b3:1c:49:e1:4c:7e:6c:8d:03:61:cd:bc:7b:2c:34:01:aa: + 23:70:ea:c5:a7:9c:7c:b6:25:ae:b7:03:f8:70:55:2d:c0:f1: + ca:7e:6d:cf:73:42:40:76:c2:e7:4c:c8:f1:06:93:a1:02:99: + 97:1f:e6:8e:86:20:d7:99:1f:cc:2e:d1:58:aa:bc:f6:83:20: + c3:3b:8d:41:af:d1:c6:d8:3d:2c:27:e1:de:3e:3c:55:31:8a: + 7b:49:e7:3f:bb:cb:f0:3b:5e:9e:37:3d:a2:af:14:af:63:ff: + 48:f4:8b:04 +-----BEGIN CERTIFICATE----- +MIIDSjCCAjKgAwIBAgIRAOpus0NGaqAiIknHahfruskwDQYJKoZIhvcNAQELBQAw +DzENMAsGA1UEAwwEYXJhbjAeFw0xODA0MjUxMzQzMjRaFw0yODA0MjIxMzQzMjRa +MB8xHTAbBgNVBAMMFGNhbGltLWNyZW9yZ2Etc2VydmVyMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEAtPkVFtO2LYYh6cx9C0IQrXD3kIrMaQsrSaMH3E1O +qJhDNdrNn35BqP2+1osHJAsacB8+/JyxZjxm3e+NrdMXHaSALnitz7Ya1rNtlM7t +zUoFqj9v54dA4264V4J3mxwclfwuz6+Gelj9GSg2LLvEw/j+IHc7Idc+1YQvMqmb +EXuZ9/AEKjFK+XMgK4ShOEu8nnMkg8gTahC+5jjjoNvFs+saOTpfCQ9Cphij3M0i +vWYQWN1Du4a8cQu1ZKHk3B2uQ4p3UM4Tzpd/s1dPgtrOO70gpBXeYnOtxIoIGRp2 +5rom+7Lxla/h/3qwZVD1Sq05861eiAXNfV0I4mrycYth3wIDAQABo4GQMIGNMAkG +A1UdEwQCMAAwHQYDVR0OBBYEFJqG5LeufTYtAMgFhzq64YE/HJkxMD8GA1UdIwQ4 +MDaAFKlRL5fjFcXVqjcd+ooH8ao6yX/UoROkETAPMQ0wCwYDVQQDDARhcmFuggkA +rrUCGnECk5QwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqG +SIb3DQEBCwUAA4IBAQA6hPSrIPBf8bMRz9mE6wDkZzADXc/eztWPSbUMG1veWcpX +0KsbRau6wxjnOFdgGlxhzlrgYVDsR6BhMEG6ZEnKsd9Eesa47cOlUfER5crn5ru+ +OXK26KX7L+NHJ/VTwz9Njh/DpyyrNvlEKwWflmbx025ufCQSteB5rhhoshxZVQXw +HJWov8Jvy4b4UDgabFIzsxxJ4Ux+bI0DYc28eyw0AaojcOrFp5x8tiWutwP4cFUt +wPHKfm3Pc0JAdsLnTMjxBpOhApmXH+aOhiDXmR/MLtFYqrz2gyDDO41Br9HG2D0s +J+HePjxVMYp7Sec/u8vwO16eNz2irxSvY/9I9IsE +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC0+RUW07YthiHp +zH0LQhCtcPeQisxpCytJowfcTU6omEM12s2ffkGo/b7WiwckCxpwHz78nLFmPGbd +742t0xcdpIAueK3PthrWs22Uzu3NSgWqP2/nh0DjbrhXgnebHByV/C7Pr4Z6WP0Z +KDYsu8TD+P4gdzsh1z7VhC8yqZsRe5n38AQqMUr5cyArhKE4S7yecySDyBNqEL7m +OOOg28Wz6xo5Ol8JD0KmGKPczSK9ZhBY3UO7hrxxC7VkoeTcHa5DindQzhPOl3+z +V0+C2s47vSCkFd5ic63EiggZGnbmuib7svGVr+H/erBlUPVKrTnzrV6IBc19XQji +avJxi2HfAgMBAAECggEARmu+dxl/BIvzWmUGK4FTuAoDa613CVEdURQtlN5IQ3as +gKJZ7TxWFIpY3mdPKglgCk0+V1Ip/dx3Mtlqyj8f+ZrvfiXbjL4SB4XemE9FXeL1 +/V+eDfwlldqZxQOxwxvXS83L8Wkd7TH/mvB41ENkt9WGHeAHlI2Ll85OB2rUOqK0 +iuz9BNiWrSSi6CSONu/xDgj05xmBqNO+ig2IurBJOX+DTFBwtKoCs90nl/OAi1KH +TnAiGlduxdj7wc2CAqHwOcFGm0XoRHaQrDvV5ObORAGR8b3XywKYOmGBLxDW5Vw7 +q9Z5oi7vqavYIFVqJTjgQ9L+zxHYindJwaUvrFhVAQKBgQDgE001tCPf6FrAX5nh +c86pyH8Bre0rILHu/3fu0uqile1FVyWZ2o+pBcWwsd6xULox6xpQcsLO5Yh8UUE8 +i/lNdsR/rso2ByMo4fdqZHON1jZCdhXJNUFi7UFnAfi2XbImU2IRELlwPeBtpY0u +crBo1LW9UXd2HyUPDPq7GuBHHwKBgQDOwbT6Am8JZUOozunxQxd29ZMYX/CK5+IU +uhT9ebWXECvW+Q07LqwENy7WSTyJfQXyiTt3XXggaCjhjYMxCPhcbRyyGeiv1uzj +piTeJQqvfmdZBE2GGa2IIDSd8+BsIVKtmUwGE5pfmcZpalJ/kIDypGzz2Urd64Vz +RO+M6StNQQKBgH2ltRzRF3C9rO3EbdhDBPali7pYWe5eFghrTkgoExP6OCMyu83r +BbWEnBb5lmMdXlsRdx73Sw+THBaBxa/62V+7onHqhE8Jb4jENOV+0GEPZjucVZkO ++MxNN+hX7avtHDFrfkkNdL5gpBE3zNPn0c3mwMYZAYDF9BTddVcnue2HAoGBAMW5 +datJvIpNr0C2b/9r2/rFquA6j70nOIv90Kj/ReuraWFyV3brkVGOvFntO9l4GMHy +/02Ns526Pq5FONsh6vHo3vJr2Jyge3bRopxW7DscNRVqCgFeeRefRPJxEYQW8gxW +d9+vy4f1dUvGhBK+TLK/D/q7KN/Fpp+voy8spV6BAoGAC9gUin1kvc7gHH68lFx+ +RfinhcUrYBPTYa86xMZLAwtyf/YwNX+xfy65Zya9dW+Xcf+WEXYsFMkmIRm9rb/h +Sqh/p6z8PtKV8X1Mfi/MhumNuGkOJG0drkB4scDvdJ9Y58LDEAskLspCHQlCXNVO +Lwroaz/hqPTjf9QRM8q/78E= +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-calim-differdange-hourtrax.ovpn b/vpn/aran/clients/DKS-VPN-calim-differdange-hourtrax.ovpn new file mode 100644 index 0000000..5936c9e --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-calim-differdange-hourtrax.ovpn @@ -0,0 +1,153 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + f8:cd:f2:75:bd:9a:c7:91:07:ca:a4:ad:65:7d:64:b3 + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Feb 6 07:54:17 2018 GMT + Not After : Feb 4 07:54:17 2028 GMT + Subject: CN=calim-differdange-hourtrax + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:f0:1f:f2:04:c7:4d:c7:a8:cf:7a:5d:f0:69:15: + fd:dc:eb:7d:05:88:d1:60:65:7c:11:03:46:5a:c3: + 5d:86:28:55:4f:41:ec:f6:01:59:67:66:80:67:71: + a2:20:98:c4:33:0c:04:8f:b0:6f:ff:b1:27:93:0a: + d2:06:34:a3:3a:06:eb:27:e6:1d:f9:da:83:ae:94: + ba:40:24:66:61:10:5f:5a:7f:63:9b:10:45:29:d8: + e0:31:cf:31:b6:78:08:bf:b8:1d:43:34:cc:a4:29: + 61:dc:d5:07:a5:c0:ad:e3:44:24:ef:c9:2e:e3:c7: + d4:70:27:ab:61:64:87:b9:29:c5:33:16:1e:11:75: + 0b:04:fd:eb:81:ac:37:84:1e:94:07:f9:10:75:df: + 7c:5c:89:37:bf:05:89:96:b4:f0:03:3e:19:d0:ba: + 40:ae:78:2f:a9:86:6f:19:c8:c7:08:53:80:52:83: + e6:06:42:03:32:4d:02:3f:02:27:bc:73:f3:da:1b: + f1:62:ae:ad:e6:18:b0:53:68:4c:ed:25:d5:6e:1d: + 0e:9c:df:90:3b:54:05:89:43:87:35:7d:ee:ae:77: + 06:2e:9d:27:e0:11:5e:66:df:73:76:ce:35:43:f2: + b4:27:06:57:63:1a:31:d1:a9:ad:9b:85:a5:82:b1: + cb:1f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + F3:DC:9F:07:28:69:63:36:8F:45:02:DB:B4:69:04:99:B9:5B:76:BF + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 75:a8:2e:e2:e9:77:fd:1d:37:01:2f:8a:a3:60:5f:71:e6:fc: + 92:de:33:53:0f:cc:b5:42:0d:da:dd:44:55:ef:dd:bd:6c:33: + 97:a6:be:f0:fd:f4:e0:fd:90:f4:d5:46:3a:6f:e4:10:d0:a9: + 41:74:f5:62:a0:f6:8c:8b:a5:c2:7e:ff:18:45:eb:36:4b:22: + b1:08:64:dc:61:63:9f:c6:63:d7:4c:ba:ea:97:fc:2c:42:c3: + fc:09:a6:ee:a2:77:5a:34:28:e2:ac:75:03:1a:4d:53:27:c6: + 75:09:84:46:47:cd:9f:96:9c:54:40:7d:e3:86:e4:1f:b0:91: + d4:f1:c9:ca:d2:5a:25:7e:a0:8b:d5:6b:09:c1:1e:db:10:6c: + 1d:c3:3d:e4:8e:a4:eb:08:7a:6d:be:88:8c:be:14:26:ae:ff: + 7c:ac:49:6c:1a:02:d9:c5:f5:e2:19:38:ec:e8:8f:f8:36:4f: + 64:34:d3:fb:8d:f8:6a:99:59:b4:04:b2:0d:3c:94:e6:a0:26: + 35:19:b8:cd:14:c4:16:ef:94:db:e7:7e:0b:be:9e:d7:d3:17: + da:08:eb:0b:87:09:c2:a0:47:4c:fb:1c:f5:e0:95:ef:21:59: + 6c:eb:ca:74:3c:57:eb:c9:90:33:0b:ab:3c:cd:47:2f:b4:ca: + 2a:96:46:14 +-----BEGIN CERTIFICATE----- +MIIDUDCCAjigAwIBAgIRAPjN8nW9mseRB8qkrWV9ZLMwDQYJKoZIhvcNAQELBQAw +DzENMAsGA1UEAwwEYXJhbjAeFw0xODAyMDYwNzU0MTdaFw0yODAyMDQwNzU0MTda +MCUxIzAhBgNVBAMMGmNhbGltLWRpZmZlcmRhbmdlLWhvdXJ0cmF4MIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8B/yBMdNx6jPel3waRX93Ot9BYjRYGV8 +EQNGWsNdhihVT0Hs9gFZZ2aAZ3GiIJjEMwwEj7Bv/7EnkwrSBjSjOgbrJ+Yd+dqD +rpS6QCRmYRBfWn9jmxBFKdjgMc8xtngIv7gdQzTMpClh3NUHpcCt40Qk78ku48fU +cCerYWSHuSnFMxYeEXULBP3rgaw3hB6UB/kQdd98XIk3vwWJlrTwAz4Z0LpArngv +qYZvGcjHCFOAUoPmBkIDMk0CPwInvHPz2hvxYq6t5hiwU2hM7SXVbh0OnN+QO1QF +iUOHNX3urncGLp0n4BFeZt9zds41Q/K0JwZXYxox0amtm4WlgrHLHwIDAQABo4GQ +MIGNMAkGA1UdEwQCMAAwHQYDVR0OBBYEFPPcnwcoaWM2j0UC27RpBJm5W3a/MD8G +A1UdIwQ4MDaAFKlRL5fjFcXVqjcd+ooH8ao6yX/UoROkETAPMQ0wCwYDVQQDDARh +cmFuggkArrUCGnECk5QwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeA +MA0GCSqGSIb3DQEBCwUAA4IBAQB1qC7i6Xf9HTcBL4qjYF9x5vyS3jNTD8y1Qg3a +3URV7929bDOXpr7w/fTg/ZD01UY6b+QQ0KlBdPVioPaMi6XCfv8YRes2SyKxCGTc +YWOfxmPXTLrql/wsQsP8CabuondaNCjirHUDGk1TJ8Z1CYRGR82flpxUQH3jhuQf +sJHU8cnK0lolfqCL1WsJwR7bEGwdwz3kjqTrCHptvoiMvhQmrv98rElsGgLZxfXi +GTjs6I/4Nk9kNNP7jfhqmVm0BLINPJTmoCY1GbjNFMQW75Tb534Lvp7X0xfaCOsL +hwnCoEdM+xz14JXvIVls68p0PFfryZAzC6s8zUcvtMoqlkYU +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDwH/IEx03HqM96 +XfBpFf3c630FiNFgZXwRA0Zaw12GKFVPQez2AVlnZoBncaIgmMQzDASPsG//sSeT +CtIGNKM6Busn5h352oOulLpAJGZhEF9af2ObEEUp2OAxzzG2eAi/uB1DNMykKWHc +1QelwK3jRCTvyS7jx9RwJ6thZIe5KcUzFh4RdQsE/euBrDeEHpQH+RB133xciTe/ +BYmWtPADPhnQukCueC+phm8ZyMcIU4BSg+YGQgMyTQI/Aie8c/PaG/Firq3mGLBT +aEztJdVuHQ6c35A7VAWJQ4c1fe6udwYunSfgEV5m33N2zjVD8rQnBldjGjHRqa2b +haWCscsfAgMBAAECggEAOqrTaq93JWztJCyHbGVfHPa8GPoQjci9wzpVmh9ZXknE +bhThXEmAGm9EuAFfZy9r4DzzcFffRU13Kcne/n0l1CuUkK78a+sjeSgFSV6bVOO3 +KFkvcNdMzqiaPhEtSDOTj6PgImdoCEPEETxLHggxc/FWRO+WcTiFgtFuYeE599bv +kqh2Jy0/RExVXDOiibijcIb7YsjVFwKxZAhnR8+oedIX7CM7QI85D8z23UmBFziQ +gS1pbEkk+jJaxNqnuU95Pm0OgBvaSFZ6E+SFUnSf0CP71SWjkNVfqjNmlNYXHh+o +HZPupLdEFW7Szx4x5orzSvQzWVGYDCv0lIlTRRAxYQKBgQD+ImF5ih1UDgDW6e0h +ukRN/M4/YmPCpGb1unXKvDK/Jw8LqH2f2qqcfx8CyHjuM9xdXS/hFdnbYwgy15H0 +5fgk0YCisfjGG2R9othjCGkTePYJsVEPk69dunpHwlY5HRuKguoNlcnjj0ljy2t+ +EsvRTg87rsPLO/VkdXV7vWFakwKBgQDx4zw1Qgc5VppwnHaFCxjM1fwBVOcaWnKT +Qdzh9bSEOtsO8/AGALjDuIl3iYUUvczF0PkJtVaMaq7Tw/RAE5IWT00D6WX9uWy5 +lzITm0oOLR0bacZB4N2AOm6t5CXKmscke/2acI5Tb77b1lhnLRv8JF9w7Z+anQ8F +iyQOK1OIxQKBgGnIxepho3OpoI/VL/AqKOSNpwybWAtdg74lr4KEdFs9VvXzXNd9 +nicmgzIVYMFGtSPn9lYrUlQQFQmU0hyu3Wv2CSWwD23nWR0y+/+9MH/6ie/e728c +epL5XI0iR+HeS+iMNgERqMggjNwNgOEp0c1+QLkHNlkSzELU4eJwImYhAoGAHnbe +GF8Ohdwwa0ppauww3Wt957UHvjvx/jXnWdYWPCklecajTj49Bvlw5ss9JZWZ+rgN +BXn/QoQVLLqbQo60cXbfXkTBAame1ekC95ExTIPGDLPPsnBdtU6mreP0FoZT2nZ7 +RD40zrFeOlXOoH//7EuwcYqb9V8eizYw/k/an3kCgYEAiuBwC7D3gCS1OHMjjzwG +9fyqtrq2Df2vOuBRQW3wnFLCjUPhXUScrT4ypNRw/UGO8m6lXJ+nRAlK+lzjOZyi +r+mwsH6VbvcFRriFjPOKY2SJcfwqB/LbS/17eLFU8NlutLfZH8NLqb4Yvrhett/o +yLycZ63osX7XE539fbAB/rE= +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-dks-hourtrax.ovpn b/vpn/aran/clients/DKS-VPN-dks-hourtrax.ovpn new file mode 100644 index 0000000..8cd495f --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-dks-hourtrax.ovpn @@ -0,0 +1,153 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 76:24:55:b4:57:ee:a0:c0:7b:e2:b5:a0:5c:3d:80:3d + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Feb 6 07:54:45 2018 GMT + Not After : Feb 4 07:54:45 2028 GMT + Subject: CN=dks-hourtrax + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:b1:67:a4:6b:28:de:50:03:da:b0:48:19:5d:28: + f4:b7:43:68:2c:6d:41:bc:b8:76:ff:b7:93:2f:93: + f5:d1:fc:90:27:6b:1b:f2:84:0d:5e:dc:be:1f:77: + 77:bb:66:34:43:ac:7e:35:13:df:90:54:31:e9:67: + 44:76:a7:e1:70:61:10:bc:3d:84:0d:75:8d:2c:b3: + 06:d0:5a:c0:20:2f:0b:e2:15:5e:3f:38:61:ed:fa: + d8:8e:03:cd:c9:07:94:25:eb:ab:59:4a:7e:92:10: + 5d:1a:ee:de:31:35:14:a4:52:f2:79:5c:11:6e:e8: + ef:6c:57:69:a1:94:74:96:b7:e0:dc:ba:a5:b3:b4: + 33:65:79:b6:e7:de:aa:1a:d2:c3:9a:7f:6d:73:35: + 82:a4:fb:1e:13:2b:c7:96:5c:d9:d9:23:1b:6a:80: + 8d:17:22:69:09:88:85:03:be:6e:4b:11:d2:05:a9: + 51:7d:bf:a0:a4:e1:55:cb:27:10:4d:3b:fd:b9:cc: + a5:0c:5a:de:6e:95:5c:e9:4e:53:70:df:8f:06:1b: + 56:67:46:91:08:39:f4:bb:74:ae:18:90:39:1b:b1: + 51:64:5c:bf:58:fb:18:90:0a:ec:ac:68:98:2d:54: + cc:a1:1c:b4:9d:be:6d:ee:16:8a:ed:9a:56:2a:11: + 6e:37 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + FE:5D:3F:2A:41:EE:A5:C2:50:D0:9B:CF:89:EB:25:9C:61:3A:67:FF + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 49:3d:9c:8e:10:37:3e:ba:6d:ac:2f:6e:65:60:01:ed:01:70: + 49:b5:16:af:29:3b:68:ca:85:58:9f:88:ff:14:5e:ae:03:0d: + 65:99:9d:0e:6b:66:98:ad:f1:55:9c:75:f1:c7:fb:e6:61:68: + d6:69:03:48:4f:08:18:d5:ae:60:55:18:70:b4:ab:63:05:b5: + 54:c7:f7:d0:8b:86:4b:34:3f:50:5c:6f:be:c1:5a:1b:22:cc: + 24:59:76:e0:8c:c6:32:37:76:ab:bc:2d:63:27:be:2e:a6:5b: + 86:90:1d:a5:4d:a6:9a:17:ed:57:76:f7:c7:65:f0:2b:29:84: + a8:f3:35:5c:66:4d:f2:38:4f:79:df:b4:c1:07:66:3f:87:d0: + 13:fc:5b:3b:ea:da:db:ab:32:2e:72:f3:84:be:0d:e9:7e:c6: + 16:22:a9:b7:28:f5:cf:89:51:11:51:9d:bb:ac:fc:1e:fb:85: + 27:31:74:bd:6d:64:1b:d5:d6:d8:31:ff:ee:3f:9c:17:04:6c: + a3:3a:64:3b:22:88:78:75:3e:37:9d:b1:8b:a2:e8:7a:6f:0f: + af:9b:2c:a7:0a:dc:af:4a:f3:e5:3b:6e:97:c4:cf:2e:0e:64: + 71:2e:c8:51:32:90:9a:53:95:be:a9:d1:bd:ea:cb:9b:0a:9d: + 03:5b:04:85 +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgIQdiRVtFfuoMB74rWgXD2APTANBgkqhkiG9w0BAQsFADAP +MQ0wCwYDVQQDDARhcmFuMB4XDTE4MDIwNjA3NTQ0NVoXDTI4MDIwNDA3NTQ0NVow +FzEVMBMGA1UEAwwMZGtzLWhvdXJ0cmF4MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAsWekayjeUAPasEgZXSj0t0NoLG1BvLh2/7eTL5P10fyQJ2sb8oQN +Xty+H3d3u2Y0Q6x+NRPfkFQx6WdEdqfhcGEQvD2EDXWNLLMG0FrAIC8L4hVePzhh +7frYjgPNyQeUJeurWUp+khBdGu7eMTUUpFLyeVwRbujvbFdpoZR0lrfg3Lqls7Qz +ZXm2596qGtLDmn9tczWCpPseEyvHllzZ2SMbaoCNFyJpCYiFA75uSxHSBalRfb+g +pOFVyycQTTv9ucylDFrebpVc6U5TcN+PBhtWZ0aRCDn0u3SuGJA5G7FRZFy/WPsY +kArsrGiYLVTMoRy0nb5t7haK7ZpWKhFuNwIDAQABo4GQMIGNMAkGA1UdEwQCMAAw +HQYDVR0OBBYEFP5dPypB7qXCUNCbz4nrJZxhOmf/MD8GA1UdIwQ4MDaAFKlRL5fj +FcXVqjcd+ooH8ao6yX/UoROkETAPMQ0wCwYDVQQDDARhcmFuggkArrUCGnECk5Qw +EwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBCwUA +A4IBAQBJPZyOEDc+um2sL25lYAHtAXBJtRavKTtoyoVYn4j/FF6uAw1lmZ0Oa2aY +rfFVnHXxx/vmYWjWaQNITwgY1a5gVRhwtKtjBbVUx/fQi4ZLND9QXG++wVobIswk +WXbgjMYyN3arvC1jJ74upluGkB2lTaaaF+1XdvfHZfArKYSo8zVcZk3yOE9537TB +B2Y/h9AT/Fs76trbqzIucvOEvg3pfsYWIqm3KPXPiVERUZ27rPwe+4UnMXS9bWQb +1dbYMf/uP5wXBGyjOmQ7Ioh4dT43nbGLouh6bw+vmyynCtyvSvPlO26XxM8uDmRx +LshRMpCaU5W+qdG96subCp0DWwSF +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCxZ6RrKN5QA9qw +SBldKPS3Q2gsbUG8uHb/t5Mvk/XR/JAnaxvyhA1e3L4fd3e7ZjRDrH41E9+QVDHp +Z0R2p+FwYRC8PYQNdY0sswbQWsAgLwviFV4/OGHt+tiOA83JB5Ql66tZSn6SEF0a +7t4xNRSkUvJ5XBFu6O9sV2mhlHSWt+DcuqWztDNlebbn3qoa0sOaf21zNYKk+x4T +K8eWXNnZIxtqgI0XImkJiIUDvm5LEdIFqVF9v6Ck4VXLJxBNO/25zKUMWt5ulVzp +TlNw348GG1ZnRpEIOfS7dK4YkDkbsVFkXL9Y+xiQCuysaJgtVMyhHLSdvm3uFort +mlYqEW43AgMBAAECggEAdIXkwtX3H4tIitzwe/Y4tl65/+RLd0+aKeBD9s4yehhv +/tQlaSc/OP24iyaHKDm7Pm///ZDuGPiUSAAiQeWG969ptJqbL9P0RFXatePFqd38 +6iSq4M+B0zQeJTluYwptTnL6+w0pEXtaDCS1IJEC2+P3i6rjcHvjNsA7i3vdEFji +Prze6oZ/UoJIGn97V+qePCmcY1raD5SUeHz/tgB1qY3zq9TdjS953pijJKlXgXVM +pI/WhovKKYFmnbTVsY9WaMXvJz3MTrCosk9LIDdVOIei7m1GI+vQoGS9I3YhFogs +8qNweEJLLF6wi3tXrur5ZYTIqBYHtrE88RsnfWDqAQKBgQDfdOVTrzoCGVcNPLTK +nj7qpEfOgJS/1dSRgcH2MGKqPl+fPbqoCXEWKQicAbuVRWKKzvjHon+IvMn1ymgF +u31uePVtF0adHJP389d5VeeeO7Tl3t50an+k+cPTpRudmpfpUaH+SE7BpXv8V9B+ +eES92r5zhr2xEuVewBIPoyr8twKBgQDLPc3jdsjZpIYheYsP1yDyuFgi8cau7mqw +4v/KmcyuOAIHlrZB6V+XkNpL0U0gWOdrH4pgEdTKhtu/lycAKNS4AJkJLqE3dQQx +c3LAdtlQ9NuHoY/SxP2wcZlFEeQsGUpj4azg/bibGh/RNsy5vi6EW8hfrTwvtvfq +cruGN66agQKBgEwj7bxdGbv7XHEzPTtJPpD/V0RjBcx0FRFbkHbNt+Dgjf6Zrw9w +4Cq34qod4QgU82Xu7lA/64rxITPyOw2w/CV3a9E3PCVuxnCXktVSUzDUkWg+T7iF +TWcuf+6O9OD3+0lSOouFoehT9fJfDbj6TBoQ/hIpWFuM38EwWzce1xfzAoGAN9b1 +OGesa0+uoofYUzPSE53eaUtwQSO0IIFdsfZrq/orZJZd4OITp3re3zHUNOz4OBBk +XlzH0BUZTxxiVMLjHuLbKRCsrqXxzvxfLM36iymbHzqeX1RMNywe5kEyJYOVUrfw +XaiYDdUxpLOfr/C2qxrkhJT+EkX8+2cmaovl5wECgYEAmO7l3iVoEET9HrxuvinL +OC600K0iIpNNAIWSywGa4V04WBXrGNMx3SAkxEdQblrSIE1dPxsJnq+clvSyqeo5 +PLi7mSs/XpE7HffjYMhtyzv+UKUCfvbRsjIDH2/Ka6WZZalBw4I0aKcWYvvqACly +FX4rIxtOEaNSC9J07tCgN1A= +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-home-backup.ovpn b/vpn/aran/clients/DKS-VPN-home-backup.ovpn new file mode 100644 index 0000000..ecdb822 --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-home-backup.ovpn @@ -0,0 +1,153 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + f8:aa:54:dd:4f:bb:c8:ab:ec:0b:43:81:df:f6:79:fc + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Jan 19 12:23:53 2018 GMT + Not After : Jan 17 12:23:53 2028 GMT + Subject: CN=home-backup + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:d3:f8:44:af:c2:1c:a6:4b:ca:1d:b8:36:7c:75: + 28:ac:5e:12:bd:57:2e:03:da:d9:b8:a9:42:f0:52: + c6:50:df:2c:04:c8:a7:2a:88:21:54:2b:60:a0:86: + 96:30:36:60:c3:bc:51:16:47:f4:29:63:65:ae:73: + af:e9:3a:e2:ed:0b:57:30:72:9d:84:60:7b:89:d0: + 66:05:77:3c:05:3b:b4:74:aa:2e:d6:b5:0b:3a:34: + 53:66:d7:cd:ee:31:74:46:e0:84:4c:31:88:1a:82: + be:67:2a:1b:8b:54:8e:44:9b:a7:51:c6:7d:fd:3a: + 7a:7e:c0:6f:06:a9:9d:d8:6e:17:40:21:45:5f:06: + 28:56:61:8a:d0:67:1c:b5:1e:5e:51:cd:ad:8b:3c: + 3d:06:07:c6:29:67:d1:3f:f7:71:09:10:f9:6b:cc: + 49:b4:53:1a:f3:d3:2a:d8:01:f1:05:2d:05:91:ec: + 47:3c:86:02:23:a0:1a:bf:69:23:f4:23:8a:1c:df: + 38:0f:c1:7f:26:4c:64:2b:cd:d1:11:a0:66:32:d9: + 1c:85:42:71:e6:ae:3a:ee:6a:f4:94:40:dd:1e:ab: + 3f:65:3d:7a:1a:21:57:d5:0e:fa:6d:02:fe:a5:d3: + d8:8c:be:0f:1d:f5:f2:eb:b4:38:fc:6a:85:f4:01: + ef:17 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + A5:AD:95:F6:D7:91:0D:8D:07:22:FD:D3:FF:57:EB:11:FD:DD:77:1A + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 8b:ce:f3:cd:75:2a:aa:1e:b6:3e:00:78:0d:c9:3d:ce:d6:c7: + 4a:88:b1:50:cc:12:8b:5d:51:74:30:6f:f2:4d:91:e5:ef:77: + 6c:18:19:f7:6e:85:04:6e:6b:66:96:b8:3e:ee:54:83:0f:f5: + 46:5c:c0:45:07:31:25:19:2a:87:5b:04:f1:d3:8b:4f:44:75: + 6a:1f:71:49:69:71:f6:48:a0:56:d4:1d:57:1d:a0:44:09:68: + 14:cf:5a:d4:3e:9d:32:65:1e:e8:17:9b:4b:e3:ff:f5:0e:3c: + 32:bf:e3:dc:a9:5c:91:7e:23:0d:98:c5:cc:63:e0:01:4e:17: + 04:41:7a:c1:78:16:85:a0:8d:53:06:a6:cd:e6:f1:42:0a:61: + 48:59:e2:a8:46:ce:58:6a:fd:4a:61:15:41:7e:5d:22:e3:20: + b1:c7:44:be:59:61:85:6c:09:ea:a1:9b:1b:08:8e:41:a6:79: + cd:10:ce:ee:91:46:87:a1:ec:23:ec:40:a2:2e:18:5a:eb:6b: + d3:40:b9:93:9c:4b:5c:f7:d3:70:5a:5e:00:72:7c:38:72:53: + fa:ae:ea:cf:3a:4d:08:c9:d2:8a:ba:00:7f:81:1a:83:1e:05: + d8:51:72:26:56:3c:d2:57:63:fd:86:2f:af:cd:41:9d:52:c9: + e3:0d:a8:4c +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgIRAPiqVN1Pu8ir7AtDgd/2efwwDQYJKoZIhvcNAQELBQAw +DzENMAsGA1UEAwwEYXJhbjAeFw0xODAxMTkxMjIzNTNaFw0yODAxMTcxMjIzNTNa +MBYxFDASBgNVBAMMC2hvbWUtYmFja3VwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEA0/hEr8IcpkvKHbg2fHUorF4SvVcuA9rZuKlC8FLGUN8sBMinKogh +VCtgoIaWMDZgw7xRFkf0KWNlrnOv6Tri7QtXMHKdhGB7idBmBXc8BTu0dKou1rUL +OjRTZtfN7jF0RuCETDGIGoK+Zyobi1SORJunUcZ9/Tp6fsBvBqmd2G4XQCFFXwYo +VmGK0GcctR5eUc2tizw9BgfGKWfRP/dxCRD5a8xJtFMa89Mq2AHxBS0FkexHPIYC +I6Aav2kj9COKHN84D8F/JkxkK83REaBmMtkchUJx5q467mr0lEDdHqs/ZT16GiFX +1Q76bQL+pdPYjL4PHfXy67Q4/GqF9AHvFwIDAQABo4GQMIGNMAkGA1UdEwQCMAAw +HQYDVR0OBBYEFKWtlfbXkQ2NByL90/9X6xH93XcaMD8GA1UdIwQ4MDaAFKlRL5fj +FcXVqjcd+ooH8ao6yX/UoROkETAPMQ0wCwYDVQQDDARhcmFuggkArrUCGnECk5Qw +EwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBCwUA +A4IBAQCLzvPNdSqqHrY+AHgNyT3O1sdKiLFQzBKLXVF0MG/yTZHl73dsGBn3boUE +bmtmlrg+7lSDD/VGXMBFBzElGSqHWwTx04tPRHVqH3FJaXH2SKBW1B1XHaBECWgU +z1rUPp0yZR7oF5tL4//1Djwyv+PcqVyRfiMNmMXMY+ABThcEQXrBeBaFoI1TBqbN +5vFCCmFIWeKoRs5Yav1KYRVBfl0i4yCxx0S+WWGFbAnqoZsbCI5BpnnNEM7ukUaH +oewj7ECiLhha62vTQLmTnEtc99NwWl4Acnw4clP6rurPOk0IydKKugB/gRqDHgXY +UXImVjzSV2P9hi+vzUGdUsnjDahM +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQDT+ESvwhymS8od +uDZ8dSisXhK9Vy4D2tm4qULwUsZQ3ywEyKcqiCFUK2CghpYwNmDDvFEWR/QpY2Wu +c6/pOuLtC1cwcp2EYHuJ0GYFdzwFO7R0qi7WtQs6NFNm183uMXRG4IRMMYgagr5n +KhuLVI5Em6dRxn39Onp+wG8GqZ3YbhdAIUVfBihWYYrQZxy1Hl5Rza2LPD0GB8Yp +Z9E/93EJEPlrzEm0Uxrz0yrYAfEFLQWR7Ec8hgIjoBq/aSP0I4oc3zgPwX8mTGQr +zdERoGYy2RyFQnHmrjruavSUQN0eqz9lPXoaIVfVDvptAv6l09iMvg8d9fLrtDj8 +aoX0Ae8XAgMBAAECggEAahE/fZtqbqRaHQkC6sBNfAMO6YPoWLF4ZPj9r/gbmHg0 +NKibTaMU2mNiVLFEEhgDz645/SZAPT2psePd0J1Q1EDqfim8PHNzHgEULAQAGrZH +lGFcUsABQDzSxxGR0HEauCS8zsuySWHHGSRu6AeFsTsaPMdQYBiVFzv/0pupipST +GB0OEPIzgNPN3gMkJ4NiybbOrD/SPgPqDsHpsu+9JZ913dKCD71b1VNHhgjfgYoH +T38NPjVep8hU7mBaXyDrw1ihEXfEGDj86qXqmwAmts4O+BHlU7YY45fwtMzgXHDC +Z3lIO1zLrfDA/v1L3e9tp6gxQ1jXIyJHpztG65pzIQKBgQDpEyimbAYF/C/Oo2sz +Dt5vlxNKLHRIRzE4rOuQSIACtCRvOWRDU9bgTw6H9BS6gONTSijvHox//7K0eJDI +gJH1p1IBl5xaKRVQPajCYHdE9GKASdgyLCJPdZH9u/i/FC30num+eVr7Q5SsSecN +DhyYiqr8+yGIVlcY2jNP0xdfWQKBgQDo0a7dkkc/AlD4cRwOyWW2c/WSkxRYPvQ3 +UKU3u6S099o67/DG1OW+ELR8eRoeUGEr0Abw6GspU6m6mE0+Notj7t/I3ja+ShlL +s4tLav3emhZ0N0lbnarv+I1dme2eGdfurJGXpssVhm+ubBCKMkFEyu6TtW5uVKdv +dxQc9ETj7wKBgG0cIvOFrmwu2tKJfi2w0EC9ILKgjO8pJMm7aatpxUN+wW+wFlfO +b9EiMVND2FBW9hSPqwoF6xAgy6/goSa7yZiOc717FB7BDNE7jD0ym6MUJOiZqTQT +pRw9ldKKpLAO6lSR8CrS9NybjoX5MsjRymE+yT0U82W3xZ5Ex7CeyVpBAoGAA/Uc +fdOwtld5vN9fVLkDq5hJAlbRr7ZSPGZ4iHv+Dr1vzjSp6RdRWGu8RalhUkaXgEEm +/Q1WVPuBFRTlqzsOH4K99xIf6BgmWe0RXxTQf+oqm4sdChuh/jZBYOfu7BMQYpQ4 +XVWOei0w1Mwtc8vq5Bp297fLysBRoElr5Boa2a0CgYA8MQsF3txVOX0tLod2O7RQ +Bk/U6J9sgJq2eIeGrwqtY7EKlZzs5fZRUKsW1bGLQYs40mgsU+xgXNvWIV/o9hqm +r9mRCTY01QAjmEQXQ9TqQ2yPSDKwyXkZZbsv9UNreNhHeeK+CjHS3S4vclDSsf6U +bAaNU4x8o+NM4xuVDj1rTA== +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/DKS-VPN-kilian-iphone.ovpn b/vpn/aran/clients/DKS-VPN-kilian-iphone.ovpn new file mode 100644 index 0000000..8fe8bcd --- /dev/null +++ b/vpn/aran/clients/DKS-VPN-kilian-iphone.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 18 15:12:43 2017 GMT + Not After : Dec 16 15:12:43 2027 GMT + Subject: CN=kilian-iphone + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:da:6e:7b:2c:1d:29:6f:e4:31:54:48:0b:82:fb: + d7:d4:8a:b6:35:00:3d:20:0f:e8:28:b1:f0:f5:99: + a7:06:20:e8:10:bc:bb:7a:3f:86:1a:e9:1e:00:b0: + bd:36:9f:01:71:e8:f8:74:55:b9:cd:2e:91:20:f8: + 65:04:87:d7:47:81:8e:e9:8d:eb:2d:07:fe:ca:ac: + 79:ab:88:04:4d:68:ca:ca:80:ba:52:12:7a:07:30: + 42:8b:af:e7:ba:28:67:59:f1:a2:91:e4:2a:ad:e3: + b0:83:d0:e7:46:11:d6:cc:2b:fe:c6:1f:43:67:6a: + 48:64:a5:9a:7a:8b:a6:ce:6f:1b:33:6e:1a:fc:6b: + a3:7f:97:cc:db:c4:60:f5:58:c6:5f:e1:84:d4:95: + 25:f7:b5:2e:9f:3b:df:45:29:c8:88:a3:92:6c:d4: + ed:74:2a:2e:fa:93:26:dd:e3:ad:f3:de:31:1b:35: + ad:1b:41:27:c8:53:6c:1a:1d:01:42:d1:d4:72:50: + 3a:eb:2e:f7:3a:4e:d1:c4:80:c8:ee:a5:fe:5e:41: + 8c:42:94:4f:ab:f8:29:9e:11:35:c6:91:fb:95:2a: + 7b:b6:f7:cf:67:d7:06:31:5e:72:bd:ba:4c:4a:07: + 14:14:aa:f9:fb:68:f7:2d:99:e4:e4:f3:9f:32:43: + db:57 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + AA:9C:9B:8A:7F:C1:1F:CB:8F:02:8E:79:DD:2D:9E:A3:6E:02:8E:BB + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + 5e:72:35:8e:33:30:56:28:fd:69:e5:ec:8b:d1:82:c6:95:e2: + 29:85:6c:25:42:56:83:57:9a:dc:a1:42:02:aa:f3:63:7c:0e: + f0:45:6f:27:46:29:6b:b4:41:5f:09:85:5f:f7:20:ad:b1:50: + 9f:74:df:c1:ce:34:31:6a:6e:a6:60:08:45:0f:65:8f:ac:ae: + 51:c2:e9:5c:d8:5b:46:e9:39:0e:d4:d2:71:7c:3e:21:e4:37: + b4:aa:62:fd:fc:88:cd:7f:94:f6:d1:84:27:d7:69:64:13:e1: + eb:dd:94:84:ab:5e:f1:cc:bb:dd:0b:27:14:8e:4d:6a:11:96: + 0e:8c:39:e9:05:f1:85:95:a6:1d:f6:ab:a9:ef:ab:de:cd:5c: + 86:97:da:3e:d4:f9:20:94:1d:82:0f:e6:e6:7b:9a:1b:d6:4b: + 24:e8:6f:52:95:ed:01:a4:ec:7d:c3:45:5c:63:3f:07:3f:d2: + 75:86:77:56:48:c0:ad:ed:32:59:c5:5d:de:70:38:ea:a3:ec: + de:b6:30:9a:cb:13:86:2b:e2:d6:a5:25:c0:b7:c6:1e:16:a5: + bf:4b:1b:c9:c2:3f:a5:86:16:38:be:0d:3e:e5:22:7d:a4:08: + 35:44:f4:68:52:f3:84:cb:5d:00:6b:de:36:d9:fd:a9:1f:e7: + 73:b5:54:c4 +-----BEGIN CERTIFICATE----- +MIIDMzCCAhugAwIBAgIBAzANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxODE1MTI0M1oXDTI3MTIxNjE1MTI0M1owGDEWMBQGA1UEAwwNa2ls +aWFuLWlwaG9uZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANpueywd +KW/kMVRIC4L719SKtjUAPSAP6Cix8PWZpwYg6BC8u3o/hhrpHgCwvTafAXHo+HRV +uc0ukSD4ZQSH10eBjumN6y0H/sqseauIBE1oysqAulISegcwQouv57ooZ1nxopHk +Kq3jsIPQ50YR1swr/sYfQ2dqSGSlmnqLps5vGzNuGvxro3+XzNvEYPVYxl/hhNSV +Jfe1Lp8730UpyIijkmzU7XQqLvqTJt3jrfPeMRs1rRtBJ8hTbBodAULR1HJQOusu +9zpO0cSAyO6l/l5BjEKUT6v4KZ4RNcaR+5Uqe7b3z2fXBjFecr26TEoHFBSq+fto +9y2Z5OTznzJD21cCAwEAAaOBkDCBjTAJBgNVHRMEAjAAMB0GA1UdDgQWBBSqnJuK +f8Efy48CjnndLZ6jbgKOuzA/BgNVHSMEODA2gBSpUS+X4xXF1ao3HfqKB/GqOsl/ +1KETpBEwDzENMAsGA1UEAwwEYXJhboIJAK61AhpxApOUMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAXnI1jjMwVij9 +aeXsi9GCxpXiKYVsJUJWg1ea3KFCAqrzY3wO8EVvJ0Ypa7RBXwmFX/cgrbFQn3Tf +wc40MWpupmAIRQ9lj6yuUcLpXNhbRuk5DtTScXw+IeQ3tKpi/fyIzX+U9tGEJ9dp +ZBPh692UhKte8cy73QsnFI5NahGWDow56QXxhZWmHfarqe+r3s1chpfaPtT5IJQd +gg/m5nuaG9ZLJOhvUpXtAaTsfcNFXGM/Bz/SdYZ3VkjAre0yWcVd3nA46qPs3rYw +mssThivi1qUlwLfGHhalv0sbycI/pYYWOL4NPuUifaQINUT0aFLzhMtdAGveNtn9 +qR/nc7VUxA== +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDabnssHSlv5DFU +SAuC+9fUirY1AD0gD+gosfD1macGIOgQvLt6P4Ya6R4AsL02nwFx6Ph0VbnNLpEg ++GUEh9dHgY7pjestB/7KrHmriARNaMrKgLpSEnoHMEKLr+e6KGdZ8aKR5Cqt47CD +0OdGEdbMK/7GH0NnakhkpZp6i6bObxszbhr8a6N/l8zbxGD1WMZf4YTUlSX3tS6f +O99FKciIo5Js1O10Ki76kybd463z3jEbNa0bQSfIU2waHQFC0dRyUDrrLvc6TtHE +gMjupf5eQYxClE+r+CmeETXGkfuVKnu2989n1wYxXnK9ukxKBxQUqvn7aPctmeTk +858yQ9tXAgMBAAECggEAe0JY8z3JgkBsrbix9koTMvbLdwEZfRw8z6oJ5S29mLG9 +AqTdzlBGZq0hpxYUz9vOPu9ONKejX2tlrgs9Rd851jn/4T+adCDM4KWPSwJIGz6F +INyfR2zxu1i6VIUA6IWgPJskN9tfUhzoIJojx+CNK02wSTCfIp5RF6pzj696g4YY +G46ykcFT4bbrDR7Hs3Pcb+COzXVUxeu/XHKXUTbDgUqBJKgWE2IXj3/siwbo9SFW +NpSZTE1qJOcz32KmbMLPdJtEM6cwsnXjYJDqOWbH+R4Swstq0t5UbC0w9CxGm3Xi +cHtD9gq4E+lbTvcavs2upYAW36aG3yEsK2NM8lI14QKBgQDtDGQUia51F+lq6ybX +9cyRzqszijv3Qw+d4zd8rsgwtEeOzdHSd5wyra0tgH+o568s+CyXj9Ak+NExQun5 +GhnL7/8JFoCB4XOIoxzzo4nb9LAKf/a4sm3UxuyqXndQCdvFgzAmbcze+q9upTS4 +PDMMv98UlTKWlTRmsX50//YqLwKBgQDr5RBvMW9SaFOLBDhvt2gZdhyIw/jWIhy3 +e+rGNt3wp+sUuZlbAezXj0lguMhS4ao5Ozrs6yFVFjCVQWW+8G6guGclhD+r89ev +7FlxvCFJ947ZfL2kf7pSVL5O86mt26hwaMPgn3MtYki82XFsMjV06qw3lRuubo7P +Xiv+c0SfWQKBgFVqdJmN7wYUYrB7IVkKIfecL8Z3lhoH2RW8bR8JX+tk2rATa/rZ +zLfaKx/NQLLdIRskJfVLBeZ8neyRPvvastbwmMZujEnAsj/W/rSwBhny9ogiCgYN +jVPxhg/x0C5QDxgBqJUAVaU3UYWeE/wa/Q4oCTtCc6MdCm/Cn12LaelTAoGBAMdJ +6xt1cS32s3XDqAZBtXGlRjAJGEWX5hjhWJQCsHfq9QC6WCP5uWTXSc+r7JmQyqW1 +M3AKqUtgBsVhzZqFN4ESqRmZ48zaocKfc2VR4fHCcm2tI+5AdmGt9GVxF02pQGFP +MQSo0L5rxTW+okMdG+pdhAclMpCoGIB6d8JtEXFpAoGBAJOyoXzZ9IBbj3jvYecz +hQOp0doitl4sWrpYMzCxw0w6dN/PbQ0mJSWdQeZ8Roy63oTkYBsXWlAW2hqI6mKm +G7xDI9azndBp7DjpmQsx/lYMPsXcK05yvHA+OhsLvJ6hG0xolxWfxiZmaxbEcJHQ +ig2hrZ49rZVT30ZefMcK8tSz +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/aran/clients/dks-laptop.ovpn b/vpn/aran/clients/dks-laptop.ovpn new file mode 100644 index 0000000..f9e8784 --- /dev/null +++ b/vpn/aran/clients/dks-laptop.ovpn @@ -0,0 +1,152 @@ +client +dev tun +proto udp +remote aran.sysaki.com 1098 +remote aran.dks.lu 1098 + +remote-random +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings + +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIJAK61AhpxApOUMA0GCSqGSIb3DQEBCwUAMA8xDTALBgNV +BAMMBGFyYW4wHhcNMTcxMjE4MTM0MTIyWhcNMjcxMjE2MTM0MTIyWjAPMQ0wCwYD +VQQDDARhcmFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1TydPk4X +8YyPjXI0htiMsM9C5jP0iH/Hgl7w+t0NL6fvcJhwy8BntJ/FRlS/GFoszmH+0zSt +pVeymgEwSQ2SrZixSkln2XhbTIH/NUEHosdllECJgj83W0Kpbtms8Cs6/FfhvMB4 +4o/GnN/mkmA9kslguStksV2vQh98Os9rw5gEKM5qFYO5FYUZIIrcsLgyzztPpw4H +vhrAzxuuu+zg9cOGAihlWV+CSlQJDZyC9hH9xal8UsTlYn9HFqVjr39k7OJg0WC6 +gyjQ92nzqEw49Jkb3NMAarF0zPcP25WV97Aq7EDZV/G8LZbg4p+xCrkz2iUJttu1 +CZjhS9uNsvIAYQIDAQABo30wezAdBgNVHQ4EFgQUqVEvl+MVxdWqNx36igfxqjrJ +f9QwPwYDVR0jBDgwNoAUqVEvl+MVxdWqNx36igfxqjrJf9ShE6QRMA8xDTALBgNV +BAMMBGFyYW6CCQCutQIacQKTlDAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQsFAAOCAQEAysh4aGsnv4CebGvzZ9mZlmK5o4JTj4bqRw8sFe4h +wW/bZ0ggMnnvNZF1VJJgO/UQQq2gIiOw7zLrlSmPHIhRPkQspemk6uU0m2h6K9rn +AnX3qeVP5dXbZsqr1jI1/aCzxSW5hu6WUfR3Q+u1pGm9HePhrRJj0djW8Kd7UO+s +PfpIN9gbfLoLnAfCJIc3BccBoD5IqU4s7vleekQGCJHloT5S3MefiIUg7d8leW4V +8PiCohkgHwMOZy3ACy1ZPuT92x+7JCaNV56X7iT3GZhkyQ4tSKu3UpMFkz8obYKw +8RrNsXXBRWgnuakkMY6wHJJZBPJn+qDrWbO7nxVTOqY22g== +-----END CERTIFICATE----- + + +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha256WithRSAEncryption + Issuer: CN=aran + Validity + Not Before: Dec 18 14:47:04 2017 GMT + Not After : Dec 16 14:47:04 2027 GMT + Subject: CN=dks-laptop + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (2048 bit) + Modulus: + 00:93:37:eb:6c:44:75:6c:cd:16:17:8f:2c:ec:70: + fe:1a:9c:ca:12:e6:d7:62:bf:ac:1f:42:41:f3:a7: + 6a:ba:7a:b5:9d:56:d6:a4:6c:0a:13:9b:af:32:b1: + 67:c6:c1:bb:91:e8:81:c3:c5:23:c1:82:24:9f:00: + 40:0d:2e:c6:10:7a:8d:c1:dc:95:88:74:fb:eb:8f: + 20:7b:11:48:05:56:88:e5:1e:ee:90:43:e5:c9:27: + ff:db:68:69:d8:76:83:a9:fb:e3:62:a0:cb:5a:0c: + b9:5c:31:e9:50:88:8b:01:58:d2:cc:20:ad:c0:35: + a0:d2:0a:eb:c2:86:ae:17:c9:29:a9:5f:01:19:d4: + 16:e4:eb:fe:7b:ff:24:c5:d3:54:e3:ea:61:81:a9: + 1c:a8:93:4b:35:ad:b7:b0:e1:26:31:8d:7e:ca:a5: + 93:f2:5d:f5:60:ec:e0:a7:2a:c3:c7:4b:a4:3e:6f: + 46:07:a9:6a:98:d1:0e:b7:31:5b:dd:04:27:7a:e7: + 0f:af:2b:ab:ea:b1:c0:f6:38:65:6c:bf:c8:ff:5f: + 90:8c:e5:81:21:ec:e0:13:3f:93:ed:d5:4c:12:7a: + 69:78:6e:52:fd:92:68:c4:0c:d0:95:e1:de:1f:1d: + bc:b5:0d:c9:65:94:5e:03:23:d0:c3:86:f9:6d:71: + de:39 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + X509v3 Subject Key Identifier: + EF:9A:95:33:48:A2:EE:AF:EF:4D:2D:F0:D5:43:AD:CD:82:FC:A4:A2 + X509v3 Authority Key Identifier: + keyid:A9:51:2F:97:E3:15:C5:D5:AA:37:1D:FA:8A:07:F1:AA:3A:C9:7F:D4 + DirName:/CN=aran + serial:AE:B5:02:1A:71:02:93:94 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha256WithRSAEncryption + bb:e0:33:57:fa:4b:bc:35:71:08:e8:6d:22:77:e5:b0:17:73: + 49:4a:7b:83:14:09:dd:ec:cc:c4:78:b8:e9:0a:94:9c:40:15: + 27:11:a3:06:d4:59:6c:cf:26:ce:30:25:8f:3c:75:e6:f3:59: + 76:46:cf:82:d5:71:ef:a7:f0:e5:e6:68:87:99:4a:da:43:83: + 5f:e5:b6:3e:f5:9e:8b:c0:a6:73:b9:2e:1c:00:1f:6e:45:c7: + 6e:7d:b0:29:ba:61:c9:72:1a:03:48:f7:44:4d:53:09:6b:16: + f6:82:a2:8e:b7:68:d0:6a:a9:a6:15:d9:72:25:0c:39:df:12: + 10:7d:6b:d7:93:62:b0:4a:62:07:c3:2a:f2:11:7f:c8:a7:6b: + 92:ed:d7:d5:ae:d8:5c:e1:a9:35:cb:2a:b9:4e:7f:31:3f:41: + 49:f5:f3:ea:63:ae:28:ce:aa:d5:d4:1d:f7:c8:26:1b:bd:9e: + 04:ac:c0:c9:8c:cb:00:a8:33:2f:da:95:7a:9c:ca:bc:eb:14: + 82:42:ab:3d:d3:37:a1:e6:c7:5f:3a:e5:f0:85:1c:7a:86:c4: + 13:84:be:13:ef:b7:03:5d:1c:b0:48:16:61:51:fd:0a:85:64: + 66:32:9e:82:e7:a3:08:0d:c0:fc:30:fc:90:cc:31:86:f8:e6: + bf:8b:7a:46 +-----BEGIN CERTIFICATE----- +MIIDMDCCAhigAwIBAgIBAjANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARhcmFu +MB4XDTE3MTIxODE0NDcwNFoXDTI3MTIxNjE0NDcwNFowFTETMBEGA1UEAwwKZGtz +LWxhcHRvcDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJM362xEdWzN +FhePLOxw/hqcyhLm12K/rB9CQfOnarp6tZ1W1qRsChObrzKxZ8bBu5HogcPFI8GC +JJ8AQA0uxhB6jcHclYh0++uPIHsRSAVWiOUe7pBD5ckn/9toadh2g6n742Kgy1oM +uVwx6VCIiwFY0swgrcA1oNIK68KGrhfJKalfARnUFuTr/nv/JMXTVOPqYYGpHKiT +SzWtt7DhJjGNfsqlk/Jd9WDs4Kcqw8dLpD5vRgepapjRDrcxW90EJ3rnD68rq+qx +wPY4ZWy/yP9fkIzlgSHs4BM/k+3VTBJ6aXhuUv2SaMQM0JXh3h8dvLUNyWWUXgMj +0MOG+W1x3jkCAwEAAaOBkDCBjTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTvmpUzSKLu +r+9NLfDVQ63NgvykojA/BgNVHSMEODA2gBSpUS+X4xXF1ao3HfqKB/GqOsl/1KET +pBEwDzENMAsGA1UEAwwEYXJhboIJAK61AhpxApOUMBMGA1UdJQQMMAoGCCsGAQUF +BwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAu+AzV/pLvDVxCOht +InflsBdzSUp7gxQJ3ezMxHi46QqUnEAVJxGjBtRZbM8mzjAljzx15vNZdkbPgtVx +76fw5eZoh5lK2kODX+W2PvWei8Cmc7kuHAAfbkXHbn2wKbphyXIaA0j3RE1TCWsW +9oKijrdo0GqpphXZciUMOd8SEH1r15NisEpiB8Mq8hF/yKdrku3X1a7YXOGpNcsq +uU5/MT9BSfXz6mOuKM6q1dQd98gmG72eBKzAyYzLAKgzL9qVepzKvOsUgkKrPdM3 +oebHXzrl8IUceobEE4S+E++3A10csEgWYVH9CoVkZjKeguejCA3A/DD8kMwxhvjm +v4t6Rg== +-----END CERTIFICATE----- + + +-----BEGIN PRIVATE KEY----- +MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCTN+tsRHVszRYX +jyzscP4anMoS5tdiv6wfQkHzp2q6erWdVtakbAoTm68ysWfGwbuR6IHDxSPBgiSf +AEANLsYQeo3B3JWIdPvrjyB7EUgFVojlHu6QQ+XJJ//baGnYdoOp++NioMtaDLlc +MelQiIsBWNLMIK3ANaDSCuvChq4XySmpXwEZ1Bbk6/57/yTF01Tj6mGBqRyok0s1 +rbew4SYxjX7KpZPyXfVg7OCnKsPHS6Q+b0YHqWqY0Q63MVvdBCd65w+vK6vqscD2 +OGVsv8j/X5CM5YEh7OATP5Pt1UwSeml4blL9kmjEDNCV4d4fHby1DclllF4DI9DD +hvltcd45AgMBAAECggEACz7EPtrj1VG9FEOdfNoMrt+3F8aGQUa+0QxwmTn6jw/8 +e248qwaNpn3H3ilq8eWufDC0aM3QM2HLhlGwktE10+Bon5xH18qHy7B9HKlvROkd +P9MjCeYF0V26z3mkTCKRYBSbg9cgcVpzdjVhywMDCzFLuMfuPbZa+HBZHdzHw40+ +dvTjdvkQ1FHka3A3vgKr1wMIUC+zOV5PJQO4E07ApnXrfKFqJCPggS37CwpgGSzf +WaM+Wamd7rRGAcw7pYk8tYPET9Z5tEem42zqDWWyUn2OQE49eq4Dt0hHJaAk1c+U +D5rALl/89MsKTkLBZ1kHLKbZH+SF34bKn1nSqZuTWQKBgQDCq0TdR0sDIy7bK5kD +5Z83NZcYPAD8jY4OWeuSZAR6j2S6KybrRNbmIwD5CHdpBYxepifFgmb4C0ghEKci +Pgfd8SrUpsRDdtuPXkMdhkfKEN12tgfnOUb1j6C/N640HaCKv20SKIAkDRI9HZNy +ENMCmHF/kycnQsuwBQul/UUBNwKBgQDBmZi81haJaDWVLtHEGUDOVHs1eGK1lIy6 +l37KoUz5GPntgXs+iWw63DjOTiLHS8WWD5tEiiupDNwLGk43fCqBCUAtWQ95FcZH +7+06SA3Yq6AHvktA4WmNYCFqwdk8rSIvxJ98tY+xzf3K8KHlwq/aPkIxi1yoLJ8z +9wSvAWWUDwKBgEDE1TO+XbHcieF4HwAR7ShkVzJD/JwKyQHzXxKk3mycuwnKA7fx +foKxkMhKzdgOdYakR8VKPtI2hrghn0ogU2O/st1v4wsDR8fqt+/h1o7fj5/IrtZ6 +0yYutHAKqZZDaT/gsvyApynXg4L8DSu9d0d8yv6ESlmgur6E3zxKCSR/AoGAKZ9m +MSMuETiwXHSGcMylHDcZjjNltXhMkUlE3zeyntN52FBAOP++nyD9rY0q+QIXZt3Q +GfpCzMORA2oSaudtE/TzMUy2gOfni0vQCvm20GCFtWR6NWbBFL4YMSWgGOV4NiDl +0SAP1sBc0ibOB+HFgPxlqtU1hIqjZ76x6RY5yo0CgYBOvG2XoWobGbuizAR92o7G ++5vlFZrkTrsDxOw/OhRtvPmaatgTUELoYYPwbuloZxuoiyB1rPFSznC/t629pihT +T8Bx6msIANSPkXTi4PJXEpM2zs+h09FB4RN5dpxLL6FUwfCULU5rnf4GIClkUT4L +qselWVQZ5oFXpg0oUiO5+A== +-----END PRIVATE KEY----- + +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC diff --git a/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.crt b/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.crt new file mode 100644 index 0000000..1f7df2b --- /dev/null +++ b/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bascharage/name=aral-bascharage/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:4e:ad:bb:23:53:fa:3c:d7:9f:b1:4e:1a:e7: + dd:af:d3:9e:b1:53:85:99:b0:8d:cb:c3:61:af:3a: + 6a:d2:39:8b:96:2e:a2:e5:df:f6:cd:50:f9:07:dd: + be:a7:1c:09:28:08:22:bd:76:c5:cb:20:21:68:9c: + 29:a9:66:d0:4a:18:54:81:af:ba:79:07:bd:5d:b1: + 7a:48:3d:b1:43:4c:4c:f0:88:2a:92:4f:b5:13:82: + a7:73:81:0c:0d:82:0f:d1:2a:41:e4:36:d2:ef:4a: + 5c:55:30:07:70:28:e7:3b:cb:27:8c:82:47:e2:6c: + 56:2b:c2:d6:71:59:54:33:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:A8:8F:E7:1C:5C:11:8B:6B:1A:36:BA:AC:ED:3A:C9:F3:B8:EE:C1 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 28:e9:95:39:e5:e2:10:30:a3:79:06:a2:26:e4:03:70:85:79: + f7:4a:21:75:9f:a5:57:d5:60:90:be:3f:4e:19:b6:c8:01:5b: + 44:c5:c8:ca:15:e2:3f:7a:49:88:d6:ae:16:e5:b4:94:d5:d9: + f1:2a:1c:57:2a:71:0f:aa:80:35:52:38:08:58:f9:4c:1d:78: + 6e:dd:0d:27:73:19:b4:d0:61:dc:cb:6b:45:c4:5b:0a:d0:02: + b4:b6:14:d1:b2:03:d5:e0:05:9e:66:7a:db:96:0d:28:17:09: + 71:ec:c9:1a:94:2e:ab:15:64:a2:ca:64:e9:7f:bd:40:58:a6: + 3d:68 +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1iYXNjaGFyYWdlMRgwFgYDVQQpEw9hcmFsLWJhc2NoYXJh +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAO9OrbsjU/o815+xThrn3a/TnrFThZmwjcvDYa86atI5i5Yu +ouXf9s1Q+QfdvqccCSgIIr12xcsgIWicKalm0EoYVIGvunkHvV2xekg9sUNMTPCI +KpJPtROCp3OBDA2CD9EqQeQ20u9KXFUwB3Ao5zvLJ4yCR+JsVivC1nFZVDNlAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFHaoj+ccXBGLaxo2uqztOsnz +uO7BMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACjplTnl4hAw +o3kGoibkA3CFefdKIXWfpVfVYJC+P04ZtsgBW0TFyMoV4j96SYjWrhbltJTV2fEq +HFcqcQ+qgDVSOAhY+UwdeG7dDSdzGbTQYdzLa0XEWwrQArS2FNGyA9XgBZ5metuW +DSgXCXHsyRqULqsVZKLKZOl/vUBYpj1o +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.key b/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.key new file mode 100644 index 0000000..0b02ddc --- /dev/null +++ b/vpn/coloradio01/clients/aral-bascharage/1/aral-bascharage.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAO9OrbsjU/o815+x +Thrn3a/TnrFThZmwjcvDYa86atI5i5YuouXf9s1Q+QfdvqccCSgIIr12xcsgIWic +Kalm0EoYVIGvunkHvV2xekg9sUNMTPCIKpJPtROCp3OBDA2CD9EqQeQ20u9KXFUw +B3Ao5zvLJ4yCR+JsVivC1nFZVDNlAgMBAAECgYBP9r9wt+ZYyLnYX7vUm8Pk+9ac +NGeBKpDHFLtwfRmys43kGiNOot7qTnNYYI1Tc7fPi6BoJOcE7/CZ7wyw0W0pn7fM +RccYTEIRHhgnRwGQZPfZfj9uBLD28HRqU/EfZsKkmFAfEtublr16O8JLhvRK6x6q +oAkIzT5un1F5gKP/QQJBAPrgOGjoWRoy61iROy95qbs3f1nZZop8Mzb3dSj7wsTn +QfRMRzC1UK78J+e9oBeniXcGs3NUKJU2wUfrFN+IuDECQQD0MfgDM4xuPmkKR7Br +/xjmaAzYIJuDlTVV8novG7KJOxV+o8FYVd3kh/hV4K5TuG7HX51ZZe2By2C7zESR +fBV1AkEAkafQ2IfeA6oAniFj/YJjm0DzfZUNReYqTgWKTkstn+iskEwhIRSETbQ0 +7wVXh6RL2YFYeuMn1Mo/maPRMJ9OYQJBAIEq9U9sMvoVlSZU6WMW2qr1muWvydL+ +V+oQisTkV7nzQNlt8VWyhd7edWOnp06tnhtj3i1tlwYy+AYedJ6oDgkCQCWsPOzS +uJ8d8V6sEHhLdGFci+JU2Rpv4JrdkPcJJVKAzPVkgjvrH8CinrUQB2RI088OqAxy +DfuaJyXpoNo3Q4s= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-bascharage/1/ca.crt b/vpn/coloradio01/clients/aral-bascharage/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-bascharage/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bascharage/client.conf b/vpn/coloradio01/clients/aral-bascharage/client.conf new file mode 100644 index 0000000..1b6d7af --- /dev/null +++ b/vpn/coloradio01/clients/aral-bascharage/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-bascharage.crt +key 1/aral-bascharage.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.crt b/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.crt new file mode 100644 index 0000000..61b473f --- /dev/null +++ b/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 26 (0x1a) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 12 08:28:01 2015 GMT + Not After : Apr 9 08:28:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bertrange/name=aral-bertrange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ae:ab:70:ff:72:ff:7c:24:6c:45:36:54:da:e6: + b8:a8:e5:a5:dc:f3:3a:b2:2d:16:33:17:98:57:06: + 1b:0e:c2:e8:96:ab:79:52:8e:27:3b:a1:7b:cf:26: + a4:4f:50:88:3e:c5:9a:b7:44:25:14:2c:d1:c7:ac: + fd:0c:61:d8:1b:4d:28:b0:f0:9a:c7:9b:d6:4d:80: + 53:bb:4a:f3:b7:3f:8f:d6:8d:59:60:82:9a:03:4e: + 97:16:f2:b1:20:b9:47:fb:83:16:5e:55:3b:88:6d: + 2b:7f:3a:59:54:1a:bc:e6:c2:ce:6e:c6:0c:ea:78: + b9:f1:12:8c:d7:64:ea:3b:77 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:B5:33:57:42:FD:EC:18:3E:22:6E:E9:CE:0C:6F:8F:4D:7F:6D:8E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1a:75:0b:c2:52:40:7d:1e:bc:aa:ad:0a:7d:4a:4f:4f:71:d4: + 1f:c8:4d:54:5c:69:3c:d3:8d:99:ac:95:7d:07:6a:7d:52:fb: + 6e:45:36:bc:c3:3b:16:99:08:28:d5:fc:cb:ca:31:ba:87:5a: + e4:1f:f3:fe:0f:ee:8a:44:44:a6:52:44:af:71:40:81:bd:6b: + 72:c7:29:ab:6f:f9:ef:95:a0:63:23:53:83:24:b5:66:a3:2a: + f0:63:1a:3a:f1:8d:66:5d:9b:b4:90:d7:33:ea:c3:8b:e2:2d: + 88:66:59:a6:73:64:ba:bb:10:ec:0b:3a:62:9d:4a:b1:8c:5e: + 89:6b +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBGjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTIwODI4MDFaFw0yNTA0MDkwODI4MDFaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1iZXJ0cmFuZ2UxFzAVBgNVBCkTDmFyYWwtYmVydHJhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCuq3D/cv98JGxFNlTa5rio5aXc8zqyLRYzF5hXBhsOwuiWq3lS +jic7oXvPJqRPUIg+xZq3RCUULNHHrP0MYdgbTSiw8JrHm9ZNgFO7SvO3P4/WjVlg +gpoDTpcW8rEguUf7gxZeVTuIbSt/OllUGrzmws5uxgzqeLnxEozXZOo7dwIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTetTNXQv3sGD4ibunODG+PTX9t +jjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAadQvCUkB9Hryq +rQp9Sk9PcdQfyE1UXGk8042ZrJV9B2p9UvtuRTa8wzsWmQgo1fzLyjG6h1rkH/P+ +D+6KRESmUkSvcUCBvWtyxymrb/nvlaBjI1ODJLVmoyrwYxo68Y1mXZu0kNcz6sOL +4i2IZlmmc2S6uxDsCzpinUqxjF6Jaw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.key b/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.key new file mode 100644 index 0000000..a957e89 --- /dev/null +++ b/vpn/coloradio01/clients/aral-bertrange/1/aral-bertrange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAK6rcP9y/3wkbEU2 +VNrmuKjlpdzzOrItFjMXmFcGGw7C6JareVKOJzuhe88mpE9QiD7FmrdEJRQs0ces +/Qxh2BtNKLDwmseb1k2AU7tK87c/j9aNWWCCmgNOlxbysSC5R/uDFl5VO4htK386 +WVQavObCzm7GDOp4ufESjNdk6jt3AgMBAAECgYEAoAhJrnIhbA8+96bQ1gKf23cU +oTxkYcz3UvZiSBE7BypCyZDvxlihz3ujoObJkjW5rrGDkDeqNTLfPS/cZNTclpsm +zdkfLJFWd8zpKiXlOzPs3gAFh2N4VTF95s70My6Fe9t51RtHhrJ3KwmcufTWJy2U +w7t8E/MdSYL6MjCvyAECQQDcgEPu0g9zeLjLBs9ts9dIe4TOBEE0pwSDo/fxjO+H +NiMS7IVwSL0hjgjPKGXqgxMW9zAIDfGX0kzycy+yV5wBAkEAyspIMk1fz+lEwyTk +Mas5bdrlHVtXR5J+O52f3lE8Mk9U45OvdQrdowipPX30wp/aAgXW1grySDmJEXtm +Day3dwJBAKv5dgJL3zUmUKo4c4uSGjQz8g5kDx8rrD+noPfJ/f8s4AogYqqCcNA8 +4O4BCgvvkvH0dIezqFvK76yg3fBwmAECQHPXO4iolGvTJ/mFkGkjE2pCmZC8hc4X +y85IS3OW2hkvIiHiUl88tsEUCIFc+z1WTRXMuh2JIT/Kxhbbc7+qAx8CQHKDUrn7 +xH11hiYGkCHxEBi920gW9oX9PQtM58J+Z9MtK30ZEvJc/81ApKwbqRVljE+7qqKY +LA/bPsMpm7ZkdHE= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-bertrange/1/ca.crt b/vpn/coloradio01/clients/aral-bertrange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-bertrange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bertrange/client.conf b/vpn/coloradio01/clients/aral-bertrange/client.conf new file mode 100644 index 0000000..57c86da --- /dev/null +++ b/vpn/coloradio01/clients/aral-bertrange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-bertrange.crt +key 1/aral-bertrange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.crt b/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.crt new file mode 100644 index 0000000..71bf031 --- /dev/null +++ b/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bettembourg/name=aral-bettembourg/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:7f:9d:a2:76:0c:81:71:36:1b:6a:e6:2d:a2: + 5d:96:f6:9b:46:72:55:92:e0:a0:6c:1e:dd:8c:f0: + ec:04:41:5b:79:5d:22:48:a9:18:04:13:52:51:b0: + ba:13:43:66:03:af:16:b1:50:8a:5d:cc:4a:6f:ff: + 93:ef:8b:15:f5:fd:a2:df:c4:b1:1c:12:be:07:6a: + f5:5a:30:ca:47:6f:c9:18:54:0e:a5:bf:f7:a9:ed: + 44:3f:e5:ce:e9:99:4e:35:a9:6d:ad:c4:ff:39:89: + 94:de:cf:54:81:9b:da:25:5e:72:1b:c0:1f:6e:6a: + a5:f6:b2:92:8b:3a:57:cd:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 84:AA:59:BE:86:AB:33:A6:59:6F:16:14:C3:1D:91:D3:57:73:44:7F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2e:9a:e2:71:c1:52:c1:72:0f:ce:96:a7:8d:e8:f0:ac:30:b2: + c1:80:22:82:e6:d9:11:ba:d0:2c:bc:81:41:07:3f:8c:f7:00: + 5a:a4:b2:90:b1:e9:75:ee:fc:2e:c9:c5:f9:ce:37:ae:6c:ad: + e2:d7:a1:65:e6:bd:ae:dc:b9:24:be:2e:b8:95:64:c9:1b:8a: + a0:9f:7f:98:cf:70:05:e0:ed:0a:b8:28:26:6e:0c:4b:9e:11: + 3c:e6:9c:5c:b2:7e:c1:ba:ab:e3:d2:ac:b0:8b:ef:e8:20:5f: + 3b:06:7c:60:e4:d9:8f:52:3e:98:88:58:e6:79:60:30:66:db: + 55:ce +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1iZXR0ZW1ib3VyZzEZMBcGA1UEKRMQYXJhbC1iZXR0ZW1i +b3VyZzEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAyn+donYMgXE2G2rmLaJdlvabRnJVkuCgbB7djPDsBEFb +eV0iSKkYBBNSUbC6E0NmA68WsVCKXcxKb/+T74sV9f2i38SxHBK+B2r1WjDKR2/J +GFQOpb/3qe1EP+XO6ZlONaltrcT/OYmU3s9UgZvaJV5yG8Afbmql9rKSizpXzXsC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUhKpZvoarM6ZZbxYUwx2R +01dzRH8wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEALpriccFS +wXIPzpanjejwrDCywYAigubZEbrQLLyBQQc/jPcAWqSykLHpde78LsnF+c43rmyt +4tehZea9rty5JL4uuJVkyRuKoJ9/mM9wBeDtCrgoJm4MS54RPOacXLJ+wbqr49Ks +sIvv6CBfOwZ8YOTZj1I+mIhY5nlgMGbbVc4= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.key b/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.key new file mode 100644 index 0000000..1c1d962 --- /dev/null +++ b/vpn/coloradio01/clients/aral-bettembourg/1/aral-bettembourg.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMp/naJ2DIFxNhtq +5i2iXZb2m0ZyVZLgoGwe3Yzw7ARBW3ldIkipGAQTUlGwuhNDZgOvFrFQil3MSm// +k++LFfX9ot/EsRwSvgdq9VowykdvyRhUDqW/96ntRD/lzumZTjWpba3E/zmJlN7P +VIGb2iVechvAH25qpfaykos6V817AgMBAAECgYBx4QLNcoXl5bz//kYkM8NeOqFo +JLRrPVf6dgEyWerhGcBPqEi3hCC1aghJWJHMc4LTX4vre9fUmCbkhV60wAtAo4Pv +QcqdY2J8e+bkfwTiRYgCO8oSXnePjD1zz0rbPveYvgEy6U9ucUaowqad82aXhMMx +OCO7eadxc/6qn2UEwQJBAOr6RR4Nwqhg0slim/NyXFY6cAd3pJ3uDjzGJRlOD3n2 +oEA+UYUjgj38XTTMTLEPiwe0sdQCe+70V47/BsSRlV0CQQDcnXioys7X//bLq4YF +CzngwFYk1ECy1VU0Cr732vcPfFDbayUNqhiIoQyuJtka/hgCbMyWVn151v8/P4JA +Nai3AkBu5LfTzCiusCsqUXhJ9xGuvBt82rD8u4lKkzSU8asKIyNTzlVIoQ5pVH1k +WnpjIXO6qkM2TAnTJstft+mowRAdAkEAu4V2fDL3Io7FnlVLc5oZNjsGfgOUgu3m +oHfJ3y/V9Om8aOVn93dvpyMNfjIzNEhq7BTCyb72pMvk5kP7WMzDfQJAffm3J73d +kRfGViY16CJDULuxoGgXcCO42UaGGASl+GBJN5GwUH/vtEvO6xHoDsqIf0xB22zQ +ZS6M96VidI3LPA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-bettembourg/1/ca.crt b/vpn/coloradio01/clients/aral-bettembourg/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-bettembourg/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-bettembourg/client.conf b/vpn/coloradio01/clients/aral-bettembourg/client.conf new file mode 100644 index 0000000..1de840a --- /dev/null +++ b/vpn/coloradio01/clients/aral-bettembourg/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-bettembourg.crt +key 1/aral-bettembourg.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.crt b/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.crt new file mode 100644 index 0000000..16b8c6b --- /dev/null +++ b/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-diekirch/name=aral-diekirch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b9:5c:dd:9f:37:c6:22:8c:8e:a8:ee:4f:9d:5c: + da:24:34:78:44:cc:ba:b9:16:78:7b:24:e8:8c:71: + 1d:b1:da:9a:33:43:02:26:29:46:52:f2:44:e8:d7: + 1a:45:86:09:82:51:c1:04:e6:39:62:24:1b:7e:7e: + 4a:ae:60:0b:1a:1b:a1:5e:e8:27:20:3d:da:a7:37: + 76:82:2d:32:d3:d8:45:81:f8:1e:8c:43:a2:bf:cc: + 46:25:30:a1:c9:ef:fd:66:89:f3:6b:57:f3:29:bf: + 76:20:5d:a3:39:ce:fb:c0:03:60:8a:86:c3:9b:90: + 43:f8:d5:d0:05:71:a2:df:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 94:1A:2B:48:44:38:11:DA:89:21:71:26:B2:62:83:99:94:2A:5A:F7 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 20:f7:79:91:9e:6b:e8:04:8c:7c:9e:4b:65:ff:c0:01:42:8c: + 21:df:7a:9e:0c:36:26:7e:42:f9:09:e8:dd:28:f6:8b:5c:ed: + e7:e3:6d:09:71:cd:23:90:7d:8b:f4:ee:48:8b:ad:fb:93:3f: + 8d:39:75:be:74:e3:20:e3:f0:51:d0:86:37:a3:df:14:57:bf: + 42:ef:c4:75:b4:0b:b3:4c:e0:c3:77:b1:21:d4:70:63:b9:23: + 0e:b2:5a:54:34:bb:0f:9a:18:11:13:65:04:dc:5a:ee:57:0d: + f9:69:56:2d:44:37:35:75:c8:db:5d:a1:d0:94:28:54:8f:a3: + 5f:d5 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1kaWVraXJjaDEWMBQGA1UEKRMNYXJhbC1kaWVraXJjaDEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAuVzdnzfGIoyOqO5PnVzaJDR4RMy6uRZ4eyTojHEdsdqaM0MCJilG +UvJE6NcaRYYJglHBBOY5YiQbfn5KrmALGhuhXugnID3apzd2gi0y09hFgfgejEOi +v8xGJTChye/9Zonza1fzKb92IF2jOc77wANgiobDm5BD+NXQBXGi33sCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlBorSEQ4EdqJIXEmsmKDmZQqWvcw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAIPd5kZ5r6ASMfJ5L +Zf/AAUKMId96ngw2Jn5C+Qno3Sj2i1zt5+NtCXHNI5B9i/TuSIut+5M/jTl1vnTj +IOPwUdCGN6PfFFe/Qu/EdbQLs0zgw3exIdRwY7kjDrJaVDS7D5oYERNlBNxa7lcN ++WlWLUQ3NXXI212h0JQoVI+jX9U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.key b/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.key new file mode 100644 index 0000000..63c72d6 --- /dev/null +++ b/vpn/coloradio01/clients/aral-diekirch/1/aral-diekirch.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALlc3Z83xiKMjqju +T51c2iQ0eETMurkWeHsk6IxxHbHamjNDAiYpRlLyROjXGkWGCYJRwQTmOWIkG35+ +Sq5gCxoboV7oJyA92qc3doItMtPYRYH4HoxDor/MRiUwocnv/WaJ82tX8ym/diBd +oznO+8ADYIqGw5uQQ/jV0AVxot97AgMBAAECgYBTcgH3DkWtAferBvViUw2E5PYL +itq4PexpC3mA199VVKK8VvsdsNEOwC/TXhpel/Op7iHlkbrdeoHCFRqLm4MDLZaf +NL7JHHQCelyyJBkXhAocSAGkGYXR4pRlkMpTTb1j33X/et7IpOOzUTsdF/91u+x3 +MJeYcMgBGvEThm3p2QJBAPI3knFwc0fxSEK1jMKJALtdNW/tyKE25da5WH6tNCgy +GdxlB9oCH9VivfecY1Gf+kTlFmcmccKZ9wQ+1nDRhb0CQQDD6RWpEReS57Arm9en +8pXaAG1ZA4wHwMMFraHl7GSiBEtBlp+rLnxBT+e9aO3xX/3oUkek7jT8IEJnElr0 ++EGXAkAAstJUS2u5sGNx9c4THYwH/kvSJ9BlTqA5D03HB77XwtU6QnxUT59B4UgE +98l9icWR/0siPwUi94iz1W6O4rvNAkA2eKJrJbN2RzE2jthBfDOqL6A3tcLDjRcs +hwCS202HtsXt8KFoiT5HMp5ujbRK/rOsWuRMuWbGC3orCnF712L1AkEAjiBEK4hP +tQkNvHgBhgsJ+23sIqkuW6smdrS7V1YXM7mCvShexoh2oS1UWxrl6NLaivJMhP6I +feLiysA9ta1+kQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-diekirch/1/ca.crt b/vpn/coloradio01/clients/aral-diekirch/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-diekirch/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-diekirch/client.conf b/vpn/coloradio01/clients/aral-diekirch/client.conf new file mode 100644 index 0000000..a9439b3 --- /dev/null +++ b/vpn/coloradio01/clients/aral-diekirch/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-diekirch.crt +key 1/aral-diekirch.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.crt b/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.crt new file mode 100644 index 0000000..b20743b --- /dev/null +++ b/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-differdange/name=aral-differdange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bf:54:75:29:dd:6d:02:02:03:2e:b7:10:57:18: + 58:b3:5b:b7:48:20:a0:d9:19:62:b7:6e:9d:d6:20: + 6d:23:8d:7b:dd:44:d7:38:5b:8a:c3:92:3c:bb:da: + a7:e3:c0:e2:c6:ec:25:7f:b2:f1:04:82:ac:6d:79: + f2:71:bd:48:38:dd:89:2b:c7:d6:c8:7e:54:57:52: + 87:f5:ba:e2:c0:1d:5a:c6:da:34:bd:10:a6:56:da: + 52:58:dc:b2:05:ba:88:7b:94:9e:a5:3c:34:e2:6e: + c6:25:8e:1e:12:cf:61:50:72:f1:5d:ef:58:b2:44: + 9b:d7:e7:5d:f3:fc:69:2a:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:38:B5:8D:15:5A:63:E8:A3:F2:ED:EB:16:D9:85:CA:ED:12:1D:4E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0b:76:ae:5a:b8:a0:27:77:2f:50:6b:27:76:dd:54:52:42:c4: + 64:e5:4c:36:05:df:da:55:0f:aa:1a:e3:f5:4a:58:82:61:5f: + 78:c5:da:c7:9f:1b:e1:74:96:f2:3b:6f:e5:f5:85:c1:39:41: + c8:f3:30:9b:92:8c:fd:3b:82:a1:f9:ac:96:b9:16:73:8f:82: + 10:89:80:e1:07:fc:fb:56:ad:70:79:62:8f:2e:10:09:da:d3: + 80:b4:6c:90:92:35:97:17:4e:81:3f:5a:30:6d:d1:5b:c2:3d: + 57:cd:48:7f:9a:3d:0b:67:62:f8:fa:ff:b7:69:17:1f:0d:2e: + 74:1a +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1kaWZmZXJkYW5nZTEZMBcGA1UEKRMQYXJhbC1kaWZmZXJk +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAv1R1Kd1tAgIDLrcQVxhYs1u3SCCg2Rlit26d1iBtI417 +3UTXOFuKw5I8u9qn48Dixuwlf7LxBIKsbXnycb1ION2JK8fWyH5UV1KH9briwB1a +xto0vRCmVtpSWNyyBbqIe5SepTw04m7GJY4eEs9hUHLxXe9YskSb1+dd8/xpKt8C +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIji1jRVaY+ij8u3rFtmF +yu0SHU4wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAC3auWrig +J3cvUGsndt1UUkLEZOVMNgXf2lUPqhrj9UpYgmFfeMXax58b4XSW8jtv5fWFwTlB +yPMwm5KM/TuCofmslrkWc4+CEImA4Qf8+1atcHlijy4QCdrTgLRskJI1lxdOgT9a +MG3RW8I9V81If5o9C2di+Pr/t2kXHw0udBo= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.key b/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.key new file mode 100644 index 0000000..3c30917 --- /dev/null +++ b/vpn/coloradio01/clients/aral-differdange/1/aral-differdange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAL9UdSndbQICAy63 +EFcYWLNbt0ggoNkZYrdundYgbSONe91E1zhbisOSPLvap+PA4sbsJX+y8QSCrG15 +8nG9SDjdiSvH1sh+VFdSh/W64sAdWsbaNL0QplbaUljcsgW6iHuUnqU8NOJuxiWO +HhLPYVBy8V3vWLJEm9fnXfP8aSrfAgMBAAECgYB/P6mozVaJhlMdh607b7rWlwIf +22t+2C5adxxMZEaR5bBiqj1Fg0SX67Ou8K7Gf+uTh00tUBKSAGKzcO55DP1xg6YS +b5q85WT/KlsDRzJDRXtBybXBhmq08/u8K4RADYCUWgBKU64wXBgGrZ1RXP4rcTgD +Q0J7yCwaeaSGvUY4MQJBAPw2V1ULVFhsXiaYP/k+Gx0mlor1tkPQ5wnstKI5f2tV +b3h7WH59mOgyCeSGjnCMTGEXVglzJfjk9DrvlXQmapkCQQDCNAwfmShYqfcqsK+G +CyGNPhDnuFOgvc5n0ZYQ/bLZH+CvY8fqlEOxHF1E+2kUyj3fYTDGUT8m3y6tXvAV ++OQ3AkEAnRR3Jedte7jalq0CQwhUOL6cyiUohGoqSvsasWKgIkhOqbogrn8o6Yyo +rqTDOAOZWmr/Udlej/qAxegLrBB1GQJAOCsrknwOwk4uccd2jNNtWdeotgyHC4e6 +SibBO5rU/p2Ms82tRbiqN3CXvVrl0qCH8rK+k61uEYUdkAFUeVZqUwJATVlphE/9 +JmCsjL2rny+e9EJd+B8aOzQXFS6+O3lBXb+RzyyraS5To3whnc+ivePMqXTa2NtT +CV0WIp5PfntDmA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-differdange/1/ca.crt b/vpn/coloradio01/clients/aral-differdange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-differdange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-differdange/client.conf b/vpn/coloradio01/clients/aral-differdange/client.conf new file mode 100644 index 0000000..6512ff8 --- /dev/null +++ b/vpn/coloradio01/clients/aral-differdange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-differdange.crt +key 1/aral-differdange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.crt b/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.crt new file mode 100644 index 0000000..986dafb --- /dev/null +++ b/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 29 (0x1d) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:47 2015 GMT + Not After : Aug 3 12:02:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-dudelange/name=aral-dudelange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:f3:ec:a1:72:da:83:39:35:4c:c4:f7:d2:c7: + 00:61:2f:9e:a5:0f:eb:63:8d:13:83:a1:62:61:98: + e0:c6:59:5e:10:ed:cf:8a:6f:fd:0e:a7:c2:ab:17: + d9:96:72:ba:05:54:54:b1:d5:bc:1c:ae:75:3c:f5: + 48:03:87:b5:16:c2:08:b9:75:92:95:fe:58:92:f5: + c3:ea:b5:ae:c8:c7:38:38:15:fb:35:aa:71:8e:d5: + bf:22:15:81:f0:d8:1e:e3:c7:3d:50:bc:e3:fa:88: + 83:f7:83:c9:6a:dd:90:07:21:f3:66:49:7a:d8:54: + 75:3f:7d:bb:19:a9:c1:64:e7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 8B:08:10:A5:39:E2:A9:9C:CE:71:28:55:90:AC:D4:50:BD:1A:90:ED + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 50:7d:e1:6b:43:56:74:10:df:b5:93:29:75:fc:70:a6:25:09: + c7:79:75:44:2d:22:b2:76:2e:ac:3e:5c:02:19:98:60:da:a0: + 71:87:16:d5:f9:24:50:d6:1c:78:01:ca:8c:49:6f:d0:7f:0c: + 94:b1:a8:ea:96:51:9c:9f:59:58:94:db:51:15:bb:06:b4:91: + 6b:26:56:5e:d1:10:52:94:27:f0:69:ba:80:3a:b2:ac:e4:86: + 23:0e:8e:6d:d5:78:8c:cf:36:bb:77:63:c2:fc:fd:53:f9:6a: + aa:fe:b5:07:7c:a4:5c:29:8a:fe:ef:06:56:c1:cb:5b:d5:a4: + 7d:16 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBHTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNDdaFw0yNTA4MDMxMjAyNDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1kdWRlbGFuZ2UxFzAVBgNVBCkTDmFyYWwtZHVkZWxhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDK8+yhctqDOTVMxPfSxwBhL56lD+tjjRODoWJhmODGWV4Q7c+K +b/0Op8KrF9mWcroFVFSx1bwcrnU89UgDh7UWwgi5dZKV/liS9cPqta7Ixzg4Ffs1 +qnGO1b8iFYHw2B7jxz1QvOP6iIP3g8lq3ZAHIfNmSXrYVHU/fbsZqcFk5wIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSLCBClOeKpnM5xKFWQrNRQvRqQ +7TCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBQfeFrQ1Z0EN+1 +kyl1/HCmJQnHeXVELSKydi6sPlwCGZhg2qBxhxbV+SRQ1hx4AcqMSW/QfwyUsajq +llGcn1lYlNtRFbsGtJFrJlZe0RBSlCfwabqAOrKs5IYjDo5t1XiMzza7d2PC/P1T ++Wqq/rUHfKRcKYr+7wZWwctb1aR9Fg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.key b/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.key new file mode 100644 index 0000000..8c554a1 --- /dev/null +++ b/vpn/coloradio01/clients/aral-dudelange/1/aral-dudelange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMrz7KFy2oM5NUzE +99LHAGEvnqUP62ONE4OhYmGY4MZZXhDtz4pv/Q6nwqsX2ZZyugVUVLHVvByudTz1 +SAOHtRbCCLl1kpX+WJL1w+q1rsjHODgV+zWqcY7VvyIVgfDYHuPHPVC84/qIg/eD +yWrdkAch82ZJethUdT99uxmpwWTnAgMBAAECgYArZR6aotFAL7JK2O7Yfb6CCUmV +p6LAJYEfqxk7HxIotyEa44513l4wjQRdyvq2ZY+K5i453Cadx1vADf446wJ4Grs6 +YR9+PrUPrJAxQzpruRGYFWu2kPfZBJtaGMSqRCdugxrjQVbUdwcgS8V9ej3/IKo+ +2yp1W9XDVrj67u4FyQJBAOuopXDtgEBcsvdMC2X/p4lVeP2AEYyrA5aZFUO1GaFi +YT+ImNbrhsiBOWpBnHJc0ufHSBlUdQZ8d1ucHSWRXDsCQQDceJMW0xjhdMnzU6YH +8tEDxFzdQefDHlNWA6x3y1w7XScx3z3N2q17XT1z+6TYDgni7qb+yDPyVWIFNsv/ +BwtFAkALcR7HQuDNPzL5Stnq0+TgiCPduxAfElaUQ06DARIDgfFS0mEJXlom9g9B +l3nvG46p7kUT5cPg0r5A1m2b21jtAkEA3GMLZf2PGZCNb9dmWPu5RHK+Ac8nxjxC +QfFaLkXy5MSxsYDfXzAByxfhnlcm6XLfHyJBfN7UTqJbYartMPnxoQJBAM5FGvhU +AIP3Hilrpum4HeeCupR14I5HEqAe4+1mYttG+AMFZUZl58RYuDhQJdXR/amD1utq +1AdPXCQCdhbK/zk= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-dudelange/1/ca.crt b/vpn/coloradio01/clients/aral-dudelange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-dudelange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-dudelange/client.conf b/vpn/coloradio01/clients/aral-dudelange/client.conf new file mode 100644 index 0000000..fcb2892 --- /dev/null +++ b/vpn/coloradio01/clients/aral-dudelange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-dudelange.crt +key 1/aral-dudelange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.crt b/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.crt new file mode 100644 index 0000000..e27517d --- /dev/null +++ b/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-ettelbruck/name=aral-ettelbruck/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:82:59:8a:c7:67:50:38:f9:3e:68:9f:ea:bd: + 0b:b5:67:77:c7:0e:59:8a:97:5b:d9:ce:24:01:21: + 20:ec:63:89:46:32:13:36:2c:bc:08:83:91:db:dd: + 9a:5b:34:db:ca:8e:72:03:e4:67:51:02:3b:13:7a: + 0d:e2:f5:c1:86:b0:57:a9:54:2a:18:78:d8:0c:72: + 30:db:ec:8b:80:45:fe:c0:6a:30:1e:49:2f:31:0b: + 26:dd:39:68:6e:28:be:f4:26:30:8e:40:3c:4c:b0: + 29:16:7e:cd:42:15:b7:bc:40:4f:5f:4c:5b:fd:2e: + 80:00:a9:66:0f:67:26:bd:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 6E:F0:E9:22:EA:31:F0:42:6A:73:AE:C4:33:01:8D:D8:29:0D:07:59 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0f:2d:e8:6a:7f:36:b1:72:a2:23:ab:66:53:da:0c:f9:b5:e6: + 33:94:35:01:e9:a6:d7:85:13:c2:21:ff:33:bf:ab:c6:e8:4c: + 52:81:e6:b2:eb:e1:bc:3d:1b:a0:8f:3b:ba:19:8b:f9:69:24: + ef:ef:4c:87:79:b5:96:a3:a1:b8:28:d7:1e:33:70:67:bd:6a: + 67:75:ea:b4:8c:e9:a6:20:d7:3d:5d:27:b3:54:e6:7a:65:95: + c6:b6:86:ad:3c:0c:89:c5:49:ab:88:16:b7:ec:a1:aa:9f:cc: + de:19:04:9b:91:4c:01:7a:1a:f0:b4:6f:f1:e8:5c:0b:92:71: + 3d:4f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1ldHRlbGJydWNrMRgwFgYDVQQpEw9hcmFsLWV0dGVsYnJ1 +Y2sxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANeCWYrHZ1A4+T5on+q9C7Vnd8cOWYqXW9nOJAEhIOxjiUYy +EzYsvAiDkdvdmls028qOcgPkZ1ECOxN6DeL1wYawV6lUKhh42AxyMNvsi4BF/sBq +MB5JLzELJt05aG4ovvQmMI5APEywKRZ+zUIVt7xAT19MW/0ugACpZg9nJr0dAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFG7w6SLqMfBCanOuxDMBjdgp +DQdZMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAA8t6Gp/NrFy +oiOrZlPaDPm15jOUNQHppteFE8Ih/zO/q8boTFKB5rLr4bw9G6CPO7oZi/lpJO/v +TId5tZajobgo1x4zcGe9amd16rSM6aYg1z1dJ7NU5npllca2hq08DInFSauIFrfs +oaqfzN4ZBJuRTAF6GvC0b/HoXAuScT1P +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.key b/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.key new file mode 100644 index 0000000..75aa552 --- /dev/null +++ b/vpn/coloradio01/clients/aral-ettelbruck/1/aral-ettelbruck.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANeCWYrHZ1A4+T5o +n+q9C7Vnd8cOWYqXW9nOJAEhIOxjiUYyEzYsvAiDkdvdmls028qOcgPkZ1ECOxN6 +DeL1wYawV6lUKhh42AxyMNvsi4BF/sBqMB5JLzELJt05aG4ovvQmMI5APEywKRZ+ +zUIVt7xAT19MW/0ugACpZg9nJr0dAgMBAAECgYEAmqDlfITspQvsEhJhw7zW3Ncb +gxDRwHYvqkyVWtYZWGNmyJ3/WNyqIfW9PyN2sEBx/5lLR22nj+Fo3+WwdwtcSeWj +hP4Q0BqIxDcs2eiDmwZt58WBh7wcDIztbJ45LXhjNvyzzsgiKGX1NYuSXEOpaf0L +zAvvqhtAbUI+tnRVX6ECQQDxsUKvSW3FIGxUMmJW/RzamyUc/WK+CVxx8oxBBOp+ +TN1eKL0E0dRO8aAbdenoDe8dwZyjWL+RTshk/e8mTbxZAkEA5ERLRe1mVSMKL40R +SIYyirF76fBbNLe8QgAMrkuHcke3FausKy6Jx1Le+KRUu2tvYmHPLuWJha5508+k +gJEeZQJBAJzSw84w+wTZkPDg8GY5PiuqV16EGznroQxesRrPMchZ35llHaCu9e9z +YMvwqqFjyS+pnRVwVHzYfbbp/e8AqaECQQDipazX0dA52IDUlg0DJbwpWfDfZ3gn +8AdMwR/WL8hdADgZnEtm1N6YuwAJgaFgNlxyIwvEVMUnpwXv+cwsm+rBAkBbozGK +2e1YNddN8rMGjJ+0p8npt9gLEsEKZQI57Aq/c5+8wBvQkJpoAn1F+3o8m6Sep5yO +L1jvT4i/moMAIKdQ +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-ettelbruck/1/ca.crt b/vpn/coloradio01/clients/aral-ettelbruck/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-ettelbruck/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-ettelbruck/client.conf b/vpn/coloradio01/clients/aral-ettelbruck/client.conf new file mode 100644 index 0000000..a464d55 --- /dev/null +++ b/vpn/coloradio01/clients/aral-ettelbruck/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-ettelbruck.crt +key 1/aral-ettelbruck.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.crt b/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.crt new file mode 100644 index 0000000..7353a30 --- /dev/null +++ b/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-foetz/name=aral-foetz/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:dd:c5:b3:57:48:1c:d1:71:ba:7c:97:e0:15:24: + 4f:7b:47:ee:21:ae:8f:7f:5e:dc:d1:85:83:e8:a0: + b1:49:f7:b6:59:8e:7c:6b:4b:da:6b:e4:24:16:59: + 5d:a6:9e:56:58:82:4b:ac:9e:81:b5:40:ac:06:c4: + 35:ff:79:e6:54:8e:07:19:99:e7:79:e5:18:6c:95: + 37:fb:2b:15:45:17:96:b1:20:c7:fa:9a:42:27:fa: + 8c:9a:e0:7e:3c:ca:9f:e5:f4:34:d3:14:3b:66:65: + 60:54:ef:23:55:d2:a9:67:d3:36:f3:39:77:b6:1c: + 7f:cd:6f:e6:9e:ee:72:04:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + F8:68:77:94:C0:C6:E0:4C:A2:26:D2:50:A8:F3:15:9C:CF:2B:DF:5C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3e:ee:41:10:65:da:af:2e:72:f7:d9:81:a6:78:b8:0b:64:56: + bc:db:92:b3:83:16:0e:af:5d:36:c6:c1:f9:32:a4:97:7e:49: + 3d:e9:8b:2a:fe:b7:e1:0f:1a:59:da:15:9b:93:25:25:f7:1d: + be:7b:e1:cc:d9:ac:ff:67:89:68:79:36:ec:77:36:73:35:e1: + 7d:fb:c6:f2:b4:9b:68:c4:6c:06:d1:16:89:bb:eb:2e:b0:d3: + c6:df:a8:6b:77:34:89:22:00:ad:c8:3d:58:ba:95:c7:ae:0d: + 61:86:8d:35:b9:1d:35:b0:4b:a3:f5:4b:d4:ab:45:8d:1a:f9: + 2b:75 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1mb2V0ejETMBEGA1UEKRMKYXJhbC1mb2V0ejEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA3cWzV0gc0XG6fJfgFSRPe0fuIa6Pf17c0YWD6KCxSfe2WY58a0vaa+QkFlld +pp5WWIJLrJ6BtUCsBsQ1/3nmVI4HGZnneeUYbJU3+ysVRReWsSDH+ppCJ/qMmuB+ +PMqf5fQ00xQ7ZmVgVO8jVdKpZ9M28zl3thx/zW/mnu5yBM0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+Gh3lMDG4EyiJtJQqPMVnM8r31wwgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAPu5BEGXary5y99mBpni4C2RW +vNuSs4MWDq9dNsbB+TKkl35JPemLKv634Q8aWdoVm5MlJfcdvnvhzNms/2eJaHk2 +7Hc2czXhffvG8rSbaMRsBtEWibvrLrDTxt+oa3c0iSIArcg9WLqVx64NYYaNNbkd +NbBLo/VL1KtFjRr5K3U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.key b/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.key new file mode 100644 index 0000000..06c6afb --- /dev/null +++ b/vpn/coloradio01/clients/aral-foetz/1/aral-foetz.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAN3Fs1dIHNFxunyX +4BUkT3tH7iGuj39e3NGFg+igsUn3tlmOfGtL2mvkJBZZXaaeVliCS6yegbVArAbE +Nf955lSOBxmZ53nlGGyVN/srFUUXlrEgx/qaQif6jJrgfjzKn+X0NNMUO2ZlYFTv +I1XSqWfTNvM5d7Ycf81v5p7ucgTNAgMBAAECgYAXjVdufYoR9DIJ6Vcy55hJT2pK +yW8T588rsTJBEk/BuzzyZd9wxa18p83tUbBQcaBZ5fyDaJH93dBnJ49Ugm2jepGj +5+OlQ8QLyIDgfEaHxAtPvmWY0dyTYUZ0QFWSMcn42F+gFu2YNOu/LG3l8A+xenFv +5pKustv7tC0hDrmkAQJBAPRrOPOuHd609QifK1eSZF//tfSPqIPXaFrm5QeH320k +zKL8k7/fL8Buc0Req2DD/TgzyWynPcah6qRc2DcmJj0CQQDoR8b+OOAqiI83Yu1b +MrE/a+GCiK41aMpLt8Aw4H86T78wilOvqe2Tu5agSGduKHMPbeQPzxlh1Rx2d+21 +udHRAkEAgu5JNOhJ4fpn5LV3P1MRaAeQTjECoZWrtj5H5A/aFRqIcKsC7t69MsU4 +BCD+hziWFhxPw1+XjSdBjciannhWNQJARsLfB0FSYQK7Bnd3sYmu35BA4eA7mf+z +aP+wZ/NsLtpudx4cwm3090V1bJzCDZf6/V9P09UWeWxPwHNmki7qkQJAZr1fL/5S ++MmqTp7RQ2jrro7NaPDkllXs8ydUTnaLSvJcxkgQ69SlcGPKBn5b+IuYbX8nR1l9 +JXzYX3tWIAv7Rw== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-foetz/1/ca.crt b/vpn/coloradio01/clients/aral-foetz/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-foetz/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-foetz/client.conf b/vpn/coloradio01/clients/aral-foetz/client.conf new file mode 100644 index 0000000..25e7abb --- /dev/null +++ b/vpn/coloradio01/clients/aral-foetz/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-foetz.crt +key 1/aral-foetz.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.crt b/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.crt new file mode 100644 index 0000000..df8c1fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-frisange/name=aral-frisange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:98:e5:5e:16:e0:2b:41:c2:e6:5f:ed:f4:dc:2f: + a5:87:99:93:65:78:e5:41:d3:bb:1b:2d:b4:a3:ee: + 91:93:46:27:3a:fe:b3:e2:55:e0:81:7a:df:04:cf: + 5c:bd:9f:77:10:43:0a:26:a8:a9:6e:cd:24:83:10: + 8d:cd:8b:56:3c:ab:ea:df:e2:a1:40:20:70:13:89: + 4b:85:5f:be:3c:9e:7e:1d:8f:cb:01:e6:70:3d:87: + ef:ee:0c:de:75:8f:48:01:5d:08:0a:3e:fa:4c:5d: + 80:4e:fa:85:29:4c:50:e4:fc:07:c0:df:f0:b6:79: + cd:f0:9a:50:83:b1:be:bf:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3D:8E:BE:A3:6A:4B:E7:13:B7:21:40:2C:90:9E:30:9F:56:E8:68:B0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:c9:6d:6f:2c:1b:1b:ee:45:8c:c5:12:98:4f:a2:8f:fe:02: + 3b:0f:63:de:5e:7e:c3:7e:cc:09:f1:a8:52:8b:f0:b4:b0:5a: + 94:47:2f:69:eb:ab:7a:26:55:fa:dc:5b:0c:b2:b3:8f:5a:4e: + f0:6b:7f:c2:ec:ee:58:fd:00:47:a6:19:93:ae:3c:e0:2d:e3: + 65:e5:d6:92:e6:c7:3a:53:24:09:b1:37:c3:3c:18:f6:f1:9c: + 73:13:87:ea:c5:68:cb:5f:e7:cb:d3:fc:82:f4:55:ed:57:c8: + e0:8c:f3:39:e3:0a:ca:d9:be:14:8f:11:1c:76:49:75:d2:0a: + b9:bd +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1mcmlzYW5nZTEWMBQGA1UEKRMNYXJhbC1mcmlzYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAmOVeFuArQcLmX+303C+lh5mTZXjlQdO7Gy20o+6Rk0YnOv6z4lXg +gXrfBM9cvZ93EEMKJqipbs0kgxCNzYtWPKvq3+KhQCBwE4lLhV++PJ5+HY/LAeZw +PYfv7gzedY9IAV0ICj76TF2ATvqFKUxQ5PwHwN/wtnnN8JpQg7G+vxECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUPY6+o2pL5xO3IUAskJ4wn1boaLAw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAa8ltbywbG+5FjMUS +mE+ij/4COw9j3l5+w37MCfGoUovwtLBalEcvaeureiZV+txbDLKzj1pO8Gt/wuzu +WP0AR6YZk6484C3jZeXWkubHOlMkCbE3wzwY9vGccxOH6sVoy1/ny9P8gvRV7VfI +4IzzOeMKytm+FI8RHHZJddIKub0= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.key b/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.key new file mode 100644 index 0000000..63fd119 --- /dev/null +++ b/vpn/coloradio01/clients/aral-frisange/1/aral-frisange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAJjlXhbgK0HC5l/t +9NwvpYeZk2V45UHTuxsttKPukZNGJzr+s+JV4IF63wTPXL2fdxBDCiaoqW7NJIMQ +jc2LVjyr6t/ioUAgcBOJS4Vfvjyefh2PywHmcD2H7+4M3nWPSAFdCAo++kxdgE76 +hSlMUOT8B8Df8LZ5zfCaUIOxvr8RAgMBAAECgYEAiKDOx5pijU1hGHBH00swnE/8 +izzRgVV3af4Z4jQaGoUiIXHhxWwARzRJfr7enQSXHQ0LUSh+3+iprAVq8jaFRCiq +OcoU+nFQmhbs1TcBoVKiUQnJYSjirlTnv3s6jsak0cixkKLd35e3t4x9gUh5b23N +c34FtbdSoWrv1Ktoc9ECQQDJCe+lgJ1K3hddZL4RzjST6yLDa1G3C5BAHvRTNvxa +v0N2Q1IiXs+1XMmC1vdVqIflsry9+n47ENBQ5NX/AbQzAkEAwrIRSMujdCWvRh3N +vVumqlZlJH0D8lF/xL0TYWFZaXakjxDX/Ds86p7LeiQo4UvilvLvseBzrC1BTzPn +Ef4bqwJAek2/K1KJXoiqcjjdoPtv5SVBat2ZQuCYC0pJnW5wK8z7/7CJATvo5Q7j +0ONyaPw0YLtSM8l2jfx2nx/4SEEDHQJAaHVVZLMtXXGimoH/EquLvjRgS7VvWqFz +ZcD0Fvk+GaF4JPIqj7/QrSjJjxy7ejVWuxpYlB0SsrwNIEt+nF6zxQJAf2EQ3+3F +mDgNBrpazvQm/4l4iIjwjn0BTfZkw4Ob0igb0q3/jjWkPQUgqzc08JWo3HovEpOO +euaHyT9Zb/zhng== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-frisange/1/ca.crt b/vpn/coloradio01/clients/aral-frisange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-frisange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-frisange/client.conf b/vpn/coloradio01/clients/aral-frisange/client.conf new file mode 100644 index 0000000..247558e --- /dev/null +++ b/vpn/coloradio01/clients/aral-frisange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-frisange.crt +key 1/aral-frisange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.crt b/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.crt new file mode 100644 index 0000000..929c50c --- /dev/null +++ b/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-gonderange/name=aral-gonderange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:92:21:29:80:d2:b4:b4:7f:52:86:17:2f:04: + a1:c0:37:dc:5c:f3:2c:53:69:78:53:fc:b8:71:34: + 7b:8c:4f:d0:0a:12:89:0e:ce:e5:a3:c0:42:a9:d4: + 72:88:d1:ac:49:4f:e4:b7:41:43:1a:08:d1:df:f3: + cc:93:7f:7c:e4:54:ba:b3:9b:79:3a:44:e1:fa:8a: + 9e:b3:b1:40:7e:60:3e:e4:63:84:97:e4:27:37:d2: + d6:a1:dc:a5:83:6c:93:9f:b2:18:41:71:74:65:34: + b9:4c:02:87:62:a8:e1:02:74:e6:ea:50:1e:9d:a2: + 56:6f:e8:57:0f:b7:d4:11:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:93:AB:3C:FF:E1:2B:99:BE:9E:9F:30:B6:9B:51:D2:59:55:58:35 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3d:c7:56:d0:40:92:16:d6:1d:99:14:bb:98:b8:6a:8c:20:cf: + ab:77:4e:23:93:71:ce:0e:50:fb:73:61:cc:a9:cd:65:42:2a: + ba:ac:f6:d9:b9:f1:f9:c7:cb:ab:bb:c0:a3:ba:44:be:0c:5c: + 18:af:1e:30:93:fe:10:79:9e:32:05:61:12:05:34:48:9b:95: + 8f:a2:d6:b8:61:f6:5d:99:ff:af:c6:76:75:6f:1c:30:62:48: + 5c:04:76:de:39:dc:0e:3b:65:92:3d:15:96:ce:5d:96:6e:cb: + e6:2d:dc:f5:6f:90:d7:f0:bc:11:4b:8c:9f:48:12:4b:0a:4f: + 66:8d +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1nb25kZXJhbmdlMRgwFgYDVQQpEw9hcmFsLWdvbmRlcmFu +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMmSISmA0rS0f1KGFy8EocA33FzzLFNpeFP8uHE0e4xP0AoS +iQ7O5aPAQqnUcojRrElP5LdBQxoI0d/zzJN/fORUurObeTpE4fqKnrOxQH5gPuRj +hJfkJzfS1qHcpYNsk5+yGEFxdGU0uUwCh2Ko4QJ05upQHp2iVm/oVw+31BGtAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFN6Tqzz/4SuZvp6fMLabUdJZ +VVg1MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAD3HVtBAkhbW +HZkUu5i4aowgz6t3TiOTcc4OUPtzYcypzWVCKrqs9tm58fnHy6u7wKO6RL4MXBiv +HjCT/hB5njIFYRIFNEiblY+i1rhh9l2Z/6/GdnVvHDBiSFwEdt453A47ZZI9FZbO +XZZuy+Yt3PVvkNfwvBFLjJ9IEksKT2aN +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.key b/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.key new file mode 100644 index 0000000..fb29f0e --- /dev/null +++ b/vpn/coloradio01/clients/aral-gonderange/1/aral-gonderange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeQIBADANBgkqhkiG9w0BAQEFAASCAmMwggJfAgEAAoGBAMmSISmA0rS0f1KG +Fy8EocA33FzzLFNpeFP8uHE0e4xP0AoSiQ7O5aPAQqnUcojRrElP5LdBQxoI0d/z +zJN/fORUurObeTpE4fqKnrOxQH5gPuRjhJfkJzfS1qHcpYNsk5+yGEFxdGU0uUwC +h2Ko4QJ05upQHp2iVm/oVw+31BGtAgMBAAECgYEAgDNSqCTo3kmWWRQzlpHplmlw +3CVFYd/IyhIH9OgeVAVHGcDkLujkIRvcykr2dZJ1c0M/AladqOdHJJrY2E7TTPtB +6pMKVniY5T9pV4tYNPigf/A5uHbCRN+mTfelSwgGFTMhkNuqFqgdcSIkj4tBwCD5 +NBn2zZjjf5TVjj+t8jkCQQD6s43X4diQo+S8ZDRxKAcpqXb42CEEytyRagZzUakU +1uExn74cwHHQVuzZ8gkVoJCaDECUpG4G5k5/bHkcH9+XAkEAzdS/2rpRoax9c6Jc +PP1HyBWzR9okcolzjYNe50ACy+INyMRAxXvpWvMvr3hc4W2aQ1qTmkT9KSucQT77 +QGABWwJBALFdovafA/ag3U0jn66G4TpqeI9paULYut/uIQ4pMfRaagwPthLlXCBH +v14aTK8OX/98t5vyER20hsjD15M8QZUCQQCnxBWQSTcKCNbD7n0x9NuSGSXklcgJ +V0FJAd/TqtfcqGbF0jhc/q9oQzkF05wY3cXTyjrujfaunO4iPBx8DwRrAkEAlxem +v3wtmoDTA4uOJaw6AaDpLpWwA4RqoTB0AduEBrdMTjW1uN+hNFSL59TDbBtlue7A +XbDPKO5cVHy2SMeFvg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-gonderange/1/ca.crt b/vpn/coloradio01/clients/aral-gonderange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-gonderange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-gonderange/client.conf b/vpn/coloradio01/clients/aral-gonderange/client.conf new file mode 100644 index 0000000..74dc6f2 --- /dev/null +++ b/vpn/coloradio01/clients/aral-gonderange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-gonderange.crt +key 1/aral-gonderange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.crt b/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.crt new file mode 100644 index 0000000..3b42bdc --- /dev/null +++ b/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-hoscheiddickt/name=aral-hoscheiddickt/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d6:80:4d:8e:14:c4:f4:5d:b4:7f:f2:d2:c3:92: + b1:c7:81:05:17:0a:cf:ce:8c:4d:81:3e:43:c7:54: + 5a:1e:69:b6:c2:c9:97:0e:d1:cf:e9:3e:6e:0c:99: + 17:15:0f:c3:94:40:51:90:3d:af:e4:b4:c8:bd:db: + 58:90:cd:1a:ab:9f:d2:0a:09:19:5f:e5:2e:fa:98: + e2:73:55:b8:07:16:9b:f0:af:25:88:98:b2:e6:18: + ab:68:e5:32:da:de:10:6e:f3:ea:93:15:17:d7:0a: + a6:80:4b:1c:6d:d5:e3:82:f0:ac:21:f2:5b:d3:90: + 95:02:69:fa:8e:15:f3:f5:35 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + BD:61:E5:30:4B:88:A4:5D:39:44:B3:F0:17:FC:88:74:83:15:A9:38 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 4f:d0:7c:e9:02:35:94:6b:2d:ef:2e:8f:da:12:d5:2e:8c:6d: + fa:f9:d5:e8:52:32:7b:21:a1:41:1a:5e:2c:d6:e8:c0:18:39: + 5c:2c:ed:4b:34:5d:6d:43:a6:36:3f:97:8c:f8:4d:5e:72:ee: + 6b:2b:9b:5d:ba:77:79:a1:70:ea:54:b6:3e:94:57:02:fd:a5: + f4:9b:9c:fa:30:41:d1:d0:9b:0d:39:fd:30:9f:59:e4:c8:64: + 9b:e0:a8:63:3c:2c:b9:41:24:0b:10:60:5b:5a:da:ed:d1:a7: + 28:09:1a:4f:03:48:8b:2c:2c:1a:2e:3a:65:3a:42:24:64:8e: + 8d:5c +-----BEGIN CERTIFICATE----- +MIIEOjCCA6OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG5MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEb +MBkGA1UEAxMSYXJhbC1ob3NjaGVpZGRpY2t0MRswGQYDVQQpExJhcmFsLWhvc2No +ZWlkZGlja3QxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZI +hvcNAQEBBQADgY0AMIGJAoGBANaATY4UxPRdtH/y0sOSsceBBRcKz86MTYE+Q8dU +Wh5ptsLJlw7Rz+k+bgyZFxUPw5RAUZA9r+S0yL3bWJDNGquf0goJGV/lLvqY4nNV +uAcWm/CvJYiYsuYYq2jlMtreEG7z6pMVF9cKpoBLHG3V44LwrCHyW9OQlQJp+o4V +8/U1AgMBAAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5 +LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFL1h5TBLiKRdOUSz +8Bf8iHSDFak4MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGu +pIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYD +VQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsT +BlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFC +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0l +BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAE/Q +fOkCNZRrLe8uj9oS1S6Mbfr51ehSMnshoUEaXizW6MAYOVws7Us0XW1DpjY/l4z4 +TV5y7msrm126d3mhcOpUtj6UVwL9pfSbnPowQdHQmw05/TCfWeTIZJvgqGM8LLlB +JAsQYFta2u3RpygJGk8DSIssLBouOmU6QiRkjo1c +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.key b/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.key new file mode 100644 index 0000000..9702fe4 --- /dev/null +++ b/vpn/coloradio01/clients/aral-hoscheiddickt/1/aral-hoscheiddickt.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANaATY4UxPRdtH/y +0sOSsceBBRcKz86MTYE+Q8dUWh5ptsLJlw7Rz+k+bgyZFxUPw5RAUZA9r+S0yL3b +WJDNGquf0goJGV/lLvqY4nNVuAcWm/CvJYiYsuYYq2jlMtreEG7z6pMVF9cKpoBL +HG3V44LwrCHyW9OQlQJp+o4V8/U1AgMBAAECgYAPiW2UrAZ0GNF5LxJ7HgYIiFzh +BWR19o2qneL07jQ03b1iMI3jgekIYQBBo1kbqm+lLl96Di3OaBXeQqQQoPqcb9eC +blBVaW5SlxH/ekilUdHw6MYINgavMfrXZJsuHb37i2tLMxjK4kwT3CxNA8aq0nE7 +IEsYwLQKdUyaFaqopQJBAPNKF9SUK3jOYC+bf2PEIew4h7+4G7cie4Rd6oopuysD +bOIZQ+c282fx4YCEQLd74xlWUGkXiJH383N1LwJBRMsCQQDhtS17gNnxirhtquhI +BDP7/tjoJnSymQhybvaXuoK3hYYC/vQgV7/Sb0Jl2MXXSjNwOHNZJnfEKnN3yPo3 +Mm3/AkAuHgJsanXfHYfAHoLEX55qj8Czx+uBCIlPaxoVfJmdKrYOGen0P0dekcxE +N02pOlOvLtxpP2vE97JvVWxGyiaHAkBD5P4zgoUM1Y+43YpV7327teOFodvExaf2 +1E41QhOEJRQ03oCNIhg/stwkStrochebEEASdzHbvnFRfRFXfUH9AkEAkAFBxcw4 +SYijzOlDOGtEKbs8TOVuboajXAxDP/x0Zj7+JUxfOxQOGqzNDR4NOFDRb3XX0MK0 +mIDRlcsenUMj8A== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-hoscheiddickt/1/ca.crt b/vpn/coloradio01/clients/aral-hoscheiddickt/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-hoscheiddickt/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-hoscheiddickt/client.conf b/vpn/coloradio01/clients/aral-hoscheiddickt/client.conf new file mode 100644 index 0000000..5855cee --- /dev/null +++ b/vpn/coloradio01/clients/aral-hoscheiddickt/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-hoscheiddickt.crt +key 1/aral-hoscheiddickt.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-howald/1/aral-howald.crt b/vpn/coloradio01/clients/aral-howald/1/aral-howald.crt new file mode 100644 index 0000000..6d8f2bc --- /dev/null +++ b/vpn/coloradio01/clients/aral-howald/1/aral-howald.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-howald/name=aral-howald/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:92:60:d7:83:b3:15:79:c7:c2:f1:e9:91:d6: + fa:3a:2c:04:c1:ea:14:d6:ec:d5:44:81:99:08:8f: + 42:05:d8:0b:10:98:8b:f7:61:ad:43:de:c0:87:3d: + db:f7:a3:99:4a:2b:d3:3e:42:cb:6d:65:5b:f3:2e: + d8:d8:d8:3d:81:7a:6a:b2:0f:3c:e7:cf:88:7d:5f: + 40:80:4e:fd:ea:57:b6:33:e6:b2:e9:56:6d:4e:36: + 6e:c9:f0:93:ef:53:32:22:c7:a6:03:c3:8d:3b:f9: + 66:4b:36:78:ca:1b:3d:79:4f:a7:44:62:a9:73:02: + 2e:b1:b4:dd:61:09:0c:cf:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B6:E4:6E:21:5F:F2:4D:7F:5C:B4:C2:9E:C1:E3:11:0C:51:AE:70:C4 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 88:8f:2b:e5:19:08:b9:ac:05:66:b2:e8:66:62:cb:8d:3c:bf: + 77:39:d8:0d:85:ba:b3:4b:4a:b4:4f:d7:ab:f6:59:52:f3:ba: + 34:6a:b5:a3:8c:68:f2:18:93:88:17:bd:5c:b5:e6:0d:6d:84: + 89:7c:2e:14:49:d9:fd:05:ee:1f:99:61:b8:0a:d4:ca:b0:5e: + 0d:ec:39:9b:da:86:10:f1:2f:78:fa:3f:8d:09:76:57:2a:ba: + 41:e7:38:d6:fe:fd:f9:f1:d3:a5:00:73:10:60:3b:95:4e:f1: + 33:db:8d:25:db:4e:f0:71:27:ca:b1:dd:b0:3b:a3:95:4c:49: + 19:74 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1ob3dhbGQxFDASBgNVBCkTC2FyYWwtaG93YWxkMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDNkmDXg7MVecfC8emR1vo6LATB6hTW7NVEgZkIj0IF2AsQmIv3Ya1D3sCH +Pdv3o5lKK9M+QsttZVvzLtjY2D2BemqyDzznz4h9X0CATv3qV7Yz5rLpVm1ONm7J +8JPvUzIix6YDw407+WZLNnjKGz15T6dEYqlzAi6xtN1hCQzPrQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS25G4hX/JNf1y0wp7B4xEMUa5wxDCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCIjyvlGQi5rAVmsuhmYsuN +PL93OdgNhbqzS0q0T9er9llS87o0arWjjGjyGJOIF71cteYNbYSJfC4USdn9Be4f +mWG4CtTKsF4N7Dmb2oYQ8S94+j+NCXZXKrpB5zjW/v358dOlAHMQYDuVTvEz240l +207wcSfKsd2wO6OVTEkZdA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-howald/1/aral-howald.key b/vpn/coloradio01/clients/aral-howald/1/aral-howald.key new file mode 100644 index 0000000..ebd69ee --- /dev/null +++ b/vpn/coloradio01/clients/aral-howald/1/aral-howald.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAM2SYNeDsxV5x8Lx +6ZHW+josBMHqFNbs1USBmQiPQgXYCxCYi/dhrUPewIc92/ejmUor0z5Cy21lW/Mu +2NjYPYF6arIPPOfPiH1fQIBO/epXtjPmsulWbU42bsnwk+9TMiLHpgPDjTv5Zks2 +eMobPXlPp0RiqXMCLrG03WEJDM+tAgMBAAECgYEAvkomXLireFCvSlRWSkq+fESs +7rd5LO40CGMSvqqlifVPYMBkp80B7xZuD4KCcLw+tDrXIwX/erddo0EVN70LSHu7 +HVeVAzYAwfOUEt14bO2QdA1gjrxm0rryDKjBT4wV8n0YWNcULftOq6LlhiXSbuGb +r/YbYIrR1LWn3AVO0iECQQDplJI1qMKAXZOtHp4zZHgZ+NZ1FJz5c/gkhbzMmMOt +w7rHUQncOYiy6/cNuRQjINyIk/WCFEV8hFS1QjGsVVpFAkEA4U2X9TevOUzdyS5r +Li6+l3/f0ov6r/Bhi3phyuDOugW0OIu+BYDbbgYiV0XFw0a2GvOvn5ydYMpbNh3M +9BfqSQJBAM6+IPd7qsRhjy9g9Ve5qpAabv9sQlCNM+pnsSdKY5BuuOhoMxkIl5T+ +REqSMV+yW2BLzbbX6HUAz9UrhLnrRh0CQFHcY44RgXUMXLkwSHkrOszJBYX2nks2 +x/ppqQaR0Ar+75BsFcriGthLGkcjbsuY8amxSOpxeS0l2SY8ha9a0SECQAccD/C3 +oiGb4GsLu2ULm1awhrSXQFe3f3qseeCaoay9jT7vsvbkYjPNTM/FyB/NpC4wR1+6 +CfICXuFBoUJASfQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-howald/1/ca.crt b/vpn/coloradio01/clients/aral-howald/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-howald/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-howald/client.conf b/vpn/coloradio01/clients/aral-howald/client.conf new file mode 100644 index 0000000..96cf0cf --- /dev/null +++ b/vpn/coloradio01/clients/aral-howald/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-howald.crt +key 1/aral-howald.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.crt b/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.crt new file mode 100644 index 0000000..aa36d0e --- /dev/null +++ b/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:54 2015 GMT + Not After : Feb 8 17:48:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-junglinster/name=aral-junglinster/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:d2:cb:4c:be:98:5b:13:02:f3:01:04:f2:bb: + 5c:b9:e5:de:e9:f7:f5:80:09:57:53:35:f6:67:a5: + 90:01:e7:89:79:41:c5:0a:62:b1:ac:a4:10:90:4b: + 88:c9:e1:e7:19:02:f3:d6:03:b5:d7:e0:8c:88:46: + ae:c0:00:9c:84:42:0d:1b:2b:77:93:83:c2:9d:cf: + 12:52:30:6d:46:75:3a:68:77:9d:84:84:3f:ce:6e: + df:70:0d:42:2e:4e:c3:87:51:6e:19:11:dd:d5:0d: + 7a:68:df:1f:e1:d0:ea:10:fb:60:0a:e8:e8:89:bd: + 7c:e0:dd:5f:82:72:e5:cf:d5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FA:91:BE:0D:F3:06:EB:6A:00:F1:6A:D7:B1:09:D3:7B:11:DC:68:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 54:06:7f:2d:fc:d6:46:a6:86:1a:fa:85:80:57:c1:07:fd:ea: + e5:ec:c8:94:59:07:15:17:c3:d9:2d:71:d4:8c:89:2f:a5:2d: + a6:fa:07:15:01:70:98:e3:60:a2:c1:5e:23:6a:6e:3b:68:58: + 1b:3a:71:bd:9a:77:95:4b:5d:a6:56:10:c0:3e:59:77:72:1c: + 4e:34:3d:dd:ba:ba:49:b6:68:ad:30:69:95:00:e7:f8:c3:ff: + 76:43:43:ab:65:43:4c:b1:53:a4:25:94:98:ad:a7:53:1b:82: + af:ec:9e:ab:5c:bd:44:53:bc:52:77:9e:eb:fd:a2:54:35:2b: + 04:47 +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NTRaFw0yNTAyMDgxNzQ4NTRaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1qdW5nbGluc3RlcjEZMBcGA1UEKRMQYXJhbC1qdW5nbGlu +c3RlcjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA19LLTL6YWxMC8wEE8rtcueXe6ff1gAlXUzX2Z6WQAeeJ +eUHFCmKxrKQQkEuIyeHnGQLz1gO11+CMiEauwACchEINGyt3k4PCnc8SUjBtRnU6 +aHedhIQ/zm7fcA1CLk7Dh1FuGRHd1Q16aN8f4dDqEPtgCujoib184N1fgnLlz9UC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+pG+DfMG62oA8WrXsQnT +exHcaKAwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAVAZ/LfzW +RqaGGvqFgFfBB/3q5ezIlFkHFRfD2S1x1IyJL6UtpvoHFQFwmONgosFeI2puO2hY +GzpxvZp3lUtdplYQwD5Zd3IcTjQ93bq6SbZorTBplQDn+MP/dkNDq2VDTLFTpCWU +mK2nUxuCr+yeq1y9RFO8Unee6/2iVDUrBEc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.key b/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.key new file mode 100644 index 0000000..0f38ec4 --- /dev/null +++ b/vpn/coloradio01/clients/aral-junglinster/1/aral-junglinster.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANfSy0y+mFsTAvMB +BPK7XLnl3un39YAJV1M19melkAHniXlBxQpisaykEJBLiMnh5xkC89YDtdfgjIhG +rsAAnIRCDRsrd5ODwp3PElIwbUZ1Omh3nYSEP85u33ANQi5Ow4dRbhkR3dUNemjf +H+HQ6hD7YAro6Im9fODdX4Jy5c/VAgMBAAECgYBnXmnK1xqnvEJUWy+ghoaR7vxG +OWHXMiImE5lx6QVBNEFO12ZlZAHPO0FHqzXX45/JBfX9kgddXwpQFvKJuYE8oa1B +IqJm9+ZleckpdfTAY4hiXrO2monU9PTd5L3ePAmEHfF6LpmdRMNjAvAESUxZkbBx +zBjiDrUKuGtQ7/yd3QJBAPt0xuP6nqQWjMBzShZu6zEEgZq0lH8dE3H2Rf29pzWj +Gl6ysyDxuRSTIVFEBS3kJpLE5n4yGa5ME6RSDQX0XIMCQQDbuS6Xsf0ApItC0AmR +kBrI9HgfskqvaEUuI+MAxBPLFioXisfqSQMeY9PQSXb9TUE+Bl6nBt5DR8oFpZF0 +TaLHAkEAiOkdPZYAeHE6s7JSHYLJFchRVM2LqOZI5xzjIPP5LdAflH4R4Bcc4aH2 +WwwBEeqOQg1pPj7DEs6jRy3Rn3NcRwJBAMUu9O9R3hl7kTaOeGfXiRIawsq/OGMe +EieMMSX40UKKS5ABDdPlXhUhxW7A3zYG5KwDD2KZuVFr1ZMnuNdE7PUCQQDZBJ2N +HesMtZVVvRC0Ks67jH1pNX06HsdBtyYZHbkXEa0IqUJSWbz1QVtNemmoqJXawMil +xyiY0qQmaYDsHLJT +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-junglinster/1/ca.crt b/vpn/coloradio01/clients/aral-junglinster/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-junglinster/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-junglinster/client.conf b/vpn/coloradio01/clients/aral-junglinster/client.conf new file mode 100644 index 0000000..cff546f --- /dev/null +++ b/vpn/coloradio01/clients/aral-junglinster/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-junglinster.crt +key 1/aral-junglinster.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.crt b/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.crt new file mode 100644 index 0000000..750b2ce --- /dev/null +++ b/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lintgen/name=aral-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c0:b5:1f:8c:6a:e1:ab:9c:17:94:17:00:d4:63: + a8:96:c8:b4:f9:97:5d:7e:5b:37:75:b2:9d:63:c4: + 09:07:63:a1:83:6b:5d:eb:4f:da:64:58:d1:b5:22: + a2:ff:27:50:22:94:12:c4:90:2a:86:e5:e4:ea:be: + 66:6e:df:fe:80:9e:0a:37:65:68:ab:19:bd:f2:58: + 4b:eb:a7:8c:cb:87:f3:e2:d2:4f:8b:a8:92:10:8e: + f1:97:e9:61:db:ae:cf:a2:68:65:06:2b:1d:72:4f: + f5:07:10:29:23:7b:20:c6:4f:3b:ac:dd:ab:64:62: + 59:e2:8a:99:f6:81:bc:2b:31 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 62:CE:EB:EE:00:A6:44:3F:E9:3C:7C:77:FE:75:FE:14:ED:65:BD:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:bd:da:83:e0:f5:ff:06:6c:ae:75:ee:24:44:95:7e:ed:5a: + 2d:e1:33:28:01:6b:6e:18:c1:62:2e:c8:2b:fd:48:60:fd:7e: + cd:77:8c:a1:be:5e:40:59:a8:57:13:7b:dd:a8:d2:58:7f:e5: + a1:03:c2:ae:cd:ca:1b:57:79:3c:61:25:70:ad:10:6a:e0:17: + 33:e2:c3:85:37:74:7e:a5:a7:86:68:fb:01:f7:e3:db:b2:24: + 86:cb:f1:08:7d:11:77:10:fb:0e:ed:16:c1:65:54:b5:37:39: + 5f:7e:ee:8b:e7:ee:6d:af:1d:24:ac:0b:ef:8b:c4:eb:2a:cc: + fb:79 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1saW50Z2VuMRUwEwYDVQQpEwxhcmFsLWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMC1H4xq4aucF5QXANRjqJbItPmXXX5bN3WynWPECQdjoYNrXetP2mRY +0bUiov8nUCKUEsSQKobl5Oq+Zm7f/oCeCjdlaKsZvfJYS+unjMuH8+LST4uokhCO +8ZfpYduuz6JoZQYrHXJP9QcQKSN7IMZPO6zdq2RiWeKKmfaBvCsxAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGLO6+4ApkQ/6Tx8d/51/hTtZb2gMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAGm92oPg9f8GbK517iRE +lX7tWi3hMygBa24YwWIuyCv9SGD9fs13jKG+XkBZqFcTe92o0lh/5aEDwq7NyhtX +eTxhJXCtEGrgFzPiw4U3dH6lp4Zo+wH349uyJIbL8Qh9EXcQ+w7tFsFlVLU3OV9+ +7ovn7m2vHSSsC++LxOsqzPt5 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.key b/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.key new file mode 100644 index 0000000..e365755 --- /dev/null +++ b/vpn/coloradio01/clients/aral-lintgen/1/aral-lintgen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMC1H4xq4aucF5QX +ANRjqJbItPmXXX5bN3WynWPECQdjoYNrXetP2mRY0bUiov8nUCKUEsSQKobl5Oq+ +Zm7f/oCeCjdlaKsZvfJYS+unjMuH8+LST4uokhCO8ZfpYduuz6JoZQYrHXJP9QcQ +KSN7IMZPO6zdq2RiWeKKmfaBvCsxAgMBAAECgYEAhXXrH4h2Oi+kdL9pp65NeAAQ +tjsKWRQ7WJwXPJzr095AYY/eP7XR/mU090nBsQw9B3WdedyOV1aoL5slvewLiTqq +esl8qdZGqTlmO2OENphnLD86WEXbSJPjcCN2hArhAHpWx0TnClfkQxqZQTbDjYAd +wOYpB9/1eR+8jm4O/nECQQD1778wXNZzHZXVIRJPJ4tRJ100DrLeb+bke40CoV/t +alX74xtkwBKAxGBXPWfttoLm9Ute1NpUVWzNL+QNOVbbAkEAyJfJsqWFLKLYjXVR +imSbcofR5/IRCHjZ30bBJ9NTHXviwHBPd27ojslCfXhyYwqJDhpKdg0JBcwvxXWL +Houl4wJAUeLiuLqgmLGoGs+pJfvXsky2BshCHDgMG9VbbR3IL+ew+25xx4kAYCmC +nmmOuiKD0VypHMkobN4InQUuHI0T8wJAfOdHCJ5YVnrwLOUoaOxMfvxjj/IC+SuH +PqhoDcxgrLM/dmR4lv3QgViAtnARieo9fTKRuwBS5fFGrcWLYvHB0QJAZJB7zRUE +qQU9QjxPQUlQNc3Va5nCvSIK9hGrk2kbZuqBWVOuMxhTSyRtpH1ddQf35L92Tnrl +SMcuHkH9O5BEog== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-lintgen/1/ca.crt b/vpn/coloradio01/clients/aral-lintgen/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-lintgen/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-lintgen/client.conf b/vpn/coloradio01/clients/aral-lintgen/client.conf new file mode 100644 index 0000000..eb4ab23 --- /dev/null +++ b/vpn/coloradio01/clients/aral-lintgen/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-lintgen.crt +key 1/aral-lintgen.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-merl/1/aral-merl.crt b/vpn/coloradio01/clients/aral-merl/1/aral-merl.crt new file mode 100644 index 0000000..bfffa68 --- /dev/null +++ b/vpn/coloradio01/clients/aral-merl/1/aral-merl.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl/name=aral-merl/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a1:fe:c3:c0:57:be:58:a1:a4:93:e2:33:05:1d: + d5:15:9a:69:a8:2b:49:f1:d4:b9:66:2e:f8:03:48: + a7:29:36:99:93:75:a3:ce:35:a3:d5:90:e2:bc:26: + db:a2:38:37:a4:ee:51:0a:56:32:f7:52:a0:e8:61: + 51:cc:77:d2:18:60:21:75:4e:89:61:94:9f:4a:8f: + a2:2f:97:00:eb:0d:9d:b3:3b:bf:22:cd:e9:5d:1f: + 9a:92:37:77:9c:19:0d:89:36:01:1b:0e:e4:84:71: + 9b:fe:66:0e:30:af:c4:9e:67:b8:3a:f2:05:b1:ab: + f7:e6:74:1e:dc:c8:d0:df:8b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2B:E5:FC:40:2C:5F:B3:56:E0:CF:ED:60:8B:3F:74:25:F7:4E:F6:37 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:70:73:77:9e:32:68:3e:aa:92:6d:ee:8b:64:0f:3c:0a:cd: + 85:0c:6f:f4:db:25:f9:d3:69:50:51:51:a7:8c:d9:74:27:92: + cc:bd:ee:47:df:b5:b0:f6:e0:1b:9f:a1:42:5f:94:b5:c0:9b: + ef:0a:47:04:d9:c8:f6:fe:29:bb:85:34:1c:28:c2:72:cc:b5: + 58:da:33:96:55:83:05:0b:98:3b:82:45:81:a5:6b:f0:e4:ac: + 27:fc:12:6a:a5:26:11:19:a6:38:d9:1d:02:11:37:f9:62:0e: + f9:2f:d3:8b:10:a8:79:4d:d7:e8:5d:34:a3:36:0e:38:c3:4a: + b4:70 +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJYXJhbC1tZXJsMRIwEAYDVQQpEwlhcmFsLW1lcmwxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +AKH+w8BXvlihpJPiMwUd1RWaaagrSfHUuWYu+ANIpyk2mZN1o841o9WQ4rwm26I4 +N6TuUQpWMvdSoOhhUcx30hhgIXVOiWGUn0qPoi+XAOsNnbM7vyLN6V0fmpI3d5wZ +DYk2ARsO5IRxm/5mDjCvxJ5nuDryBbGr9+Z0HtzI0N+LAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFCvl/EAsX7NW4M/tYIs/dCX3TvY3MIHdBgNVHSME +gdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1wc3eeMmg+qpJt7otkDzwKzYUM +b/TbJfnTaVBRUaeM2XQnksy97kfftbD24BufoUJflLXAm+8KRwTZyPb+KbuFNBwo +wnLMtVjaM5ZVgwULmDuCRYGla/DkrCf8EmqlJhEZpjjZHQIRN/liDvkv04sQqHlN +1+hdNKM2DjjDSrRw +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-merl/1/aral-merl.key b/vpn/coloradio01/clients/aral-merl/1/aral-merl.key new file mode 100644 index 0000000..e4e2b6d --- /dev/null +++ b/vpn/coloradio01/clients/aral-merl/1/aral-merl.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAKH+w8BXvlihpJPi +MwUd1RWaaagrSfHUuWYu+ANIpyk2mZN1o841o9WQ4rwm26I4N6TuUQpWMvdSoOhh +Ucx30hhgIXVOiWGUn0qPoi+XAOsNnbM7vyLN6V0fmpI3d5wZDYk2ARsO5IRxm/5m +DjCvxJ5nuDryBbGr9+Z0HtzI0N+LAgMBAAECgYEAlkqITfCZ1hzRVaosb3jH8mz5 +zV2sEsKq5xR4YIONIn1XailgObYmM8Nht/HNHulNJqU7Zn2mdzKfujhf7XTU4vKa +zCvM2Qo/YfAXdvOtPimDBvtbX45EYk45FA/CI3RVqS1LZHcm6lMVLunUy8j3shoH ++93fLvp8UJZjlWKFn5ECQQDNhtTbfiFiECFzywMAxlth7o9iukdwDlkH4CxVyZ3V +8Dqp0rNMolRIMIXRbN7pVZtfEjZDXWQ2UbnJDbyZx/OXAkEAyccrXUnudfljTGwo +lzAacRzV3H7JMAv40rjyypJ8YM0rGbtrrjyOjN8JqpFHi32KpspSGFVwRb8NqPPb +JlciLQJACADQGRv4QNFP/CpTm5wdwtp/SuDmFz73yI66Kz0GoGYSYrqJsNpBXe5F +x7ntlDh5LGKRKl5goJzeFy4pwfM/UQJAEcuzE2M12MnJ7C+N1Oe1LUyxv+SesdIc +e9k78InC1nbB2l8hPBizKdFx9M0jVjYYSGWHoAXJBR24grIfHd6JcQJBAIUYjsxy +JhhUC+J5fkA2ZzH4esflk4OvdbwsDhPilZWPWhrz//Kw8Gs2O2vLUtcUmMUJM2OL +M/PhiJWl1yiTpdI= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-merl/1/ca.crt b/vpn/coloradio01/clients/aral-merl/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-merl/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-merl/client.conf b/vpn/coloradio01/clients/aral-merl/client.conf new file mode 100644 index 0000000..6a69996 --- /dev/null +++ b/vpn/coloradio01/clients/aral-merl/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-merl.crt +key 1/aral-merl.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.crt b/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.crt new file mode 100644 index 0000000..a97e700 --- /dev/null +++ b/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-mondorf/name=aral-mondorf/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:22:31:a1:d9:ed:af:8c:a9:b6:8c:91:54:92: + 29:27:1b:a2:2d:14:a0:18:b3:cb:8d:1c:86:b9:e4: + 2a:51:40:db:ce:a7:57:a8:54:60:ff:bd:9f:d4:ef: + 29:b2:19:69:fb:55:c8:f9:32:d9:06:7a:35:12:d8: + 93:01:64:e3:e2:44:c6:eb:b0:52:28:4c:b9:98:ff: + 52:04:da:d6:07:cf:8c:6d:33:d1:e8:08:42:5b:1d: + fc:8e:96:52:f4:0c:75:c1:6f:a9:78:7b:27:a3:37: + f5:ad:8d:0d:ce:6d:dd:71:d2:1a:22:78:79:29:bf: + eb:34:d7:5e:83:10:af:d5:89 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 98:6E:59:0E:4E:76:63:BE:50:03:11:08:CD:A1:50:14:FE:9F:7D:A5 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a2:88:98:47:0e:90:84:44:37:43:96:8e:be:f8:43:90:d7:c8: + 29:e0:92:86:14:0f:57:a4:24:bf:69:7c:6b:9a:9c:8a:63:85: + 89:39:78:d9:76:40:a1:3e:4c:2f:ef:3f:1a:df:3c:74:99:5f: + 6d:b0:21:c2:ea:25:44:c2:00:3a:f3:37:fb:a7:93:2a:a7:eb: + fa:ff:30:fb:75:c7:46:bf:82:e1:71:0c:56:e9:d8:e0:31:89: + d6:b5:e9:1a:fa:67:83:26:5d:1a:73:24:4c:4d:da:44:f4:b1: + ac:86:a8:ed:2b:8d:42:4e:3c:2e:53:ca:6d:95:10:07:25:32: + fe:99 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1tb25kb3JmMRUwEwYDVQQpEwxhcmFsLW1vbmRvcmYxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOEiMaHZ7a+MqbaMkVSSKScboi0UoBizy40chrnkKlFA286nV6hUYP+9 +n9TvKbIZaftVyPky2QZ6NRLYkwFk4+JExuuwUihMuZj/UgTa1gfPjG0z0egIQlsd +/I6WUvQMdcFvqXh7J6M39a2NDc5t3XHSGiJ4eSm/6zTXXoMQr9WJAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJhuWQ5OdmO+UAMRCM2hUBT+n32lMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAKKImEcOkIREN0OWjr74 +Q5DXyCngkoYUD1ekJL9pfGuanIpjhYk5eNl2QKE+TC/vPxrfPHSZX22wIcLqJUTC +ADrzN/unkyqn6/r/MPt1x0a/guFxDFbp2OAxida16Rr6Z4MmXRpzJExN2kT0sayG +qO0rjUJOPC5Tym2VEAclMv6Z +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.key b/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.key new file mode 100644 index 0000000..ba92431 --- /dev/null +++ b/vpn/coloradio01/clients/aral-mondorf/1/aral-mondorf.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOEiMaHZ7a+MqbaM +kVSSKScboi0UoBizy40chrnkKlFA286nV6hUYP+9n9TvKbIZaftVyPky2QZ6NRLY +kwFk4+JExuuwUihMuZj/UgTa1gfPjG0z0egIQlsd/I6WUvQMdcFvqXh7J6M39a2N +Dc5t3XHSGiJ4eSm/6zTXXoMQr9WJAgMBAAECgYEA1AV36I1sox891YWceKEN0J7d +pMb/30O0NzjeSMLwd4U1fPFsRELy9uaGV+rEwc3dWa34j3erm8YLpawBBhcV5IWK +jZEqkk9OWc718M+K1DkmsK2nI4qBx05B92f+KqPo7bVhtvV7NpOMd+VzBmkJDgf7 +8E+Or3ymfa+Sd2fkfGECQQD5k8njrrc/sekHH/GoXXU2MIgSuCpBYGfrPP+HdOcn +zqmtz/aHwTu1eG/ieSieZMJ73atLWjf17BvEHNOdpgfjAkEA5u1ezkwGh02p8QeA +1175P31eQlmLqkHwNjGmC48qYip0Pib4SBJe0jaU9eRVyqEJyXgxLkDTz8/NwoYc +cVzwowJAA2p7a+tbRLrppphQVW6aCRjW8/KjWWu5YGXgVXlLJKdWeTOMe0UwzQYN ++fqQjMJySwG4s3pTo8EMjD2cw96e4wJAE5SrBkkSAKUINOTS+vAVqFmEBZI8MnqW +2LGLB83i5SH+a0q4oLvWCHMSXGs5Dw5qmwey+94JV8SiCM2AWehsiwJBALWoiYjW +x6hKkmYrdVy+q/6FRgD38GkdPvVtxLrTXhtBAR7dqoSjttAadMN+jOY5ewVSYUvG +sxKUo+CE9eumpU8= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-mondorf/1/ca.crt b/vpn/coloradio01/clients/aral-mondorf/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-mondorf/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-mondorf/client.conf b/vpn/coloradio01/clients/aral-mondorf/client.conf new file mode 100644 index 0000000..42f0811 --- /dev/null +++ b/vpn/coloradio01/clients/aral-mondorf/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-mondorf.crt +key 1/aral-mondorf.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.crt b/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.crt new file mode 100644 index 0000000..94267c9 --- /dev/null +++ b/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-niederfeulen/name=aral-niederfeulen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9e:f8:4f:68:ef:e9:12:66:c1:99:27:98:76:b1: + a3:15:44:a4:2b:05:4a:22:86:97:ba:2b:f1:91:39: + 04:1b:9f:0e:1a:6f:3f:f1:8c:03:42:32:cc:f0:54: + 82:43:4a:b7:f5:a6:c5:46:47:58:5e:82:3c:02:47: + 89:b1:8d:6c:59:6c:74:25:0c:8f:14:77:11:1c:94: + a9:b8:97:54:9b:34:40:89:21:83:fd:54:6a:ad:20: + 92:75:72:f8:59:59:02:d0:c6:01:9e:71:a3:1f:a2: + 26:2a:08:b8:f7:ee:cc:15:b7:e5:5d:53:59:73:35: + d0:e3:89:43:dd:75:99:df:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:C6:35:EA:56:0A:7C:16:AB:47:8D:9E:8E:75:60:51:DA:F8:A1:0E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 08:7e:c1:e1:05:1b:8f:1f:0a:23:fd:a4:d6:87:de:0b:9a:31: + 18:13:7b:57:a7:2c:3a:38:ac:0c:dd:1c:e1:03:5a:c3:8e:d3: + f6:93:a0:a0:a1:c0:ef:82:77:ca:6c:8b:9d:36:26:7f:99:86: + e0:80:59:85:9d:0c:10:dd:d7:db:45:63:68:b3:6d:ec:6f:68: + cb:a3:32:ec:9f:ec:34:74:d5:fe:b1:b9:0d:7f:91:5f:b0:64: + 14:8b:b0:70:b1:bc:5f:d5:c6:b3:ac:22:9e:70:ec:2d:d9:92: + a1:c0:39:35:54:fd:3a:7f:d3:ed:36:8f:44:6b:97:11:49:32: + 51:3b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC1uaWVkZXJmZXVsZW4xGjAYBgNVBCkTEWFyYWwtbmllZGVy +ZmV1bGVuMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCe+E9o7+kSZsGZJ5h2saMVRKQrBUoihpe6K/GROQQb +nw4abz/xjANCMszwVIJDSrf1psVGR1hegjwCR4mxjWxZbHQlDI8UdxEclKm4l1Sb +NECJIYP9VGqtIJJ1cvhZWQLQxgGecaMfoiYqCLj37swVt+VdU1lzNdDjiUPddZnf +pwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTCxjXqVgp8FqtHjZ6O +dWBR2vihDjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAIfsHh +BRuPHwoj/aTWh94LmjEYE3tXpyw6OKwM3RzhA1rDjtP2k6CgocDvgnfKbIudNiZ/ +mYbggFmFnQwQ3dfbRWNos23sb2jLozLsn+w0dNX+sbkNf5FfsGQUi7Bwsbxf1caz +rCKecOwt2ZKhwDk1VP06f9PtNo9Ea5cRSTJROw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.key b/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.key new file mode 100644 index 0000000..ff07679 --- /dev/null +++ b/vpn/coloradio01/clients/aral-niederfeulen/1/aral-niederfeulen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJ74T2jv6RJmwZkn +mHaxoxVEpCsFSiKGl7or8ZE5BBufDhpvP/GMA0IyzPBUgkNKt/WmxUZHWF6CPAJH +ibGNbFlsdCUMjxR3ERyUqbiXVJs0QIkhg/1Uaq0gknVy+FlZAtDGAZ5xox+iJioI +uPfuzBW35V1TWXM10OOJQ911md+nAgMBAAECgYBUtgdC6Q0vJBioL2RcY55+19wP +nLr7mPNDXuVUOKjKu0A9r+jII48c+IsiyjW7/BX5TkwzfhNGEWo+4LYsKiuAyGF9 +yTmpDnxFoVsGbUQcLd4bl2ACFxwWkUVJhtwMptI8qHioTrG7S3LAiCMV9stKXNwU +Z5ywBvGsP4H0JK5ayQJBANA7jfLb6KoFGwJhzn+NjHqexsnzQ0hqjuX7DXNHPOgD +23rS0/T3JXP1zXlyDhRgCAl2i9RnvcsXu/qGrS49lO0CQQDDb88bWJCsd9fOMeU8 +7nZp+j2++njMSmClqRa0FOzy1yDnicU03r9u5OUl57ZyJwWUhiJrJsERTyBDMphU +TWhjAkEAjM2oZ27R/Z1kLREry85QDl4st0P53A7Jv7Mp3ihug8iP8ZZ74mn39lhg +b11zLc3dwWBanu7jRGAxKO9GTT0w5QJBAKjyaOlM4JQXbblULMVFp5vptaL4x6Bi +07WhvHykcklja5B86rvPq1FkEit4aaG41fwVEH/smo4qBsvQWxrVZ90CQH/iQuAN +u29MtcR5hsnGCscEqxWa9dkPFqRuYzSfdwPWnJr55XTwPlWzL8+HAAcQbo45jrt6 +kOoAMlzJ+vNPB1M= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-niederfeulen/1/ca.crt b/vpn/coloradio01/clients/aral-niederfeulen/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-niederfeulen/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-niederfeulen/client.conf b/vpn/coloradio01/clients/aral-niederfeulen/client.conf new file mode 100644 index 0000000..20aefea --- /dev/null +++ b/vpn/coloradio01/clients/aral-niederfeulen/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-niederfeulen.crt +key 1/aral-niederfeulen.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-petange/1/aral-petange.crt b/vpn/coloradio01/clients/aral-petange/1/aral-petange.crt new file mode 100644 index 0000000..88e94ea --- /dev/null +++ b/vpn/coloradio01/clients/aral-petange/1/aral-petange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-petange/name=aral-petange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b1:2e:95:e7:98:68:02:e7:b5:2a:6f:1d:f1:46: + 38:6d:08:da:d6:44:42:59:83:dc:67:ca:3b:04:15: + c8:7a:a2:cc:ee:d6:ff:e5:88:d2:c6:48:22:4f:10: + 3d:80:06:50:26:70:e1:a2:00:95:a9:49:95:bc:a9: + 75:ee:f7:a8:b9:0b:8c:b4:ea:2a:1f:af:86:1c:28: + d6:0d:50:1a:01:d8:98:bd:6c:4d:54:d5:d7:59:55: + 53:00:8b:68:6b:04:57:1c:6f:b8:43:bf:02:46:ea: + 04:24:07:41:4c:3c:67:a9:b2:b5:6d:50:ef:bf:7e: + 3f:e3:09:ca:50:ff:5d:5e:27 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + A3:1A:2B:9B:07:4D:D4:58:C0:D0:D7:8A:F2:35:4F:3C:00:07:DF:85 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 36:3c:0d:1c:a9:3c:a3:d2:58:d9:c0:97:68:e8:99:ef:27:7b: + 3b:0f:bd:3d:01:5a:88:03:e7:cd:00:48:a4:5d:2f:a0:8e:f3: + a6:88:c4:d0:a2:f3:27:67:41:fa:5b:96:32:5f:6b:83:99:06: + 12:6e:71:9f:3f:c1:de:64:f1:47:ae:e1:64:38:f8:1b:b1:bd: + f0:36:61:32:2e:42:41:22:1a:cb:6c:c0:66:5d:2d:37:10:ef: + 7d:b3:27:ad:3e:3c:e6:1e:b0:be:19:4f:2c:86:00:e2:b6:a7: + fa:3c:a3:50:05:8a:1a:51:1d:a6:e2:b4:6d:7f:16:4c:10:ca: + 91:b6 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1wZXRhbmdlMRUwEwYDVQQpEwxhcmFsLXBldGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALEuleeYaALntSpvHfFGOG0I2tZEQlmD3GfKOwQVyHqizO7W/+WI0sZI +Ik8QPYAGUCZw4aIAlalJlbypde73qLkLjLTqKh+vhhwo1g1QGgHYmL1sTVTV11lV +UwCLaGsEVxxvuEO/AkbqBCQHQUw8Z6mytW1Q779+P+MJylD/XV4nAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFKMaK5sHTdRYwNDXivI1TzwAB9+FMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADY8DRypPKPSWNnAl2jo +me8nezsPvT0BWogD580ASKRdL6CO86aIxNCi8ydnQfpbljJfa4OZBhJucZ8/wd5k +8Ueu4WQ4+BuxvfA2YTIuQkEiGstswGZdLTcQ732zJ60+POYesL4ZTyyGAOK2p/o8 +o1AFihpRHabitG1/FkwQypG2 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-petange/1/aral-petange.key b/vpn/coloradio01/clients/aral-petange/1/aral-petange.key new file mode 100644 index 0000000..5180a3b --- /dev/null +++ b/vpn/coloradio01/clients/aral-petange/1/aral-petange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBALEuleeYaALntSpv +HfFGOG0I2tZEQlmD3GfKOwQVyHqizO7W/+WI0sZIIk8QPYAGUCZw4aIAlalJlbyp +de73qLkLjLTqKh+vhhwo1g1QGgHYmL1sTVTV11lVUwCLaGsEVxxvuEO/AkbqBCQH +QUw8Z6mytW1Q779+P+MJylD/XV4nAgMBAAECgYASU8pHwXkIy+Tudb34JhZSGPdh +8H+YeM5EoiOGoaYyIULnda/Uk1mSDwYVfY2O/5gs0cJVGpBgiW8Gq9S6Gj4GcfsD +Nywq1dyG/q2T5+c/0ZbKjnbJbMjejBc6ce0y3C/aEF6Bs1n0aBOT01NyVppkGgFS +zedmJfPg3jRWP/TwaQJBANq4rjgLJyJyQlUNrhY6poi40NJr0Y16TbndpWc3Asgm +BhdnVaQXjZxRDHhGZqwrgPoqhjXzW0UKcwINDDdkK7MCQQDPYXGZCAxM50HlbzpG +Z3etu3Bi/1AECbA4fQB3Ba9UXxLwGsY7aBvAk8oliJlHZinWvMu32TtGPHfrclQQ +ePm9AkEAkOzoO6hgMPnmq/bZkE8ig9t6OsNIYedVUz/jVkXkKPzQ8nb9DzKwGZC2 +o4d6hsB4wMqmjV8H7fJjjEta+eT88wJABgzZu5U4hqXYjlEIajVqkG7/gGPiebuu +oHdFJDPOQa/kZYzia6lF5gBpzV6G2kZowhMP/nUf/ZSWCxBy02g0IQJBAK5HNVdd +lJIKWgxfN0bZgVN371/9D3valocmdMa3ug2VoXFiiLk5cCTLK/+68PWnlXmjsxpQ +FA3Yf+otHoE9yxU= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-petange/1/ca.crt b/vpn/coloradio01/clients/aral-petange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-petange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-petange/client.conf b/vpn/coloradio01/clients/aral-petange/client.conf new file mode 100644 index 0000000..14a7bfe --- /dev/null +++ b/vpn/coloradio01/clients/aral-petange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-petange.crt +key 1/aral-petange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.crt b/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.crt new file mode 100644 index 0000000..3b88abe --- /dev/null +++ b/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-pommerloch/name=aral-pommerloch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:03:f3:76:ec:71:29:61:88:3f:37:c3:9f:76: + 55:51:52:5d:26:39:64:4b:d3:d7:69:7a:1e:bf:c3: + d1:07:c6:1c:c1:da:b2:9b:cb:5c:6c:3c:a6:ea:bc: + ce:b2:c9:6f:55:88:e5:8d:00:d4:d7:ec:01:70:b1: + d4:fc:08:cd:9b:ed:73:1e:b0:a2:c2:fd:33:95:aa: + 35:c9:56:3d:3f:df:31:be:ac:70:09:9d:ed:51:57: + d9:79:0a:46:b7:cd:5f:22:64:01:89:11:fb:ba:e4: + 80:f3:a4:32:e8:7c:c5:d9:1a:97:6f:ad:68:f2:ec: + 4d:d8:22:e6:5f:7e:c5:8c:dd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 82:40:9E:14:D0:AD:F7:75:2A:89:48:D3:10:7D:12:5D:33:71:04:D3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:4e:b2:21:65:8b:7b:44:e8:b4:81:1f:02:4b:53:ff:ee:12: + 36:b4:38:ae:6b:d8:ab:1f:d5:b7:03:3c:c9:6e:80:43:1a:d9: + 26:c0:f6:26:df:66:a2:cb:21:6f:2f:d6:3e:19:41:20:30:e5: + 44:46:a7:27:73:22:f5:00:ce:1f:76:cd:c3:91:7f:e2:e0:88: + 6d:c0:9e:81:87:53:7d:fb:0f:5d:9a:94:34:c6:f4:16:c7:8d: + 62:15:e2:dd:0d:74:e2:66:4a:b9:e5:e6:e8:a9:9e:d6:4f:d8: + da:12:82:dd:63:a0:74:14:89:04:b2:97:b3:56:ce:fa:72:44: + a1:df +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1wb21tZXJsb2NoMRgwFgYDVQQpEw9hcmFsLXBvbW1lcmxv +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMMD83bscSlhiD83w592VVFSXSY5ZEvT12l6Hr/D0QfGHMHa +spvLXGw8puq8zrLJb1WI5Y0A1NfsAXCx1PwIzZvtcx6wosL9M5WqNclWPT/fMb6s +cAmd7VFX2XkKRrfNXyJkAYkR+7rkgPOkMuh8xdkal2+taPLsTdgi5l9+xYzdAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFIJAnhTQrfd1KolI0xB9El0z +cQTTMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADJOsiFli3tE +6LSBHwJLU//uEja0OK5r2Ksf1bcDPMlugEMa2SbA9ibfZqLLIW8v1j4ZQSAw5URG +pydzIvUAzh92zcORf+LgiG3AnoGHU337D12alDTG9BbHjWIV4t0NdOJmSrnl5uip +ntZP2NoSgt1joHQUiQSyl7NWzvpyRKHf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.key b/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.key new file mode 100644 index 0000000..7435b41 --- /dev/null +++ b/vpn/coloradio01/clients/aral-pommerloch/1/aral-pommerloch.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMMD83bscSlhiD83 +w592VVFSXSY5ZEvT12l6Hr/D0QfGHMHaspvLXGw8puq8zrLJb1WI5Y0A1NfsAXCx +1PwIzZvtcx6wosL9M5WqNclWPT/fMb6scAmd7VFX2XkKRrfNXyJkAYkR+7rkgPOk +Muh8xdkal2+taPLsTdgi5l9+xYzdAgMBAAECgYEAnbWsRxify19c2AM46NTB2qpJ +OohfXBNNubdQ9rRdb3P//aXnm6ayb7X9JwjaACx3JS04tvddKeFqqMCoBcr4ux7n +S/HDd+bxLgAVc2cWqDDYXfDTfgnEW62/Z71Mw4K22a7xOByzlddUTsDBPn7hLSlX +d8AgfuDvTsqhUQAtcwECQQDvP4VL0At2kvbtRwTTor7KxG6CnrDf2/c57ig+sF6T +OtovI67ZWaQgT2IjLZ0drelj/jPmv/z9Spk4Y1TNOQelAkEA0KuRPECa9UqebDuI +DYxnTu10SZL8F+XQvHNOpbJl+zjRbuRjLUEzz4s51zD2g5x+8ffcfO5J0UR5VSl0 +Bekq2QJBAMsKqpJ7nq7j7OHUatk9fhRRfsQl71AcuwUUBF2niqwCv1ZQPzzAodS1 +6kCWnoeop7Ev9FY5y3gfDkfXrQl6A+0CQA6TjYep86ki10I0PmLD5guLZs4k6Fs7 +AIPJgjrs5VbRN0AJ0Cu/HEFpNlcj4nR7IBsC93H6q0llARzD0oj/KrECQGRjIZNK +LdBOqZnrqx2G5XPIRpin8Fgj/PyAkAzqJ/bECqVnSOBK/uAnq8p45GlnKPlCzYXv +AAJ3jpodY5/LG3A= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-pommerloch/1/ca.crt b/vpn/coloradio01/clients/aral-pommerloch/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-pommerloch/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-pommerloch/client.conf b/vpn/coloradio01/clients/aral-pommerloch/client.conf new file mode 100644 index 0000000..a92c936 --- /dev/null +++ b/vpn/coloradio01/clients/aral-pommerloch/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-pommerloch.crt +key 1/aral-pommerloch.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-redange/1/aral-redange.crt b/vpn/coloradio01/clients/aral-redange/1/aral-redange.crt new file mode 100644 index 0000000..fbae72b --- /dev/null +++ b/vpn/coloradio01/clients/aral-redange/1/aral-redange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:41 2015 GMT + Not After : Feb 8 17:48:41 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-redange/name=aral-redange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:9e:df:06:d0:f0:33:0f:cf:aa:71:97:59:21: + a2:59:82:7a:03:8b:a1:64:ae:23:b7:d2:8f:5a:1c: + dc:0a:11:0b:44:32:21:40:05:52:88:d7:b3:4a:1b: + 7c:ea:c4:24:34:4c:31:7c:c5:0b:3a:63:1a:6b:bc: + 3b:e7:db:17:64:3e:ad:81:ce:fc:40:87:d8:6b:8c: + 9c:14:10:48:9e:23:88:62:2b:36:91:23:6e:15:a0: + e8:44:80:a9:2d:11:60:85:46:88:e6:c2:79:e5:8c: + a5:96:92:b6:c7:0e:d2:c0:ae:4f:45:0e:b3:a4:ad: + 00:49:a4:53:ab:6e:40:a2:41 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B8:28:BE:C9:99:FB:A8:9A:9F:7A:D8:9C:69:9E:6D:B6:8B:9F:0D:74 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 47:86:20:c6:a2:14:02:55:e9:0d:88:f4:e6:6e:fe:be:51:2a: + c9:a0:02:81:4e:8d:3a:8c:8e:77:f0:17:bb:43:73:6c:3e:5d: + cc:d5:b9:cc:f7:d1:03:5d:48:b8:d7:c5:8d:76:d6:e5:56:31: + 24:aa:a2:fe:00:eb:64:01:47:c4:b4:be:e2:55:5a:9b:5d:5f: + 43:ff:a3:c8:91:71:c4:4c:7e:42:a5:3b:66:fd:d9:b5:29:e0: + fc:a9:7a:0c:6c:70:58:81:c1:3e:34:92:e1:a6:dc:f1:f9:da: + d8:43:4d:74:9e:ad:33:01:65:85:79:70:6b:7d:1c:3c:12:35: + 58:ea +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NDFaFw0yNTAyMDgxNzQ4NDFaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZWRhbmdlMRUwEwYDVQQpEwxhcmFsLXJlZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAM2e3wbQ8DMPz6pxl1kholmCegOLoWSuI7fSj1oc3AoRC0QyIUAFUojX +s0obfOrEJDRMMXzFCzpjGmu8O+fbF2Q+rYHO/ECH2GuMnBQQSJ4jiGIrNpEjbhWg +6ESAqS0RYIVGiObCeeWMpZaStscO0sCuT0UOs6StAEmkU6tuQKJBAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFLgovsmZ+6ian3rYnGmebbaLnw10MIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAEeGIMaiFAJV6Q2I9OZu +/r5RKsmgAoFOjTqMjnfwF7tDc2w+XczVucz30QNdSLjXxY121uVWMSSqov4A62QB +R8S0vuJVWptdX0P/o8iRccRMfkKlO2b92bUp4PypegxscFiBwT40kuGm3PH52thD +TXSerTMBZYV5cGt9HDwSNVjq +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-redange/1/aral-redange.key b/vpn/coloradio01/clients/aral-redange/1/aral-redange.key new file mode 100644 index 0000000..cbcbd86 --- /dev/null +++ b/vpn/coloradio01/clients/aral-redange/1/aral-redange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAM2e3wbQ8DMPz6px +l1kholmCegOLoWSuI7fSj1oc3AoRC0QyIUAFUojXs0obfOrEJDRMMXzFCzpjGmu8 +O+fbF2Q+rYHO/ECH2GuMnBQQSJ4jiGIrNpEjbhWg6ESAqS0RYIVGiObCeeWMpZaS +tscO0sCuT0UOs6StAEmkU6tuQKJBAgMBAAECgYEAzIQlruDo2ND0K8K51+SVV1Ro +ydf7Gmn+itr6zJWB4t1bCGSYH9ZrZkKtSJuYnuWiYQYb/s76QQPLhrb+GroXQ0xb +STSEp0y8EiA2MO9GsY5NPmR1YT5aoV0bCjhEMqLycqVVlCOXs/9pYjhQlwglQPin +Yc1gLDgBYro9oFy7jNUCQQDsdMwRui5J3qufimkzuNor+eaBYOh7hTT4nTdbONTd +Uh1VqoAn8RayfRzTqseKQ8zpwdBoSw36dhH6HgrD8KNzAkEA3p2eiKMQaRN5VgA4 +y7MEd//KUvvOQbrn6H+t+qZCOMXJyDx3Gfu1zbMDD56pQo4rlCrC3+dyCRhJuVgG +OTL+ewJAF7nggCbeXisprWiGBdqWibMZngHLUhmbpxafZ1fchBipON9S3K8kR+Sl +79dDDmyfMxVvhAeD743JX/+DtQWAYQJABwqjTh0iUsCL8P12znKuLIGJy9AtOQUJ +euA3B5ukspkHBe9rsQW2PXhxG1hgcDuBA2HK4jw27jS3eEZhhAOp6wJARRAdVPhy +MNn/3Z/Sws9NaGxGFrx2cygY0M1bnrKRunefFTP1VjhlIoAKQPyrK/8b8VZ+MXS5 +pcStng2PLaD8og== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-redange/1/ca.crt b/vpn/coloradio01/clients/aral-redange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-redange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-redange/client.conf b/vpn/coloradio01/clients/aral-redange/client.conf new file mode 100644 index 0000000..c5b8f7d --- /dev/null +++ b/vpn/coloradio01/clients/aral-redange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-redange.crt +key 1/aral-redange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.crt b/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.crt new file mode 100644 index 0000000..02287fc --- /dev/null +++ b/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 31 (0x1f) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 7 09:53:16 2015 GMT + Not After : Aug 4 09:53:16 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange/name=aral-rodange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c1:2b:6c:2a:e9:07:7f:6d:7e:23:ef:ef:6f:b3: + c6:79:8d:79:57:34:cd:72:de:cd:95:a1:34:c4:af: + 63:6b:9c:b3:24:0c:2a:67:72:19:09:63:eb:87:47: + bb:b8:b6:7c:6e:a0:64:e9:6a:9e:2d:6b:10:ed:ce: + ae:9d:35:56:72:f6:d9:7d:31:e5:b5:e5:34:90:4f: + 46:29:73:69:5d:8a:01:45:bc:4e:8b:2d:14:b7:90: + 53:98:98:57:2a:61:2f:f5:41:6a:3a:14:75:b2:45: + af:27:86:03:52:ba:6c:e3:83:c8:bc:e7:d5:00:9a: + 60:b8:9e:7f:43:09:3e:49:57 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 34:9D:52:DC:C9:30:95:B0:A0:E2:7B:9C:95:75:A6:FD:D3:23:75:8C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:f3:d8:db:32:ca:38:4f:b5:42:8c:29:43:c0:6f:b3:c1:58: + 07:44:4d:ba:8a:28:99:e3:ad:fc:59:de:fe:ab:21:ff:2b:bf: + e6:2a:7a:cc:63:78:85:c2:b7:e0:c9:cd:9d:dd:0c:9b:93:20: + a8:a8:93:49:a4:43:ae:36:d8:a1:65:3d:49:47:2f:5f:da:44: + 14:23:b6:4f:b1:c3:34:92:60:8b:96:29:98:e7:22:42:df:df: + e7:ce:8c:d1:93:f3:69:ae:8a:af:9b:c5:e2:c2:fe:06:bf:c6: + 90:8d:cf:3a:28:fd:d2:16:ed:12:f5:e1:b4:f7:07:64:99:64: + 97:5f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBHzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDcwOTUzMTZaFw0yNTA4MDQwOTUzMTZaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yb2RhbmdlMRUwEwYDVQQpEwxhcmFsLXJvZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMErbCrpB39tfiPv72+zxnmNeVc0zXLezZWhNMSvY2ucsyQMKmdyGQlj +64dHu7i2fG6gZOlqni1rEO3Orp01VnL22X0x5bXlNJBPRilzaV2KAUW8TostFLeQ +U5iYVyphL/VBajoUdbJFryeGA1K6bOODyLzn1QCaYLief0MJPklXAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDSdUtzJMJWwoOJ7nJV1pv3TI3WMMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAHDz2NsyyjhPtUKMKUPA +b7PBWAdETbqKKJnjrfxZ3v6rIf8rv+YqesxjeIXCt+DJzZ3dDJuTIKiok0mkQ642 +2KFlPUlHL1/aRBQjtk+xwzSSYIuWKZjnIkLf3+fOjNGT82muiq+bxeLC/ga/xpCN +zzoo/dIW7RL14bT3B2SZZJdf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.key b/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.key new file mode 100644 index 0000000..d8c8535 --- /dev/null +++ b/vpn/coloradio01/clients/aral-rodange/1/aral-rodange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMErbCrpB39tfiPv +72+zxnmNeVc0zXLezZWhNMSvY2ucsyQMKmdyGQlj64dHu7i2fG6gZOlqni1rEO3O +rp01VnL22X0x5bXlNJBPRilzaV2KAUW8TostFLeQU5iYVyphL/VBajoUdbJFryeG +A1K6bOODyLzn1QCaYLief0MJPklXAgMBAAECgYBwicCx2yMwHPUhMLbY5+6YgFCR ++sQ6yQ0SwGFCuT99wUQomyHVNIbbjqf4H1WBTmd999nyltfic/7f3Mqj8iATQ6mk +PVaH0rGo/HMvYNKAtkZn3Sl2PIFaCdGRROvHSbYivuVwuOxGpj3MC5WmiHgt1vkB +Rdare+LTpLOgcY8q0QJBAPcYb6KoK68F8bC2V5OgcPglS2V3UkHyTL92TNNg8YQ7 +ZyXuw5AAI8RWk4CCFEBm8EvJBgwdRaPfLCHY4H0xw08CQQDIIX86WeMcSNaCv6rM +RIaEEQazAsgMX5iKzQJY7pqcUukBa0elzzX4YA1gs0gvPs/zLkc4/ymHn/xJpNeD +TTd5AkEAjYmtyJpUC3l4LCUGnUV18G5Mdd6Xe7bzR2jYMOyC65+rQgs2cjHiSwDc +lOvt9cYBNyf7Es1hqrCXcvvr+0qZ+QJAVcp2Pc9WmkNnIXmEgDhH6clas9ZXZ2Z7 +f9TOUs1GHgk0tVUFy8B+BFE4quFv6kDk5/xIr9hCN0+P2Qn/ENxDEQJAQMKdpsno +sauin7I0B6KkfOqkLFcDinP5m2xUTXFVhurFZM5+3z4UJ8Q7X6oNw3EX6B4am8qj +J+VCq5PGFCFnTg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-rodange/1/ca.crt b/vpn/coloradio01/clients/aral-rodange/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-rodange/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-rodange/client.conf b/vpn/coloradio01/clients/aral-rodange/client.conf new file mode 100644 index 0000000..348ffc0 --- /dev/null +++ b/vpn/coloradio01/clients/aral-rodange/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-rodange.crt +key 1/aral-rodange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.crt b/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.crt new file mode 100644 index 0000000..351a5f7 --- /dev/null +++ b/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rollingergrund/name=aral-rollingergrund/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e0:6d:c3:a0:c1:d2:0a:85:9d:e4:47:da:15:f5: + 97:ff:73:89:5d:fb:71:0e:6c:4d:f2:36:8d:9f:28: + c6:a1:48:50:d5:a7:bb:9d:0d:e9:62:56:8d:24:83: + 57:e3:47:ee:78:39:04:9f:69:4a:42:2e:39:93:bd: + e2:df:d8:39:97:6d:48:f3:a7:45:76:09:af:29:15: + 03:d2:1f:67:91:69:c3:96:90:18:ba:cb:e3:ee:3f: + 37:55:e2:9b:13:6e:b6:07:f1:29:c1:a0:4e:a4:29: + 81:f1:86:7f:e1:e1:ca:ba:1e:f8:d6:79:81:e0:fd: + 4c:08:9d:d2:12:8d:0c:27:c3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 88:34:58:CD:28:24:8C:CF:A4:FB:35:1B:57:03:74:E1:91:08:F0:41 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 8b:93:52:40:85:3c:8e:49:6c:3d:2b:e2:d4:75:e3:45:c5:55: + 3b:86:a3:ca:84:3e:2d:c5:91:92:7b:d8:c3:f7:df:39:5c:b7: + 4d:34:c6:80:6f:1e:11:42:ae:ec:6c:15:0d:14:2d:15:e7:c4: + 02:b2:1b:67:28:08:32:69:82:7e:73:b5:1e:1c:b7:a4:98:a8: + 38:0c:bc:ca:a0:7a:bc:c9:c0:69:6d:bf:08:3a:8b:c6:ee:3a: + 71:84:20:82:61:bf:72:82:9d:8d:be:22:08:da:cf:69:21:5d: + f7:48:7b:59:c5:c1:99:d2:23:7a:e6:b4:9f:4d:c1:c2:57:7d: + 45:87 +-----BEGIN CERTIFICATE----- +MIIEPDCCA6WgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG7MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEc +MBoGA1UEAxMTYXJhbC1yb2xsaW5nZXJncnVuZDEcMBoGA1UEKRMTYXJhbC1yb2xs +aW5nZXJncnVuZDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkq +hkiG9w0BAQEFAAOBjQAwgYkCgYEA4G3DoMHSCoWd5EfaFfWX/3OJXftxDmxN8jaN +nyjGoUhQ1ae7nQ3pYlaNJINX40fueDkEn2lKQi45k73i39g5l21I86dFdgmvKRUD +0h9nkWnDlpAYusvj7j83VeKbE262B/EpwaBOpCmB8YZ/4eHKuh741nmB4P1MCJ3S +Eo0MJ8MCAwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVh +c3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUiDRYzSgkjM+k ++zUbVwN04ZEI8EEwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qh +ga6kgaswgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAV +BgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UE +CxMGUE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NE +QUIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNV +HSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEA +i5NSQIU8jklsPSvi1HXjRcVVO4ajyoQ+LcWRknvYw/ffOVy3TTTGgG8eEUKu7GwV +DRQtFefEArIbZygIMmmCfnO1Hhy3pJioOAy8yqB6vMnAaW2/CDqLxu46cYQggmG/ +coKdjb4iCNrPaSFd90h7WcXBmdIjeua0n03Bwld9RYc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.key b/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.key new file mode 100644 index 0000000..2a72efa --- /dev/null +++ b/vpn/coloradio01/clients/aral-rollingergrund/1/aral-rollingergrund.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAOBtw6DB0gqFneRH +2hX1l/9ziV37cQ5sTfI2jZ8oxqFIUNWnu50N6WJWjSSDV+NH7ng5BJ9pSkIuOZO9 +4t/YOZdtSPOnRXYJrykVA9IfZ5Fpw5aQGLrL4+4/N1XimxNutgfxKcGgTqQpgfGG +f+Hhyroe+NZ5geD9TAid0hKNDCfDAgMBAAECgYACTR3UaChfMz+LN7FkyD/mvqiJ +7ioam8Gw2h5Zo3Fl9ffeOPoTgjECcSDBXxdnnTU0xmDlwY6hXxf4C9pnsS/l+KxZ +Iql8uB+eEYtY31S5XX1wXAUle5wpTzZmZbciJGGpUS3ClsJmPHvGBqKyJy+3Ruzr +Try4A2Oy1DgscZg3AQJBAP4iwWadxV7fd3Ar0MhR0eGWX7CxAnsru7/s18y9dUee +PT1R7Qy+pWw0ryRIVaUnYzGtLbp5sJJ7X/zA2ZRilEcCQQDiEzi5j4t7cegO+Ju/ +nqA2WLNE7T4fVMyj+R4KnawNQ1XPn4m2O85nM+wh8SbyyH8QRLaXZyQvfw07Whze +gbqlAkEAtc3fVa3gmLJ9G3386pG9+Ag/hIPdJohu1Cp3ZzzSPd3yKYAGeWuZpAM8 +mFQ3EONQjyU45YJQ0zn3vTWpcgHj2QJADlmqAB1cfTl9wXWGbWNkSA7ZUka86sA3 +PTFS9tmLUkwz5jn6Q9cIAwUIuB7WmhKf/ihebr3dTiaCcIIH0xfpAQJABbxCVn5h +3OV+oElQ1ymtCIFsXmZIPYcsNmD1EBDNIkh208+gzOTG70T0ofEbototrAc+5Zl2 +fLKzUdYGcVkvGg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-rollingergrund/1/ca.crt b/vpn/coloradio01/clients/aral-rollingergrund/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-rollingergrund/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-rollingergrund/client.conf b/vpn/coloradio01/clients/aral-rollingergrund/client.conf new file mode 100644 index 0000000..5969f4a --- /dev/null +++ b/vpn/coloradio01/clients/aral-rollingergrund/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-rollingergrund.crt +key 1/aral-rollingergrund.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.crt b/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.crt new file mode 100644 index 0000000..46212a2 --- /dev/null +++ b/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 30 (0x1e) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:55 2015 GMT + Not After : Aug 3 12:02:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schengen/name=aral-schengen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d2:25:34:65:46:e6:95:f7:82:16:e7:ff:95:41: + af:5c:81:d9:2d:c8:2e:01:a2:d4:fe:78:91:c0:c3: + 8a:bb:4e:3e:a3:63:1d:1a:a2:b7:0f:c2:96:e1:65: + bd:e2:2a:14:43:03:f1:4f:bf:b8:6d:7b:ae:80:f7: + ae:7d:87:e9:fc:23:92:ea:8b:72:91:f6:aa:9f:e4: + da:81:dc:c1:96:8d:89:06:5f:86:3d:c6:a3:67:58: + 75:e0:5e:4f:50:73:45:50:5b:a1:68:f3:98:d8:10: + 08:b3:41:9b:68:34:5f:68:dd:c1:60:3e:0d:ff:2a: + af:5d:10:17:ae:3b:61:0d:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 08:75:49:41:BE:2C:62:78:BA:2F:C7:FE:70:2B:E7:FF:51:5F:4D:E9 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:8c:2e:39:42:70:36:1f:4c:ff:42:45:a2:34:bb:6e:f5:54: + 08:e3:4e:12:f4:4f:e7:6f:55:0c:7f:ca:37:a6:3a:ec:2c:63: + 92:2b:ad:b0:eb:bc:43:78:cd:ac:ee:6a:e3:1a:55:84:bb:43: + f1:51:f7:9f:1c:99:e7:ab:8b:9c:33:18:e0:7d:cb:6f:85:72: + cf:4f:dd:63:91:9a:04:2a:16:b4:7b:fe:76:57:1d:9f:8a:79: + 90:9a:d6:13:bc:83:87:a5:c0:8f:f3:90:e7:43:a0:a9:64:de: + 6e:7e:e3:6d:ab:05:65:97:bf:28:3b:f8:c8:82:4a:53:0e:8c: + 1b:7b +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBHjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNTVaFw0yNTA4MDMxMjAyNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1zY2hlbmdlbjEWMBQGA1UEKRMNYXJhbC1zY2hlbmdlbjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA0iU0ZUbmlfeCFuf/lUGvXIHZLcguAaLU/niRwMOKu04+o2MdGqK3 +D8KW4WW94ioUQwPxT7+4bXuugPeufYfp/COS6otykfaqn+TagdzBlo2JBl+GPcaj +Z1h14F5PUHNFUFuhaPOY2BAIs0GbaDRfaN3BYD4N/yqvXRAXrjthDc0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUCHVJQb4sYni6L8f+cCvn/1FfTekw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAcIwuOUJwNh9M/0JF +ojS7bvVUCONOEvRP529VDH/KN6Y67CxjkiutsOu8Q3jNrO5q4xpVhLtD8VH3nxyZ +56uLnDMY4H3Lb4Vyz0/dY5GaBCoWtHv+dlcdn4p5kJrWE7yDh6XAj/OQ50OgqWTe +bn7jbasFZZe/KDv4yIJKUw6MG3s= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.key b/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.key new file mode 100644 index 0000000..d483c9b --- /dev/null +++ b/vpn/coloradio01/clients/aral-schengen/1/aral-schengen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANIlNGVG5pX3ghbn +/5VBr1yB2S3ILgGi1P54kcDDirtOPqNjHRqitw/CluFlveIqFEMD8U+/uG17roD3 +rn2H6fwjkuqLcpH2qp/k2oHcwZaNiQZfhj3Go2dYdeBeT1BzRVBboWjzmNgQCLNB +m2g0X2jdwWA+Df8qr10QF647YQ3NAgMBAAECgYBgzFpyPFKCydvWiU8lhXgteHJ9 +sDPg9Qx/mzIoROpmlQgtYr5JQqJoVA4EDUWGJDPpGqvRPFLLu6kKJwztLeoNMI77 +bNIwHNlzNYDFU8VeBiRfZrUVOcJW1uOHdpQT1amsNKchWREguUbvocBKNTFMBMFQ +b6PNDIocVpDFmS5i0QJBAPa9NgzrbrNKkyNSzWkuVNVXocZFPl43Jqqbmx3Zxjpg +i2HuVdxn/RaQCIZ2mam6lGSOMl0IEAGYQ7KjuJ/jpm8CQQDaCGIAKMvS2MX445J9 +//3QdbrvTohbGH9JU0ekbXJCaZ8IQdSBTtN91UNNAPPxkEwyQqMRMEugKMOs636q +JM2DAkEAv5N31R4zrKf5iJKxBLrBiYhqBm0bGMIPlqYNEWdWf1sYvef06JYhLxSU +WfraIqvIri6uMgehjetwnNJ79kEmpwJANmkvI8EKlJS6WxFXxo/y5Gns+7mKd8lW +QpNA5rzVbdNz95iOErL8PoPRJs9dEWSkT0qn7SszREXIB0hBtO44RwJBAO8kUd0N +ahpY8bv4FZ/BgxdkZYGvMvsbeElFo7jlqRj6tKZ75bsVZGqxay411iadxojgx2Zx +lnR5hUA8ld83INo= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-schengen/1/ca.crt b/vpn/coloradio01/clients/aral-schengen/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-schengen/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-schengen/client.conf b/vpn/coloradio01/clients/aral-schengen/client.conf new file mode 100644 index 0000000..9c48092 --- /dev/null +++ b/vpn/coloradio01/clients/aral-schengen/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-schengen.crt +key 1/aral-schengen.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.crt b/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.crt new file mode 100644 index 0000000..2bb3e89 --- /dev/null +++ b/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-steinfort/name=aral-steinfort/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c5:8f:85:f5:21:40:3f:9e:44:86:62:3b:4c:63: + f6:0d:81:3e:48:ef:a6:1e:cc:f2:c0:74:32:ef:e0: + b9:2b:e0:67:cf:5d:75:a6:07:cb:c7:c0:3f:41:76: + 7c:91:87:af:21:5c:4e:b6:81:d1:4f:a0:81:f9:e3: + 28:05:f9:0f:6f:51:8e:b1:7e:38:f2:93:96:50:ba: + 1e:ca:68:0b:68:b1:44:af:a2:e4:c9:08:e4:6d:2e: + 68:a7:2d:61:12:63:72:9e:d3:36:51:09:95:81:0c: + 4a:88:d5:9a:28:c7:a8:73:c9:9e:cb:35:79:69:9c: + 40:b0:cc:10:87:41:a9:ed:a3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 63:79:E2:C9:FC:2C:C0:FA:7D:F0:BF:95:68:6C:EB:A4:1F:37:CE:9D + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:13:fc:10:f9:8a:86:7c:86:82:97:aa:55:a0:4a:2e:f9:bf: + d2:f2:49:ff:99:2d:5f:9b:0f:cd:59:50:1f:81:5c:ff:ae:04: + b2:12:6b:5a:1a:12:43:63:2c:1f:d2:e3:f1:05:3f:5a:d0:9c: + 1d:d0:9c:f4:02:d5:9e:47:9e:5f:42:e9:9c:f1:d5:52:b3:41: + 67:92:22:b9:d3:5b:51:d6:c8:f1:e0:c6:d0:3b:ad:42:84:cc: + df:11:e5:67:c0:d8:8a:92:1a:67:fa:7a:dd:ca:28:89:27:da: + a2:12:06:df:ac:c3:7a:67:78:53:4e:3a:9a:75:82:62:dc:8a: + f9:ad +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1zdGVpbmZvcnQxFzAVBgNVBCkTDmFyYWwtc3RlaW5mb3J0 +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDFj4X1IUA/nkSGYjtMY/YNgT5I76YezPLAdDLv4Lkr4GfPXXWm +B8vHwD9BdnyRh68hXE62gdFPoIH54ygF+Q9vUY6xfjjyk5ZQuh7KaAtosUSvouTJ +CORtLminLWESY3Ke0zZRCZWBDEqI1Zoox6hzyZ7LNXlpnECwzBCHQantowIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRjeeLJ/CzA+n3wv5VobOukHzfO +nTCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUE/wQ+YqGfIaC +l6pVoEou+b/S8kn/mS1fmw/NWVAfgVz/rgSyEmtaGhJDYywf0uPxBT9a0Jwd0Jz0 +AtWeR55fQumc8dVSs0FnkiK501tR1sjx4MbQO61ChMzfEeVnwNiKkhpn+nrdyiiJ +J9qiEgbfrMN6Z3hTTjqadYJi3Ir5rQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.key b/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.key new file mode 100644 index 0000000..06fb7d0 --- /dev/null +++ b/vpn/coloradio01/clients/aral-steinfort/1/aral-steinfort.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMWPhfUhQD+eRIZi +O0xj9g2BPkjvph7M8sB0Mu/guSvgZ89ddaYHy8fAP0F2fJGHryFcTraB0U+ggfnj +KAX5D29RjrF+OPKTllC6HspoC2ixRK+i5MkI5G0uaKctYRJjcp7TNlEJlYEMSojV +mijHqHPJnss1eWmcQLDMEIdBqe2jAgMBAAECgYEAj8/xiMbCuUzhvx1k4y/lHmGV +0Iw7VjKFB5nOtpXU1d7OUsJK8Si9q9QDeAjjlyC5WMSUPAD2OEu0Mg6sxORP2cUW +UMYgmOub3x5Ms5A1pPzWBpbCJWc5Bj3fuqBDUd8/3d1GYi0PtpLeho4c9p8sI4Oc +ifIlcYyRHh6Any6+DJkCQQD3PjlHKoUwxGxy38wlKXvCu46OuXcRwf4nNMygxf7/ +RumFgMZVKyGNDpiI5xjJhoe8jkduVqDKZwcIma3TooVdAkEAzI7TBIQ78ReVI2gs +Xf8KdXMlvjo0cG1iflXS4DLw0eR+hpf+Y86Ftg8WLOcRELCSDAXwyUp8Am0F4p2k +eawO/wJBAOUy58JTZplo3eg4E3W32SUS3frtb7YkkkkiJzg7lEJuKHk8gZ/elgG/ +sCPpqA7aCecANrPQ1soLbHfKj1wL43kCQCv0HH+B8mdRi+g5wB7KaHLoNRn048Os +nVdMFa27BGf1UwKUskK745tFDpzDYbVWW2td82ktKgxTZMpW2TqTr/0CQFKeIJYc +mERJ35mAn5sk1Avr8TMjMvYbLYuhzAny8OuvPCqugmvOcxSpbAy9ohyUBmjMh4Ki +c6KJ+B+7IYjXEyI= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-steinfort/1/ca.crt b/vpn/coloradio01/clients/aral-steinfort/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-steinfort/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-steinfort/client.conf b/vpn/coloradio01/clients/aral-steinfort/client.conf new file mode 100644 index 0000000..768d176 --- /dev/null +++ b/vpn/coloradio01/clients/aral-steinfort/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-steinfort.crt +key 1/aral-steinfort.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.crt b/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.crt new file mode 100644 index 0000000..5c9a126 --- /dev/null +++ b/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-vianden/name=aral-vianden/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:17:91:21:fe:4c:df:0d:3f:49:2c:85:0a:68: + 29:a6:2f:33:42:f0:4d:19:d6:8d:8d:32:19:b1:95: + 16:8a:d2:a5:b0:c2:fc:8e:99:98:fb:b1:6f:c5:d9: + 12:59:e5:65:24:84:9f:a9:85:dc:83:ce:32:53:3e: + e7:44:cf:bd:14:33:fe:5b:c2:ae:dc:75:25:23:05: + e5:9e:92:b8:3c:d2:20:61:b6:39:14:70:31:a5:c2: + 28:c7:22:73:ad:5e:78:92:06:f3:f5:e5:34:f4:b4: + f3:d1:91:c1:69:73:a8:b8:45:dc:86:dc:85:99:6a: + ad:d4:41:cf:d6:1e:32:ec:23 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 38:CC:0C:22:42:94:00:8C:21:2B:73:D9:63:B7:7A:73:E7:14:F5:6B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2d:aa:8f:84:93:53:6c:aa:fa:6c:bc:23:d8:ae:e1:bd:7a:59: + c3:47:b7:08:19:bf:1e:df:f1:a3:7c:bd:19:65:d2:b0:e7:00: + 25:0e:d6:60:63:4c:5d:de:73:8e:f0:37:40:0b:5c:f7:ea:b2: + 2e:bf:7e:eb:67:85:21:b6:8b:f5:47:84:ac:05:df:ad:ec:19: + 3f:42:d0:b8:1e:e5:02:a2:de:bf:48:9d:1b:65:a2:a1:d4:7e: + 2d:50:61:ff:a3:7e:9a:af:78:a1:c8:23:03:fc:18:38:c3:6a: + da:c0:3a:d6:1d:7d:e6:9e:1d:07:67:ce:f1:c0:62:ea:5a:71: + cf:6b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC12aWFuZGVuMRUwEwYDVQQpEwxhcmFsLXZpYW5kZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBANoXkSH+TN8NP0kshQpoKaYvM0LwTRnWjY0yGbGVForSpbDC/I6ZmPux +b8XZElnlZSSEn6mF3IPOMlM+50TPvRQz/lvCrtx1JSMF5Z6SuDzSIGG2ORRwMaXC +KMcic61eeJIG8/XlNPS089GRwWlzqLhF3IbchZlqrdRBz9YeMuwjAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDjMDCJClACMIStz2WO3enPnFPVrMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAC2qj4STU2yq+my8I9iu +4b16WcNHtwgZvx7f8aN8vRll0rDnACUO1mBjTF3ec47wN0ALXPfqsi6/futnhSG2 +i/VHhKwF363sGT9C0Lge5QKi3r9InRtloqHUfi1QYf+jfpqveKHIIwP8GDjDatrA +OtYdfeaeHQdnzvHAYupacc9r +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.key b/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.key new file mode 100644 index 0000000..21c7aa5 --- /dev/null +++ b/vpn/coloradio01/clients/aral-vianden/1/aral-vianden.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANoXkSH+TN8NP0ks +hQpoKaYvM0LwTRnWjY0yGbGVForSpbDC/I6ZmPuxb8XZElnlZSSEn6mF3IPOMlM+ +50TPvRQz/lvCrtx1JSMF5Z6SuDzSIGG2ORRwMaXCKMcic61eeJIG8/XlNPS089GR +wWlzqLhF3IbchZlqrdRBz9YeMuwjAgMBAAECgYEAyZinS6jqHfT83wMMJ8aJWVig +JexDGPM+/ZmmLoUFxWVaS76x/o703xPxog057Wciy1Lc07MtV5ku48xtsynkOCbW +4/cl3woApZpdzLlLlBEenYqsr7KgKEA8SMHATDuxIwPXS7ztbP8kb0JDoGQ+jvo0 +k+QxBe5AILUDMXvUc0ECQQD8pDM7xZFsp0llBn52QHnpDMqr3cEy4MgnLpsdUpYy +io1oFgVJ+8E699QX9MGMeg1mnxV7OdrY+bElFA3ANKrLAkEA3P3JeKdyFIuCdmEZ +N+8xsQfmCnc0nRt5FHnFQafIxjeNf8Wm0pf4NhPukpWXOFbd4gOXTshuTHE4tbVh ++KZhCQJAMnQYRzeNc0V1QtepKbR2pDQJxYjjrGV3k1ubXp+/nxhMZR0AsWW1kTEt +Chu3C3bUdkoO4C0Np4c1+VGn7VqXQQJAeiodpwJB0VOyAkj5DO/As5GfPKfbQQJ/ +867BOeNL3S+2nCyiZQa3owVvvD7PwshajmfXzCiGuOFaLTEhALjRKQJAVwjqMUHM +3TJriH6/w730+kA0sbWGPlhAgUqppBegymXQUmDHhE3UdXYdX/xt5xHsyN3nlwiJ +hr4DmSwcIqLylg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-vianden/1/ca.crt b/vpn/coloradio01/clients/aral-vianden/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-vianden/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-vianden/client.conf b/vpn/coloradio01/clients/aral-vianden/client.conf new file mode 100644 index 0000000..24015ae --- /dev/null +++ b/vpn/coloradio01/clients/aral-vianden/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-vianden.crt +key 1/aral-vianden.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.crt b/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.crt new file mode 100644 index 0000000..1e0c7f4 --- /dev/null +++ b/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-wasserbillig/name=aral-wasserbillig/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d1:b0:06:da:6e:40:ba:50:40:60:87:e6:c1:5c: + ba:07:73:e7:59:de:f6:53:cc:a7:6b:31:cb:85:63: + a5:3f:2c:75:cb:01:94:7f:86:2d:8b:7a:7b:50:6f: + f5:81:5d:da:d0:ac:85:bd:d6:26:18:25:58:5c:c5: + 4e:e6:1c:71:17:43:b1:9a:98:f0:39:f8:16:8f:bf: + 52:35:c9:86:15:a6:5a:5e:71:c0:9c:e0:fd:53:b0: + 5b:3b:8d:e8:5b:a7:7e:18:5c:77:89:19:de:1e:7f: + 78:68:a1:52:bd:15:ea:c5:0d:a8:c5:95:25:97:d3: + 4e:6a:4c:1a:4c:b8:74:c6:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2C:78:BD:63:E1:2D:7B:DF:2E:B8:E3:A2:C0:BA:FB:FF:F7:FC:95:E3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:c4:56:24:24:e4:72:33:3e:0d:68:f2:37:36:a0:26:13:e2: + c6:d3:3e:9d:43:5b:dc:d2:96:c1:5d:b5:0a:f1:dd:14:13:a7: + 37:d3:33:48:84:c7:aa:d6:12:2a:a8:0c:26:b1:d6:bf:5e:df: + 5d:a6:bd:ed:b0:75:43:14:6a:62:da:e8:b1:c8:53:bc:9a:23: + a6:e4:5f:ba:7e:42:56:d4:01:9c:40:8b:e1:2c:12:50:52:1a: + f4:c1:1c:1f:bb:ce:97:ae:ef:ea:50:d8:e6:81:dd:d7:b5:e3: + 5c:3f:29:d8:5b:77:99:da:8f:70:51:f0:c0:03:43:1a:9a:00: + 65:73 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC13YXNzZXJiaWxsaWcxGjAYBgNVBCkTEWFyYWwtd2Fzc2Vy +YmlsbGlnMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDRsAbabkC6UEBgh+bBXLoHc+dZ3vZTzKdrMcuFY6U/ +LHXLAZR/hi2LentQb/WBXdrQrIW91iYYJVhcxU7mHHEXQ7GamPA5+BaPv1I1yYYV +plpeccCc4P1TsFs7jehbp34YXHeJGd4ef3hooVK9FerFDajFlSWX005qTBpMuHTG +gQIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQseL1j4S173y6446LA +uvv/9/yV4zCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUxFYk +JORyMz4NaPI3NqAmE+LG0z6dQ1vc0pbBXbUK8d0UE6c30zNIhMeq1hIqqAwmsda/ +Xt9dpr3tsHVDFGpi2uixyFO8miOm5F+6fkJW1AGcQIvhLBJQUhr0wRwfu86Xru/q +UNjmgd3XteNcPynYW3eZ2o9wUfDAA0MamgBlcw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.key b/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.key new file mode 100644 index 0000000..2c1ead7 --- /dev/null +++ b/vpn/coloradio01/clients/aral-wasserbillig/1/aral-wasserbillig.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANGwBtpuQLpQQGCH +5sFcugdz51ne9lPMp2sxy4VjpT8sdcsBlH+GLYt6e1Bv9YFd2tCshb3WJhglWFzF +TuYccRdDsZqY8Dn4Fo+/UjXJhhWmWl5xwJzg/VOwWzuN6Funfhhcd4kZ3h5/eGih +Ur0V6sUNqMWVJZfTTmpMGky4dMaBAgMBAAECgYBInqbw9SgTnoF9LPPc2alPtXNV +K6Oxx/nfZQJwMt9i7pno8aYlOCoD2Spl5DBpWkDS7jzvTwAocp6UmnzFsunzHS6+ +lA/dZvdfocxVS8wuKWbtIsM78+o1JLSLY5bhkEwFX+gypyQEuw5aXXSEjiuDcPkB +iHvi6NgH7B0r8TV1MQJBAOrJyUZccHoUxqjh9o3QPnrAgHKQQwdvKgnqrGEB4l6r +1MIIovsLeqTRqkuPrntIhCgJOXJmUBL+MjZjmEhfYHUCQQDkobW/XqhbOZlAWgmc +fYCTHnIvJKKhtgiMFYlXtmDXPwrtThT4Os2kXU0P2xqTGUBoD2JugO/KBnfa0ylC +/ExdAkAYgSb4qP00QKbbSXoqIunideTyEAxu4jNJBa0oEsJFjzmNZslb2j7apOdZ +K43SYCcq5ouQXQ1Obilfc9WY+BthAkEAtIVCXeG9iJoH+RmecSNe+8qUWcjRaGG0 +ifcPRGRKPmoWlJyMThsP9/F7QUO8zdyoUAGltJ61tow44lzMPYm8OQJBAL/MJv+5 +kN9rfEKq0ZyvJObis2WEnBr9EcpnMka/kE7DPmZFQJNlnHqfx42l/DfUOl8tRWn9 +hUNbutQqbqXD8H4= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/aral-wasserbillig/1/ca.crt b/vpn/coloradio01/clients/aral-wasserbillig/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/aral-wasserbillig/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/aral-wasserbillig/client.conf b/vpn/coloradio01/clients/aral-wasserbillig/client.conf new file mode 100644 index 0000000..cce38a1 --- /dev/null +++ b/vpn/coloradio01/clients/aral-wasserbillig/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/aral-wasserbillig.crt +key 1/aral-wasserbillig.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/dks-rpi2test/1/ca.crt b/vpn/coloradio01/clients/dks-rpi2test/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/dks-rpi2test/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.crt b/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.crt new file mode 100644 index 0000000..972b5a4 --- /dev/null +++ b/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 27 (0x1b) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 19 12:04:05 2015 GMT + Not After : Apr 16 12:04:05 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-rpi2test/name=dks-rpi2test/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bb:5f:37:53:30:39:ef:24:4e:6d:9f:e0:0f:9a: + 22:67:2f:17:f3:da:22:d4:e1:af:7b:20:99:1d:4e: + c5:48:99:c3:b8:b5:cc:43:7a:44:c5:22:cd:ed:ec: + 92:39:b6:9e:1c:6b:de:92:81:0f:66:5c:f1:a6:74: + c5:05:4f:e9:19:bc:71:0c:34:4d:a3:d9:3c:b8:a4: + 45:60:2b:2a:bc:dd:9e:44:ac:76:7f:6f:7d:34:b0: + 35:fd:f6:29:d7:08:17:ec:20:5e:5d:c0:09:d5:98: + ae:e5:3d:c8:5d:42:9f:9a:fd:d7:4e:57:40:c5:82: + ce:33:8d:7c:65:fa:7a:1a:8f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 60:14:81:89:49:9B:8E:B8:4A:7E:A5:A4:B9:B7:88:69:97:E1:A8:4B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 25:9f:6c:81:18:5d:64:75:eb:b3:73:dc:90:25:82:b0:51:40: + 77:99:9c:bd:cd:4e:9b:4b:7b:fe:09:51:3c:aa:41:25:81:c2: + dc:fc:6f:b4:b0:37:92:0b:fd:53:e2:ba:41:57:2d:b3:b2:2f: + 15:7e:64:89:05:f0:2d:c2:e7:81:a2:6f:13:ff:d5:b5:a0:ed: + 54:e1:07:c9:30:8d:fd:11:f0:6a:67:a8:c0:eb:e5:d4:88:1f: + e7:36:cd:e0:db:25:85:45:6a:4d:df:56:25:9b:28:7d:75:cd: + 41:68:79:b3:40:21:50:7b:cc:52:83:6c:db:08:dd:6d:af:44: + 05:9b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTkxMjA0MDVaFw0yNTA0MTYxMjA0MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMZGtzLXJwaTJ0ZXN0MRUwEwYDVQQpEwxka3MtcnBpMnRlc3QxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALtfN1MwOe8kTm2f4A+aImcvF/PaItThr3sgmR1OxUiZw7i1zEN6RMUi +ze3skjm2nhxr3pKBD2Zc8aZ0xQVP6Rm8cQw0TaPZPLikRWArKrzdnkSsdn9vfTSw +Nf32KdcIF+wgXl3ACdWYruU9yF1Cn5r9105XQMWCzjONfGX6ehqPAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGAUgYlJm464Sn6lpLm3iGmX4ahLMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACWfbIEYXWR167Nz3JAl +grBRQHeZnL3NTptLe/4JUTyqQSWBwtz8b7SwN5IL/VPiukFXLbOyLxV+ZIkF8C3C +54GibxP/1bWg7VThB8kwjf0R8GpnqMDr5dSIH+c2zeDbJYVFak3fViWbKH11zUFo +ebNAIVB7zFKDbNsI3W2vRAWb +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.key b/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.key new file mode 100644 index 0000000..6950efb --- /dev/null +++ b/vpn/coloradio01/clients/dks-rpi2test/1/dks-rpi2test.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBALtfN1MwOe8kTm2f +4A+aImcvF/PaItThr3sgmR1OxUiZw7i1zEN6RMUize3skjm2nhxr3pKBD2Zc8aZ0 +xQVP6Rm8cQw0TaPZPLikRWArKrzdnkSsdn9vfTSwNf32KdcIF+wgXl3ACdWYruU9 +yF1Cn5r9105XQMWCzjONfGX6ehqPAgMBAAECgYEAsxeaePACn/pS4GNMtXz83yVb +PqBEZLfmk8ifsSymUvNt6PITcHfAnbDbpktVpMZRMBdGoT+sqYmzDAhWfPJZeLRR +toZjbh2yvPe6eG/10b6O0JbUq8hayRcEoxIZ4z4aifvihBgCH5KmKGxj3C9w+Wkd +t1lxMArhzmbA2hu8UuECQQDxGFlFcJn7HeramK+zGUZ3ir1PJgdmeHgRMH2LFqkX +seFu2ea4V5rvr1TCcJ1rjyWRe6EK7fo90+uN6c+TUJSRAkEAxvSgaU7BVsudXqsq +DqDT9LLTp2TzBtqxvBu0aloK9djgN8D9gew45lFEWdzafBNYNN4G6Ie8fL4Nntdx +MMDNHwJBAOrlejS5nIyZfXQ1RxoMCif2OLOgrZ0cyn6U6/xTu7OmT6mdC7mXQRE9 +litLZVSiR0wTU7g+XI1YqCvAHcm9vMECQQC8FmZUSC0FpicXaY+wFqFq02i+9vO+ +RiADKtnsNUXpV+fZLa08F5tPOgL5RY6UACHCkShMyo4KDA6KXTjYE12XAkBR6gIW +V6KB9OAr/XFi6ZVIwqvO5enRt7yx5b8V5eLOfBx8gQ1Kf2GHRI2FGMkZyXXIPrBJ +pkayPIZh+F0a2wQ0 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/dks-rpi2test/client.conf b/vpn/coloradio01/clients/dks-rpi2test/client.conf new file mode 100644 index 0000000..a083e69 --- /dev/null +++ b/vpn/coloradio01/clients/dks-rpi2test/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/dks-rpi2test.crt +key 1/dks-rpi2test.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/dks-testrpi/1/ca.crt b/vpn/coloradio01/clients/dks-testrpi/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/dks-testrpi/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.crt b/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.crt new file mode 100644 index 0000000..6e17529 --- /dev/null +++ b/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 24 (0x18) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 20 19:41:48 2015 GMT + Not After : Feb 17 19:41:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-testrpi/name=dks-testrpi/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ed:d7:bc:aa:20:35:7c:eb:ac:89:37:42:c5:d9: + ce:20:e2:5c:3f:f3:77:5b:59:0e:65:6b:2c:a0:19: + 2a:5e:b5:a1:fb:85:fb:4f:b7:ad:37:20:93:be:09: + a4:71:34:6f:58:e1:aa:9f:db:b1:b0:9e:41:ba:a2: + 8d:78:a2:0b:28:ed:22:af:59:3f:7e:fe:6e:c9:dc: + 37:66:26:7b:22:22:57:0e:0f:b6:23:00:29:4c:49: + 0b:48:18:3a:8c:3e:5a:0b:41:5d:0f:c3:ed:b2:fc: + 93:f9:c5:eb:db:9a:f9:3b:b1:2d:02:8e:2c:02:a0: + a5:6c:b9:93:e0:70:2a:25:9f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0B:F0:5F:07:58:B5:28:F9:F0:98:09:24:C3:93:5D:08:B8:33:CC:3B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:a2:b0:58:0c:b0:55:82:b2:ed:ad:09:fe:2b:c8:41:81:4e: + e3:1e:43:6b:4b:0c:3f:ea:c7:fa:1f:d7:6f:2f:46:98:9f:16: + e8:00:d2:35:e0:11:5e:d5:1c:37:21:c7:4c:d4:13:08:a3:76: + cc:41:62:47:01:a1:19:ac:70:30:2b:c2:8f:fe:9e:7d:6f:e1: + 2b:94:2b:ce:8b:06:84:48:6c:b9:63:d7:d2:fc:b2:1c:26:74: + 40:81:4e:68:3c:f3:c9:08:62:8f:c4:2a:cd:bc:05:ee:31:cb: + de:17:e4:42:9f:71:2a:95:c7:58:ff:e8:35:f1:6c:d8:0f:19: + c9:6d +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBGDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMjAxOTQxNDhaFw0yNTAyMTcxOTQxNDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLZGtzLXRlc3RycGkxFDASBgNVBCkTC2Rrcy10ZXN0cnBpMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDt17yqIDV866yJN0LF2c4g4lw/83dbWQ5layygGSpetaH7hftPt603IJO+ +CaRxNG9Y4aqf27GwnkG6oo14ogso7SKvWT9+/m7J3DdmJnsiIlcOD7YjAClMSQtI +GDqMPloLQV0Pw+2y/JP5xevbmvk7sS0CjiwCoKVsuZPgcColnwIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBQL8F8HWLUo+fCYCSTDk10IuDPMOzCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBrorBYDLBVgrLtrQn+K8hB +gU7jHkNrSww/6sf6H9dvL0aYnxboANI14BFe1Rw3IcdM1BMIo3bMQWJHAaEZrHAw +K8KP/p59b+ErlCvOiwaESGy5Y9fS/LIcJnRAgU5oPPPJCGKPxCrNvAXuMcveF+RC +n3EqlcdY/+g18WzYDxnJbQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.key b/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.key new file mode 100644 index 0000000..af3f5f9 --- /dev/null +++ b/vpn/coloradio01/clients/dks-testrpi/1/dks-testrpi.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAO3XvKogNXzrrIk3 +QsXZziDiXD/zd1tZDmVrLKAZKl61ofuF+0+3rTcgk74JpHE0b1jhqp/bsbCeQbqi +jXiiCyjtIq9ZP37+bsncN2YmeyIiVw4PtiMAKUxJC0gYOow+WgtBXQ/D7bL8k/nF +69ua+TuxLQKOLAKgpWy5k+BwKiWfAgMBAAECgYB8SI2XwLjyjBxen3fO91+VI3Pd +HxYxr7msGXL6Pew8DWGVk4+dOnfTJLzPQy6g0SuWIGYOnrideDUUl7ihXtvBBxIb +r+fru6wODDzY8BtD100JEk3PjL7qQOjIiaGwpPrSRkuYjfQoF2Jk72H79FL2coC5 +DPoSUXw+mqaapbDwMQJBAP8ldE/7PzmGzNHikppHxQ9he2H7EBo5vg18iEUUUTHf +NcsiUsBKFL1B1UzPP1mMQPnXLn223guQnuAR/aAJ6qUCQQDuo3YTgr7aTVsfY990 +yVGpmHFMfDFGFHYWsk5ceCh9b5yJTrS/95h61fXBBHwner4+qOmYcLkH2mvPwCF7 +4c/zAkEA3lqrxNA2x1F8yiTkkmOdjsvrlPYRkGlmAabXsywDnqzh2oetCjsFW/I1 +i1zJ3qZmMdWfhJuLYxTEAI5tM72wqQJAaVLx4UiabYUoy6Dr1gKorT6f+s7xfGm5 +eOj3lu5diIdDQoLfWb6wqL5YOfl9xnrxDnzEpMhTkfjADrBQ1vliKwJBALNXrfzs +i1361eKJEFxW/zVpGOQU2CQlkwhcYpDGQE4c2HYdnYVTjKept3x393FuAM5NSO2Y +b5Y/FeBGzPb245o= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/dks-testrpi/client.conf b/vpn/coloradio01/clients/dks-testrpi/client.conf new file mode 100644 index 0000000..24ff726 --- /dev/null +++ b/vpn/coloradio01/clients/dks-testrpi/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote posdab.dks.lu 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/dks-testrpi.crt +key 1/dks-testrpi.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/clients/rb75-lintgen/1/ca.crt b/vpn/coloradio01/clients/rb75-lintgen/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/clients/rb75-lintgen/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.crt b/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.crt new file mode 100644 index 0000000..552ff2a --- /dev/null +++ b/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 25 (0x19) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 16:10:27 2015 GMT + Not After : Mar 26 16:10:27 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=rb75-lintgen/name=rb75-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:86:4f:1f:04:e0:9d:f7:2a:af:99:c6:14:e6: + 4f:27:41:a9:c7:b9:bc:fa:1b:71:dd:65:79:b0:54: + dc:b4:f0:5f:95:3c:cb:c7:e9:26:59:ca:e5:96:31: + 36:55:b9:55:2a:fb:ed:64:72:25:65:40:49:98:02: + 28:44:54:c2:65:80:5b:57:eb:c2:1b:40:dc:b3:4a: + 77:97:5a:69:0b:a9:7d:dc:a3:f0:2e:19:f1:ce:37: + df:c8:b1:15:9f:38:86:d9:58:bf:48:b7:bc:4c:f5: + 57:c3:b0:69:58:7a:02:96:c9:38:4d:af:21:c6:64: + c2:c3:9b:64:7e:88:29:fc:19 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 19:6A:3F:80:EA:31:87:5F:49:18:63:0D:CA:F6:B0:FF:3D:D8:07:60 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:58:2f:bf:2a:28:62:ec:33:e5:93:40:31:f2:a1:76:82:62: + cd:99:e3:eb:7c:61:47:4d:fb:05:5d:25:a0:22:4d:50:4c:de: + 6c:12:c5:ef:db:6f:85:95:56:61:6e:ca:55:01:db:9d:6b:6d: + 9f:08:d2:a3:ad:bf:d1:86:a8:e7:49:d6:97:0a:fa:c6:5e:4f: + c9:bf:76:35:de:95:30:06:d8:8b:3a:82:6f:97:50:25:d1:1a: + de:4c:75:93:e7:b0:e2:c0:c8:1e:98:bc:87:8e:ee:8c:13:6b: + 0a:50:f9:ae:87:76:ed:8e:e7:06:36:7a:92:89:5b:06:98:bc: + f6:ac +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAzMjkxNjEwMjdaFw0yNTAzMjYxNjEwMjdaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMcmI3NS1saW50Z2VuMRUwEwYDVQQpEwxyYjc1LWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMmGTx8E4J33Kq+ZxhTmTydBqce5vPobcd1lebBU3LTwX5U8y8fpJlnK +5ZYxNlW5VSr77WRyJWVASZgCKERUwmWAW1frwhtA3LNKd5daaQupfdyj8C4Z8c43 +38ixFZ84htlYv0i3vEz1V8OwaVh6ApbJOE2vIcZkwsObZH6IKfwZAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFBlqP4DqMYdfSRhjDcr2sP892AdgMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1YL78qKGLsM+WTQDHy +oXaCYs2Z4+t8YUdN+wVdJaAiTVBM3mwSxe/bb4WVVmFuylUB251rbZ8I0qOtv9GG +qOdJ1pcK+sZeT8m/djXelTAG2Is6gm+XUCXRGt5MdZPnsOLAyB6YvIeO7owTawpQ ++a6Hdu2O5wY2epKJWwaYvPas +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.key b/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.key new file mode 100644 index 0000000..83676ee --- /dev/null +++ b/vpn/coloradio01/clients/rb75-lintgen/1/rb75-lintgen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMmGTx8E4J33Kq+Z +xhTmTydBqce5vPobcd1lebBU3LTwX5U8y8fpJlnK5ZYxNlW5VSr77WRyJWVASZgC +KERUwmWAW1frwhtA3LNKd5daaQupfdyj8C4Z8c4338ixFZ84htlYv0i3vEz1V8Ow +aVh6ApbJOE2vIcZkwsObZH6IKfwZAgMBAAECgYEAmFM2AQtNwPkvwbWpHOkM0W53 +p6kEZ8RQ5/ko5xjuDrJWfVaL7dqUi3Cq40DlghxpfOkaAj+pdoQGXKjcyPGMUZcP +ux2q0dnFX55cJJxpxTSNv3o2kzZYAmlf1z09Hr5IcFqbEq7ZyLhUa7n4ZzQcYUVY +MKs81yfRhAWb5nnS+yUCQQDqSICECmVl20k5tEebLaT+WzfE49csAgQN/pHYe45Y ++Ol/LL362sENipF/8CIsE4x8PhKVxdXhHTEgIg1NXY8LAkEA3DRzxaN3GBFW8h+7 +yyr1ewCOg+2mkQXOV6fBPvmj6tRrATp0Ue9fa4TjG9u15WaKK5sy+RVQRr7MHN0p +iZcn6wJAXbpxx+GM3WoUaoSIXTmul6AQuLFaRR3tV1fwK0aLFWdHqvxQaQqZT3yP +Zzq/wRh1DMOcldTXEz+lhrB41+nFLwJAYLAHRXiJCmBStO2KH6M1NlUAPp1Szcqm +14YpK+WhO7MZaOipunBIjYVD0y+dpqRnds4mi4f4P5f3N5VEb82XEQJBALEfAX6c +3K9CP2od1OyktNx047NGR8WbbAqLkNkqzetcQvJsCjum2lcMy3XbVpU2s0F/Hp9B +23/9MJ+AMWN26Yo= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/clients/rb75-lintgen/client.conf b/vpn/coloradio01/clients/rb75-lintgen/client.conf new file mode 100644 index 0000000..5bcf92a --- /dev/null +++ b/vpn/coloradio01/clients/rb75-lintgen/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/rb75-lintgen.crt +key 1/rb75-lintgen.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio01/conf/ipp.txt b/vpn/coloradio01/conf/ipp.txt new file mode 100644 index 0000000..e3941ff --- /dev/null +++ b/vpn/coloradio01/conf/ipp.txt @@ -0,0 +1,52 @@ +aral-vianden,10.1.0.4 +aral-hoscheiddickt,10.1.0.8 +aral-niederfeulen,10.1.0.12 +aral-ettelbruck,10.1.0.16 +aral-pommerloch,10.1.0.20 +aral-lintgen,10.1.0.24 +aral-diekirch,10.1.0.28 +aral-steinfort,10.1.0.32 +aral-wasserbillig,10.1.0.36 +aral-merl,10.1.0.40 +aral-howald,10.1.0.44 +aral-rollingergrund,10.1.0.48 +aral-redange,10.1.0.52 +aral-junglinster,10.1.0.56 +aral-gonderange,10.1.0.60 +aral-mondorf,10.1.0.64 +aral-bettembourg,10.1.0.68 +dks-testrpi,10.1.0.72 +aral-petange,10.1.0.76 +aral-differdange,10.1.0.80 +aral-bascharage,10.1.0.84 +aral-frisange,10.1.0.88 +aral-pommerloch,10.1.0.92 +aral-foetz,10.1.0.96 +rb75-lintgen,10.1.0.100 +aral-bertrange,10.1.0.104 +dks-rpi2test,10.1.0.108 +aral-merl,10.1.0.112 +aral-frisange,10.1.0.116 +aral-rollingergrund,10.1.0.120 +aral-diekirch,10.1.0.124 +aral-howald,10.1.0.128 +aral-bertrange,10.1.0.132 +aral-hoscheiddickt,10.1.0.136 +aral-ettelbruck,10.1.0.140 +dks-laptop,10.1.0.144 +aral-schengen,10.1.0.148 +aral-rodange,10.1.0.152 +dks-rpi2test,10.1.0.156 +aral-rodange,10.1.0.160 +aral-niederfeulen,10.1.0.164 +aral-lintgen,10.1.0.168 +aral-petange,10.1.0.172 +aral-bascharage,10.1.0.176 +aral-differdange,10.1.0.180 +aral-steinfort,10.1.0.184 +aral-wasserbillig,10.1.0.188 +aral-vianden,10.1.0.192 +aral-bettembourg,10.1.0.196 +aral-dudelange,10.1.0.200 +aral-redange,10.1.0.204 +aral-dudelange,10.1.0.208 diff --git a/vpn/coloradio01/conf/server.conf b/vpn/coloradio01/conf/server.conf new file mode 100644 index 0000000..dd1dd4e --- /dev/null +++ b/vpn/coloradio01/conf/server.conf @@ -0,0 +1,21 @@ +port 1194 +proto udp +dev tun +ca /home/posdab/vpn/keys/ca.crt +cert /home/posdab/vpn/keys/server.crt +key /home/posdab/vpn/keys/server.key +dh /home/posdab/vpn/keys/dh1024.pem +server 10.1.0.0 255.255.0.0 +ifconfig-pool-persist /home/posdab/vpn/conf/ipp.txt +client-to-client +keepalive 10 120 +comp-lzo +max-clients 300 +persist-key +persist-tun +status /home/posdab/vpn/log/openvpn-status.log +log /home/posdab/vpn/log/openvpn.log +;log-append openvpn.log +verb 3 +mute 20 +management localhost 7505 diff --git a/vpn/coloradio01/easyrsa/build-ca b/vpn/coloradio01/easyrsa/build-ca new file mode 100644 index 0000000..bce29a6 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-ca @@ -0,0 +1,8 @@ +#!/bin/sh + +# +# Build a root certificate +# + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --initca $* diff --git a/vpn/coloradio01/easyrsa/build-dh b/vpn/coloradio01/easyrsa/build-dh new file mode 100644 index 0000000..4beb127 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-dh @@ -0,0 +1,11 @@ +#!/bin/sh + +# Build Diffie-Hellman parameters for the server side +# of an SSL/TLS connection. + +if [ -d $KEY_DIR ] && [ $KEY_SIZE ]; then + $OPENSSL dhparam -out ${KEY_DIR}/dh${KEY_SIZE}.pem ${KEY_SIZE} +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio01/easyrsa/build-inter b/vpn/coloradio01/easyrsa/build-inter new file mode 100644 index 0000000..87bf98d --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-inter @@ -0,0 +1,7 @@ +#!/bin/sh + +# Make an intermediate CA certificate/private key pair using a locally generated +# root certificate. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --inter $* diff --git a/vpn/coloradio01/easyrsa/build-key b/vpn/coloradio01/easyrsa/build-key new file mode 100644 index 0000000..6c0fed8 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-key @@ -0,0 +1,7 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact $* diff --git a/vpn/coloradio01/easyrsa/build-key-pass b/vpn/coloradio01/easyrsa/build-key-pass new file mode 100644 index 0000000..8ef8307 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-key-pass @@ -0,0 +1,7 @@ +#!/bin/sh + +# Similar to build-key, but protect the private key +# with a password. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --pass $* diff --git a/vpn/coloradio01/easyrsa/build-key-pkcs12 b/vpn/coloradio01/easyrsa/build-key-pkcs12 new file mode 100644 index 0000000..ba90e6a --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-key-pkcs12 @@ -0,0 +1,8 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate and convert it to a PKCS #12 file including the +# the CA certificate as well. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --pkcs12 $* diff --git a/vpn/coloradio01/easyrsa/build-key-server b/vpn/coloradio01/easyrsa/build-key-server new file mode 100644 index 0000000..fee0194 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-key-server @@ -0,0 +1,10 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate. +# +# Explicitly set nsCertType to server using the "server" +# extension in the openssl.cnf file. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --server $* diff --git a/vpn/coloradio01/easyrsa/build-req b/vpn/coloradio01/easyrsa/build-req new file mode 100644 index 0000000..559d512 --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-req @@ -0,0 +1,7 @@ +#!/bin/sh + +# Build a certificate signing request and private key. Use this +# when your root certificate and key is not available locally. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --csr $* diff --git a/vpn/coloradio01/easyrsa/build-req-pass b/vpn/coloradio01/easyrsa/build-req-pass new file mode 100644 index 0000000..b73ee1b --- /dev/null +++ b/vpn/coloradio01/easyrsa/build-req-pass @@ -0,0 +1,7 @@ +#!/bin/sh + +# Like build-req, but protect your private key +# with a password. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --csr --pass $* diff --git a/vpn/coloradio01/easyrsa/clean-all b/vpn/coloradio01/easyrsa/clean-all new file mode 100644 index 0000000..cc6e3b2 --- /dev/null +++ b/vpn/coloradio01/easyrsa/clean-all @@ -0,0 +1,16 @@ +#!/bin/sh + +# Initialize the $KEY_DIR directory. +# Note that this script does a +# rm -rf on $KEY_DIR so be careful! + +if [ "$KEY_DIR" ]; then + rm -rf "$KEY_DIR" + mkdir "$KEY_DIR" && \ + chmod go-rwx "$KEY_DIR" && \ + touch "$KEY_DIR/index.txt" && \ + echo 01 >"$KEY_DIR/serial" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio01/easyrsa/inherit-inter b/vpn/coloradio01/easyrsa/inherit-inter new file mode 100644 index 0000000..aaa5168 --- /dev/null +++ b/vpn/coloradio01/easyrsa/inherit-inter @@ -0,0 +1,39 @@ +#!/bin/sh + +# Build a new PKI which is rooted on an intermediate certificate generated +# by ./build-inter or ./pkitool --inter from a parent PKI. The new PKI should +# have independent vars settings, and must use a different KEY_DIR directory +# from the parent. This tool can be used to generate arbitrary depth +# certificate chains. +# +# To build an intermediate CA, follow the same steps for a regular PKI but +# replace ./build-key or ./pkitool --initca with this script. + +# The EXPORT_CA file will contain the CA certificate chain and should be +# referenced by the OpenVPN "ca" directive in config files. The ca.crt file +# will only contain the local intermediate CA -- it's needed by the easy-rsa +# scripts but not by OpenVPN directly. +EXPORT_CA="export-ca.crt" + +if [ $# -ne 2 ]; then + echo "usage: $0 " + echo "parent-key-dir: the KEY_DIR directory of the parent PKI" + echo "common-name: the common name of the intermediate certificate in the parent PKI" + exit 1; +fi + +if [ "$KEY_DIR" ]; then + cp "$1/$2.crt" "$KEY_DIR/ca.crt" + cp "$1/$2.key" "$KEY_DIR/ca.key" + + if [ -e "$1/$EXPORT_CA" ]; then + PARENT_CA="$1/$EXPORT_CA" + else + PARENT_CA="$1/ca.crt" + fi + cp "$PARENT_CA" "$KEY_DIR/$EXPORT_CA" + cat "$KEY_DIR/ca.crt" >> "$KEY_DIR/$EXPORT_CA" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio01/easyrsa/list-crl b/vpn/coloradio01/easyrsa/list-crl new file mode 100644 index 0000000..d1d8a69 --- /dev/null +++ b/vpn/coloradio01/easyrsa/list-crl @@ -0,0 +1,13 @@ +#!/bin/sh + +# list revoked certificates + +CRL="${1:-crl.pem}" + +if [ "$KEY_DIR" ]; then + cd "$KEY_DIR" && \ + $OPENSSL crl -text -noout -in "$CRL" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio01/easyrsa/openssl-0.9.6.cnf b/vpn/coloradio01/easyrsa/openssl-0.9.6.cnf new file mode 100644 index 0000000..d28341d --- /dev/null +++ b/vpn/coloradio01/easyrsa/openssl-0.9.6.cnf @@ -0,0 +1,265 @@ +# For use with easy-rsa version 2.0 + +# +# OpenSSL example configuration file. +# This is mostly being used for generation of certificate requests. +# + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd + +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # which md to use. +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString. +# utf8only: only UTF8Strings. +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings +# so use this option with caution! +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/vpn/coloradio01/easyrsa/openssl-0.9.8.cnf b/vpn/coloradio01/easyrsa/openssl-0.9.8.cnf new file mode 100644 index 0000000..340b8af --- /dev/null +++ b/vpn/coloradio01/easyrsa/openssl-0.9.8.cnf @@ -0,0 +1,290 @@ +# For use with easy-rsa version 2.0 + +# +# OpenSSL example configuration file. +# This is mostly being used for generation of certificate requests. +# + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd +openssl_conf = openssl_init + +[ openssl_init ] +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids +engines = engine_section + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # which md to use. +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString. +# utf8only: only UTF8Strings. +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings +# so use this option with caution! +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +name = Name +name_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN +name_default = $ENV::KEY_NAME + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + +[ engine_section ] +# +# If you are using PKCS#11 +# Install engine_pkcs11 of opensc (www.opensc.org) +# And uncomment the following +# verify that dynamic_path points to the correct location +# +#pkcs11 = pkcs11_section + +[ pkcs11_section ] +engine_id = pkcs11 +dynamic_path = /usr/lib/engines/engine_pkcs11.so +MODULE_PATH = $ENV::PKCS11_MODULE_PATH +PIN = $ENV::PKCS11_PIN +init = 0 diff --git a/vpn/coloradio01/easyrsa/openssl-1.0.0.cnf b/vpn/coloradio01/easyrsa/openssl-1.0.0.cnf new file mode 100644 index 0000000..fa258a5 --- /dev/null +++ b/vpn/coloradio01/easyrsa/openssl-1.0.0.cnf @@ -0,0 +1,285 @@ +# For use with easy-rsa version 2.0 and OpenSSL 1.0.0* + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd +openssl_conf = openssl_init + +[ openssl_init ] +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids +engines = engine_section + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # use public key default MD +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString (PKIX recommendation after 2004). +# utf8only: only UTF8Strings (PKIX recommendation after 2004). +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +name = Name +name_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN +name_default = $ENV::KEY_NAME + + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + +[ engine_section ] +# +# If you are using PKCS#11 +# Install engine_pkcs11 of opensc (www.opensc.org) +# And uncomment the following +# verify that dynamic_path points to the correct location +# +#pkcs11 = pkcs11_section + +[ pkcs11_section ] +engine_id = pkcs11 +dynamic_path = /usr/lib/engines/engine_pkcs11.so +MODULE_PATH = $ENV::PKCS11_MODULE_PATH +PIN = $ENV::PKCS11_PIN +init = 0 diff --git a/vpn/coloradio01/easyrsa/pkitool b/vpn/coloradio01/easyrsa/pkitool new file mode 100644 index 0000000..49588f5 --- /dev/null +++ b/vpn/coloradio01/easyrsa/pkitool @@ -0,0 +1,379 @@ +#!/bin/sh + +# OpenVPN -- An application to securely tunnel IP networks +# over a single TCP/UDP port, with support for SSL/TLS-based +# session authentication and key exchange, +# packet encryption, packet authentication, and +# packet compression. +# +# Copyright (C) 2002-2010 OpenVPN Technologies, Inc. +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 +# as published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program (see the file COPYING included with this +# distribution); if not, write to the Free Software Foundation, Inc., +# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + +# pkitool is a front-end for the openssl tool. + +# Calling scripts can set the certificate organizational +# unit with the KEY_OU environmental variable. + +# Calling scripts can also set the KEY_NAME environmental +# variable to set the "name" X509 subject field. + +PROGNAME=pkitool +VERSION=2.0 +DEBUG=0 + +die() +{ + local m="$1" + + echo "$m" >&2 + exit 1 +} + +need_vars() +{ + echo ' Please edit the vars script to reflect your configuration,' + echo ' then source it with "source ./vars".' + echo ' Next, to start with a fresh PKI configuration and to delete any' + echo ' previous certificates and keys, run "./clean-all".' + echo " Finally, you can run this tool ($PROGNAME) to build certificates/keys." +} + +usage() +{ + echo "$PROGNAME $VERSION" + echo "Usage: $PROGNAME [options...] [common-name]" + echo "Options:" + echo " --batch : batch mode (default)" + echo " --keysize : Set keysize" + echo " size : size (default=1024)" + echo " --interact : interactive mode" + echo " --server : build server cert" + echo " --initca : build root CA" + echo " --inter : build intermediate CA" + echo " --pass : encrypt private key with password" + echo " --csr : only generate a CSR, do not sign" + echo " --sign : sign an existing CSR" + echo " --pkcs12 : generate a combined PKCS#12 file" + echo " --pkcs11 : generate certificate on PKCS#11 token" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " id : PKCS#11 object id (hex string)" + echo " label : PKCS#11 object label" + echo "Standalone options:" + echo " --pkcs11-slots : list PKCS#11 slots" + echo " lib : PKCS#11 library" + echo " --pkcs11-objects : list PKCS#11 token objects" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " --pkcs11-init : initialize PKCS#11 token DANGEROUS!!!" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " label : PKCS#11 token label" + echo "Notes:" + need_vars + echo " In order to use PKCS#11 interface you must have opensc-0.10.0 or higher." + echo "Generated files and corresponding OpenVPN directives:" + echo '(Files will be placed in the $KEY_DIR directory, defined in ./vars)' + echo " ca.crt -> root certificate (--ca)" + echo " ca.key -> root key, keep secure (not directly used by OpenVPN)" + echo " .crt files -> client/server certificates (--cert)" + echo " .key files -> private keys, keep secure (--key)" + echo " .csr files -> certificate signing request (not directly used by OpenVPN)" + echo " dh1024.pem or dh2048.pem -> Diffie Hellman parameters (--dh)" + echo "Examples:" + echo " $PROGNAME --initca -> Build root certificate" + echo " $PROGNAME --initca --pass -> Build root certificate with password-protected key" + echo " $PROGNAME --server server1 -> Build \"server1\" certificate/key" + echo " $PROGNAME client1 -> Build \"client1\" certificate/key" + echo " $PROGNAME --pass client2 -> Build password-protected \"client2\" certificate/key" + echo " $PROGNAME --pkcs12 client3 -> Build \"client3\" certificate/key in PKCS#12 format" + echo " $PROGNAME --csr client4 -> Build \"client4\" CSR to be signed by another CA" + echo " $PROGNAME --sign client4 -> Sign \"client4\" CSR" + echo " $PROGNAME --inter interca -> Build an intermediate key-signing certificate/key" + echo " Also see ./inherit-inter script." + echo " $PROGNAME --pkcs11 /usr/lib/pkcs11/lib1 0 010203 \"client5 id\" client5" + echo " -> Build \"client5\" certificate/key in PKCS#11 token" + echo "Typical usage for initial PKI setup. Build myserver, client1, and client2 cert/keys." + echo "Protect client2 key with a password. Build DH parms. Generated files in ./keys :" + echo " [edit vars with your site-specific info]" + echo " source ./vars" + echo " ./clean-all" + echo " ./build-dh -> takes a long time, consider backgrounding" + echo " ./$PROGNAME --initca" + echo " ./$PROGNAME --server myserver" + echo " ./$PROGNAME client1" + echo " ./$PROGNAME --pass client2" + echo "Typical usage for adding client cert to existing PKI:" + echo " source ./vars" + echo " ./$PROGNAME client-new" +} + +# Set tool defaults +[ -n "$OPENSSL" ] || export OPENSSL="openssl" +[ -n "$PKCS11TOOL" ] || export PKCS11TOOL="pkcs11-tool" +[ -n "$GREP" ] || export GREP="grep" + +# Set defaults +DO_REQ="1" +REQ_EXT="" +DO_CA="1" +CA_EXT="" +DO_P12="0" +DO_P11="0" +DO_ROOT="0" +NODES_REQ="-nodes" +NODES_P12="" +BATCH="-batch" +CA="ca" +# must be set or errors of openssl.cnf +PKCS11_MODULE_PATH="dummy" +PKCS11_PIN="dummy" + +# Process options +while [ $# -gt 0 ]; do + case "$1" in + --keysize ) KEY_SIZE=$2 + shift;; + --server ) REQ_EXT="$REQ_EXT -extensions server" + CA_EXT="$CA_EXT -extensions server" ;; + --batch ) BATCH="-batch" ;; + --interact ) BATCH="" ;; + --inter ) CA_EXT="$CA_EXT -extensions v3_ca" ;; + --initca ) DO_ROOT="1" ;; + --pass ) NODES_REQ="" ;; + --csr ) DO_CA="0" ;; + --sign ) DO_REQ="0" ;; + --pkcs12 ) DO_P12="1" ;; + --pkcs11 ) DO_P11="1" + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + PKCS11_ID="$4" + PKCS11_LABEL="$5" + shift 4;; + + # standalone + --pkcs11-init) + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + PKCS11_LABEL="$4" + if [ -z "$PKCS11_LABEL" ]; then + die "Please specify library name, slot and label" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --init-token --slot "$PKCS11_SLOT" \ + --label "$PKCS11_LABEL" && + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --init-pin --slot "$PKCS11_SLOT" + exit $?;; + --pkcs11-slots) + PKCS11_MODULE_PATH="$2" + if [ -z "$PKCS11_MODULE_PATH" ]; then + die "Please specify library name" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --list-slots + exit 0;; + --pkcs11-objects) + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + if [ -z "$PKCS11_SLOT" ]; then + die "Please specify library name and slot" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --list-objects --login --slot "$PKCS11_SLOT" + exit 0;; + + --help|--usage) + usage + exit ;; + --version) + echo "$PROGNAME $VERSION" + exit ;; + # errors + --* ) die "$PROGNAME: unknown option: $1" ;; + * ) break ;; + esac + shift +done + +if ! [ -z "$BATCH" ]; then + if $OPENSSL version | grep 0.9.6 > /dev/null; then + die "Batch mode is unsupported in openssl<0.9.7" + fi +fi + +if [ $DO_P12 -eq 1 -a $DO_P11 -eq 1 ]; then + die "PKCS#11 and PKCS#12 cannot be specified together" +fi + +if [ $DO_P11 -eq 1 ]; then + if ! grep "^pkcs11.*=" "$KEY_CONFIG" > /dev/null; then + die "Please edit $KEY_CONFIG and setup PKCS#11 engine" + fi +fi + +# If we are generating pkcs12, only encrypt the final step +if [ $DO_P12 -eq 1 ]; then + NODES_P12="$NODES_REQ" + NODES_REQ="-nodes" +fi + +if [ $DO_P11 -eq 1 ]; then + if [ -z "$PKCS11_LABEL" ]; then + die "PKCS#11 arguments incomplete" + fi +fi + +# If undefined, set default key expiration intervals +if [ -z "$KEY_EXPIRE" ]; then + KEY_EXPIRE=3650 +fi +if [ -z "$CA_EXPIRE" ]; then + CA_EXPIRE=3650 +fi + +# Set organizational unit to empty string if undefined +if [ -z "$KEY_OU" ]; then + KEY_OU="" +fi + +# Set X509 Name string to empty string if undefined +if [ -z "$KEY_NAME" ]; then + KEY_NAME="" +fi + +# Set KEY_CN, FN +if [ $DO_ROOT -eq 1 ]; then + if [ -z "$KEY_CN" ]; then + if [ "$1" ]; then + KEY_CN="$1" + elif [ "$KEY_ORG" ]; then + KEY_CN="$KEY_ORG CA" + fi + fi + if [ $BATCH ] && [ "$KEY_CN" ]; then + echo "Using CA Common Name:" "$KEY_CN" + fi + FN="$KEY_CN" +elif [ $BATCH ] && [ "$KEY_CN" ]; then + echo "Using Common Name:" "$KEY_CN" + FN="$KEY_CN" + if [ "$1" ]; then + FN="$1" + fi +else + if [ $# -ne 1 ]; then + usage + exit 1 + else + KEY_CN="$1" + fi + FN="$KEY_CN" +fi + +export CA_EXPIRE KEY_EXPIRE KEY_OU KEY_NAME KEY_CN PKCS11_MODULE_PATH PKCS11_PIN + +# Show parameters (debugging) +if [ $DEBUG -eq 1 ]; then + echo DO_REQ $DO_REQ + echo REQ_EXT $REQ_EXT + echo DO_CA $DO_CA + echo CA_EXT $CA_EXT + echo NODES_REQ $NODES_REQ + echo NODES_P12 $NODES_P12 + echo DO_P12 $DO_P12 + echo KEY_CN $KEY_CN + echo BATCH $BATCH + echo DO_ROOT $DO_ROOT + echo KEY_EXPIRE $KEY_EXPIRE + echo CA_EXPIRE $CA_EXPIRE + echo KEY_OU $KEY_OU + echo KEY_NAME $KEY_NAME + echo DO_P11 $DO_P11 + echo PKCS11_MODULE_PATH $PKCS11_MODULE_PATH + echo PKCS11_SLOT $PKCS11_SLOT + echo PKCS11_ID $PKCS11_ID + echo PKCS11_LABEL $PKCS11_LABEL +fi + +# Make sure ./vars was sourced beforehand +if [ -d "$KEY_DIR" ] && [ "$KEY_CONFIG" ]; then + cd "$KEY_DIR" + + # Make sure $KEY_CONFIG points to the correct version + # of openssl.cnf + if $GREP -i 'easy-rsa version 2\.[0-9]' "$KEY_CONFIG" >/dev/null; then + : + else + echo "$PROGNAME: KEY_CONFIG (set by the ./vars script) is pointing to the wrong" + echo "version of openssl.cnf: $KEY_CONFIG" + echo "The correct version should have a comment that says: easy-rsa version 2.x"; + exit 1; + fi + + # Build root CA + if [ $DO_ROOT -eq 1 ]; then + $OPENSSL req $BATCH -days $CA_EXPIRE $NODES_REQ -new -newkey rsa:$KEY_SIZE -sha1 \ + -x509 -keyout "$CA.key" -out "$CA.crt" -config "$KEY_CONFIG" && \ + chmod 0600 "$CA.key" + else + # Make sure CA key/cert is available + if [ $DO_CA -eq 1 ] || [ $DO_P12 -eq 1 ]; then + if [ ! -r "$CA.crt" ] || [ ! -r "$CA.key" ]; then + echo "$PROGNAME: Need a readable $CA.crt and $CA.key in $KEY_DIR" + echo "Try $PROGNAME --initca to build a root certificate/key." + exit 1 + fi + fi + + # Generate key for PKCS#11 token + PKCS11_ARGS= + if [ $DO_P11 -eq 1 ]; then + stty -echo + echo -n "User PIN: " + read -r PKCS11_PIN + stty echo + export PKCS11_PIN + + echo "Generating key pair on PKCS#11 token..." + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --keypairgen \ + --login --pin "$PKCS11_PIN" \ + --key-type rsa:1024 \ + --slot "$PKCS11_SLOT" --id "$PKCS11_ID" --label "$PKCS11_LABEL" || exit 1 + PKCS11_ARGS="-engine pkcs11 -keyform engine -key $PKCS11_SLOT:$PKCS11_ID" + fi + + # Build cert/key + ( [ $DO_REQ -eq 0 ] || $OPENSSL req $BATCH -days $KEY_EXPIRE $NODES_REQ -new -newkey rsa:$KEY_SIZE \ + -keyout "$FN.key" -out "$FN.csr" $REQ_EXT -config "$KEY_CONFIG" $PKCS11_ARGS ) && \ + ( [ $DO_CA -eq 0 ] || $OPENSSL ca $BATCH -days $KEY_EXPIRE -out "$FN.crt" \ + -in "$FN.csr" $CA_EXT -md sha1 -config "$KEY_CONFIG" ) && \ + ( [ $DO_P12 -eq 0 ] || $OPENSSL pkcs12 -export -inkey "$FN.key" \ + -in "$FN.crt" -certfile "$CA.crt" -out "$FN.p12" $NODES_P12 ) && \ + ( [ $DO_CA -eq 0 -o $DO_P11 -eq 1 ] || chmod 0600 "$FN.key" ) && \ + ( [ $DO_P12 -eq 0 ] || chmod 0600 "$FN.p12" ) + + # Load certificate into PKCS#11 token + if [ $DO_P11 -eq 1 ]; then + $OPENSSL x509 -in "$FN.crt" -inform PEM -out "$FN.crt.der" -outform DER && \ + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --write-object "$FN.crt.der" --type cert \ + --login --pin "$PKCS11_PIN" \ + --slot "$PKCS11_SLOT" --id "$PKCS11_ID" --label "$PKCS11_LABEL" + [ -e "$FN.crt.der" ]; rm "$FN.crt.der" + fi + + fi + +# Need definitions +else + need_vars +fi diff --git a/vpn/coloradio01/easyrsa/revoke-full b/vpn/coloradio01/easyrsa/revoke-full new file mode 100644 index 0000000..4169c4c --- /dev/null +++ b/vpn/coloradio01/easyrsa/revoke-full @@ -0,0 +1,40 @@ +#!/bin/sh + +# revoke a certificate, regenerate CRL, +# and verify revocation + +CRL="crl.pem" +RT="revoke-test.pem" + +if [ $# -ne 1 ]; then + echo "usage: revoke-full "; + exit 1 +fi + +if [ "$KEY_DIR" ]; then + cd "$KEY_DIR" + rm -f "$RT" + + # set defaults + export KEY_CN="" + export KEY_OU="" + export KEY_NAME="" + + # revoke key and generate a new CRL + $OPENSSL ca -revoke "$1.crt" -config "$KEY_CONFIG" + + # generate a new CRL -- try to be compatible with + # intermediate PKIs + $OPENSSL ca -gencrl -out "$CRL" -config "$KEY_CONFIG" + if [ -e export-ca.crt ]; then + cat export-ca.crt "$CRL" >"$RT" + else + cat ca.crt "$CRL" >"$RT" + fi + + # verify the revocation + $OPENSSL verify -CAfile "$RT" -crl_check "$1.crt" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio01/easyrsa/sign-req b/vpn/coloradio01/easyrsa/sign-req new file mode 100644 index 0000000..6cae7b4 --- /dev/null +++ b/vpn/coloradio01/easyrsa/sign-req @@ -0,0 +1,7 @@ +#!/bin/sh + +# Sign a certificate signing request (a .csr file) +# with a local root certificate and key. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --sign $* diff --git a/vpn/coloradio01/easyrsa/vars b/vpn/coloradio01/easyrsa/vars new file mode 100644 index 0000000..36e9d8d --- /dev/null +++ b/vpn/coloradio01/easyrsa/vars @@ -0,0 +1,75 @@ +# easy-rsa parameter settings + +# NOTE: If you installed from an RPM, +# don't edit this file in place in +# /usr/share/openvpn/easy-rsa -- +# instead, you should copy the whole +# easy-rsa directory to another location +# (such as /etc/openvpn) so that your +# edits will not be wiped out by a future +# OpenVPN package upgrade. + +# This variable should point to +# the top level of the easy-rsa +# tree. +export EASY_RSA="`pwd`" + +# +# This variable should point to +# the requested executables +# +export OPENSSL="openssl" +export PKCS11TOOL="pkcs11-tool" +export GREP="grep" + + +# This variable should point to +# the openssl.cnf file included +# with easy-rsa. +export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA` + +# Edit this variable to point to +# your soon-to-be-created key +# directory. +# +# WARNING: clean-all will do +# a rm -rf on this directory +# so make sure you define +# it correctly! +export KEY_DIR="/home/posdab/vpn/keys" + +# Issue rm -rf warning +echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR + +# PKCS11 fixes +export PKCS11_MODULE_PATH="dummy" +export PKCS11_PIN="dummy" + +# Increase this to 2048 if you +# are paranoid. This will slow +# down TLS negotiation performance +# as well as the one-time DH parms +# generation process. +export KEY_SIZE=1024 + +# In how many days should the root CA key expire? +export CA_EXPIRE=3650 + +# In how many days should certificates expire? +export KEY_EXPIRE=3650 + +# These are the default values for fields +# which will be placed in the certificate. +# Don't leave any of these fields blank. +export KEY_COUNTRY="LU" +export KEY_PROVINCE="Grevenmacher" +export KEY_CITY="Roodt-sur-Syre" +export KEY_ORG="DKS sarl" +export KEY_EMAIL="info@dks.sarl" +#export KEY_EMAIL=mail@host.domain +export KEY_CN="POSDAB" +export KEY_NAME="POSDAB" +export KEY_OU="POSDAB" +#export PKCS11_MODULE_PATH=changeme +#export PKCS11_PIN=123 + diff --git a/vpn/coloradio01/easyrsa/whichopensslcnf b/vpn/coloradio01/easyrsa/whichopensslcnf new file mode 100644 index 0000000..2226a8e --- /dev/null +++ b/vpn/coloradio01/easyrsa/whichopensslcnf @@ -0,0 +1,26 @@ +#!/bin/sh + +cnf="$1/openssl.cnf" + +if [ "$OPENSSL" ]; then + if $OPENSSL version | grep -E "0\.9\.6[[:alnum:]]" > /dev/null; then + cnf="$1/openssl-0.9.6.cnf" + elif $OPENSSL version | grep -E "0\.9\.8[[:alnum:]]" > /dev/null; then + cnf="$1/openssl-0.9.8.cnf" + elif $OPENSSL version | grep -E "1\.0\.([[:digit:]][[:alnum:]])" > /dev/null; then + cnf="$1/openssl-1.0.0.cnf" + else + cnf="$1/openssl.cnf" + fi +fi + +echo $cnf + +if [ ! -r $cnf ]; then + echo "**************************************************************" >&2 + echo " No $cnf file could be found" >&2 + echo " Further invocations will fail" >&2 + echo "**************************************************************" >&2 +fi + +exit 0 diff --git a/vpn/coloradio01/keys/01.pem b/vpn/coloradio01/keys/01.pem new file mode 100644 index 0000000..e14c2ef --- /dev/null +++ b/vpn/coloradio01/keys/01.pem @@ -0,0 +1,76 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 1 (0x1) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 8 08:46:07 2015 GMT + Not After : Feb 5 08:46:07 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ce:97:26:db:3e:30:a6:d3:b6:aa:13:09:6f:10: + e9:66:61:f7:dd:d6:2c:32:fc:6c:07:da:b0:69:d2: + aa:45:38:79:5b:ea:9c:d8:1f:b8:83:f1:e0:cf:57: + 50:3d:cc:34:45:ed:b0:45:d5:75:cb:18:1d:6c:b6: + 40:7e:42:04:f5:d0:a2:5c:9a:80:e8:c7:c5:50:c0: + a4:3e:8a:f2:c2:18:87:75:fc:84:a8:9f:5f:a1:21: + 68:e8:a2:8b:4a:dc:75:2f:b1:48:9d:e8:c3:dd:b5: + a7:71:49:53:99:a1:90:56:7d:ed:c7:e2:b5:5b:7c: + 08:c6:5a:57:10:20:26:7d:23 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Cert Type: + SSL Server + Netscape Comment: + Easy-RSA Generated Server Certificate + X509v3 Subject Key Identifier: + 2F:B9:7E:3C:A0:B2:EE:F5:21:F8:D1:B7:69:04:EC:26:B9:24:E3:C6 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Server Authentication + X509v3 Key Usage: + Digital Signature, Key Encipherment + Signature Algorithm: sha1WithRSAEncryption + 70:53:83:2d:40:c9:50:7d:45:a7:25:50:ac:2c:ef:0a:21:3b: + 76:d1:91:42:9f:6f:d0:6b:9b:b2:20:8e:51:5c:31:2a:7a:95: + 56:fb:fb:cf:3b:10:89:78:e3:42:8d:8e:ca:5a:ea:a0:27:7f: + 19:46:42:a5:12:e8:fc:60:e8:02:66:6a:ab:70:ac:28:a6:95: + b0:30:1f:7c:4a:e9:f0:0d:67:53:8e:3b:e4:8f:ea:50:ed:24: + 03:6c:cf:a3:04:38:fa:38:40:2b:8e:63:b5:cc:11:4f:34:bb: + 89:42:5f:83:17:c5:4f:fb:f1:97:4c:81:72:52:9b:3e:61:8e: + a2:d0 +-----BEGIN CERTIFICATE----- +MIIEQzCCA6ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDgwODQ2MDdaFw0yNTAyMDUwODQ2MDdaMIGoMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZI +hvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB +gQDOlybbPjCm07aqEwlvEOlmYffd1iwy/GwH2rBp0qpFOHlb6pzYH7iD8eDPV1A9 +zDRF7bBF1XXLGB1stkB+QgT10KJcmoDox8VQwKQ+ivLCGId1/ISon1+hIWjoootK +3HUvsUid6MPdtadxSVOZoZBWfe3H4rVbfAjGWlcQICZ9IwIDAQABo4IBeTCCAXUw +CQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVh +c3ktUlNBIEdlbmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFC+5 +fjygsu71IfjRt2kE7Ca5JOPGMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8Lztm +ngnprxN6oYGupIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFj +aGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwx +DzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UE +KRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyd +uFIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgWgMA0GCSqGSIb3DQEB +BQUAA4GBAHBTgy1AyVB9RaclUKws7wohO3bRkUKfb9Brm7IgjlFcMSp6lVb7+887 +EIl440KNjspa6qAnfxlGQqUS6Pxg6AJmaqtwrCimlbAwH3xK6fANZ1OOO+SP6lDt +JANsz6MEOPo4QCuOY7XMEU80u4lCX4MXxU/78ZdMgXJSmz5hjqLQ +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/02.pem b/vpn/coloradio01/keys/02.pem new file mode 100644 index 0000000..bfffa68 --- /dev/null +++ b/vpn/coloradio01/keys/02.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl/name=aral-merl/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a1:fe:c3:c0:57:be:58:a1:a4:93:e2:33:05:1d: + d5:15:9a:69:a8:2b:49:f1:d4:b9:66:2e:f8:03:48: + a7:29:36:99:93:75:a3:ce:35:a3:d5:90:e2:bc:26: + db:a2:38:37:a4:ee:51:0a:56:32:f7:52:a0:e8:61: + 51:cc:77:d2:18:60:21:75:4e:89:61:94:9f:4a:8f: + a2:2f:97:00:eb:0d:9d:b3:3b:bf:22:cd:e9:5d:1f: + 9a:92:37:77:9c:19:0d:89:36:01:1b:0e:e4:84:71: + 9b:fe:66:0e:30:af:c4:9e:67:b8:3a:f2:05:b1:ab: + f7:e6:74:1e:dc:c8:d0:df:8b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2B:E5:FC:40:2C:5F:B3:56:E0:CF:ED:60:8B:3F:74:25:F7:4E:F6:37 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:70:73:77:9e:32:68:3e:aa:92:6d:ee:8b:64:0f:3c:0a:cd: + 85:0c:6f:f4:db:25:f9:d3:69:50:51:51:a7:8c:d9:74:27:92: + cc:bd:ee:47:df:b5:b0:f6:e0:1b:9f:a1:42:5f:94:b5:c0:9b: + ef:0a:47:04:d9:c8:f6:fe:29:bb:85:34:1c:28:c2:72:cc:b5: + 58:da:33:96:55:83:05:0b:98:3b:82:45:81:a5:6b:f0:e4:ac: + 27:fc:12:6a:a5:26:11:19:a6:38:d9:1d:02:11:37:f9:62:0e: + f9:2f:d3:8b:10:a8:79:4d:d7:e8:5d:34:a3:36:0e:38:c3:4a: + b4:70 +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJYXJhbC1tZXJsMRIwEAYDVQQpEwlhcmFsLW1lcmwxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +AKH+w8BXvlihpJPiMwUd1RWaaagrSfHUuWYu+ANIpyk2mZN1o841o9WQ4rwm26I4 +N6TuUQpWMvdSoOhhUcx30hhgIXVOiWGUn0qPoi+XAOsNnbM7vyLN6V0fmpI3d5wZ +DYk2ARsO5IRxm/5mDjCvxJ5nuDryBbGr9+Z0HtzI0N+LAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFCvl/EAsX7NW4M/tYIs/dCX3TvY3MIHdBgNVHSME +gdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1wc3eeMmg+qpJt7otkDzwKzYUM +b/TbJfnTaVBRUaeM2XQnksy97kfftbD24BufoUJflLXAm+8KRwTZyPb+KbuFNBwo +wnLMtVjaM5ZVgwULmDuCRYGla/DkrCf8EmqlJhEZpjjZHQIRN/liDvkv04sQqHlN +1+hdNKM2DjjDSrRw +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/03.pem b/vpn/coloradio01/keys/03.pem new file mode 100644 index 0000000..e27517d --- /dev/null +++ b/vpn/coloradio01/keys/03.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-ettelbruck/name=aral-ettelbruck/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:82:59:8a:c7:67:50:38:f9:3e:68:9f:ea:bd: + 0b:b5:67:77:c7:0e:59:8a:97:5b:d9:ce:24:01:21: + 20:ec:63:89:46:32:13:36:2c:bc:08:83:91:db:dd: + 9a:5b:34:db:ca:8e:72:03:e4:67:51:02:3b:13:7a: + 0d:e2:f5:c1:86:b0:57:a9:54:2a:18:78:d8:0c:72: + 30:db:ec:8b:80:45:fe:c0:6a:30:1e:49:2f:31:0b: + 26:dd:39:68:6e:28:be:f4:26:30:8e:40:3c:4c:b0: + 29:16:7e:cd:42:15:b7:bc:40:4f:5f:4c:5b:fd:2e: + 80:00:a9:66:0f:67:26:bd:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 6E:F0:E9:22:EA:31:F0:42:6A:73:AE:C4:33:01:8D:D8:29:0D:07:59 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0f:2d:e8:6a:7f:36:b1:72:a2:23:ab:66:53:da:0c:f9:b5:e6: + 33:94:35:01:e9:a6:d7:85:13:c2:21:ff:33:bf:ab:c6:e8:4c: + 52:81:e6:b2:eb:e1:bc:3d:1b:a0:8f:3b:ba:19:8b:f9:69:24: + ef:ef:4c:87:79:b5:96:a3:a1:b8:28:d7:1e:33:70:67:bd:6a: + 67:75:ea:b4:8c:e9:a6:20:d7:3d:5d:27:b3:54:e6:7a:65:95: + c6:b6:86:ad:3c:0c:89:c5:49:ab:88:16:b7:ec:a1:aa:9f:cc: + de:19:04:9b:91:4c:01:7a:1a:f0:b4:6f:f1:e8:5c:0b:92:71: + 3d:4f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1ldHRlbGJydWNrMRgwFgYDVQQpEw9hcmFsLWV0dGVsYnJ1 +Y2sxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANeCWYrHZ1A4+T5on+q9C7Vnd8cOWYqXW9nOJAEhIOxjiUYy +EzYsvAiDkdvdmls028qOcgPkZ1ECOxN6DeL1wYawV6lUKhh42AxyMNvsi4BF/sBq +MB5JLzELJt05aG4ovvQmMI5APEywKRZ+zUIVt7xAT19MW/0ugACpZg9nJr0dAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFG7w6SLqMfBCanOuxDMBjdgp +DQdZMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAA8t6Gp/NrFy +oiOrZlPaDPm15jOUNQHppteFE8Ih/zO/q8boTFKB5rLr4bw9G6CPO7oZi/lpJO/v +TId5tZajobgo1x4zcGe9amd16rSM6aYg1z1dJ7NU5npllca2hq08DInFSauIFrfs +oaqfzN4ZBJuRTAF6GvC0b/HoXAuScT1P +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/04.pem b/vpn/coloradio01/keys/04.pem new file mode 100644 index 0000000..88e94ea --- /dev/null +++ b/vpn/coloradio01/keys/04.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-petange/name=aral-petange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b1:2e:95:e7:98:68:02:e7:b5:2a:6f:1d:f1:46: + 38:6d:08:da:d6:44:42:59:83:dc:67:ca:3b:04:15: + c8:7a:a2:cc:ee:d6:ff:e5:88:d2:c6:48:22:4f:10: + 3d:80:06:50:26:70:e1:a2:00:95:a9:49:95:bc:a9: + 75:ee:f7:a8:b9:0b:8c:b4:ea:2a:1f:af:86:1c:28: + d6:0d:50:1a:01:d8:98:bd:6c:4d:54:d5:d7:59:55: + 53:00:8b:68:6b:04:57:1c:6f:b8:43:bf:02:46:ea: + 04:24:07:41:4c:3c:67:a9:b2:b5:6d:50:ef:bf:7e: + 3f:e3:09:ca:50:ff:5d:5e:27 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + A3:1A:2B:9B:07:4D:D4:58:C0:D0:D7:8A:F2:35:4F:3C:00:07:DF:85 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 36:3c:0d:1c:a9:3c:a3:d2:58:d9:c0:97:68:e8:99:ef:27:7b: + 3b:0f:bd:3d:01:5a:88:03:e7:cd:00:48:a4:5d:2f:a0:8e:f3: + a6:88:c4:d0:a2:f3:27:67:41:fa:5b:96:32:5f:6b:83:99:06: + 12:6e:71:9f:3f:c1:de:64:f1:47:ae:e1:64:38:f8:1b:b1:bd: + f0:36:61:32:2e:42:41:22:1a:cb:6c:c0:66:5d:2d:37:10:ef: + 7d:b3:27:ad:3e:3c:e6:1e:b0:be:19:4f:2c:86:00:e2:b6:a7: + fa:3c:a3:50:05:8a:1a:51:1d:a6:e2:b4:6d:7f:16:4c:10:ca: + 91:b6 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1wZXRhbmdlMRUwEwYDVQQpEwxhcmFsLXBldGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALEuleeYaALntSpvHfFGOG0I2tZEQlmD3GfKOwQVyHqizO7W/+WI0sZI +Ik8QPYAGUCZw4aIAlalJlbypde73qLkLjLTqKh+vhhwo1g1QGgHYmL1sTVTV11lV +UwCLaGsEVxxvuEO/AkbqBCQHQUw8Z6mytW1Q779+P+MJylD/XV4nAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFKMaK5sHTdRYwNDXivI1TzwAB9+FMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADY8DRypPKPSWNnAl2jo +me8nezsPvT0BWogD580ASKRdL6CO86aIxNCi8ydnQfpbljJfa4OZBhJucZ8/wd5k +8Ueu4WQ4+BuxvfA2YTIuQkEiGstswGZdLTcQ732zJ60+POYesL4ZTyyGAOK2p/o8 +o1AFihpRHabitG1/FkwQypG2 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/05.pem b/vpn/coloradio01/keys/05.pem new file mode 100644 index 0000000..df8c1fa --- /dev/null +++ b/vpn/coloradio01/keys/05.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-frisange/name=aral-frisange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:98:e5:5e:16:e0:2b:41:c2:e6:5f:ed:f4:dc:2f: + a5:87:99:93:65:78:e5:41:d3:bb:1b:2d:b4:a3:ee: + 91:93:46:27:3a:fe:b3:e2:55:e0:81:7a:df:04:cf: + 5c:bd:9f:77:10:43:0a:26:a8:a9:6e:cd:24:83:10: + 8d:cd:8b:56:3c:ab:ea:df:e2:a1:40:20:70:13:89: + 4b:85:5f:be:3c:9e:7e:1d:8f:cb:01:e6:70:3d:87: + ef:ee:0c:de:75:8f:48:01:5d:08:0a:3e:fa:4c:5d: + 80:4e:fa:85:29:4c:50:e4:fc:07:c0:df:f0:b6:79: + cd:f0:9a:50:83:b1:be:bf:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3D:8E:BE:A3:6A:4B:E7:13:B7:21:40:2C:90:9E:30:9F:56:E8:68:B0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:c9:6d:6f:2c:1b:1b:ee:45:8c:c5:12:98:4f:a2:8f:fe:02: + 3b:0f:63:de:5e:7e:c3:7e:cc:09:f1:a8:52:8b:f0:b4:b0:5a: + 94:47:2f:69:eb:ab:7a:26:55:fa:dc:5b:0c:b2:b3:8f:5a:4e: + f0:6b:7f:c2:ec:ee:58:fd:00:47:a6:19:93:ae:3c:e0:2d:e3: + 65:e5:d6:92:e6:c7:3a:53:24:09:b1:37:c3:3c:18:f6:f1:9c: + 73:13:87:ea:c5:68:cb:5f:e7:cb:d3:fc:82:f4:55:ed:57:c8: + e0:8c:f3:39:e3:0a:ca:d9:be:14:8f:11:1c:76:49:75:d2:0a: + b9:bd +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1mcmlzYW5nZTEWMBQGA1UEKRMNYXJhbC1mcmlzYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAmOVeFuArQcLmX+303C+lh5mTZXjlQdO7Gy20o+6Rk0YnOv6z4lXg +gXrfBM9cvZ93EEMKJqipbs0kgxCNzYtWPKvq3+KhQCBwE4lLhV++PJ5+HY/LAeZw +PYfv7gzedY9IAV0ICj76TF2ATvqFKUxQ5PwHwN/wtnnN8JpQg7G+vxECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUPY6+o2pL5xO3IUAskJ4wn1boaLAw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAa8ltbywbG+5FjMUS +mE+ij/4COw9j3l5+w37MCfGoUovwtLBalEcvaeureiZV+txbDLKzj1pO8Gt/wuzu +WP0AR6YZk6484C3jZeXWkubHOlMkCbE3wzwY9vGccxOH6sVoy1/ny9P8gvRV7VfI +4IzzOeMKytm+FI8RHHZJddIKub0= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/06.pem b/vpn/coloradio01/keys/06.pem new file mode 100644 index 0000000..a97e700 --- /dev/null +++ b/vpn/coloradio01/keys/06.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-mondorf/name=aral-mondorf/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:22:31:a1:d9:ed:af:8c:a9:b6:8c:91:54:92: + 29:27:1b:a2:2d:14:a0:18:b3:cb:8d:1c:86:b9:e4: + 2a:51:40:db:ce:a7:57:a8:54:60:ff:bd:9f:d4:ef: + 29:b2:19:69:fb:55:c8:f9:32:d9:06:7a:35:12:d8: + 93:01:64:e3:e2:44:c6:eb:b0:52:28:4c:b9:98:ff: + 52:04:da:d6:07:cf:8c:6d:33:d1:e8:08:42:5b:1d: + fc:8e:96:52:f4:0c:75:c1:6f:a9:78:7b:27:a3:37: + f5:ad:8d:0d:ce:6d:dd:71:d2:1a:22:78:79:29:bf: + eb:34:d7:5e:83:10:af:d5:89 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 98:6E:59:0E:4E:76:63:BE:50:03:11:08:CD:A1:50:14:FE:9F:7D:A5 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a2:88:98:47:0e:90:84:44:37:43:96:8e:be:f8:43:90:d7:c8: + 29:e0:92:86:14:0f:57:a4:24:bf:69:7c:6b:9a:9c:8a:63:85: + 89:39:78:d9:76:40:a1:3e:4c:2f:ef:3f:1a:df:3c:74:99:5f: + 6d:b0:21:c2:ea:25:44:c2:00:3a:f3:37:fb:a7:93:2a:a7:eb: + fa:ff:30:fb:75:c7:46:bf:82:e1:71:0c:56:e9:d8:e0:31:89: + d6:b5:e9:1a:fa:67:83:26:5d:1a:73:24:4c:4d:da:44:f4:b1: + ac:86:a8:ed:2b:8d:42:4e:3c:2e:53:ca:6d:95:10:07:25:32: + fe:99 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1tb25kb3JmMRUwEwYDVQQpEwxhcmFsLW1vbmRvcmYxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOEiMaHZ7a+MqbaMkVSSKScboi0UoBizy40chrnkKlFA286nV6hUYP+9 +n9TvKbIZaftVyPky2QZ6NRLYkwFk4+JExuuwUihMuZj/UgTa1gfPjG0z0egIQlsd +/I6WUvQMdcFvqXh7J6M39a2NDc5t3XHSGiJ4eSm/6zTXXoMQr9WJAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJhuWQ5OdmO+UAMRCM2hUBT+n32lMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAKKImEcOkIREN0OWjr74 +Q5DXyCngkoYUD1ekJL9pfGuanIpjhYk5eNl2QKE+TC/vPxrfPHSZX22wIcLqJUTC +ADrzN/unkyqn6/r/MPt1x0a/guFxDFbp2OAxida16Rr6Z4MmXRpzJExN2kT0sayG +qO0rjUJOPC5Tym2VEAclMv6Z +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/07.pem b/vpn/coloradio01/keys/07.pem new file mode 100644 index 0000000..1e0c7f4 --- /dev/null +++ b/vpn/coloradio01/keys/07.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-wasserbillig/name=aral-wasserbillig/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d1:b0:06:da:6e:40:ba:50:40:60:87:e6:c1:5c: + ba:07:73:e7:59:de:f6:53:cc:a7:6b:31:cb:85:63: + a5:3f:2c:75:cb:01:94:7f:86:2d:8b:7a:7b:50:6f: + f5:81:5d:da:d0:ac:85:bd:d6:26:18:25:58:5c:c5: + 4e:e6:1c:71:17:43:b1:9a:98:f0:39:f8:16:8f:bf: + 52:35:c9:86:15:a6:5a:5e:71:c0:9c:e0:fd:53:b0: + 5b:3b:8d:e8:5b:a7:7e:18:5c:77:89:19:de:1e:7f: + 78:68:a1:52:bd:15:ea:c5:0d:a8:c5:95:25:97:d3: + 4e:6a:4c:1a:4c:b8:74:c6:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2C:78:BD:63:E1:2D:7B:DF:2E:B8:E3:A2:C0:BA:FB:FF:F7:FC:95:E3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:c4:56:24:24:e4:72:33:3e:0d:68:f2:37:36:a0:26:13:e2: + c6:d3:3e:9d:43:5b:dc:d2:96:c1:5d:b5:0a:f1:dd:14:13:a7: + 37:d3:33:48:84:c7:aa:d6:12:2a:a8:0c:26:b1:d6:bf:5e:df: + 5d:a6:bd:ed:b0:75:43:14:6a:62:da:e8:b1:c8:53:bc:9a:23: + a6:e4:5f:ba:7e:42:56:d4:01:9c:40:8b:e1:2c:12:50:52:1a: + f4:c1:1c:1f:bb:ce:97:ae:ef:ea:50:d8:e6:81:dd:d7:b5:e3: + 5c:3f:29:d8:5b:77:99:da:8f:70:51:f0:c0:03:43:1a:9a:00: + 65:73 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC13YXNzZXJiaWxsaWcxGjAYBgNVBCkTEWFyYWwtd2Fzc2Vy +YmlsbGlnMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDRsAbabkC6UEBgh+bBXLoHc+dZ3vZTzKdrMcuFY6U/ +LHXLAZR/hi2LentQb/WBXdrQrIW91iYYJVhcxU7mHHEXQ7GamPA5+BaPv1I1yYYV +plpeccCc4P1TsFs7jehbp34YXHeJGd4ef3hooVK9FerFDajFlSWX005qTBpMuHTG +gQIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQseL1j4S173y6446LA +uvv/9/yV4zCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUxFYk +JORyMz4NaPI3NqAmE+LG0z6dQ1vc0pbBXbUK8d0UE6c30zNIhMeq1hIqqAwmsda/ +Xt9dpr3tsHVDFGpi2uixyFO8miOm5F+6fkJW1AGcQIvhLBJQUhr0wRwfu86Xru/q +UNjmgd3XteNcPynYW3eZ2o9wUfDAA0MamgBlcw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/08.pem b/vpn/coloradio01/keys/08.pem new file mode 100644 index 0000000..351a5f7 --- /dev/null +++ b/vpn/coloradio01/keys/08.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rollingergrund/name=aral-rollingergrund/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e0:6d:c3:a0:c1:d2:0a:85:9d:e4:47:da:15:f5: + 97:ff:73:89:5d:fb:71:0e:6c:4d:f2:36:8d:9f:28: + c6:a1:48:50:d5:a7:bb:9d:0d:e9:62:56:8d:24:83: + 57:e3:47:ee:78:39:04:9f:69:4a:42:2e:39:93:bd: + e2:df:d8:39:97:6d:48:f3:a7:45:76:09:af:29:15: + 03:d2:1f:67:91:69:c3:96:90:18:ba:cb:e3:ee:3f: + 37:55:e2:9b:13:6e:b6:07:f1:29:c1:a0:4e:a4:29: + 81:f1:86:7f:e1:e1:ca:ba:1e:f8:d6:79:81:e0:fd: + 4c:08:9d:d2:12:8d:0c:27:c3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 88:34:58:CD:28:24:8C:CF:A4:FB:35:1B:57:03:74:E1:91:08:F0:41 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 8b:93:52:40:85:3c:8e:49:6c:3d:2b:e2:d4:75:e3:45:c5:55: + 3b:86:a3:ca:84:3e:2d:c5:91:92:7b:d8:c3:f7:df:39:5c:b7: + 4d:34:c6:80:6f:1e:11:42:ae:ec:6c:15:0d:14:2d:15:e7:c4: + 02:b2:1b:67:28:08:32:69:82:7e:73:b5:1e:1c:b7:a4:98:a8: + 38:0c:bc:ca:a0:7a:bc:c9:c0:69:6d:bf:08:3a:8b:c6:ee:3a: + 71:84:20:82:61:bf:72:82:9d:8d:be:22:08:da:cf:69:21:5d: + f7:48:7b:59:c5:c1:99:d2:23:7a:e6:b4:9f:4d:c1:c2:57:7d: + 45:87 +-----BEGIN CERTIFICATE----- +MIIEPDCCA6WgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG7MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEc +MBoGA1UEAxMTYXJhbC1yb2xsaW5nZXJncnVuZDEcMBoGA1UEKRMTYXJhbC1yb2xs +aW5nZXJncnVuZDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkq +hkiG9w0BAQEFAAOBjQAwgYkCgYEA4G3DoMHSCoWd5EfaFfWX/3OJXftxDmxN8jaN +nyjGoUhQ1ae7nQ3pYlaNJINX40fueDkEn2lKQi45k73i39g5l21I86dFdgmvKRUD +0h9nkWnDlpAYusvj7j83VeKbE262B/EpwaBOpCmB8YZ/4eHKuh741nmB4P1MCJ3S +Eo0MJ8MCAwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVh +c3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUiDRYzSgkjM+k ++zUbVwN04ZEI8EEwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qh +ga6kgaswgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAV +BgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UE +CxMGUE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NE +QUIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNV +HSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEA +i5NSQIU8jklsPSvi1HXjRcVVO4ajyoQ+LcWRknvYw/ffOVy3TTTGgG8eEUKu7GwV +DRQtFefEArIbZygIMmmCfnO1Hhy3pJioOAy8yqB6vMnAaW2/CDqLxu46cYQggmG/ +coKdjb4iCNrPaSFd90h7WcXBmdIjeua0n03Bwld9RYc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/09.pem b/vpn/coloradio01/keys/09.pem new file mode 100644 index 0000000..71bf031 --- /dev/null +++ b/vpn/coloradio01/keys/09.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bettembourg/name=aral-bettembourg/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:7f:9d:a2:76:0c:81:71:36:1b:6a:e6:2d:a2: + 5d:96:f6:9b:46:72:55:92:e0:a0:6c:1e:dd:8c:f0: + ec:04:41:5b:79:5d:22:48:a9:18:04:13:52:51:b0: + ba:13:43:66:03:af:16:b1:50:8a:5d:cc:4a:6f:ff: + 93:ef:8b:15:f5:fd:a2:df:c4:b1:1c:12:be:07:6a: + f5:5a:30:ca:47:6f:c9:18:54:0e:a5:bf:f7:a9:ed: + 44:3f:e5:ce:e9:99:4e:35:a9:6d:ad:c4:ff:39:89: + 94:de:cf:54:81:9b:da:25:5e:72:1b:c0:1f:6e:6a: + a5:f6:b2:92:8b:3a:57:cd:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 84:AA:59:BE:86:AB:33:A6:59:6F:16:14:C3:1D:91:D3:57:73:44:7F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2e:9a:e2:71:c1:52:c1:72:0f:ce:96:a7:8d:e8:f0:ac:30:b2: + c1:80:22:82:e6:d9:11:ba:d0:2c:bc:81:41:07:3f:8c:f7:00: + 5a:a4:b2:90:b1:e9:75:ee:fc:2e:c9:c5:f9:ce:37:ae:6c:ad: + e2:d7:a1:65:e6:bd:ae:dc:b9:24:be:2e:b8:95:64:c9:1b:8a: + a0:9f:7f:98:cf:70:05:e0:ed:0a:b8:28:26:6e:0c:4b:9e:11: + 3c:e6:9c:5c:b2:7e:c1:ba:ab:e3:d2:ac:b0:8b:ef:e8:20:5f: + 3b:06:7c:60:e4:d9:8f:52:3e:98:88:58:e6:79:60:30:66:db: + 55:ce +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1iZXR0ZW1ib3VyZzEZMBcGA1UEKRMQYXJhbC1iZXR0ZW1i +b3VyZzEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAyn+donYMgXE2G2rmLaJdlvabRnJVkuCgbB7djPDsBEFb +eV0iSKkYBBNSUbC6E0NmA68WsVCKXcxKb/+T74sV9f2i38SxHBK+B2r1WjDKR2/J +GFQOpb/3qe1EP+XO6ZlONaltrcT/OYmU3s9UgZvaJV5yG8Afbmql9rKSizpXzXsC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUhKpZvoarM6ZZbxYUwx2R +01dzRH8wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEALpriccFS +wXIPzpanjejwrDCywYAigubZEbrQLLyBQQc/jPcAWqSykLHpde78LsnF+c43rmyt +4tehZea9rty5JL4uuJVkyRuKoJ9/mM9wBeDtCrgoJm4MS54RPOacXLJ+wbqr49Ks +sIvv6CBfOwZ8YOTZj1I+mIhY5nlgMGbbVc4= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0A.pem b/vpn/coloradio01/keys/0A.pem new file mode 100644 index 0000000..3b88abe --- /dev/null +++ b/vpn/coloradio01/keys/0A.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-pommerloch/name=aral-pommerloch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:03:f3:76:ec:71:29:61:88:3f:37:c3:9f:76: + 55:51:52:5d:26:39:64:4b:d3:d7:69:7a:1e:bf:c3: + d1:07:c6:1c:c1:da:b2:9b:cb:5c:6c:3c:a6:ea:bc: + ce:b2:c9:6f:55:88:e5:8d:00:d4:d7:ec:01:70:b1: + d4:fc:08:cd:9b:ed:73:1e:b0:a2:c2:fd:33:95:aa: + 35:c9:56:3d:3f:df:31:be:ac:70:09:9d:ed:51:57: + d9:79:0a:46:b7:cd:5f:22:64:01:89:11:fb:ba:e4: + 80:f3:a4:32:e8:7c:c5:d9:1a:97:6f:ad:68:f2:ec: + 4d:d8:22:e6:5f:7e:c5:8c:dd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 82:40:9E:14:D0:AD:F7:75:2A:89:48:D3:10:7D:12:5D:33:71:04:D3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:4e:b2:21:65:8b:7b:44:e8:b4:81:1f:02:4b:53:ff:ee:12: + 36:b4:38:ae:6b:d8:ab:1f:d5:b7:03:3c:c9:6e:80:43:1a:d9: + 26:c0:f6:26:df:66:a2:cb:21:6f:2f:d6:3e:19:41:20:30:e5: + 44:46:a7:27:73:22:f5:00:ce:1f:76:cd:c3:91:7f:e2:e0:88: + 6d:c0:9e:81:87:53:7d:fb:0f:5d:9a:94:34:c6:f4:16:c7:8d: + 62:15:e2:dd:0d:74:e2:66:4a:b9:e5:e6:e8:a9:9e:d6:4f:d8: + da:12:82:dd:63:a0:74:14:89:04:b2:97:b3:56:ce:fa:72:44: + a1:df +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1wb21tZXJsb2NoMRgwFgYDVQQpEw9hcmFsLXBvbW1lcmxv +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMMD83bscSlhiD83w592VVFSXSY5ZEvT12l6Hr/D0QfGHMHa +spvLXGw8puq8zrLJb1WI5Y0A1NfsAXCx1PwIzZvtcx6wosL9M5WqNclWPT/fMb6s +cAmd7VFX2XkKRrfNXyJkAYkR+7rkgPOkMuh8xdkal2+taPLsTdgi5l9+xYzdAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFIJAnhTQrfd1KolI0xB9El0z +cQTTMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADJOsiFli3tE +6LSBHwJLU//uEja0OK5r2Ksf1bcDPMlugEMa2SbA9ibfZqLLIW8v1j4ZQSAw5URG +pydzIvUAzh92zcORf+LgiG3AnoGHU337D12alDTG9BbHjWIV4t0NdOJmSrnl5uip +ntZP2NoSgt1joHQUiQSyl7NWzvpyRKHf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0B.pem b/vpn/coloradio01/keys/0B.pem new file mode 100644 index 0000000..6d8f2bc --- /dev/null +++ b/vpn/coloradio01/keys/0B.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-howald/name=aral-howald/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:92:60:d7:83:b3:15:79:c7:c2:f1:e9:91:d6: + fa:3a:2c:04:c1:ea:14:d6:ec:d5:44:81:99:08:8f: + 42:05:d8:0b:10:98:8b:f7:61:ad:43:de:c0:87:3d: + db:f7:a3:99:4a:2b:d3:3e:42:cb:6d:65:5b:f3:2e: + d8:d8:d8:3d:81:7a:6a:b2:0f:3c:e7:cf:88:7d:5f: + 40:80:4e:fd:ea:57:b6:33:e6:b2:e9:56:6d:4e:36: + 6e:c9:f0:93:ef:53:32:22:c7:a6:03:c3:8d:3b:f9: + 66:4b:36:78:ca:1b:3d:79:4f:a7:44:62:a9:73:02: + 2e:b1:b4:dd:61:09:0c:cf:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B6:E4:6E:21:5F:F2:4D:7F:5C:B4:C2:9E:C1:E3:11:0C:51:AE:70:C4 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 88:8f:2b:e5:19:08:b9:ac:05:66:b2:e8:66:62:cb:8d:3c:bf: + 77:39:d8:0d:85:ba:b3:4b:4a:b4:4f:d7:ab:f6:59:52:f3:ba: + 34:6a:b5:a3:8c:68:f2:18:93:88:17:bd:5c:b5:e6:0d:6d:84: + 89:7c:2e:14:49:d9:fd:05:ee:1f:99:61:b8:0a:d4:ca:b0:5e: + 0d:ec:39:9b:da:86:10:f1:2f:78:fa:3f:8d:09:76:57:2a:ba: + 41:e7:38:d6:fe:fd:f9:f1:d3:a5:00:73:10:60:3b:95:4e:f1: + 33:db:8d:25:db:4e:f0:71:27:ca:b1:dd:b0:3b:a3:95:4c:49: + 19:74 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1ob3dhbGQxFDASBgNVBCkTC2FyYWwtaG93YWxkMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDNkmDXg7MVecfC8emR1vo6LATB6hTW7NVEgZkIj0IF2AsQmIv3Ya1D3sCH +Pdv3o5lKK9M+QsttZVvzLtjY2D2BemqyDzznz4h9X0CATv3qV7Yz5rLpVm1ONm7J +8JPvUzIix6YDw407+WZLNnjKGz15T6dEYqlzAi6xtN1hCQzPrQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS25G4hX/JNf1y0wp7B4xEMUa5wxDCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCIjyvlGQi5rAVmsuhmYsuN +PL93OdgNhbqzS0q0T9er9llS87o0arWjjGjyGJOIF71cteYNbYSJfC4USdn9Be4f +mWG4CtTKsF4N7Dmb2oYQ8S94+j+NCXZXKrpB5zjW/v358dOlAHMQYDuVTvEz240l +207wcSfKsd2wO6OVTEkZdA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0C.pem b/vpn/coloradio01/keys/0C.pem new file mode 100644 index 0000000..2bb3e89 --- /dev/null +++ b/vpn/coloradio01/keys/0C.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-steinfort/name=aral-steinfort/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c5:8f:85:f5:21:40:3f:9e:44:86:62:3b:4c:63: + f6:0d:81:3e:48:ef:a6:1e:cc:f2:c0:74:32:ef:e0: + b9:2b:e0:67:cf:5d:75:a6:07:cb:c7:c0:3f:41:76: + 7c:91:87:af:21:5c:4e:b6:81:d1:4f:a0:81:f9:e3: + 28:05:f9:0f:6f:51:8e:b1:7e:38:f2:93:96:50:ba: + 1e:ca:68:0b:68:b1:44:af:a2:e4:c9:08:e4:6d:2e: + 68:a7:2d:61:12:63:72:9e:d3:36:51:09:95:81:0c: + 4a:88:d5:9a:28:c7:a8:73:c9:9e:cb:35:79:69:9c: + 40:b0:cc:10:87:41:a9:ed:a3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 63:79:E2:C9:FC:2C:C0:FA:7D:F0:BF:95:68:6C:EB:A4:1F:37:CE:9D + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:13:fc:10:f9:8a:86:7c:86:82:97:aa:55:a0:4a:2e:f9:bf: + d2:f2:49:ff:99:2d:5f:9b:0f:cd:59:50:1f:81:5c:ff:ae:04: + b2:12:6b:5a:1a:12:43:63:2c:1f:d2:e3:f1:05:3f:5a:d0:9c: + 1d:d0:9c:f4:02:d5:9e:47:9e:5f:42:e9:9c:f1:d5:52:b3:41: + 67:92:22:b9:d3:5b:51:d6:c8:f1:e0:c6:d0:3b:ad:42:84:cc: + df:11:e5:67:c0:d8:8a:92:1a:67:fa:7a:dd:ca:28:89:27:da: + a2:12:06:df:ac:c3:7a:67:78:53:4e:3a:9a:75:82:62:dc:8a: + f9:ad +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1zdGVpbmZvcnQxFzAVBgNVBCkTDmFyYWwtc3RlaW5mb3J0 +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDFj4X1IUA/nkSGYjtMY/YNgT5I76YezPLAdDLv4Lkr4GfPXXWm +B8vHwD9BdnyRh68hXE62gdFPoIH54ygF+Q9vUY6xfjjyk5ZQuh7KaAtosUSvouTJ +CORtLminLWESY3Ke0zZRCZWBDEqI1Zoox6hzyZ7LNXlpnECwzBCHQantowIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRjeeLJ/CzA+n3wv5VobOukHzfO +nTCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUE/wQ+YqGfIaC +l6pVoEou+b/S8kn/mS1fmw/NWVAfgVz/rgSyEmtaGhJDYywf0uPxBT9a0Jwd0Jz0 +AtWeR55fQumc8dVSs0FnkiK501tR1sjx4MbQO61ChMzfEeVnwNiKkhpn+nrdyiiJ +J9qiEgbfrMN6Z3hTTjqadYJi3Ir5rQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0D.pem b/vpn/coloradio01/keys/0D.pem new file mode 100644 index 0000000..b20743b --- /dev/null +++ b/vpn/coloradio01/keys/0D.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-differdange/name=aral-differdange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bf:54:75:29:dd:6d:02:02:03:2e:b7:10:57:18: + 58:b3:5b:b7:48:20:a0:d9:19:62:b7:6e:9d:d6:20: + 6d:23:8d:7b:dd:44:d7:38:5b:8a:c3:92:3c:bb:da: + a7:e3:c0:e2:c6:ec:25:7f:b2:f1:04:82:ac:6d:79: + f2:71:bd:48:38:dd:89:2b:c7:d6:c8:7e:54:57:52: + 87:f5:ba:e2:c0:1d:5a:c6:da:34:bd:10:a6:56:da: + 52:58:dc:b2:05:ba:88:7b:94:9e:a5:3c:34:e2:6e: + c6:25:8e:1e:12:cf:61:50:72:f1:5d:ef:58:b2:44: + 9b:d7:e7:5d:f3:fc:69:2a:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:38:B5:8D:15:5A:63:E8:A3:F2:ED:EB:16:D9:85:CA:ED:12:1D:4E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0b:76:ae:5a:b8:a0:27:77:2f:50:6b:27:76:dd:54:52:42:c4: + 64:e5:4c:36:05:df:da:55:0f:aa:1a:e3:f5:4a:58:82:61:5f: + 78:c5:da:c7:9f:1b:e1:74:96:f2:3b:6f:e5:f5:85:c1:39:41: + c8:f3:30:9b:92:8c:fd:3b:82:a1:f9:ac:96:b9:16:73:8f:82: + 10:89:80:e1:07:fc:fb:56:ad:70:79:62:8f:2e:10:09:da:d3: + 80:b4:6c:90:92:35:97:17:4e:81:3f:5a:30:6d:d1:5b:c2:3d: + 57:cd:48:7f:9a:3d:0b:67:62:f8:fa:ff:b7:69:17:1f:0d:2e: + 74:1a +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1kaWZmZXJkYW5nZTEZMBcGA1UEKRMQYXJhbC1kaWZmZXJk +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAv1R1Kd1tAgIDLrcQVxhYs1u3SCCg2Rlit26d1iBtI417 +3UTXOFuKw5I8u9qn48Dixuwlf7LxBIKsbXnycb1ION2JK8fWyH5UV1KH9briwB1a +xto0vRCmVtpSWNyyBbqIe5SepTw04m7GJY4eEs9hUHLxXe9YskSb1+dd8/xpKt8C +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIji1jRVaY+ij8u3rFtmF +yu0SHU4wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAC3auWrig +J3cvUGsndt1UUkLEZOVMNgXf2lUPqhrj9UpYgmFfeMXax58b4XSW8jtv5fWFwTlB +yPMwm5KM/TuCofmslrkWc4+CEImA4Qf8+1atcHlijy4QCdrTgLRskJI1lxdOgT9a +MG3RW8I9V81If5o9C2di+Pr/t2kXHw0udBo= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0E.pem b/vpn/coloradio01/keys/0E.pem new file mode 100644 index 0000000..929c50c --- /dev/null +++ b/vpn/coloradio01/keys/0E.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-gonderange/name=aral-gonderange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:92:21:29:80:d2:b4:b4:7f:52:86:17:2f:04: + a1:c0:37:dc:5c:f3:2c:53:69:78:53:fc:b8:71:34: + 7b:8c:4f:d0:0a:12:89:0e:ce:e5:a3:c0:42:a9:d4: + 72:88:d1:ac:49:4f:e4:b7:41:43:1a:08:d1:df:f3: + cc:93:7f:7c:e4:54:ba:b3:9b:79:3a:44:e1:fa:8a: + 9e:b3:b1:40:7e:60:3e:e4:63:84:97:e4:27:37:d2: + d6:a1:dc:a5:83:6c:93:9f:b2:18:41:71:74:65:34: + b9:4c:02:87:62:a8:e1:02:74:e6:ea:50:1e:9d:a2: + 56:6f:e8:57:0f:b7:d4:11:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:93:AB:3C:FF:E1:2B:99:BE:9E:9F:30:B6:9B:51:D2:59:55:58:35 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3d:c7:56:d0:40:92:16:d6:1d:99:14:bb:98:b8:6a:8c:20:cf: + ab:77:4e:23:93:71:ce:0e:50:fb:73:61:cc:a9:cd:65:42:2a: + ba:ac:f6:d9:b9:f1:f9:c7:cb:ab:bb:c0:a3:ba:44:be:0c:5c: + 18:af:1e:30:93:fe:10:79:9e:32:05:61:12:05:34:48:9b:95: + 8f:a2:d6:b8:61:f6:5d:99:ff:af:c6:76:75:6f:1c:30:62:48: + 5c:04:76:de:39:dc:0e:3b:65:92:3d:15:96:ce:5d:96:6e:cb: + e6:2d:dc:f5:6f:90:d7:f0:bc:11:4b:8c:9f:48:12:4b:0a:4f: + 66:8d +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1nb25kZXJhbmdlMRgwFgYDVQQpEw9hcmFsLWdvbmRlcmFu +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMmSISmA0rS0f1KGFy8EocA33FzzLFNpeFP8uHE0e4xP0AoS +iQ7O5aPAQqnUcojRrElP5LdBQxoI0d/zzJN/fORUurObeTpE4fqKnrOxQH5gPuRj +hJfkJzfS1qHcpYNsk5+yGEFxdGU0uUwCh2Ko4QJ05upQHp2iVm/oVw+31BGtAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFN6Tqzz/4SuZvp6fMLabUdJZ +VVg1MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAD3HVtBAkhbW +HZkUu5i4aowgz6t3TiOTcc4OUPtzYcypzWVCKrqs9tm58fnHy6u7wKO6RL4MXBiv +HjCT/hB5njIFYRIFNEiblY+i1rhh9l2Z/6/GdnVvHDBiSFwEdt453A47ZZI9FZbO +XZZuy+Yt3PVvkNfwvBFLjJ9IEksKT2aN +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/0F.pem b/vpn/coloradio01/keys/0F.pem new file mode 100644 index 0000000..7353a30 --- /dev/null +++ b/vpn/coloradio01/keys/0F.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-foetz/name=aral-foetz/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:dd:c5:b3:57:48:1c:d1:71:ba:7c:97:e0:15:24: + 4f:7b:47:ee:21:ae:8f:7f:5e:dc:d1:85:83:e8:a0: + b1:49:f7:b6:59:8e:7c:6b:4b:da:6b:e4:24:16:59: + 5d:a6:9e:56:58:82:4b:ac:9e:81:b5:40:ac:06:c4: + 35:ff:79:e6:54:8e:07:19:99:e7:79:e5:18:6c:95: + 37:fb:2b:15:45:17:96:b1:20:c7:fa:9a:42:27:fa: + 8c:9a:e0:7e:3c:ca:9f:e5:f4:34:d3:14:3b:66:65: + 60:54:ef:23:55:d2:a9:67:d3:36:f3:39:77:b6:1c: + 7f:cd:6f:e6:9e:ee:72:04:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + F8:68:77:94:C0:C6:E0:4C:A2:26:D2:50:A8:F3:15:9C:CF:2B:DF:5C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3e:ee:41:10:65:da:af:2e:72:f7:d9:81:a6:78:b8:0b:64:56: + bc:db:92:b3:83:16:0e:af:5d:36:c6:c1:f9:32:a4:97:7e:49: + 3d:e9:8b:2a:fe:b7:e1:0f:1a:59:da:15:9b:93:25:25:f7:1d: + be:7b:e1:cc:d9:ac:ff:67:89:68:79:36:ec:77:36:73:35:e1: + 7d:fb:c6:f2:b4:9b:68:c4:6c:06:d1:16:89:bb:eb:2e:b0:d3: + c6:df:a8:6b:77:34:89:22:00:ad:c8:3d:58:ba:95:c7:ae:0d: + 61:86:8d:35:b9:1d:35:b0:4b:a3:f5:4b:d4:ab:45:8d:1a:f9: + 2b:75 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1mb2V0ejETMBEGA1UEKRMKYXJhbC1mb2V0ejEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA3cWzV0gc0XG6fJfgFSRPe0fuIa6Pf17c0YWD6KCxSfe2WY58a0vaa+QkFlld +pp5WWIJLrJ6BtUCsBsQ1/3nmVI4HGZnneeUYbJU3+ysVRReWsSDH+ppCJ/qMmuB+ +PMqf5fQ00xQ7ZmVgVO8jVdKpZ9M28zl3thx/zW/mnu5yBM0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+Gh3lMDG4EyiJtJQqPMVnM8r31wwgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAPu5BEGXary5y99mBpni4C2RW +vNuSs4MWDq9dNsbB+TKkl35JPemLKv634Q8aWdoVm5MlJfcdvnvhzNms/2eJaHk2 +7Hc2czXhffvG8rSbaMRsBtEWibvrLrDTxt+oa3c0iSIArcg9WLqVx64NYYaNNbkd +NbBLo/VL1KtFjRr5K3U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/10.pem b/vpn/coloradio01/keys/10.pem new file mode 100644 index 0000000..16b8c6b --- /dev/null +++ b/vpn/coloradio01/keys/10.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-diekirch/name=aral-diekirch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b9:5c:dd:9f:37:c6:22:8c:8e:a8:ee:4f:9d:5c: + da:24:34:78:44:cc:ba:b9:16:78:7b:24:e8:8c:71: + 1d:b1:da:9a:33:43:02:26:29:46:52:f2:44:e8:d7: + 1a:45:86:09:82:51:c1:04:e6:39:62:24:1b:7e:7e: + 4a:ae:60:0b:1a:1b:a1:5e:e8:27:20:3d:da:a7:37: + 76:82:2d:32:d3:d8:45:81:f8:1e:8c:43:a2:bf:cc: + 46:25:30:a1:c9:ef:fd:66:89:f3:6b:57:f3:29:bf: + 76:20:5d:a3:39:ce:fb:c0:03:60:8a:86:c3:9b:90: + 43:f8:d5:d0:05:71:a2:df:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 94:1A:2B:48:44:38:11:DA:89:21:71:26:B2:62:83:99:94:2A:5A:F7 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 20:f7:79:91:9e:6b:e8:04:8c:7c:9e:4b:65:ff:c0:01:42:8c: + 21:df:7a:9e:0c:36:26:7e:42:f9:09:e8:dd:28:f6:8b:5c:ed: + e7:e3:6d:09:71:cd:23:90:7d:8b:f4:ee:48:8b:ad:fb:93:3f: + 8d:39:75:be:74:e3:20:e3:f0:51:d0:86:37:a3:df:14:57:bf: + 42:ef:c4:75:b4:0b:b3:4c:e0:c3:77:b1:21:d4:70:63:b9:23: + 0e:b2:5a:54:34:bb:0f:9a:18:11:13:65:04:dc:5a:ee:57:0d: + f9:69:56:2d:44:37:35:75:c8:db:5d:a1:d0:94:28:54:8f:a3: + 5f:d5 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1kaWVraXJjaDEWMBQGA1UEKRMNYXJhbC1kaWVraXJjaDEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAuVzdnzfGIoyOqO5PnVzaJDR4RMy6uRZ4eyTojHEdsdqaM0MCJilG +UvJE6NcaRYYJglHBBOY5YiQbfn5KrmALGhuhXugnID3apzd2gi0y09hFgfgejEOi +v8xGJTChye/9Zonza1fzKb92IF2jOc77wANgiobDm5BD+NXQBXGi33sCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlBorSEQ4EdqJIXEmsmKDmZQqWvcw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAIPd5kZ5r6ASMfJ5L +Zf/AAUKMId96ngw2Jn5C+Qno3Sj2i1zt5+NtCXHNI5B9i/TuSIut+5M/jTl1vnTj +IOPwUdCGN6PfFFe/Qu/EdbQLs0zgw3exIdRwY7kjDrJaVDS7D5oYERNlBNxa7lcN ++WlWLUQ3NXXI212h0JQoVI+jX9U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/11.pem b/vpn/coloradio01/keys/11.pem new file mode 100644 index 0000000..5c9a126 --- /dev/null +++ b/vpn/coloradio01/keys/11.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-vianden/name=aral-vianden/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:17:91:21:fe:4c:df:0d:3f:49:2c:85:0a:68: + 29:a6:2f:33:42:f0:4d:19:d6:8d:8d:32:19:b1:95: + 16:8a:d2:a5:b0:c2:fc:8e:99:98:fb:b1:6f:c5:d9: + 12:59:e5:65:24:84:9f:a9:85:dc:83:ce:32:53:3e: + e7:44:cf:bd:14:33:fe:5b:c2:ae:dc:75:25:23:05: + e5:9e:92:b8:3c:d2:20:61:b6:39:14:70:31:a5:c2: + 28:c7:22:73:ad:5e:78:92:06:f3:f5:e5:34:f4:b4: + f3:d1:91:c1:69:73:a8:b8:45:dc:86:dc:85:99:6a: + ad:d4:41:cf:d6:1e:32:ec:23 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 38:CC:0C:22:42:94:00:8C:21:2B:73:D9:63:B7:7A:73:E7:14:F5:6B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2d:aa:8f:84:93:53:6c:aa:fa:6c:bc:23:d8:ae:e1:bd:7a:59: + c3:47:b7:08:19:bf:1e:df:f1:a3:7c:bd:19:65:d2:b0:e7:00: + 25:0e:d6:60:63:4c:5d:de:73:8e:f0:37:40:0b:5c:f7:ea:b2: + 2e:bf:7e:eb:67:85:21:b6:8b:f5:47:84:ac:05:df:ad:ec:19: + 3f:42:d0:b8:1e:e5:02:a2:de:bf:48:9d:1b:65:a2:a1:d4:7e: + 2d:50:61:ff:a3:7e:9a:af:78:a1:c8:23:03:fc:18:38:c3:6a: + da:c0:3a:d6:1d:7d:e6:9e:1d:07:67:ce:f1:c0:62:ea:5a:71: + cf:6b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC12aWFuZGVuMRUwEwYDVQQpEwxhcmFsLXZpYW5kZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBANoXkSH+TN8NP0kshQpoKaYvM0LwTRnWjY0yGbGVForSpbDC/I6ZmPux +b8XZElnlZSSEn6mF3IPOMlM+50TPvRQz/lvCrtx1JSMF5Z6SuDzSIGG2ORRwMaXC +KMcic61eeJIG8/XlNPS089GRwWlzqLhF3IbchZlqrdRBz9YeMuwjAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDjMDCJClACMIStz2WO3enPnFPVrMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAC2qj4STU2yq+my8I9iu +4b16WcNHtwgZvx7f8aN8vRll0rDnACUO1mBjTF3ec47wN0ALXPfqsi6/futnhSG2 +i/VHhKwF363sGT9C0Lge5QKi3r9InRtloqHUfi1QYf+jfpqveKHIIwP8GDjDatrA +OtYdfeaeHQdnzvHAYupacc9r +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/12.pem b/vpn/coloradio01/keys/12.pem new file mode 100644 index 0000000..750b2ce --- /dev/null +++ b/vpn/coloradio01/keys/12.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lintgen/name=aral-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c0:b5:1f:8c:6a:e1:ab:9c:17:94:17:00:d4:63: + a8:96:c8:b4:f9:97:5d:7e:5b:37:75:b2:9d:63:c4: + 09:07:63:a1:83:6b:5d:eb:4f:da:64:58:d1:b5:22: + a2:ff:27:50:22:94:12:c4:90:2a:86:e5:e4:ea:be: + 66:6e:df:fe:80:9e:0a:37:65:68:ab:19:bd:f2:58: + 4b:eb:a7:8c:cb:87:f3:e2:d2:4f:8b:a8:92:10:8e: + f1:97:e9:61:db:ae:cf:a2:68:65:06:2b:1d:72:4f: + f5:07:10:29:23:7b:20:c6:4f:3b:ac:dd:ab:64:62: + 59:e2:8a:99:f6:81:bc:2b:31 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 62:CE:EB:EE:00:A6:44:3F:E9:3C:7C:77:FE:75:FE:14:ED:65:BD:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:bd:da:83:e0:f5:ff:06:6c:ae:75:ee:24:44:95:7e:ed:5a: + 2d:e1:33:28:01:6b:6e:18:c1:62:2e:c8:2b:fd:48:60:fd:7e: + cd:77:8c:a1:be:5e:40:59:a8:57:13:7b:dd:a8:d2:58:7f:e5: + a1:03:c2:ae:cd:ca:1b:57:79:3c:61:25:70:ad:10:6a:e0:17: + 33:e2:c3:85:37:74:7e:a5:a7:86:68:fb:01:f7:e3:db:b2:24: + 86:cb:f1:08:7d:11:77:10:fb:0e:ed:16:c1:65:54:b5:37:39: + 5f:7e:ee:8b:e7:ee:6d:af:1d:24:ac:0b:ef:8b:c4:eb:2a:cc: + fb:79 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1saW50Z2VuMRUwEwYDVQQpEwxhcmFsLWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMC1H4xq4aucF5QXANRjqJbItPmXXX5bN3WynWPECQdjoYNrXetP2mRY +0bUiov8nUCKUEsSQKobl5Oq+Zm7f/oCeCjdlaKsZvfJYS+unjMuH8+LST4uokhCO +8ZfpYduuz6JoZQYrHXJP9QcQKSN7IMZPO6zdq2RiWeKKmfaBvCsxAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGLO6+4ApkQ/6Tx8d/51/hTtZb2gMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAGm92oPg9f8GbK517iRE +lX7tWi3hMygBa24YwWIuyCv9SGD9fs13jKG+XkBZqFcTe92o0lh/5aEDwq7NyhtX +eTxhJXCtEGrgFzPiw4U3dH6lp4Zo+wH349uyJIbL8Qh9EXcQ+w7tFsFlVLU3OV9+ +7ovn7m2vHSSsC++LxOsqzPt5 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/13.pem b/vpn/coloradio01/keys/13.pem new file mode 100644 index 0000000..1f7df2b --- /dev/null +++ b/vpn/coloradio01/keys/13.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bascharage/name=aral-bascharage/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:4e:ad:bb:23:53:fa:3c:d7:9f:b1:4e:1a:e7: + dd:af:d3:9e:b1:53:85:99:b0:8d:cb:c3:61:af:3a: + 6a:d2:39:8b:96:2e:a2:e5:df:f6:cd:50:f9:07:dd: + be:a7:1c:09:28:08:22:bd:76:c5:cb:20:21:68:9c: + 29:a9:66:d0:4a:18:54:81:af:ba:79:07:bd:5d:b1: + 7a:48:3d:b1:43:4c:4c:f0:88:2a:92:4f:b5:13:82: + a7:73:81:0c:0d:82:0f:d1:2a:41:e4:36:d2:ef:4a: + 5c:55:30:07:70:28:e7:3b:cb:27:8c:82:47:e2:6c: + 56:2b:c2:d6:71:59:54:33:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:A8:8F:E7:1C:5C:11:8B:6B:1A:36:BA:AC:ED:3A:C9:F3:B8:EE:C1 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 28:e9:95:39:e5:e2:10:30:a3:79:06:a2:26:e4:03:70:85:79: + f7:4a:21:75:9f:a5:57:d5:60:90:be:3f:4e:19:b6:c8:01:5b: + 44:c5:c8:ca:15:e2:3f:7a:49:88:d6:ae:16:e5:b4:94:d5:d9: + f1:2a:1c:57:2a:71:0f:aa:80:35:52:38:08:58:f9:4c:1d:78: + 6e:dd:0d:27:73:19:b4:d0:61:dc:cb:6b:45:c4:5b:0a:d0:02: + b4:b6:14:d1:b2:03:d5:e0:05:9e:66:7a:db:96:0d:28:17:09: + 71:ec:c9:1a:94:2e:ab:15:64:a2:ca:64:e9:7f:bd:40:58:a6: + 3d:68 +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1iYXNjaGFyYWdlMRgwFgYDVQQpEw9hcmFsLWJhc2NoYXJh +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAO9OrbsjU/o815+xThrn3a/TnrFThZmwjcvDYa86atI5i5Yu +ouXf9s1Q+QfdvqccCSgIIr12xcsgIWicKalm0EoYVIGvunkHvV2xekg9sUNMTPCI +KpJPtROCp3OBDA2CD9EqQeQ20u9KXFUwB3Ao5zvLJ4yCR+JsVivC1nFZVDNlAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFHaoj+ccXBGLaxo2uqztOsnz +uO7BMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACjplTnl4hAw +o3kGoibkA3CFefdKIXWfpVfVYJC+P04ZtsgBW0TFyMoV4j96SYjWrhbltJTV2fEq +HFcqcQ+qgDVSOAhY+UwdeG7dDSdzGbTQYdzLa0XEWwrQArS2FNGyA9XgBZ5metuW +DSgXCXHsyRqULqsVZKLKZOl/vUBYpj1o +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/14.pem b/vpn/coloradio01/keys/14.pem new file mode 100644 index 0000000..3b42bdc --- /dev/null +++ b/vpn/coloradio01/keys/14.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-hoscheiddickt/name=aral-hoscheiddickt/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d6:80:4d:8e:14:c4:f4:5d:b4:7f:f2:d2:c3:92: + b1:c7:81:05:17:0a:cf:ce:8c:4d:81:3e:43:c7:54: + 5a:1e:69:b6:c2:c9:97:0e:d1:cf:e9:3e:6e:0c:99: + 17:15:0f:c3:94:40:51:90:3d:af:e4:b4:c8:bd:db: + 58:90:cd:1a:ab:9f:d2:0a:09:19:5f:e5:2e:fa:98: + e2:73:55:b8:07:16:9b:f0:af:25:88:98:b2:e6:18: + ab:68:e5:32:da:de:10:6e:f3:ea:93:15:17:d7:0a: + a6:80:4b:1c:6d:d5:e3:82:f0:ac:21:f2:5b:d3:90: + 95:02:69:fa:8e:15:f3:f5:35 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + BD:61:E5:30:4B:88:A4:5D:39:44:B3:F0:17:FC:88:74:83:15:A9:38 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 4f:d0:7c:e9:02:35:94:6b:2d:ef:2e:8f:da:12:d5:2e:8c:6d: + fa:f9:d5:e8:52:32:7b:21:a1:41:1a:5e:2c:d6:e8:c0:18:39: + 5c:2c:ed:4b:34:5d:6d:43:a6:36:3f:97:8c:f8:4d:5e:72:ee: + 6b:2b:9b:5d:ba:77:79:a1:70:ea:54:b6:3e:94:57:02:fd:a5: + f4:9b:9c:fa:30:41:d1:d0:9b:0d:39:fd:30:9f:59:e4:c8:64: + 9b:e0:a8:63:3c:2c:b9:41:24:0b:10:60:5b:5a:da:ed:d1:a7: + 28:09:1a:4f:03:48:8b:2c:2c:1a:2e:3a:65:3a:42:24:64:8e: + 8d:5c +-----BEGIN CERTIFICATE----- +MIIEOjCCA6OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG5MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEb +MBkGA1UEAxMSYXJhbC1ob3NjaGVpZGRpY2t0MRswGQYDVQQpExJhcmFsLWhvc2No +ZWlkZGlja3QxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZI +hvcNAQEBBQADgY0AMIGJAoGBANaATY4UxPRdtH/y0sOSsceBBRcKz86MTYE+Q8dU +Wh5ptsLJlw7Rz+k+bgyZFxUPw5RAUZA9r+S0yL3bWJDNGquf0goJGV/lLvqY4nNV +uAcWm/CvJYiYsuYYq2jlMtreEG7z6pMVF9cKpoBLHG3V44LwrCHyW9OQlQJp+o4V +8/U1AgMBAAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5 +LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFL1h5TBLiKRdOUSz +8Bf8iHSDFak4MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGu +pIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYD +VQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsT +BlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFC +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0l +BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAE/Q +fOkCNZRrLe8uj9oS1S6Mbfr51ehSMnshoUEaXizW6MAYOVws7Us0XW1DpjY/l4z4 +TV5y7msrm126d3mhcOpUtj6UVwL9pfSbnPowQdHQmw05/TCfWeTIZJvgqGM8LLlB +JAsQYFta2u3RpygJGk8DSIssLBouOmU6QiRkjo1c +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/15.pem b/vpn/coloradio01/keys/15.pem new file mode 100644 index 0000000..94267c9 --- /dev/null +++ b/vpn/coloradio01/keys/15.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-niederfeulen/name=aral-niederfeulen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9e:f8:4f:68:ef:e9:12:66:c1:99:27:98:76:b1: + a3:15:44:a4:2b:05:4a:22:86:97:ba:2b:f1:91:39: + 04:1b:9f:0e:1a:6f:3f:f1:8c:03:42:32:cc:f0:54: + 82:43:4a:b7:f5:a6:c5:46:47:58:5e:82:3c:02:47: + 89:b1:8d:6c:59:6c:74:25:0c:8f:14:77:11:1c:94: + a9:b8:97:54:9b:34:40:89:21:83:fd:54:6a:ad:20: + 92:75:72:f8:59:59:02:d0:c6:01:9e:71:a3:1f:a2: + 26:2a:08:b8:f7:ee:cc:15:b7:e5:5d:53:59:73:35: + d0:e3:89:43:dd:75:99:df:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:C6:35:EA:56:0A:7C:16:AB:47:8D:9E:8E:75:60:51:DA:F8:A1:0E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 08:7e:c1:e1:05:1b:8f:1f:0a:23:fd:a4:d6:87:de:0b:9a:31: + 18:13:7b:57:a7:2c:3a:38:ac:0c:dd:1c:e1:03:5a:c3:8e:d3: + f6:93:a0:a0:a1:c0:ef:82:77:ca:6c:8b:9d:36:26:7f:99:86: + e0:80:59:85:9d:0c:10:dd:d7:db:45:63:68:b3:6d:ec:6f:68: + cb:a3:32:ec:9f:ec:34:74:d5:fe:b1:b9:0d:7f:91:5f:b0:64: + 14:8b:b0:70:b1:bc:5f:d5:c6:b3:ac:22:9e:70:ec:2d:d9:92: + a1:c0:39:35:54:fd:3a:7f:d3:ed:36:8f:44:6b:97:11:49:32: + 51:3b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC1uaWVkZXJmZXVsZW4xGjAYBgNVBCkTEWFyYWwtbmllZGVy +ZmV1bGVuMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCe+E9o7+kSZsGZJ5h2saMVRKQrBUoihpe6K/GROQQb +nw4abz/xjANCMszwVIJDSrf1psVGR1hegjwCR4mxjWxZbHQlDI8UdxEclKm4l1Sb +NECJIYP9VGqtIJJ1cvhZWQLQxgGecaMfoiYqCLj37swVt+VdU1lzNdDjiUPddZnf +pwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTCxjXqVgp8FqtHjZ6O +dWBR2vihDjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAIfsHh +BRuPHwoj/aTWh94LmjEYE3tXpyw6OKwM3RzhA1rDjtP2k6CgocDvgnfKbIudNiZ/ +mYbggFmFnQwQ3dfbRWNos23sb2jLozLsn+w0dNX+sbkNf5FfsGQUi7Bwsbxf1caz +rCKecOwt2ZKhwDk1VP06f9PtNo9Ea5cRSTJROw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/16.pem b/vpn/coloradio01/keys/16.pem new file mode 100644 index 0000000..fbae72b --- /dev/null +++ b/vpn/coloradio01/keys/16.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:41 2015 GMT + Not After : Feb 8 17:48:41 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-redange/name=aral-redange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:9e:df:06:d0:f0:33:0f:cf:aa:71:97:59:21: + a2:59:82:7a:03:8b:a1:64:ae:23:b7:d2:8f:5a:1c: + dc:0a:11:0b:44:32:21:40:05:52:88:d7:b3:4a:1b: + 7c:ea:c4:24:34:4c:31:7c:c5:0b:3a:63:1a:6b:bc: + 3b:e7:db:17:64:3e:ad:81:ce:fc:40:87:d8:6b:8c: + 9c:14:10:48:9e:23:88:62:2b:36:91:23:6e:15:a0: + e8:44:80:a9:2d:11:60:85:46:88:e6:c2:79:e5:8c: + a5:96:92:b6:c7:0e:d2:c0:ae:4f:45:0e:b3:a4:ad: + 00:49:a4:53:ab:6e:40:a2:41 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B8:28:BE:C9:99:FB:A8:9A:9F:7A:D8:9C:69:9E:6D:B6:8B:9F:0D:74 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 47:86:20:c6:a2:14:02:55:e9:0d:88:f4:e6:6e:fe:be:51:2a: + c9:a0:02:81:4e:8d:3a:8c:8e:77:f0:17:bb:43:73:6c:3e:5d: + cc:d5:b9:cc:f7:d1:03:5d:48:b8:d7:c5:8d:76:d6:e5:56:31: + 24:aa:a2:fe:00:eb:64:01:47:c4:b4:be:e2:55:5a:9b:5d:5f: + 43:ff:a3:c8:91:71:c4:4c:7e:42:a5:3b:66:fd:d9:b5:29:e0: + fc:a9:7a:0c:6c:70:58:81:c1:3e:34:92:e1:a6:dc:f1:f9:da: + d8:43:4d:74:9e:ad:33:01:65:85:79:70:6b:7d:1c:3c:12:35: + 58:ea +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NDFaFw0yNTAyMDgxNzQ4NDFaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZWRhbmdlMRUwEwYDVQQpEwxhcmFsLXJlZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAM2e3wbQ8DMPz6pxl1kholmCegOLoWSuI7fSj1oc3AoRC0QyIUAFUojX +s0obfOrEJDRMMXzFCzpjGmu8O+fbF2Q+rYHO/ECH2GuMnBQQSJ4jiGIrNpEjbhWg +6ESAqS0RYIVGiObCeeWMpZaStscO0sCuT0UOs6StAEmkU6tuQKJBAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFLgovsmZ+6ian3rYnGmebbaLnw10MIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAEeGIMaiFAJV6Q2I9OZu +/r5RKsmgAoFOjTqMjnfwF7tDc2w+XczVucz30QNdSLjXxY121uVWMSSqov4A62QB +R8S0vuJVWptdX0P/o8iRccRMfkKlO2b92bUp4PypegxscFiBwT40kuGm3PH52thD +TXSerTMBZYV5cGt9HDwSNVjq +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/17.pem b/vpn/coloradio01/keys/17.pem new file mode 100644 index 0000000..aa36d0e --- /dev/null +++ b/vpn/coloradio01/keys/17.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:54 2015 GMT + Not After : Feb 8 17:48:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-junglinster/name=aral-junglinster/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:d2:cb:4c:be:98:5b:13:02:f3:01:04:f2:bb: + 5c:b9:e5:de:e9:f7:f5:80:09:57:53:35:f6:67:a5: + 90:01:e7:89:79:41:c5:0a:62:b1:ac:a4:10:90:4b: + 88:c9:e1:e7:19:02:f3:d6:03:b5:d7:e0:8c:88:46: + ae:c0:00:9c:84:42:0d:1b:2b:77:93:83:c2:9d:cf: + 12:52:30:6d:46:75:3a:68:77:9d:84:84:3f:ce:6e: + df:70:0d:42:2e:4e:c3:87:51:6e:19:11:dd:d5:0d: + 7a:68:df:1f:e1:d0:ea:10:fb:60:0a:e8:e8:89:bd: + 7c:e0:dd:5f:82:72:e5:cf:d5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FA:91:BE:0D:F3:06:EB:6A:00:F1:6A:D7:B1:09:D3:7B:11:DC:68:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 54:06:7f:2d:fc:d6:46:a6:86:1a:fa:85:80:57:c1:07:fd:ea: + e5:ec:c8:94:59:07:15:17:c3:d9:2d:71:d4:8c:89:2f:a5:2d: + a6:fa:07:15:01:70:98:e3:60:a2:c1:5e:23:6a:6e:3b:68:58: + 1b:3a:71:bd:9a:77:95:4b:5d:a6:56:10:c0:3e:59:77:72:1c: + 4e:34:3d:dd:ba:ba:49:b6:68:ad:30:69:95:00:e7:f8:c3:ff: + 76:43:43:ab:65:43:4c:b1:53:a4:25:94:98:ad:a7:53:1b:82: + af:ec:9e:ab:5c:bd:44:53:bc:52:77:9e:eb:fd:a2:54:35:2b: + 04:47 +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NTRaFw0yNTAyMDgxNzQ4NTRaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1qdW5nbGluc3RlcjEZMBcGA1UEKRMQYXJhbC1qdW5nbGlu +c3RlcjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA19LLTL6YWxMC8wEE8rtcueXe6ff1gAlXUzX2Z6WQAeeJ +eUHFCmKxrKQQkEuIyeHnGQLz1gO11+CMiEauwACchEINGyt3k4PCnc8SUjBtRnU6 +aHedhIQ/zm7fcA1CLk7Dh1FuGRHd1Q16aN8f4dDqEPtgCujoib184N1fgnLlz9UC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+pG+DfMG62oA8WrXsQnT +exHcaKAwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAVAZ/LfzW +RqaGGvqFgFfBB/3q5ezIlFkHFRfD2S1x1IyJL6UtpvoHFQFwmONgosFeI2puO2hY +GzpxvZp3lUtdplYQwD5Zd3IcTjQ93bq6SbZorTBplQDn+MP/dkNDq2VDTLFTpCWU +mK2nUxuCr+yeq1y9RFO8Unee6/2iVDUrBEc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/18.pem b/vpn/coloradio01/keys/18.pem new file mode 100644 index 0000000..6e17529 --- /dev/null +++ b/vpn/coloradio01/keys/18.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 24 (0x18) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 20 19:41:48 2015 GMT + Not After : Feb 17 19:41:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-testrpi/name=dks-testrpi/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ed:d7:bc:aa:20:35:7c:eb:ac:89:37:42:c5:d9: + ce:20:e2:5c:3f:f3:77:5b:59:0e:65:6b:2c:a0:19: + 2a:5e:b5:a1:fb:85:fb:4f:b7:ad:37:20:93:be:09: + a4:71:34:6f:58:e1:aa:9f:db:b1:b0:9e:41:ba:a2: + 8d:78:a2:0b:28:ed:22:af:59:3f:7e:fe:6e:c9:dc: + 37:66:26:7b:22:22:57:0e:0f:b6:23:00:29:4c:49: + 0b:48:18:3a:8c:3e:5a:0b:41:5d:0f:c3:ed:b2:fc: + 93:f9:c5:eb:db:9a:f9:3b:b1:2d:02:8e:2c:02:a0: + a5:6c:b9:93:e0:70:2a:25:9f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0B:F0:5F:07:58:B5:28:F9:F0:98:09:24:C3:93:5D:08:B8:33:CC:3B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:a2:b0:58:0c:b0:55:82:b2:ed:ad:09:fe:2b:c8:41:81:4e: + e3:1e:43:6b:4b:0c:3f:ea:c7:fa:1f:d7:6f:2f:46:98:9f:16: + e8:00:d2:35:e0:11:5e:d5:1c:37:21:c7:4c:d4:13:08:a3:76: + cc:41:62:47:01:a1:19:ac:70:30:2b:c2:8f:fe:9e:7d:6f:e1: + 2b:94:2b:ce:8b:06:84:48:6c:b9:63:d7:d2:fc:b2:1c:26:74: + 40:81:4e:68:3c:f3:c9:08:62:8f:c4:2a:cd:bc:05:ee:31:cb: + de:17:e4:42:9f:71:2a:95:c7:58:ff:e8:35:f1:6c:d8:0f:19: + c9:6d +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBGDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMjAxOTQxNDhaFw0yNTAyMTcxOTQxNDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLZGtzLXRlc3RycGkxFDASBgNVBCkTC2Rrcy10ZXN0cnBpMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDt17yqIDV866yJN0LF2c4g4lw/83dbWQ5layygGSpetaH7hftPt603IJO+ +CaRxNG9Y4aqf27GwnkG6oo14ogso7SKvWT9+/m7J3DdmJnsiIlcOD7YjAClMSQtI +GDqMPloLQV0Pw+2y/JP5xevbmvk7sS0CjiwCoKVsuZPgcColnwIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBQL8F8HWLUo+fCYCSTDk10IuDPMOzCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBrorBYDLBVgrLtrQn+K8hB +gU7jHkNrSww/6sf6H9dvL0aYnxboANI14BFe1Rw3IcdM1BMIo3bMQWJHAaEZrHAw +K8KP/p59b+ErlCvOiwaESGy5Y9fS/LIcJnRAgU5oPPPJCGKPxCrNvAXuMcveF+RC +n3EqlcdY/+g18WzYDxnJbQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/19.pem b/vpn/coloradio01/keys/19.pem new file mode 100644 index 0000000..552ff2a --- /dev/null +++ b/vpn/coloradio01/keys/19.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 25 (0x19) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 16:10:27 2015 GMT + Not After : Mar 26 16:10:27 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=rb75-lintgen/name=rb75-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:86:4f:1f:04:e0:9d:f7:2a:af:99:c6:14:e6: + 4f:27:41:a9:c7:b9:bc:fa:1b:71:dd:65:79:b0:54: + dc:b4:f0:5f:95:3c:cb:c7:e9:26:59:ca:e5:96:31: + 36:55:b9:55:2a:fb:ed:64:72:25:65:40:49:98:02: + 28:44:54:c2:65:80:5b:57:eb:c2:1b:40:dc:b3:4a: + 77:97:5a:69:0b:a9:7d:dc:a3:f0:2e:19:f1:ce:37: + df:c8:b1:15:9f:38:86:d9:58:bf:48:b7:bc:4c:f5: + 57:c3:b0:69:58:7a:02:96:c9:38:4d:af:21:c6:64: + c2:c3:9b:64:7e:88:29:fc:19 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 19:6A:3F:80:EA:31:87:5F:49:18:63:0D:CA:F6:B0:FF:3D:D8:07:60 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:58:2f:bf:2a:28:62:ec:33:e5:93:40:31:f2:a1:76:82:62: + cd:99:e3:eb:7c:61:47:4d:fb:05:5d:25:a0:22:4d:50:4c:de: + 6c:12:c5:ef:db:6f:85:95:56:61:6e:ca:55:01:db:9d:6b:6d: + 9f:08:d2:a3:ad:bf:d1:86:a8:e7:49:d6:97:0a:fa:c6:5e:4f: + c9:bf:76:35:de:95:30:06:d8:8b:3a:82:6f:97:50:25:d1:1a: + de:4c:75:93:e7:b0:e2:c0:c8:1e:98:bc:87:8e:ee:8c:13:6b: + 0a:50:f9:ae:87:76:ed:8e:e7:06:36:7a:92:89:5b:06:98:bc: + f6:ac +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAzMjkxNjEwMjdaFw0yNTAzMjYxNjEwMjdaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMcmI3NS1saW50Z2VuMRUwEwYDVQQpEwxyYjc1LWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMmGTx8E4J33Kq+ZxhTmTydBqce5vPobcd1lebBU3LTwX5U8y8fpJlnK +5ZYxNlW5VSr77WRyJWVASZgCKERUwmWAW1frwhtA3LNKd5daaQupfdyj8C4Z8c43 +38ixFZ84htlYv0i3vEz1V8OwaVh6ApbJOE2vIcZkwsObZH6IKfwZAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFBlqP4DqMYdfSRhjDcr2sP892AdgMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1YL78qKGLsM+WTQDHy +oXaCYs2Z4+t8YUdN+wVdJaAiTVBM3mwSxe/bb4WVVmFuylUB251rbZ8I0qOtv9GG +qOdJ1pcK+sZeT8m/djXelTAG2Is6gm+XUCXRGt5MdZPnsOLAyB6YvIeO7owTawpQ ++a6Hdu2O5wY2epKJWwaYvPas +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1A.pem b/vpn/coloradio01/keys/1A.pem new file mode 100644 index 0000000..61b473f --- /dev/null +++ b/vpn/coloradio01/keys/1A.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 26 (0x1a) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 12 08:28:01 2015 GMT + Not After : Apr 9 08:28:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bertrange/name=aral-bertrange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ae:ab:70:ff:72:ff:7c:24:6c:45:36:54:da:e6: + b8:a8:e5:a5:dc:f3:3a:b2:2d:16:33:17:98:57:06: + 1b:0e:c2:e8:96:ab:79:52:8e:27:3b:a1:7b:cf:26: + a4:4f:50:88:3e:c5:9a:b7:44:25:14:2c:d1:c7:ac: + fd:0c:61:d8:1b:4d:28:b0:f0:9a:c7:9b:d6:4d:80: + 53:bb:4a:f3:b7:3f:8f:d6:8d:59:60:82:9a:03:4e: + 97:16:f2:b1:20:b9:47:fb:83:16:5e:55:3b:88:6d: + 2b:7f:3a:59:54:1a:bc:e6:c2:ce:6e:c6:0c:ea:78: + b9:f1:12:8c:d7:64:ea:3b:77 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:B5:33:57:42:FD:EC:18:3E:22:6E:E9:CE:0C:6F:8F:4D:7F:6D:8E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1a:75:0b:c2:52:40:7d:1e:bc:aa:ad:0a:7d:4a:4f:4f:71:d4: + 1f:c8:4d:54:5c:69:3c:d3:8d:99:ac:95:7d:07:6a:7d:52:fb: + 6e:45:36:bc:c3:3b:16:99:08:28:d5:fc:cb:ca:31:ba:87:5a: + e4:1f:f3:fe:0f:ee:8a:44:44:a6:52:44:af:71:40:81:bd:6b: + 72:c7:29:ab:6f:f9:ef:95:a0:63:23:53:83:24:b5:66:a3:2a: + f0:63:1a:3a:f1:8d:66:5d:9b:b4:90:d7:33:ea:c3:8b:e2:2d: + 88:66:59:a6:73:64:ba:bb:10:ec:0b:3a:62:9d:4a:b1:8c:5e: + 89:6b +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBGjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTIwODI4MDFaFw0yNTA0MDkwODI4MDFaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1iZXJ0cmFuZ2UxFzAVBgNVBCkTDmFyYWwtYmVydHJhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCuq3D/cv98JGxFNlTa5rio5aXc8zqyLRYzF5hXBhsOwuiWq3lS +jic7oXvPJqRPUIg+xZq3RCUULNHHrP0MYdgbTSiw8JrHm9ZNgFO7SvO3P4/WjVlg +gpoDTpcW8rEguUf7gxZeVTuIbSt/OllUGrzmws5uxgzqeLnxEozXZOo7dwIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTetTNXQv3sGD4ibunODG+PTX9t +jjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAadQvCUkB9Hryq +rQp9Sk9PcdQfyE1UXGk8042ZrJV9B2p9UvtuRTa8wzsWmQgo1fzLyjG6h1rkH/P+ +D+6KRESmUkSvcUCBvWtyxymrb/nvlaBjI1ODJLVmoyrwYxo68Y1mXZu0kNcz6sOL +4i2IZlmmc2S6uxDsCzpinUqxjF6Jaw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1B.pem b/vpn/coloradio01/keys/1B.pem new file mode 100644 index 0000000..972b5a4 --- /dev/null +++ b/vpn/coloradio01/keys/1B.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 27 (0x1b) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 19 12:04:05 2015 GMT + Not After : Apr 16 12:04:05 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-rpi2test/name=dks-rpi2test/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bb:5f:37:53:30:39:ef:24:4e:6d:9f:e0:0f:9a: + 22:67:2f:17:f3:da:22:d4:e1:af:7b:20:99:1d:4e: + c5:48:99:c3:b8:b5:cc:43:7a:44:c5:22:cd:ed:ec: + 92:39:b6:9e:1c:6b:de:92:81:0f:66:5c:f1:a6:74: + c5:05:4f:e9:19:bc:71:0c:34:4d:a3:d9:3c:b8:a4: + 45:60:2b:2a:bc:dd:9e:44:ac:76:7f:6f:7d:34:b0: + 35:fd:f6:29:d7:08:17:ec:20:5e:5d:c0:09:d5:98: + ae:e5:3d:c8:5d:42:9f:9a:fd:d7:4e:57:40:c5:82: + ce:33:8d:7c:65:fa:7a:1a:8f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 60:14:81:89:49:9B:8E:B8:4A:7E:A5:A4:B9:B7:88:69:97:E1:A8:4B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 25:9f:6c:81:18:5d:64:75:eb:b3:73:dc:90:25:82:b0:51:40: + 77:99:9c:bd:cd:4e:9b:4b:7b:fe:09:51:3c:aa:41:25:81:c2: + dc:fc:6f:b4:b0:37:92:0b:fd:53:e2:ba:41:57:2d:b3:b2:2f: + 15:7e:64:89:05:f0:2d:c2:e7:81:a2:6f:13:ff:d5:b5:a0:ed: + 54:e1:07:c9:30:8d:fd:11:f0:6a:67:a8:c0:eb:e5:d4:88:1f: + e7:36:cd:e0:db:25:85:45:6a:4d:df:56:25:9b:28:7d:75:cd: + 41:68:79:b3:40:21:50:7b:cc:52:83:6c:db:08:dd:6d:af:44: + 05:9b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTkxMjA0MDVaFw0yNTA0MTYxMjA0MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMZGtzLXJwaTJ0ZXN0MRUwEwYDVQQpEwxka3MtcnBpMnRlc3QxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALtfN1MwOe8kTm2f4A+aImcvF/PaItThr3sgmR1OxUiZw7i1zEN6RMUi +ze3skjm2nhxr3pKBD2Zc8aZ0xQVP6Rm8cQw0TaPZPLikRWArKrzdnkSsdn9vfTSw +Nf32KdcIF+wgXl3ACdWYruU9yF1Cn5r9105XQMWCzjONfGX6ehqPAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGAUgYlJm464Sn6lpLm3iGmX4ahLMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACWfbIEYXWR167Nz3JAl +grBRQHeZnL3NTptLe/4JUTyqQSWBwtz8b7SwN5IL/VPiukFXLbOyLxV+ZIkF8C3C +54GibxP/1bWg7VThB8kwjf0R8GpnqMDr5dSIH+c2zeDbJYVFak3fViWbKH11zUFo +ebNAIVB7zFKDbNsI3W2vRAWb +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1C.pem b/vpn/coloradio01/keys/1C.pem new file mode 100644 index 0000000..3d6bfd7 --- /dev/null +++ b/vpn/coloradio01/keys/1C.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 28 (0x1c) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 5 21:19:58 2015 GMT + Not After : Aug 2 21:19:58 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b8:bb:9d:f2:6b:f1:8f:37:84:b6:f5:34:55:5e: + 8b:8b:af:d7:3d:0a:7e:f9:99:bb:6f:30:0b:39:f4: + 66:b3:39:94:ff:98:e6:66:e1:63:df:40:50:1a:d4: + 6c:54:98:c5:26:66:36:c1:a3:de:ad:d5:43:21:b1: + 3e:c3:f7:72:ca:6c:1c:50:7e:2c:aa:19:a6:24:f7: + 4c:fc:ac:03:b6:32:a3:b8:10:e9:ce:83:ea:f5:fc: + 96:04:bc:cf:87:44:44:2a:87:06:2a:8e:af:62:41: + 2c:17:b7:34:b0:15:6f:9e:4b:f4:69:95:a1:1e:f4: + 90:62:f4:2a:3f:2b:f7:75:6b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FF:A1:4D:6F:A0:EF:B4:61:F9:15:DF:4E:D1:A1:BD:6A:74:B4:9D:0F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:8a:29:5a:82:b5:50:86:44:b0:da:61:3f:83:23:c4:65:ac: + ff:11:fb:18:9b:a3:87:ac:b7:a1:97:ba:dd:f4:67:b3:8f:26: + f9:f3:b7:87:3c:38:b9:15:a4:ae:db:e5:13:86:6a:d5:1b:35: + a9:23:6b:39:c2:45:5d:83:2d:e5:90:84:f2:9c:8a:87:f5:42: + 26:dc:d4:8e:02:ff:97:05:16:37:7a:05:d7:11:50:e7:83:75: + 7f:95:e3:62:79:21:8c:6d:e2:bc:bd:5a:1b:29:5b:3c:f9:9e: + f3:c9:e9:30:2c:8a:16:26:bc:13:43:8d:3e:e3:aa:f2:51:1c: + c8:26 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBHDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDUyMTE5NThaFw0yNTA4MDIyMTE5NThaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAuLud8mvxjzeEtvU0VV6Li6/XPQp++Zm7bzALOfRmszmU/5jmZuFj30BQGtRs +VJjFJmY2waPerdVDIbE+w/dyymwcUH4sqhmmJPdM/KwDtjKjuBDpzoPq9fyWBLzP +h0REKocGKo6vYkEsF7c0sBVvnkv0aZWhHvSQYvQqPyv3dWsCAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU/6FNb6DvtGH5Fd9O0aG9anS0nQ8wgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAf4opWoK1UIZEsNphP4MjxGWs +/xH7GJujh6y3oZe63fRns48m+fO3hzw4uRWkrtvlE4Zq1Rs1qSNrOcJFXYMt5ZCE +8pyKh/VCJtzUjgL/lwUWN3oF1xFQ54N1f5XjYnkhjG3ivL1aGylbPPme88npMCyK +Fia8E0ONPuOq8lEcyCY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1D.pem b/vpn/coloradio01/keys/1D.pem new file mode 100644 index 0000000..986dafb --- /dev/null +++ b/vpn/coloradio01/keys/1D.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 29 (0x1d) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:47 2015 GMT + Not After : Aug 3 12:02:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-dudelange/name=aral-dudelange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:f3:ec:a1:72:da:83:39:35:4c:c4:f7:d2:c7: + 00:61:2f:9e:a5:0f:eb:63:8d:13:83:a1:62:61:98: + e0:c6:59:5e:10:ed:cf:8a:6f:fd:0e:a7:c2:ab:17: + d9:96:72:ba:05:54:54:b1:d5:bc:1c:ae:75:3c:f5: + 48:03:87:b5:16:c2:08:b9:75:92:95:fe:58:92:f5: + c3:ea:b5:ae:c8:c7:38:38:15:fb:35:aa:71:8e:d5: + bf:22:15:81:f0:d8:1e:e3:c7:3d:50:bc:e3:fa:88: + 83:f7:83:c9:6a:dd:90:07:21:f3:66:49:7a:d8:54: + 75:3f:7d:bb:19:a9:c1:64:e7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 8B:08:10:A5:39:E2:A9:9C:CE:71:28:55:90:AC:D4:50:BD:1A:90:ED + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 50:7d:e1:6b:43:56:74:10:df:b5:93:29:75:fc:70:a6:25:09: + c7:79:75:44:2d:22:b2:76:2e:ac:3e:5c:02:19:98:60:da:a0: + 71:87:16:d5:f9:24:50:d6:1c:78:01:ca:8c:49:6f:d0:7f:0c: + 94:b1:a8:ea:96:51:9c:9f:59:58:94:db:51:15:bb:06:b4:91: + 6b:26:56:5e:d1:10:52:94:27:f0:69:ba:80:3a:b2:ac:e4:86: + 23:0e:8e:6d:d5:78:8c:cf:36:bb:77:63:c2:fc:fd:53:f9:6a: + aa:fe:b5:07:7c:a4:5c:29:8a:fe:ef:06:56:c1:cb:5b:d5:a4: + 7d:16 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBHTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNDdaFw0yNTA4MDMxMjAyNDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1kdWRlbGFuZ2UxFzAVBgNVBCkTDmFyYWwtZHVkZWxhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDK8+yhctqDOTVMxPfSxwBhL56lD+tjjRODoWJhmODGWV4Q7c+K +b/0Op8KrF9mWcroFVFSx1bwcrnU89UgDh7UWwgi5dZKV/liS9cPqta7Ixzg4Ffs1 +qnGO1b8iFYHw2B7jxz1QvOP6iIP3g8lq3ZAHIfNmSXrYVHU/fbsZqcFk5wIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSLCBClOeKpnM5xKFWQrNRQvRqQ +7TCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBQfeFrQ1Z0EN+1 +kyl1/HCmJQnHeXVELSKydi6sPlwCGZhg2qBxhxbV+SRQ1hx4AcqMSW/QfwyUsajq +llGcn1lYlNtRFbsGtJFrJlZe0RBSlCfwabqAOrKs5IYjDo5t1XiMzza7d2PC/P1T ++Wqq/rUHfKRcKYr+7wZWwctb1aR9Fg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1E.pem b/vpn/coloradio01/keys/1E.pem new file mode 100644 index 0000000..46212a2 --- /dev/null +++ b/vpn/coloradio01/keys/1E.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 30 (0x1e) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:55 2015 GMT + Not After : Aug 3 12:02:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schengen/name=aral-schengen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d2:25:34:65:46:e6:95:f7:82:16:e7:ff:95:41: + af:5c:81:d9:2d:c8:2e:01:a2:d4:fe:78:91:c0:c3: + 8a:bb:4e:3e:a3:63:1d:1a:a2:b7:0f:c2:96:e1:65: + bd:e2:2a:14:43:03:f1:4f:bf:b8:6d:7b:ae:80:f7: + ae:7d:87:e9:fc:23:92:ea:8b:72:91:f6:aa:9f:e4: + da:81:dc:c1:96:8d:89:06:5f:86:3d:c6:a3:67:58: + 75:e0:5e:4f:50:73:45:50:5b:a1:68:f3:98:d8:10: + 08:b3:41:9b:68:34:5f:68:dd:c1:60:3e:0d:ff:2a: + af:5d:10:17:ae:3b:61:0d:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 08:75:49:41:BE:2C:62:78:BA:2F:C7:FE:70:2B:E7:FF:51:5F:4D:E9 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:8c:2e:39:42:70:36:1f:4c:ff:42:45:a2:34:bb:6e:f5:54: + 08:e3:4e:12:f4:4f:e7:6f:55:0c:7f:ca:37:a6:3a:ec:2c:63: + 92:2b:ad:b0:eb:bc:43:78:cd:ac:ee:6a:e3:1a:55:84:bb:43: + f1:51:f7:9f:1c:99:e7:ab:8b:9c:33:18:e0:7d:cb:6f:85:72: + cf:4f:dd:63:91:9a:04:2a:16:b4:7b:fe:76:57:1d:9f:8a:79: + 90:9a:d6:13:bc:83:87:a5:c0:8f:f3:90:e7:43:a0:a9:64:de: + 6e:7e:e3:6d:ab:05:65:97:bf:28:3b:f8:c8:82:4a:53:0e:8c: + 1b:7b +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBHjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNTVaFw0yNTA4MDMxMjAyNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1zY2hlbmdlbjEWMBQGA1UEKRMNYXJhbC1zY2hlbmdlbjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA0iU0ZUbmlfeCFuf/lUGvXIHZLcguAaLU/niRwMOKu04+o2MdGqK3 +D8KW4WW94ioUQwPxT7+4bXuugPeufYfp/COS6otykfaqn+TagdzBlo2JBl+GPcaj +Z1h14F5PUHNFUFuhaPOY2BAIs0GbaDRfaN3BYD4N/yqvXRAXrjthDc0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUCHVJQb4sYni6L8f+cCvn/1FfTekw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAcIwuOUJwNh9M/0JF +ojS7bvVUCONOEvRP529VDH/KN6Y67CxjkiutsOu8Q3jNrO5q4xpVhLtD8VH3nxyZ +56uLnDMY4H3Lb4Vyz0/dY5GaBCoWtHv+dlcdn4p5kJrWE7yDh6XAj/OQ50OgqWTe +bn7jbasFZZe/KDv4yIJKUw6MG3s= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/1F.pem b/vpn/coloradio01/keys/1F.pem new file mode 100644 index 0000000..02287fc --- /dev/null +++ b/vpn/coloradio01/keys/1F.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 31 (0x1f) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 7 09:53:16 2015 GMT + Not After : Aug 4 09:53:16 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange/name=aral-rodange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c1:2b:6c:2a:e9:07:7f:6d:7e:23:ef:ef:6f:b3: + c6:79:8d:79:57:34:cd:72:de:cd:95:a1:34:c4:af: + 63:6b:9c:b3:24:0c:2a:67:72:19:09:63:eb:87:47: + bb:b8:b6:7c:6e:a0:64:e9:6a:9e:2d:6b:10:ed:ce: + ae:9d:35:56:72:f6:d9:7d:31:e5:b5:e5:34:90:4f: + 46:29:73:69:5d:8a:01:45:bc:4e:8b:2d:14:b7:90: + 53:98:98:57:2a:61:2f:f5:41:6a:3a:14:75:b2:45: + af:27:86:03:52:ba:6c:e3:83:c8:bc:e7:d5:00:9a: + 60:b8:9e:7f:43:09:3e:49:57 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 34:9D:52:DC:C9:30:95:B0:A0:E2:7B:9C:95:75:A6:FD:D3:23:75:8C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:f3:d8:db:32:ca:38:4f:b5:42:8c:29:43:c0:6f:b3:c1:58: + 07:44:4d:ba:8a:28:99:e3:ad:fc:59:de:fe:ab:21:ff:2b:bf: + e6:2a:7a:cc:63:78:85:c2:b7:e0:c9:cd:9d:dd:0c:9b:93:20: + a8:a8:93:49:a4:43:ae:36:d8:a1:65:3d:49:47:2f:5f:da:44: + 14:23:b6:4f:b1:c3:34:92:60:8b:96:29:98:e7:22:42:df:df: + e7:ce:8c:d1:93:f3:69:ae:8a:af:9b:c5:e2:c2:fe:06:bf:c6: + 90:8d:cf:3a:28:fd:d2:16:ed:12:f5:e1:b4:f7:07:64:99:64: + 97:5f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBHzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDcwOTUzMTZaFw0yNTA4MDQwOTUzMTZaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yb2RhbmdlMRUwEwYDVQQpEwxhcmFsLXJvZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMErbCrpB39tfiPv72+zxnmNeVc0zXLezZWhNMSvY2ucsyQMKmdyGQlj +64dHu7i2fG6gZOlqni1rEO3Orp01VnL22X0x5bXlNJBPRilzaV2KAUW8TostFLeQ +U5iYVyphL/VBajoUdbJFryeGA1K6bOODyLzn1QCaYLief0MJPklXAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDSdUtzJMJWwoOJ7nJV1pv3TI3WMMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAHDz2NsyyjhPtUKMKUPA +b7PBWAdETbqKKJnjrfxZ3v6rIf8rv+YqesxjeIXCt+DJzZ3dDJuTIKiok0mkQ642 +2KFlPUlHL1/aRBQjtk+xwzSSYIuWKZjnIkLf3+fOjNGT82muiq+bxeLC/ga/xpCN +zzoo/dIW7RL14bT3B2SZZJdf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/20.pem b/vpn/coloradio01/keys/20.pem new file mode 100644 index 0000000..137bc05 --- /dev/null +++ b/vpn/coloradio01/keys/20.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 32 (0x20) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 5 06:37:41 2015 GMT + Not After : Oct 2 06:37:41 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:df:cf:c8:31:6c:9c:3e:ca:1e:ef:e6:2f:fb:8c: + a6:ce:20:76:a9:a3:63:a2:05:ac:51:16:db:c7:68: + c2:e0:49:0d:fd:38:1f:7a:61:a3:e2:5e:a7:60:a6: + 92:c1:3b:d7:5a:24:94:79:8e:fa:db:21:39:7d:1b: + 54:58:9e:c3:c9:1a:af:e2:17:5f:de:57:3d:8c:6e: + 60:37:32:18:99:4b:de:f0:7f:c5:a5:f4:fc:35:04: + b4:04:d0:f3:cc:03:a3:cd:27:ee:f1:f6:b4:69:6d: + a5:28:34:54:51:ac:3d:39:8c:d7:e3:b5:5a:9a:1f: + a3:c9:60:9f:c1:8e:e6:13:0b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 70:64:03:45:D3:19:34:10:8F:77:2F:41:31:51:12:8D:BA:B4:89:51 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 83:a4:52:98:3c:2c:8c:c8:fc:6c:4f:cb:53:1e:a1:14:62:d8: + a6:73:67:12:17:51:1a:47:ca:30:8e:d3:d9:61:fe:39:b2:ce: + c0:25:43:e4:3e:28:a0:12:2b:22:f2:6e:15:a4:19:e8:61:87: + cf:af:94:95:04:ee:7a:b5:f2:30:ad:c2:7c:93:32:a3:9e:e2: + 01:90:62:df:74:f8:3b:78:41:51:79:b8:f4:e6:88:1f:a0:41: + 45:f9:c8:f7:b3:0d:35:57:f3:59:f5:e2:7e:a1:87:31:d1:73: + 49:53:5e:4e:89:33:a5:43:71:3f:a5:b1:32:11:22:91:40:47: + 8e:14 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBIDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMDUwNjM3NDFaFw0yNTEwMDIwNjM3NDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDIxGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDfz8gxbJw+yh7v5i/7jKbOIHapo2OiBaxRFtvHaMLg +SQ39OB96YaPiXqdgppLBO9daJJR5jvrbITl9G1RYnsPJGq/iF1/eVz2MbmA3MhiZ +S97wf8Wl9Pw1BLQE0PPMA6PNJ+7x9rRpbaUoNFRRrD05jNfjtVqaH6PJYJ/BjuYT +CwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRwZANF0xk0EI93L0Ex +URKNurSJUTCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCDpFKY +PCyMyPxsT8tTHqEUYtimc2cSF1EaR8owjtPZYf45ss7AJUPkPiigEisi8m4VpBno +YYfPr5SVBO56tfIwrcJ8kzKjnuIBkGLfdPg7eEFRebj05ogfoEFF+cj3sw01V/NZ +9eJ+oYcx0XNJU15OiTOlQ3E/pbEyESKRQEeOFA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-bascharage.crt b/vpn/coloradio01/keys/aral-bascharage.crt new file mode 100644 index 0000000..1f7df2b --- /dev/null +++ b/vpn/coloradio01/keys/aral-bascharage.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bascharage/name=aral-bascharage/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:4e:ad:bb:23:53:fa:3c:d7:9f:b1:4e:1a:e7: + dd:af:d3:9e:b1:53:85:99:b0:8d:cb:c3:61:af:3a: + 6a:d2:39:8b:96:2e:a2:e5:df:f6:cd:50:f9:07:dd: + be:a7:1c:09:28:08:22:bd:76:c5:cb:20:21:68:9c: + 29:a9:66:d0:4a:18:54:81:af:ba:79:07:bd:5d:b1: + 7a:48:3d:b1:43:4c:4c:f0:88:2a:92:4f:b5:13:82: + a7:73:81:0c:0d:82:0f:d1:2a:41:e4:36:d2:ef:4a: + 5c:55:30:07:70:28:e7:3b:cb:27:8c:82:47:e2:6c: + 56:2b:c2:d6:71:59:54:33:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:A8:8F:E7:1C:5C:11:8B:6B:1A:36:BA:AC:ED:3A:C9:F3:B8:EE:C1 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 28:e9:95:39:e5:e2:10:30:a3:79:06:a2:26:e4:03:70:85:79: + f7:4a:21:75:9f:a5:57:d5:60:90:be:3f:4e:19:b6:c8:01:5b: + 44:c5:c8:ca:15:e2:3f:7a:49:88:d6:ae:16:e5:b4:94:d5:d9: + f1:2a:1c:57:2a:71:0f:aa:80:35:52:38:08:58:f9:4c:1d:78: + 6e:dd:0d:27:73:19:b4:d0:61:dc:cb:6b:45:c4:5b:0a:d0:02: + b4:b6:14:d1:b2:03:d5:e0:05:9e:66:7a:db:96:0d:28:17:09: + 71:ec:c9:1a:94:2e:ab:15:64:a2:ca:64:e9:7f:bd:40:58:a6: + 3d:68 +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1iYXNjaGFyYWdlMRgwFgYDVQQpEw9hcmFsLWJhc2NoYXJh +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAO9OrbsjU/o815+xThrn3a/TnrFThZmwjcvDYa86atI5i5Yu +ouXf9s1Q+QfdvqccCSgIIr12xcsgIWicKalm0EoYVIGvunkHvV2xekg9sUNMTPCI +KpJPtROCp3OBDA2CD9EqQeQ20u9KXFUwB3Ao5zvLJ4yCR+JsVivC1nFZVDNlAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFHaoj+ccXBGLaxo2uqztOsnz +uO7BMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACjplTnl4hAw +o3kGoibkA3CFefdKIXWfpVfVYJC+P04ZtsgBW0TFyMoV4j96SYjWrhbltJTV2fEq +HFcqcQ+qgDVSOAhY+UwdeG7dDSdzGbTQYdzLa0XEWwrQArS2FNGyA9XgBZ5metuW +DSgXCXHsyRqULqsVZKLKZOl/vUBYpj1o +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-bascharage.csr b/vpn/coloradio01/keys/aral-bascharage.csr new file mode 100644 index 0000000..c4cbf06 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bascharage.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9DCCAV0CAQAwgbMxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRgwFgYDVQQDEw9hcmFsLWJhc2NoYXJhZ2UxGDAWBgNV +BCkTD2FyYWwtYmFzY2hhcmFnZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2Fy +bDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA706tuyNT+jzXn7FOGufdr9Oe +sVOFmbCNy8Nhrzpq0jmLli6i5d/2zVD5B92+pxwJKAgivXbFyyAhaJwpqWbQShhU +ga+6eQe9XbF6SD2xQ0xM8Igqkk+1E4Knc4EMDYIP0SpB5DbS70pcVTAHcCjnO8sn +jIJH4mxWK8LWcVlUM2UCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAFK19SuNWPsY +SyBBB8TRPpRAfb5nEmIYmztK+LMdg8Qnwqymg4EAHEFmbPHmUjGONK9i2z2Vve/5 +URt6iUXeDgICaz3iV1FdbLUergDDZRL0nGzSX7fMYGpyn7rOp8rK+6rKf06wxGvK +GyXYsXzafAGJ7Chlw51fz8P4FnQZERBl +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-bascharage.key b/vpn/coloradio01/keys/aral-bascharage.key new file mode 100644 index 0000000..0b02ddc --- /dev/null +++ b/vpn/coloradio01/keys/aral-bascharage.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAO9OrbsjU/o815+x +Thrn3a/TnrFThZmwjcvDYa86atI5i5YuouXf9s1Q+QfdvqccCSgIIr12xcsgIWic +Kalm0EoYVIGvunkHvV2xekg9sUNMTPCIKpJPtROCp3OBDA2CD9EqQeQ20u9KXFUw +B3Ao5zvLJ4yCR+JsVivC1nFZVDNlAgMBAAECgYBP9r9wt+ZYyLnYX7vUm8Pk+9ac +NGeBKpDHFLtwfRmys43kGiNOot7qTnNYYI1Tc7fPi6BoJOcE7/CZ7wyw0W0pn7fM +RccYTEIRHhgnRwGQZPfZfj9uBLD28HRqU/EfZsKkmFAfEtublr16O8JLhvRK6x6q +oAkIzT5un1F5gKP/QQJBAPrgOGjoWRoy61iROy95qbs3f1nZZop8Mzb3dSj7wsTn +QfRMRzC1UK78J+e9oBeniXcGs3NUKJU2wUfrFN+IuDECQQD0MfgDM4xuPmkKR7Br +/xjmaAzYIJuDlTVV8novG7KJOxV+o8FYVd3kh/hV4K5TuG7HX51ZZe2By2C7zESR +fBV1AkEAkafQ2IfeA6oAniFj/YJjm0DzfZUNReYqTgWKTkstn+iskEwhIRSETbQ0 +7wVXh6RL2YFYeuMn1Mo/maPRMJ9OYQJBAIEq9U9sMvoVlSZU6WMW2qr1muWvydL+ +V+oQisTkV7nzQNlt8VWyhd7edWOnp06tnhtj3i1tlwYy+AYedJ6oDgkCQCWsPOzS +uJ8d8V6sEHhLdGFci+JU2Rpv4JrdkPcJJVKAzPVkgjvrH8CinrUQB2RI088OqAxy +DfuaJyXpoNo3Q4s= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-bertrange.crt b/vpn/coloradio01/keys/aral-bertrange.crt new file mode 100644 index 0000000..61b473f --- /dev/null +++ b/vpn/coloradio01/keys/aral-bertrange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 26 (0x1a) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 12 08:28:01 2015 GMT + Not After : Apr 9 08:28:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bertrange/name=aral-bertrange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ae:ab:70:ff:72:ff:7c:24:6c:45:36:54:da:e6: + b8:a8:e5:a5:dc:f3:3a:b2:2d:16:33:17:98:57:06: + 1b:0e:c2:e8:96:ab:79:52:8e:27:3b:a1:7b:cf:26: + a4:4f:50:88:3e:c5:9a:b7:44:25:14:2c:d1:c7:ac: + fd:0c:61:d8:1b:4d:28:b0:f0:9a:c7:9b:d6:4d:80: + 53:bb:4a:f3:b7:3f:8f:d6:8d:59:60:82:9a:03:4e: + 97:16:f2:b1:20:b9:47:fb:83:16:5e:55:3b:88:6d: + 2b:7f:3a:59:54:1a:bc:e6:c2:ce:6e:c6:0c:ea:78: + b9:f1:12:8c:d7:64:ea:3b:77 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:B5:33:57:42:FD:EC:18:3E:22:6E:E9:CE:0C:6F:8F:4D:7F:6D:8E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1a:75:0b:c2:52:40:7d:1e:bc:aa:ad:0a:7d:4a:4f:4f:71:d4: + 1f:c8:4d:54:5c:69:3c:d3:8d:99:ac:95:7d:07:6a:7d:52:fb: + 6e:45:36:bc:c3:3b:16:99:08:28:d5:fc:cb:ca:31:ba:87:5a: + e4:1f:f3:fe:0f:ee:8a:44:44:a6:52:44:af:71:40:81:bd:6b: + 72:c7:29:ab:6f:f9:ef:95:a0:63:23:53:83:24:b5:66:a3:2a: + f0:63:1a:3a:f1:8d:66:5d:9b:b4:90:d7:33:ea:c3:8b:e2:2d: + 88:66:59:a6:73:64:ba:bb:10:ec:0b:3a:62:9d:4a:b1:8c:5e: + 89:6b +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBGjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTIwODI4MDFaFw0yNTA0MDkwODI4MDFaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1iZXJ0cmFuZ2UxFzAVBgNVBCkTDmFyYWwtYmVydHJhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCuq3D/cv98JGxFNlTa5rio5aXc8zqyLRYzF5hXBhsOwuiWq3lS +jic7oXvPJqRPUIg+xZq3RCUULNHHrP0MYdgbTSiw8JrHm9ZNgFO7SvO3P4/WjVlg +gpoDTpcW8rEguUf7gxZeVTuIbSt/OllUGrzmws5uxgzqeLnxEozXZOo7dwIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTetTNXQv3sGD4ibunODG+PTX9t +jjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAadQvCUkB9Hryq +rQp9Sk9PcdQfyE1UXGk8042ZrJV9B2p9UvtuRTa8wzsWmQgo1fzLyjG6h1rkH/P+ +D+6KRESmUkSvcUCBvWtyxymrb/nvlaBjI1ODJLVmoyrwYxo68Y1mXZu0kNcz6sOL +4i2IZlmmc2S6uxDsCzpinUqxjF6Jaw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-bertrange.csr b/vpn/coloradio01/keys/aral-bertrange.csr new file mode 100644 index 0000000..7fa6f06 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bertrange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8jCCAVsCAQAwgbExCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRcwFQYDVQQDEw5hcmFsLWJlcnRyYW5nZTEXMBUGA1UE +KRMOYXJhbC1iZXJ0cmFuZ2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmww +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK6rcP9y/3wkbEU2VNrmuKjlpdzz +OrItFjMXmFcGGw7C6JareVKOJzuhe88mpE9QiD7FmrdEJRQs0ces/Qxh2BtNKLDw +mseb1k2AU7tK87c/j9aNWWCCmgNOlxbysSC5R/uDFl5VO4htK386WVQavObCzm7G +DOp4ufESjNdk6jt3AgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQA8E+QEPiETwQxq +I8PlXat5fP2XB/hRRdINJg6zg8asxib7gHnneqPD03V9D0nYxcoiXX9t4kJLvcbF +CBDrUGTLPxGOxQ+Tq7DFaMpHVm6wpuzHPW3UTxuEbzmTW8RQOIhQN0XuVv7UlLrZ +Fu+NK4Jqm/A3jLq4K9gu1Q8nIps+zQ== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-bertrange.key b/vpn/coloradio01/keys/aral-bertrange.key new file mode 100644 index 0000000..a957e89 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bertrange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAK6rcP9y/3wkbEU2 +VNrmuKjlpdzzOrItFjMXmFcGGw7C6JareVKOJzuhe88mpE9QiD7FmrdEJRQs0ces +/Qxh2BtNKLDwmseb1k2AU7tK87c/j9aNWWCCmgNOlxbysSC5R/uDFl5VO4htK386 +WVQavObCzm7GDOp4ufESjNdk6jt3AgMBAAECgYEAoAhJrnIhbA8+96bQ1gKf23cU +oTxkYcz3UvZiSBE7BypCyZDvxlihz3ujoObJkjW5rrGDkDeqNTLfPS/cZNTclpsm +zdkfLJFWd8zpKiXlOzPs3gAFh2N4VTF95s70My6Fe9t51RtHhrJ3KwmcufTWJy2U +w7t8E/MdSYL6MjCvyAECQQDcgEPu0g9zeLjLBs9ts9dIe4TOBEE0pwSDo/fxjO+H +NiMS7IVwSL0hjgjPKGXqgxMW9zAIDfGX0kzycy+yV5wBAkEAyspIMk1fz+lEwyTk +Mas5bdrlHVtXR5J+O52f3lE8Mk9U45OvdQrdowipPX30wp/aAgXW1grySDmJEXtm +Day3dwJBAKv5dgJL3zUmUKo4c4uSGjQz8g5kDx8rrD+noPfJ/f8s4AogYqqCcNA8 +4O4BCgvvkvH0dIezqFvK76yg3fBwmAECQHPXO4iolGvTJ/mFkGkjE2pCmZC8hc4X +y85IS3OW2hkvIiHiUl88tsEUCIFc+z1WTRXMuh2JIT/Kxhbbc7+qAx8CQHKDUrn7 +xH11hiYGkCHxEBi920gW9oX9PQtM58J+Z9MtK30ZEvJc/81ApKwbqRVljE+7qqKY +LA/bPsMpm7ZkdHE= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-bettembourg.crt b/vpn/coloradio01/keys/aral-bettembourg.crt new file mode 100644 index 0000000..71bf031 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bettembourg.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bettembourg/name=aral-bettembourg/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:7f:9d:a2:76:0c:81:71:36:1b:6a:e6:2d:a2: + 5d:96:f6:9b:46:72:55:92:e0:a0:6c:1e:dd:8c:f0: + ec:04:41:5b:79:5d:22:48:a9:18:04:13:52:51:b0: + ba:13:43:66:03:af:16:b1:50:8a:5d:cc:4a:6f:ff: + 93:ef:8b:15:f5:fd:a2:df:c4:b1:1c:12:be:07:6a: + f5:5a:30:ca:47:6f:c9:18:54:0e:a5:bf:f7:a9:ed: + 44:3f:e5:ce:e9:99:4e:35:a9:6d:ad:c4:ff:39:89: + 94:de:cf:54:81:9b:da:25:5e:72:1b:c0:1f:6e:6a: + a5:f6:b2:92:8b:3a:57:cd:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 84:AA:59:BE:86:AB:33:A6:59:6F:16:14:C3:1D:91:D3:57:73:44:7F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2e:9a:e2:71:c1:52:c1:72:0f:ce:96:a7:8d:e8:f0:ac:30:b2: + c1:80:22:82:e6:d9:11:ba:d0:2c:bc:81:41:07:3f:8c:f7:00: + 5a:a4:b2:90:b1:e9:75:ee:fc:2e:c9:c5:f9:ce:37:ae:6c:ad: + e2:d7:a1:65:e6:bd:ae:dc:b9:24:be:2e:b8:95:64:c9:1b:8a: + a0:9f:7f:98:cf:70:05:e0:ed:0a:b8:28:26:6e:0c:4b:9e:11: + 3c:e6:9c:5c:b2:7e:c1:ba:ab:e3:d2:ac:b0:8b:ef:e8:20:5f: + 3b:06:7c:60:e4:d9:8f:52:3e:98:88:58:e6:79:60:30:66:db: + 55:ce +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1iZXR0ZW1ib3VyZzEZMBcGA1UEKRMQYXJhbC1iZXR0ZW1i +b3VyZzEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAyn+donYMgXE2G2rmLaJdlvabRnJVkuCgbB7djPDsBEFb +eV0iSKkYBBNSUbC6E0NmA68WsVCKXcxKb/+T74sV9f2i38SxHBK+B2r1WjDKR2/J +GFQOpb/3qe1EP+XO6ZlONaltrcT/OYmU3s9UgZvaJV5yG8Afbmql9rKSizpXzXsC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUhKpZvoarM6ZZbxYUwx2R +01dzRH8wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEALpriccFS +wXIPzpanjejwrDCywYAigubZEbrQLLyBQQc/jPcAWqSykLHpde78LsnF+c43rmyt +4tehZea9rty5JL4uuJVkyRuKoJ9/mM9wBeDtCrgoJm4MS54RPOacXLJ+wbqr49Ks +sIvv6CBfOwZ8YOTZj1I+mIhY5nlgMGbbVc4= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-bettembourg.csr b/vpn/coloradio01/keys/aral-bettembourg.csr new file mode 100644 index 0000000..8b97289 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bettembourg.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9jCCAV8CAQAwgbUxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRkwFwYDVQQDExBhcmFsLWJldHRlbWJvdXJnMRkwFwYD +VQQpExBhcmFsLWJldHRlbWJvdXJnMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5z +YXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDKf52idgyBcTYbauYtol2W +9ptGclWS4KBsHt2M8OwEQVt5XSJIqRgEE1JRsLoTQ2YDrxaxUIpdzEpv/5PvixX1 +/aLfxLEcEr4HavVaMMpHb8kYVA6lv/ep7UQ/5c7pmU41qW2txP85iZTez1SBm9ol +XnIbwB9uaqX2spKLOlfNewIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAG8z2O9LL +DJMad3ycEJiTQT2RplF/5HiEYusfIZO3EHUVZMNz/cEybZJcGFfK8TN64Pii9hH/ +UZoLXIBPWvNJnAydIYcH1axCT1qP2mzwidGTXyQ0XJ73JrulPnxnaH/UcF8WTjhj +3ye2eMzhtIl7gg0a8lFeyGWuvjXcBsUTCLM= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-bettembourg.key b/vpn/coloradio01/keys/aral-bettembourg.key new file mode 100644 index 0000000..1c1d962 --- /dev/null +++ b/vpn/coloradio01/keys/aral-bettembourg.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMp/naJ2DIFxNhtq +5i2iXZb2m0ZyVZLgoGwe3Yzw7ARBW3ldIkipGAQTUlGwuhNDZgOvFrFQil3MSm// +k++LFfX9ot/EsRwSvgdq9VowykdvyRhUDqW/96ntRD/lzumZTjWpba3E/zmJlN7P +VIGb2iVechvAH25qpfaykos6V817AgMBAAECgYBx4QLNcoXl5bz//kYkM8NeOqFo +JLRrPVf6dgEyWerhGcBPqEi3hCC1aghJWJHMc4LTX4vre9fUmCbkhV60wAtAo4Pv +QcqdY2J8e+bkfwTiRYgCO8oSXnePjD1zz0rbPveYvgEy6U9ucUaowqad82aXhMMx +OCO7eadxc/6qn2UEwQJBAOr6RR4Nwqhg0slim/NyXFY6cAd3pJ3uDjzGJRlOD3n2 +oEA+UYUjgj38XTTMTLEPiwe0sdQCe+70V47/BsSRlV0CQQDcnXioys7X//bLq4YF +CzngwFYk1ECy1VU0Cr732vcPfFDbayUNqhiIoQyuJtka/hgCbMyWVn151v8/P4JA +Nai3AkBu5LfTzCiusCsqUXhJ9xGuvBt82rD8u4lKkzSU8asKIyNTzlVIoQ5pVH1k +WnpjIXO6qkM2TAnTJstft+mowRAdAkEAu4V2fDL3Io7FnlVLc5oZNjsGfgOUgu3m +oHfJ3y/V9Om8aOVn93dvpyMNfjIzNEhq7BTCyb72pMvk5kP7WMzDfQJAffm3J73d +kRfGViY16CJDULuxoGgXcCO42UaGGASl+GBJN5GwUH/vtEvO6xHoDsqIf0xB22zQ +ZS6M96VidI3LPA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-diekirch.crt b/vpn/coloradio01/keys/aral-diekirch.crt new file mode 100644 index 0000000..16b8c6b --- /dev/null +++ b/vpn/coloradio01/keys/aral-diekirch.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-diekirch/name=aral-diekirch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b9:5c:dd:9f:37:c6:22:8c:8e:a8:ee:4f:9d:5c: + da:24:34:78:44:cc:ba:b9:16:78:7b:24:e8:8c:71: + 1d:b1:da:9a:33:43:02:26:29:46:52:f2:44:e8:d7: + 1a:45:86:09:82:51:c1:04:e6:39:62:24:1b:7e:7e: + 4a:ae:60:0b:1a:1b:a1:5e:e8:27:20:3d:da:a7:37: + 76:82:2d:32:d3:d8:45:81:f8:1e:8c:43:a2:bf:cc: + 46:25:30:a1:c9:ef:fd:66:89:f3:6b:57:f3:29:bf: + 76:20:5d:a3:39:ce:fb:c0:03:60:8a:86:c3:9b:90: + 43:f8:d5:d0:05:71:a2:df:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 94:1A:2B:48:44:38:11:DA:89:21:71:26:B2:62:83:99:94:2A:5A:F7 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 20:f7:79:91:9e:6b:e8:04:8c:7c:9e:4b:65:ff:c0:01:42:8c: + 21:df:7a:9e:0c:36:26:7e:42:f9:09:e8:dd:28:f6:8b:5c:ed: + e7:e3:6d:09:71:cd:23:90:7d:8b:f4:ee:48:8b:ad:fb:93:3f: + 8d:39:75:be:74:e3:20:e3:f0:51:d0:86:37:a3:df:14:57:bf: + 42:ef:c4:75:b4:0b:b3:4c:e0:c3:77:b1:21:d4:70:63:b9:23: + 0e:b2:5a:54:34:bb:0f:9a:18:11:13:65:04:dc:5a:ee:57:0d: + f9:69:56:2d:44:37:35:75:c8:db:5d:a1:d0:94:28:54:8f:a3: + 5f:d5 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1kaWVraXJjaDEWMBQGA1UEKRMNYXJhbC1kaWVraXJjaDEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAuVzdnzfGIoyOqO5PnVzaJDR4RMy6uRZ4eyTojHEdsdqaM0MCJilG +UvJE6NcaRYYJglHBBOY5YiQbfn5KrmALGhuhXugnID3apzd2gi0y09hFgfgejEOi +v8xGJTChye/9Zonza1fzKb92IF2jOc77wANgiobDm5BD+NXQBXGi33sCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlBorSEQ4EdqJIXEmsmKDmZQqWvcw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAIPd5kZ5r6ASMfJ5L +Zf/AAUKMId96ngw2Jn5C+Qno3Sj2i1zt5+NtCXHNI5B9i/TuSIut+5M/jTl1vnTj +IOPwUdCGN6PfFFe/Qu/EdbQLs0zgw3exIdRwY7kjDrJaVDS7D5oYERNlBNxa7lcN ++WlWLUQ3NXXI212h0JQoVI+jX9U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-diekirch.csr b/vpn/coloradio01/keys/aral-diekirch.csr new file mode 100644 index 0000000..a74e7c4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-diekirch.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1hcmFsLWRpZWtpcmNoMRYwFAYDVQQp +Ew1hcmFsLWRpZWtpcmNoMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5XN2fN8YijI6o7k+dXNokNHhEzLq5 +Fnh7JOiMcR2x2pozQwImKUZS8kTo1xpFhgmCUcEE5jliJBt+fkquYAsaG6Fe6Ccg +PdqnN3aCLTLT2EWB+B6MQ6K/zEYlMKHJ7/1mifNrV/Mpv3YgXaM5zvvAA2CKhsOb +kEP41dAFcaLfewIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAgOS02euJTr2WPgpo +BaN8bf0KEbTdxlBy4kqEwbEW/U+BrPo7GJ4o1Apjc3q0XkAkA+vLgjqAoeooaqn+ +QoU+0A+RtfDKwitiUXsQvXpEFv+8XkRiFwYhB9Cxvybq9QovDs7rLtfViBNOqGek +8TkJAc0VDuegovFhJmWfIeNWbpg= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-diekirch.key b/vpn/coloradio01/keys/aral-diekirch.key new file mode 100644 index 0000000..63c72d6 --- /dev/null +++ b/vpn/coloradio01/keys/aral-diekirch.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALlc3Z83xiKMjqju +T51c2iQ0eETMurkWeHsk6IxxHbHamjNDAiYpRlLyROjXGkWGCYJRwQTmOWIkG35+ +Sq5gCxoboV7oJyA92qc3doItMtPYRYH4HoxDor/MRiUwocnv/WaJ82tX8ym/diBd +oznO+8ADYIqGw5uQQ/jV0AVxot97AgMBAAECgYBTcgH3DkWtAferBvViUw2E5PYL +itq4PexpC3mA199VVKK8VvsdsNEOwC/TXhpel/Op7iHlkbrdeoHCFRqLm4MDLZaf +NL7JHHQCelyyJBkXhAocSAGkGYXR4pRlkMpTTb1j33X/et7IpOOzUTsdF/91u+x3 +MJeYcMgBGvEThm3p2QJBAPI3knFwc0fxSEK1jMKJALtdNW/tyKE25da5WH6tNCgy +GdxlB9oCH9VivfecY1Gf+kTlFmcmccKZ9wQ+1nDRhb0CQQDD6RWpEReS57Arm9en +8pXaAG1ZA4wHwMMFraHl7GSiBEtBlp+rLnxBT+e9aO3xX/3oUkek7jT8IEJnElr0 ++EGXAkAAstJUS2u5sGNx9c4THYwH/kvSJ9BlTqA5D03HB77XwtU6QnxUT59B4UgE +98l9icWR/0siPwUi94iz1W6O4rvNAkA2eKJrJbN2RzE2jthBfDOqL6A3tcLDjRcs +hwCS202HtsXt8KFoiT5HMp5ujbRK/rOsWuRMuWbGC3orCnF712L1AkEAjiBEK4hP +tQkNvHgBhgsJ+23sIqkuW6smdrS7V1YXM7mCvShexoh2oS1UWxrl6NLaivJMhP6I +feLiysA9ta1+kQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-differdange.crt b/vpn/coloradio01/keys/aral-differdange.crt new file mode 100644 index 0000000..b20743b --- /dev/null +++ b/vpn/coloradio01/keys/aral-differdange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-differdange/name=aral-differdange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bf:54:75:29:dd:6d:02:02:03:2e:b7:10:57:18: + 58:b3:5b:b7:48:20:a0:d9:19:62:b7:6e:9d:d6:20: + 6d:23:8d:7b:dd:44:d7:38:5b:8a:c3:92:3c:bb:da: + a7:e3:c0:e2:c6:ec:25:7f:b2:f1:04:82:ac:6d:79: + f2:71:bd:48:38:dd:89:2b:c7:d6:c8:7e:54:57:52: + 87:f5:ba:e2:c0:1d:5a:c6:da:34:bd:10:a6:56:da: + 52:58:dc:b2:05:ba:88:7b:94:9e:a5:3c:34:e2:6e: + c6:25:8e:1e:12:cf:61:50:72:f1:5d:ef:58:b2:44: + 9b:d7:e7:5d:f3:fc:69:2a:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:38:B5:8D:15:5A:63:E8:A3:F2:ED:EB:16:D9:85:CA:ED:12:1D:4E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0b:76:ae:5a:b8:a0:27:77:2f:50:6b:27:76:dd:54:52:42:c4: + 64:e5:4c:36:05:df:da:55:0f:aa:1a:e3:f5:4a:58:82:61:5f: + 78:c5:da:c7:9f:1b:e1:74:96:f2:3b:6f:e5:f5:85:c1:39:41: + c8:f3:30:9b:92:8c:fd:3b:82:a1:f9:ac:96:b9:16:73:8f:82: + 10:89:80:e1:07:fc:fb:56:ad:70:79:62:8f:2e:10:09:da:d3: + 80:b4:6c:90:92:35:97:17:4e:81:3f:5a:30:6d:d1:5b:c2:3d: + 57:cd:48:7f:9a:3d:0b:67:62:f8:fa:ff:b7:69:17:1f:0d:2e: + 74:1a +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1kaWZmZXJkYW5nZTEZMBcGA1UEKRMQYXJhbC1kaWZmZXJk +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAv1R1Kd1tAgIDLrcQVxhYs1u3SCCg2Rlit26d1iBtI417 +3UTXOFuKw5I8u9qn48Dixuwlf7LxBIKsbXnycb1ION2JK8fWyH5UV1KH9briwB1a +xto0vRCmVtpSWNyyBbqIe5SepTw04m7GJY4eEs9hUHLxXe9YskSb1+dd8/xpKt8C +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIji1jRVaY+ij8u3rFtmF +yu0SHU4wgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAC3auWrig +J3cvUGsndt1UUkLEZOVMNgXf2lUPqhrj9UpYgmFfeMXax58b4XSW8jtv5fWFwTlB +yPMwm5KM/TuCofmslrkWc4+CEImA4Qf8+1atcHlijy4QCdrTgLRskJI1lxdOgT9a +MG3RW8I9V81If5o9C2di+Pr/t2kXHw0udBo= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-differdange.csr b/vpn/coloradio01/keys/aral-differdange.csr new file mode 100644 index 0000000..5b7c832 --- /dev/null +++ b/vpn/coloradio01/keys/aral-differdange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9jCCAV8CAQAwgbUxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRkwFwYDVQQDExBhcmFsLWRpZmZlcmRhbmdlMRkwFwYD +VQQpExBhcmFsLWRpZmZlcmRhbmdlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5z +YXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/VHUp3W0CAgMutxBXGFiz +W7dIIKDZGWK3bp3WIG0jjXvdRNc4W4rDkjy72qfjwOLG7CV/svEEgqxtefJxvUg4 +3Ykrx9bIflRXUof1uuLAHVrG2jS9EKZW2lJY3LIFuoh7lJ6lPDTibsYljh4Sz2FQ +cvFd71iyRJvX513z/Gkq3wIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAESG6/OuK +C4RVoPC/Q5gHFM43ihBXaLrqhJqRAQUwynHbkKT+hFp7eKg4kmf+uJIy7ky8tjEv +upwmgYkCqua5MlHtldNYSg4YnqL/OIcsNmG9cnikQJZFEVXpgAe4YTSvYZaXV82+ +TOlu4/pKahpZACrleE0jx9YcSM4y5LajaN4= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-differdange.key b/vpn/coloradio01/keys/aral-differdange.key new file mode 100644 index 0000000..3c30917 --- /dev/null +++ b/vpn/coloradio01/keys/aral-differdange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAL9UdSndbQICAy63 +EFcYWLNbt0ggoNkZYrdundYgbSONe91E1zhbisOSPLvap+PA4sbsJX+y8QSCrG15 +8nG9SDjdiSvH1sh+VFdSh/W64sAdWsbaNL0QplbaUljcsgW6iHuUnqU8NOJuxiWO +HhLPYVBy8V3vWLJEm9fnXfP8aSrfAgMBAAECgYB/P6mozVaJhlMdh607b7rWlwIf +22t+2C5adxxMZEaR5bBiqj1Fg0SX67Ou8K7Gf+uTh00tUBKSAGKzcO55DP1xg6YS +b5q85WT/KlsDRzJDRXtBybXBhmq08/u8K4RADYCUWgBKU64wXBgGrZ1RXP4rcTgD +Q0J7yCwaeaSGvUY4MQJBAPw2V1ULVFhsXiaYP/k+Gx0mlor1tkPQ5wnstKI5f2tV +b3h7WH59mOgyCeSGjnCMTGEXVglzJfjk9DrvlXQmapkCQQDCNAwfmShYqfcqsK+G +CyGNPhDnuFOgvc5n0ZYQ/bLZH+CvY8fqlEOxHF1E+2kUyj3fYTDGUT8m3y6tXvAV ++OQ3AkEAnRR3Jedte7jalq0CQwhUOL6cyiUohGoqSvsasWKgIkhOqbogrn8o6Yyo +rqTDOAOZWmr/Udlej/qAxegLrBB1GQJAOCsrknwOwk4uccd2jNNtWdeotgyHC4e6 +SibBO5rU/p2Ms82tRbiqN3CXvVrl0qCH8rK+k61uEYUdkAFUeVZqUwJATVlphE/9 +JmCsjL2rny+e9EJd+B8aOzQXFS6+O3lBXb+RzyyraS5To3whnc+ivePMqXTa2NtT +CV0WIp5PfntDmA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-dudelange.crt b/vpn/coloradio01/keys/aral-dudelange.crt new file mode 100644 index 0000000..986dafb --- /dev/null +++ b/vpn/coloradio01/keys/aral-dudelange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 29 (0x1d) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:47 2015 GMT + Not After : Aug 3 12:02:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-dudelange/name=aral-dudelange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:f3:ec:a1:72:da:83:39:35:4c:c4:f7:d2:c7: + 00:61:2f:9e:a5:0f:eb:63:8d:13:83:a1:62:61:98: + e0:c6:59:5e:10:ed:cf:8a:6f:fd:0e:a7:c2:ab:17: + d9:96:72:ba:05:54:54:b1:d5:bc:1c:ae:75:3c:f5: + 48:03:87:b5:16:c2:08:b9:75:92:95:fe:58:92:f5: + c3:ea:b5:ae:c8:c7:38:38:15:fb:35:aa:71:8e:d5: + bf:22:15:81:f0:d8:1e:e3:c7:3d:50:bc:e3:fa:88: + 83:f7:83:c9:6a:dd:90:07:21:f3:66:49:7a:d8:54: + 75:3f:7d:bb:19:a9:c1:64:e7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 8B:08:10:A5:39:E2:A9:9C:CE:71:28:55:90:AC:D4:50:BD:1A:90:ED + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 50:7d:e1:6b:43:56:74:10:df:b5:93:29:75:fc:70:a6:25:09: + c7:79:75:44:2d:22:b2:76:2e:ac:3e:5c:02:19:98:60:da:a0: + 71:87:16:d5:f9:24:50:d6:1c:78:01:ca:8c:49:6f:d0:7f:0c: + 94:b1:a8:ea:96:51:9c:9f:59:58:94:db:51:15:bb:06:b4:91: + 6b:26:56:5e:d1:10:52:94:27:f0:69:ba:80:3a:b2:ac:e4:86: + 23:0e:8e:6d:d5:78:8c:cf:36:bb:77:63:c2:fc:fd:53:f9:6a: + aa:fe:b5:07:7c:a4:5c:29:8a:fe:ef:06:56:c1:cb:5b:d5:a4: + 7d:16 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBHTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNDdaFw0yNTA4MDMxMjAyNDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1kdWRlbGFuZ2UxFzAVBgNVBCkTDmFyYWwtZHVkZWxhbmdl +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDK8+yhctqDOTVMxPfSxwBhL56lD+tjjRODoWJhmODGWV4Q7c+K +b/0Op8KrF9mWcroFVFSx1bwcrnU89UgDh7UWwgi5dZKV/liS9cPqta7Ixzg4Ffs1 +qnGO1b8iFYHw2B7jxz1QvOP6iIP3g8lq3ZAHIfNmSXrYVHU/fbsZqcFk5wIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBSLCBClOeKpnM5xKFWQrNRQvRqQ +7TCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBQfeFrQ1Z0EN+1 +kyl1/HCmJQnHeXVELSKydi6sPlwCGZhg2qBxhxbV+SRQ1hx4AcqMSW/QfwyUsajq +llGcn1lYlNtRFbsGtJFrJlZe0RBSlCfwabqAOrKs5IYjDo5t1XiMzza7d2PC/P1T ++Wqq/rUHfKRcKYr+7wZWwctb1aR9Fg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-dudelange.csr b/vpn/coloradio01/keys/aral-dudelange.csr new file mode 100644 index 0000000..8fa8f4b --- /dev/null +++ b/vpn/coloradio01/keys/aral-dudelange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8jCCAVsCAQAwgbExCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRcwFQYDVQQDEw5hcmFsLWR1ZGVsYW5nZTEXMBUGA1UE +KRMOYXJhbC1kdWRlbGFuZ2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmww +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMrz7KFy2oM5NUzE99LHAGEvnqUP +62ONE4OhYmGY4MZZXhDtz4pv/Q6nwqsX2ZZyugVUVLHVvByudTz1SAOHtRbCCLl1 +kpX+WJL1w+q1rsjHODgV+zWqcY7VvyIVgfDYHuPHPVC84/qIg/eDyWrdkAch82ZJ +ethUdT99uxmpwWTnAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQBnoE56PpfRKn4+ +fdFPfMn36A+XKwLmmfLcmPflGyHUgaDbU7nzD6vMbdyGhPFBLI64owjC+8/wbsem +tqG3EDgjUJcJqVvXFfxNigxhqh3yQ04cnzXsOC/qgJQ5V096FXMSHchmoArlHFld +LBH38BoBU8s8qr2tXdBiTY87RvqJ6g== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-dudelange.key b/vpn/coloradio01/keys/aral-dudelange.key new file mode 100644 index 0000000..8c554a1 --- /dev/null +++ b/vpn/coloradio01/keys/aral-dudelange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMrz7KFy2oM5NUzE +99LHAGEvnqUP62ONE4OhYmGY4MZZXhDtz4pv/Q6nwqsX2ZZyugVUVLHVvByudTz1 +SAOHtRbCCLl1kpX+WJL1w+q1rsjHODgV+zWqcY7VvyIVgfDYHuPHPVC84/qIg/eD +yWrdkAch82ZJethUdT99uxmpwWTnAgMBAAECgYArZR6aotFAL7JK2O7Yfb6CCUmV +p6LAJYEfqxk7HxIotyEa44513l4wjQRdyvq2ZY+K5i453Cadx1vADf446wJ4Grs6 +YR9+PrUPrJAxQzpruRGYFWu2kPfZBJtaGMSqRCdugxrjQVbUdwcgS8V9ej3/IKo+ +2yp1W9XDVrj67u4FyQJBAOuopXDtgEBcsvdMC2X/p4lVeP2AEYyrA5aZFUO1GaFi +YT+ImNbrhsiBOWpBnHJc0ufHSBlUdQZ8d1ucHSWRXDsCQQDceJMW0xjhdMnzU6YH +8tEDxFzdQefDHlNWA6x3y1w7XScx3z3N2q17XT1z+6TYDgni7qb+yDPyVWIFNsv/ +BwtFAkALcR7HQuDNPzL5Stnq0+TgiCPduxAfElaUQ06DARIDgfFS0mEJXlom9g9B +l3nvG46p7kUT5cPg0r5A1m2b21jtAkEA3GMLZf2PGZCNb9dmWPu5RHK+Ac8nxjxC +QfFaLkXy5MSxsYDfXzAByxfhnlcm6XLfHyJBfN7UTqJbYartMPnxoQJBAM5FGvhU +AIP3Hilrpum4HeeCupR14I5HEqAe4+1mYttG+AMFZUZl58RYuDhQJdXR/amD1utq +1AdPXCQCdhbK/zk= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-ettelbruck.crt b/vpn/coloradio01/keys/aral-ettelbruck.crt new file mode 100644 index 0000000..e27517d --- /dev/null +++ b/vpn/coloradio01/keys/aral-ettelbruck.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-ettelbruck/name=aral-ettelbruck/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:82:59:8a:c7:67:50:38:f9:3e:68:9f:ea:bd: + 0b:b5:67:77:c7:0e:59:8a:97:5b:d9:ce:24:01:21: + 20:ec:63:89:46:32:13:36:2c:bc:08:83:91:db:dd: + 9a:5b:34:db:ca:8e:72:03:e4:67:51:02:3b:13:7a: + 0d:e2:f5:c1:86:b0:57:a9:54:2a:18:78:d8:0c:72: + 30:db:ec:8b:80:45:fe:c0:6a:30:1e:49:2f:31:0b: + 26:dd:39:68:6e:28:be:f4:26:30:8e:40:3c:4c:b0: + 29:16:7e:cd:42:15:b7:bc:40:4f:5f:4c:5b:fd:2e: + 80:00:a9:66:0f:67:26:bd:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 6E:F0:E9:22:EA:31:F0:42:6A:73:AE:C4:33:01:8D:D8:29:0D:07:59 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 0f:2d:e8:6a:7f:36:b1:72:a2:23:ab:66:53:da:0c:f9:b5:e6: + 33:94:35:01:e9:a6:d7:85:13:c2:21:ff:33:bf:ab:c6:e8:4c: + 52:81:e6:b2:eb:e1:bc:3d:1b:a0:8f:3b:ba:19:8b:f9:69:24: + ef:ef:4c:87:79:b5:96:a3:a1:b8:28:d7:1e:33:70:67:bd:6a: + 67:75:ea:b4:8c:e9:a6:20:d7:3d:5d:27:b3:54:e6:7a:65:95: + c6:b6:86:ad:3c:0c:89:c5:49:ab:88:16:b7:ec:a1:aa:9f:cc: + de:19:04:9b:91:4c:01:7a:1a:f0:b4:6f:f1:e8:5c:0b:92:71: + 3d:4f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1ldHRlbGJydWNrMRgwFgYDVQQpEw9hcmFsLWV0dGVsYnJ1 +Y2sxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANeCWYrHZ1A4+T5on+q9C7Vnd8cOWYqXW9nOJAEhIOxjiUYy +EzYsvAiDkdvdmls028qOcgPkZ1ECOxN6DeL1wYawV6lUKhh42AxyMNvsi4BF/sBq +MB5JLzELJt05aG4ovvQmMI5APEywKRZ+zUIVt7xAT19MW/0ugACpZg9nJr0dAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFG7w6SLqMfBCanOuxDMBjdgp +DQdZMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAA8t6Gp/NrFy +oiOrZlPaDPm15jOUNQHppteFE8Ih/zO/q8boTFKB5rLr4bw9G6CPO7oZi/lpJO/v +TId5tZajobgo1x4zcGe9amd16rSM6aYg1z1dJ7NU5npllca2hq08DInFSauIFrfs +oaqfzN4ZBJuRTAF6GvC0b/HoXAuScT1P +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-ettelbruck.csr b/vpn/coloradio01/keys/aral-ettelbruck.csr new file mode 100644 index 0000000..bd5edbd --- /dev/null +++ b/vpn/coloradio01/keys/aral-ettelbruck.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9DCCAV0CAQAwgbMxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRgwFgYDVQQDEw9hcmFsLWV0dGVsYnJ1Y2sxGDAWBgNV +BCkTD2FyYWwtZXR0ZWxicnVjazEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2Fy +bDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA14JZisdnUDj5Pmif6r0LtWd3 +xw5Zipdb2c4kASEg7GOJRjITNiy8CIOR292aWzTbyo5yA+RnUQI7E3oN4vXBhrBX +qVQqGHjYDHIw2+yLgEX+wGowHkkvMQsm3Tlobii+9CYwjkA8TLApFn7NQhW3vEBP +X0xb/S6AAKlmD2cmvR0CAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAALjWl99X9T/ +rmMLlzF5IWiZK+sCCRnm7ve2Qz1ALb7HolvnqLm9/X/qs/QE8A5kNs7MxuowLK/v +VWqzW10y3JiMRyk30tSHnb6FhReq+Saa/yLyMu6G0DxPvbfQc5b7LPE6x2JS+lQu +vC1HfVUZzoY6Xpc6nFycXgpMIL158okf +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-ettelbruck.key b/vpn/coloradio01/keys/aral-ettelbruck.key new file mode 100644 index 0000000..75aa552 --- /dev/null +++ b/vpn/coloradio01/keys/aral-ettelbruck.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANeCWYrHZ1A4+T5o +n+q9C7Vnd8cOWYqXW9nOJAEhIOxjiUYyEzYsvAiDkdvdmls028qOcgPkZ1ECOxN6 +DeL1wYawV6lUKhh42AxyMNvsi4BF/sBqMB5JLzELJt05aG4ovvQmMI5APEywKRZ+ +zUIVt7xAT19MW/0ugACpZg9nJr0dAgMBAAECgYEAmqDlfITspQvsEhJhw7zW3Ncb +gxDRwHYvqkyVWtYZWGNmyJ3/WNyqIfW9PyN2sEBx/5lLR22nj+Fo3+WwdwtcSeWj +hP4Q0BqIxDcs2eiDmwZt58WBh7wcDIztbJ45LXhjNvyzzsgiKGX1NYuSXEOpaf0L +zAvvqhtAbUI+tnRVX6ECQQDxsUKvSW3FIGxUMmJW/RzamyUc/WK+CVxx8oxBBOp+ +TN1eKL0E0dRO8aAbdenoDe8dwZyjWL+RTshk/e8mTbxZAkEA5ERLRe1mVSMKL40R +SIYyirF76fBbNLe8QgAMrkuHcke3FausKy6Jx1Le+KRUu2tvYmHPLuWJha5508+k +gJEeZQJBAJzSw84w+wTZkPDg8GY5PiuqV16EGznroQxesRrPMchZ35llHaCu9e9z +YMvwqqFjyS+pnRVwVHzYfbbp/e8AqaECQQDipazX0dA52IDUlg0DJbwpWfDfZ3gn +8AdMwR/WL8hdADgZnEtm1N6YuwAJgaFgNlxyIwvEVMUnpwXv+cwsm+rBAkBbozGK +2e1YNddN8rMGjJ+0p8npt9gLEsEKZQI57Aq/c5+8wBvQkJpoAn1F+3o8m6Sep5yO +L1jvT4i/moMAIKdQ +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-foetz.crt b/vpn/coloradio01/keys/aral-foetz.crt new file mode 100644 index 0000000..7353a30 --- /dev/null +++ b/vpn/coloradio01/keys/aral-foetz.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-foetz/name=aral-foetz/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:dd:c5:b3:57:48:1c:d1:71:ba:7c:97:e0:15:24: + 4f:7b:47:ee:21:ae:8f:7f:5e:dc:d1:85:83:e8:a0: + b1:49:f7:b6:59:8e:7c:6b:4b:da:6b:e4:24:16:59: + 5d:a6:9e:56:58:82:4b:ac:9e:81:b5:40:ac:06:c4: + 35:ff:79:e6:54:8e:07:19:99:e7:79:e5:18:6c:95: + 37:fb:2b:15:45:17:96:b1:20:c7:fa:9a:42:27:fa: + 8c:9a:e0:7e:3c:ca:9f:e5:f4:34:d3:14:3b:66:65: + 60:54:ef:23:55:d2:a9:67:d3:36:f3:39:77:b6:1c: + 7f:cd:6f:e6:9e:ee:72:04:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + F8:68:77:94:C0:C6:E0:4C:A2:26:D2:50:A8:F3:15:9C:CF:2B:DF:5C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3e:ee:41:10:65:da:af:2e:72:f7:d9:81:a6:78:b8:0b:64:56: + bc:db:92:b3:83:16:0e:af:5d:36:c6:c1:f9:32:a4:97:7e:49: + 3d:e9:8b:2a:fe:b7:e1:0f:1a:59:da:15:9b:93:25:25:f7:1d: + be:7b:e1:cc:d9:ac:ff:67:89:68:79:36:ec:77:36:73:35:e1: + 7d:fb:c6:f2:b4:9b:68:c4:6c:06:d1:16:89:bb:eb:2e:b0:d3: + c6:df:a8:6b:77:34:89:22:00:ad:c8:3d:58:ba:95:c7:ae:0d: + 61:86:8d:35:b9:1d:35:b0:4b:a3:f5:4b:d4:ab:45:8d:1a:f9: + 2b:75 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1mb2V0ejETMBEGA1UEKRMKYXJhbC1mb2V0ejEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA3cWzV0gc0XG6fJfgFSRPe0fuIa6Pf17c0YWD6KCxSfe2WY58a0vaa+QkFlld +pp5WWIJLrJ6BtUCsBsQ1/3nmVI4HGZnneeUYbJU3+ysVRReWsSDH+ppCJ/qMmuB+ +PMqf5fQ00xQ7ZmVgVO8jVdKpZ9M28zl3thx/zW/mnu5yBM0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+Gh3lMDG4EyiJtJQqPMVnM8r31wwgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAPu5BEGXary5y99mBpni4C2RW +vNuSs4MWDq9dNsbB+TKkl35JPemLKv634Q8aWdoVm5MlJfcdvnvhzNms/2eJaHk2 +7Hc2czXhffvG8rSbaMRsBtEWibvrLrDTxt+oa3c0iSIArcg9WLqVx64NYYaNNbkd +NbBLo/VL1KtFjRr5K3U= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-foetz.csr b/vpn/coloradio01/keys/aral-foetz.csr new file mode 100644 index 0000000..8eace50 --- /dev/null +++ b/vpn/coloradio01/keys/aral-foetz.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6jCCAVMCAQAwgakxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRMwEQYDVQQDEwphcmFsLWZvZXR6MRMwEQYDVQQpEwph +cmFsLWZvZXR6MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqG +SIb3DQEBAQUAA4GNADCBiQKBgQDdxbNXSBzRcbp8l+AVJE97R+4hro9/XtzRhYPo +oLFJ97ZZjnxrS9pr5CQWWV2mnlZYgkusnoG1QKwGxDX/eeZUjgcZmed55RhslTf7 +KxVFF5axIMf6mkIn+oya4H48yp/l9DTTFDtmZWBU7yNV0qln0zbzOXe2HH/Nb+ae +7nIEzQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAk5eOuYiICGrdOm2kfzcoudrv +bAMEFl4myjdM965CGYbOF6WLIEhsD4lXSlYE/lGa5go/UDasCAmu7gjPdPV+ZCmk +c/ygv3pTzwm8D5xz8c8+0digg2nHDtg9KmqfzFuieqnC9up8Q2k0DwmkN6Kl9BYN +bdA7lXfRewEzo7wSY7I= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-foetz.key b/vpn/coloradio01/keys/aral-foetz.key new file mode 100644 index 0000000..06c6afb --- /dev/null +++ b/vpn/coloradio01/keys/aral-foetz.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAN3Fs1dIHNFxunyX +4BUkT3tH7iGuj39e3NGFg+igsUn3tlmOfGtL2mvkJBZZXaaeVliCS6yegbVArAbE +Nf955lSOBxmZ53nlGGyVN/srFUUXlrEgx/qaQif6jJrgfjzKn+X0NNMUO2ZlYFTv +I1XSqWfTNvM5d7Ycf81v5p7ucgTNAgMBAAECgYAXjVdufYoR9DIJ6Vcy55hJT2pK +yW8T588rsTJBEk/BuzzyZd9wxa18p83tUbBQcaBZ5fyDaJH93dBnJ49Ugm2jepGj +5+OlQ8QLyIDgfEaHxAtPvmWY0dyTYUZ0QFWSMcn42F+gFu2YNOu/LG3l8A+xenFv +5pKustv7tC0hDrmkAQJBAPRrOPOuHd609QifK1eSZF//tfSPqIPXaFrm5QeH320k +zKL8k7/fL8Buc0Req2DD/TgzyWynPcah6qRc2DcmJj0CQQDoR8b+OOAqiI83Yu1b +MrE/a+GCiK41aMpLt8Aw4H86T78wilOvqe2Tu5agSGduKHMPbeQPzxlh1Rx2d+21 +udHRAkEAgu5JNOhJ4fpn5LV3P1MRaAeQTjECoZWrtj5H5A/aFRqIcKsC7t69MsU4 +BCD+hziWFhxPw1+XjSdBjciannhWNQJARsLfB0FSYQK7Bnd3sYmu35BA4eA7mf+z +aP+wZ/NsLtpudx4cwm3090V1bJzCDZf6/V9P09UWeWxPwHNmki7qkQJAZr1fL/5S ++MmqTp7RQ2jrro7NaPDkllXs8ydUTnaLSvJcxkgQ69SlcGPKBn5b+IuYbX8nR1l9 +JXzYX3tWIAv7Rw== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-frisange.crt b/vpn/coloradio01/keys/aral-frisange.crt new file mode 100644 index 0000000..df8c1fa --- /dev/null +++ b/vpn/coloradio01/keys/aral-frisange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-frisange/name=aral-frisange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:98:e5:5e:16:e0:2b:41:c2:e6:5f:ed:f4:dc:2f: + a5:87:99:93:65:78:e5:41:d3:bb:1b:2d:b4:a3:ee: + 91:93:46:27:3a:fe:b3:e2:55:e0:81:7a:df:04:cf: + 5c:bd:9f:77:10:43:0a:26:a8:a9:6e:cd:24:83:10: + 8d:cd:8b:56:3c:ab:ea:df:e2:a1:40:20:70:13:89: + 4b:85:5f:be:3c:9e:7e:1d:8f:cb:01:e6:70:3d:87: + ef:ee:0c:de:75:8f:48:01:5d:08:0a:3e:fa:4c:5d: + 80:4e:fa:85:29:4c:50:e4:fc:07:c0:df:f0:b6:79: + cd:f0:9a:50:83:b1:be:bf:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3D:8E:BE:A3:6A:4B:E7:13:B7:21:40:2C:90:9E:30:9F:56:E8:68:B0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:c9:6d:6f:2c:1b:1b:ee:45:8c:c5:12:98:4f:a2:8f:fe:02: + 3b:0f:63:de:5e:7e:c3:7e:cc:09:f1:a8:52:8b:f0:b4:b0:5a: + 94:47:2f:69:eb:ab:7a:26:55:fa:dc:5b:0c:b2:b3:8f:5a:4e: + f0:6b:7f:c2:ec:ee:58:fd:00:47:a6:19:93:ae:3c:e0:2d:e3: + 65:e5:d6:92:e6:c7:3a:53:24:09:b1:37:c3:3c:18:f6:f1:9c: + 73:13:87:ea:c5:68:cb:5f:e7:cb:d3:fc:82:f4:55:ed:57:c8: + e0:8c:f3:39:e3:0a:ca:d9:be:14:8f:11:1c:76:49:75:d2:0a: + b9:bd +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1mcmlzYW5nZTEWMBQGA1UEKRMNYXJhbC1mcmlzYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAmOVeFuArQcLmX+303C+lh5mTZXjlQdO7Gy20o+6Rk0YnOv6z4lXg +gXrfBM9cvZ93EEMKJqipbs0kgxCNzYtWPKvq3+KhQCBwE4lLhV++PJ5+HY/LAeZw +PYfv7gzedY9IAV0ICj76TF2ATvqFKUxQ5PwHwN/wtnnN8JpQg7G+vxECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUPY6+o2pL5xO3IUAskJ4wn1boaLAw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAa8ltbywbG+5FjMUS +mE+ij/4COw9j3l5+w37MCfGoUovwtLBalEcvaeureiZV+txbDLKzj1pO8Gt/wuzu +WP0AR6YZk6484C3jZeXWkubHOlMkCbE3wzwY9vGccxOH6sVoy1/ny9P8gvRV7VfI +4IzzOeMKytm+FI8RHHZJddIKub0= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-frisange.csr b/vpn/coloradio01/keys/aral-frisange.csr new file mode 100644 index 0000000..31ea40c --- /dev/null +++ b/vpn/coloradio01/keys/aral-frisange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1hcmFsLWZyaXNhbmdlMRYwFAYDVQQp +Ew1hcmFsLWZyaXNhbmdlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCY5V4W4CtBwuZf7fTcL6WHmZNleOVB +07sbLbSj7pGTRic6/rPiVeCBet8Ez1y9n3cQQwomqKluzSSDEI3Ni1Y8q+rf4qFA +IHATiUuFX748nn4dj8sB5nA9h+/uDN51j0gBXQgKPvpMXYBO+oUpTFDk/AfA3/C2 +ec3wmlCDsb6/EQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEARepp38VzTqXBJglX +XhYMb90SlD7bM2sVXPn+7RKFIDVCTS0G/jj5Oq53oe/i2b2tYxeBOojaR6kA6wcV +G1DZYr0uWsEGl7E5zP6Oy+X5NHI1ISkKbOe9N+jYXK32THe+SVHBm/xUu3+26iyL +980BvzfENTHzBnaD076wnxJvWK4= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-frisange.key b/vpn/coloradio01/keys/aral-frisange.key new file mode 100644 index 0000000..63fd119 --- /dev/null +++ b/vpn/coloradio01/keys/aral-frisange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAJjlXhbgK0HC5l/t +9NwvpYeZk2V45UHTuxsttKPukZNGJzr+s+JV4IF63wTPXL2fdxBDCiaoqW7NJIMQ +jc2LVjyr6t/ioUAgcBOJS4Vfvjyefh2PywHmcD2H7+4M3nWPSAFdCAo++kxdgE76 +hSlMUOT8B8Df8LZ5zfCaUIOxvr8RAgMBAAECgYEAiKDOx5pijU1hGHBH00swnE/8 +izzRgVV3af4Z4jQaGoUiIXHhxWwARzRJfr7enQSXHQ0LUSh+3+iprAVq8jaFRCiq +OcoU+nFQmhbs1TcBoVKiUQnJYSjirlTnv3s6jsak0cixkKLd35e3t4x9gUh5b23N +c34FtbdSoWrv1Ktoc9ECQQDJCe+lgJ1K3hddZL4RzjST6yLDa1G3C5BAHvRTNvxa +v0N2Q1IiXs+1XMmC1vdVqIflsry9+n47ENBQ5NX/AbQzAkEAwrIRSMujdCWvRh3N +vVumqlZlJH0D8lF/xL0TYWFZaXakjxDX/Ds86p7LeiQo4UvilvLvseBzrC1BTzPn +Ef4bqwJAek2/K1KJXoiqcjjdoPtv5SVBat2ZQuCYC0pJnW5wK8z7/7CJATvo5Q7j +0ONyaPw0YLtSM8l2jfx2nx/4SEEDHQJAaHVVZLMtXXGimoH/EquLvjRgS7VvWqFz +ZcD0Fvk+GaF4JPIqj7/QrSjJjxy7ejVWuxpYlB0SsrwNIEt+nF6zxQJAf2EQ3+3F +mDgNBrpazvQm/4l4iIjwjn0BTfZkw4Ob0igb0q3/jjWkPQUgqzc08JWo3HovEpOO +euaHyT9Zb/zhng== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-gonderange.crt b/vpn/coloradio01/keys/aral-gonderange.crt new file mode 100644 index 0000000..929c50c --- /dev/null +++ b/vpn/coloradio01/keys/aral-gonderange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-gonderange/name=aral-gonderange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:92:21:29:80:d2:b4:b4:7f:52:86:17:2f:04: + a1:c0:37:dc:5c:f3:2c:53:69:78:53:fc:b8:71:34: + 7b:8c:4f:d0:0a:12:89:0e:ce:e5:a3:c0:42:a9:d4: + 72:88:d1:ac:49:4f:e4:b7:41:43:1a:08:d1:df:f3: + cc:93:7f:7c:e4:54:ba:b3:9b:79:3a:44:e1:fa:8a: + 9e:b3:b1:40:7e:60:3e:e4:63:84:97:e4:27:37:d2: + d6:a1:dc:a5:83:6c:93:9f:b2:18:41:71:74:65:34: + b9:4c:02:87:62:a8:e1:02:74:e6:ea:50:1e:9d:a2: + 56:6f:e8:57:0f:b7:d4:11:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + DE:93:AB:3C:FF:E1:2B:99:BE:9E:9F:30:B6:9B:51:D2:59:55:58:35 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 3d:c7:56:d0:40:92:16:d6:1d:99:14:bb:98:b8:6a:8c:20:cf: + ab:77:4e:23:93:71:ce:0e:50:fb:73:61:cc:a9:cd:65:42:2a: + ba:ac:f6:d9:b9:f1:f9:c7:cb:ab:bb:c0:a3:ba:44:be:0c:5c: + 18:af:1e:30:93:fe:10:79:9e:32:05:61:12:05:34:48:9b:95: + 8f:a2:d6:b8:61:f6:5d:99:ff:af:c6:76:75:6f:1c:30:62:48: + 5c:04:76:de:39:dc:0e:3b:65:92:3d:15:96:ce:5d:96:6e:cb: + e6:2d:dc:f5:6f:90:d7:f0:bc:11:4b:8c:9f:48:12:4b:0a:4f: + 66:8d +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1nb25kZXJhbmdlMRgwFgYDVQQpEw9hcmFsLWdvbmRlcmFu +Z2UxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMmSISmA0rS0f1KGFy8EocA33FzzLFNpeFP8uHE0e4xP0AoS +iQ7O5aPAQqnUcojRrElP5LdBQxoI0d/zzJN/fORUurObeTpE4fqKnrOxQH5gPuRj +hJfkJzfS1qHcpYNsk5+yGEFxdGU0uUwCh2Ko4QJ05upQHp2iVm/oVw+31BGtAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFN6Tqzz/4SuZvp6fMLabUdJZ +VVg1MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAD3HVtBAkhbW +HZkUu5i4aowgz6t3TiOTcc4OUPtzYcypzWVCKrqs9tm58fnHy6u7wKO6RL4MXBiv +HjCT/hB5njIFYRIFNEiblY+i1rhh9l2Z/6/GdnVvHDBiSFwEdt453A47ZZI9FZbO +XZZuy+Yt3PVvkNfwvBFLjJ9IEksKT2aN +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-gonderange.csr b/vpn/coloradio01/keys/aral-gonderange.csr new file mode 100644 index 0000000..58e1217 --- /dev/null +++ b/vpn/coloradio01/keys/aral-gonderange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9DCCAV0CAQAwgbMxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRgwFgYDVQQDEw9hcmFsLWdvbmRlcmFuZ2UxGDAWBgNV +BCkTD2FyYWwtZ29uZGVyYW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2Fy +bDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyZIhKYDStLR/UoYXLwShwDfc +XPMsU2l4U/y4cTR7jE/QChKJDs7lo8BCqdRyiNGsSU/kt0FDGgjR3/PMk3985FS6 +s5t5OkTh+oqes7FAfmA+5GOEl+QnN9LWodylg2yTn7IYQXF0ZTS5TAKHYqjhAnTm +6lAenaJWb+hXD7fUEa0CAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAINWbmQJGH2x +q1S0f0zm2CI02n8mNKYXoRnTs2oKmhi2KFclWnDM6YnhLbBYoCH8XAN9G15paUgz +sVrOmxzSvKTWlp9sC2K2rzwyDvgZ+bsuDfnlYyLwA7vKBuP5jlhVX7eomzvGjT1z +r/m3jr96ie3WX8dFGrFjuqXeh4We9jC5 +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-gonderange.key b/vpn/coloradio01/keys/aral-gonderange.key new file mode 100644 index 0000000..fb29f0e --- /dev/null +++ b/vpn/coloradio01/keys/aral-gonderange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeQIBADANBgkqhkiG9w0BAQEFAASCAmMwggJfAgEAAoGBAMmSISmA0rS0f1KG +Fy8EocA33FzzLFNpeFP8uHE0e4xP0AoSiQ7O5aPAQqnUcojRrElP5LdBQxoI0d/z +zJN/fORUurObeTpE4fqKnrOxQH5gPuRjhJfkJzfS1qHcpYNsk5+yGEFxdGU0uUwC +h2Ko4QJ05upQHp2iVm/oVw+31BGtAgMBAAECgYEAgDNSqCTo3kmWWRQzlpHplmlw +3CVFYd/IyhIH9OgeVAVHGcDkLujkIRvcykr2dZJ1c0M/AladqOdHJJrY2E7TTPtB +6pMKVniY5T9pV4tYNPigf/A5uHbCRN+mTfelSwgGFTMhkNuqFqgdcSIkj4tBwCD5 +NBn2zZjjf5TVjj+t8jkCQQD6s43X4diQo+S8ZDRxKAcpqXb42CEEytyRagZzUakU +1uExn74cwHHQVuzZ8gkVoJCaDECUpG4G5k5/bHkcH9+XAkEAzdS/2rpRoax9c6Jc +PP1HyBWzR9okcolzjYNe50ACy+INyMRAxXvpWvMvr3hc4W2aQ1qTmkT9KSucQT77 +QGABWwJBALFdovafA/ag3U0jn66G4TpqeI9paULYut/uIQ4pMfRaagwPthLlXCBH +v14aTK8OX/98t5vyER20hsjD15M8QZUCQQCnxBWQSTcKCNbD7n0x9NuSGSXklcgJ +V0FJAd/TqtfcqGbF0jhc/q9oQzkF05wY3cXTyjrujfaunO4iPBx8DwRrAkEAlxem +v3wtmoDTA4uOJaw6AaDpLpWwA4RqoTB0AduEBrdMTjW1uN+hNFSL59TDbBtlue7A +XbDPKO5cVHy2SMeFvg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-hoscheiddickt.crt b/vpn/coloradio01/keys/aral-hoscheiddickt.crt new file mode 100644 index 0000000..3b42bdc --- /dev/null +++ b/vpn/coloradio01/keys/aral-hoscheiddickt.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-hoscheiddickt/name=aral-hoscheiddickt/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d6:80:4d:8e:14:c4:f4:5d:b4:7f:f2:d2:c3:92: + b1:c7:81:05:17:0a:cf:ce:8c:4d:81:3e:43:c7:54: + 5a:1e:69:b6:c2:c9:97:0e:d1:cf:e9:3e:6e:0c:99: + 17:15:0f:c3:94:40:51:90:3d:af:e4:b4:c8:bd:db: + 58:90:cd:1a:ab:9f:d2:0a:09:19:5f:e5:2e:fa:98: + e2:73:55:b8:07:16:9b:f0:af:25:88:98:b2:e6:18: + ab:68:e5:32:da:de:10:6e:f3:ea:93:15:17:d7:0a: + a6:80:4b:1c:6d:d5:e3:82:f0:ac:21:f2:5b:d3:90: + 95:02:69:fa:8e:15:f3:f5:35 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + BD:61:E5:30:4B:88:A4:5D:39:44:B3:F0:17:FC:88:74:83:15:A9:38 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 4f:d0:7c:e9:02:35:94:6b:2d:ef:2e:8f:da:12:d5:2e:8c:6d: + fa:f9:d5:e8:52:32:7b:21:a1:41:1a:5e:2c:d6:e8:c0:18:39: + 5c:2c:ed:4b:34:5d:6d:43:a6:36:3f:97:8c:f8:4d:5e:72:ee: + 6b:2b:9b:5d:ba:77:79:a1:70:ea:54:b6:3e:94:57:02:fd:a5: + f4:9b:9c:fa:30:41:d1:d0:9b:0d:39:fd:30:9f:59:e4:c8:64: + 9b:e0:a8:63:3c:2c:b9:41:24:0b:10:60:5b:5a:da:ed:d1:a7: + 28:09:1a:4f:03:48:8b:2c:2c:1a:2e:3a:65:3a:42:24:64:8e: + 8d:5c +-----BEGIN CERTIFICATE----- +MIIEOjCCA6OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG5MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEb +MBkGA1UEAxMSYXJhbC1ob3NjaGVpZGRpY2t0MRswGQYDVQQpExJhcmFsLWhvc2No +ZWlkZGlja3QxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZI +hvcNAQEBBQADgY0AMIGJAoGBANaATY4UxPRdtH/y0sOSsceBBRcKz86MTYE+Q8dU +Wh5ptsLJlw7Rz+k+bgyZFxUPw5RAUZA9r+S0yL3bWJDNGquf0goJGV/lLvqY4nNV +uAcWm/CvJYiYsuYYq2jlMtreEG7z6pMVF9cKpoBLHG3V44LwrCHyW9OQlQJp+o4V +8/U1AgMBAAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5 +LVJTQSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFL1h5TBLiKRdOUSz +8Bf8iHSDFak4MIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGu +pIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYD +VQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsT +BlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFC +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0l +BAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAE/Q +fOkCNZRrLe8uj9oS1S6Mbfr51ehSMnshoUEaXizW6MAYOVws7Us0XW1DpjY/l4z4 +TV5y7msrm126d3mhcOpUtj6UVwL9pfSbnPowQdHQmw05/TCfWeTIZJvgqGM8LLlB +JAsQYFta2u3RpygJGk8DSIssLBouOmU6QiRkjo1c +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-hoscheiddickt.csr b/vpn/coloradio01/keys/aral-hoscheiddickt.csr new file mode 100644 index 0000000..afb10d0 --- /dev/null +++ b/vpn/coloradio01/keys/aral-hoscheiddickt.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+jCCAWMCAQAwgbkxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRswGQYDVQQDExJhcmFsLWhvc2NoZWlkZGlja3QxGzAZ +BgNVBCkTEmFyYWwtaG9zY2hlaWRkaWNrdDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bk +a3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA1oBNjhTE9F20f/LS +w5Kxx4EFFwrPzoxNgT5Dx1RaHmm2wsmXDtHP6T5uDJkXFQ/DlEBRkD2v5LTIvdtY +kM0aq5/SCgkZX+Uu+pjic1W4Bxab8K8liJiy5hiraOUy2t4QbvPqkxUX1wqmgEsc +bdXjgvCsIfJb05CVAmn6jhXz9TUCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAMsv +33LkxLRN6Bc/dBSsEuRXcfn6u6a5mMtTFqqVTefa2uTLhnlk2QjEjEjzHEhf6XHy +gCZsMWRIE7IoE1v6Ko15pv6NA6Hd+TcfLkN5Itm3N4GZaloq+JzMLTyvwtE+6bxV +KYFmj+UpX974utquoWaHMuxxsMTHFwq5SzT7yhjD +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-hoscheiddickt.key b/vpn/coloradio01/keys/aral-hoscheiddickt.key new file mode 100644 index 0000000..9702fe4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-hoscheiddickt.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANaATY4UxPRdtH/y +0sOSsceBBRcKz86MTYE+Q8dUWh5ptsLJlw7Rz+k+bgyZFxUPw5RAUZA9r+S0yL3b +WJDNGquf0goJGV/lLvqY4nNVuAcWm/CvJYiYsuYYq2jlMtreEG7z6pMVF9cKpoBL +HG3V44LwrCHyW9OQlQJp+o4V8/U1AgMBAAECgYAPiW2UrAZ0GNF5LxJ7HgYIiFzh +BWR19o2qneL07jQ03b1iMI3jgekIYQBBo1kbqm+lLl96Di3OaBXeQqQQoPqcb9eC +blBVaW5SlxH/ekilUdHw6MYINgavMfrXZJsuHb37i2tLMxjK4kwT3CxNA8aq0nE7 +IEsYwLQKdUyaFaqopQJBAPNKF9SUK3jOYC+bf2PEIew4h7+4G7cie4Rd6oopuysD +bOIZQ+c282fx4YCEQLd74xlWUGkXiJH383N1LwJBRMsCQQDhtS17gNnxirhtquhI +BDP7/tjoJnSymQhybvaXuoK3hYYC/vQgV7/Sb0Jl2MXXSjNwOHNZJnfEKnN3yPo3 +Mm3/AkAuHgJsanXfHYfAHoLEX55qj8Czx+uBCIlPaxoVfJmdKrYOGen0P0dekcxE +N02pOlOvLtxpP2vE97JvVWxGyiaHAkBD5P4zgoUM1Y+43YpV7327teOFodvExaf2 +1E41QhOEJRQ03oCNIhg/stwkStrochebEEASdzHbvnFRfRFXfUH9AkEAkAFBxcw4 +SYijzOlDOGtEKbs8TOVuboajXAxDP/x0Zj7+JUxfOxQOGqzNDR4NOFDRb3XX0MK0 +mIDRlcsenUMj8A== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-howald.crt b/vpn/coloradio01/keys/aral-howald.crt new file mode 100644 index 0000000..6d8f2bc --- /dev/null +++ b/vpn/coloradio01/keys/aral-howald.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-howald/name=aral-howald/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:92:60:d7:83:b3:15:79:c7:c2:f1:e9:91:d6: + fa:3a:2c:04:c1:ea:14:d6:ec:d5:44:81:99:08:8f: + 42:05:d8:0b:10:98:8b:f7:61:ad:43:de:c0:87:3d: + db:f7:a3:99:4a:2b:d3:3e:42:cb:6d:65:5b:f3:2e: + d8:d8:d8:3d:81:7a:6a:b2:0f:3c:e7:cf:88:7d:5f: + 40:80:4e:fd:ea:57:b6:33:e6:b2:e9:56:6d:4e:36: + 6e:c9:f0:93:ef:53:32:22:c7:a6:03:c3:8d:3b:f9: + 66:4b:36:78:ca:1b:3d:79:4f:a7:44:62:a9:73:02: + 2e:b1:b4:dd:61:09:0c:cf:ad + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B6:E4:6E:21:5F:F2:4D:7F:5C:B4:C2:9E:C1:E3:11:0C:51:AE:70:C4 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 88:8f:2b:e5:19:08:b9:ac:05:66:b2:e8:66:62:cb:8d:3c:bf: + 77:39:d8:0d:85:ba:b3:4b:4a:b4:4f:d7:ab:f6:59:52:f3:ba: + 34:6a:b5:a3:8c:68:f2:18:93:88:17:bd:5c:b5:e6:0d:6d:84: + 89:7c:2e:14:49:d9:fd:05:ee:1f:99:61:b8:0a:d4:ca:b0:5e: + 0d:ec:39:9b:da:86:10:f1:2f:78:fa:3f:8d:09:76:57:2a:ba: + 41:e7:38:d6:fe:fd:f9:f1:d3:a5:00:73:10:60:3b:95:4e:f1: + 33:db:8d:25:db:4e:f0:71:27:ca:b1:dd:b0:3b:a3:95:4c:49: + 19:74 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1ob3dhbGQxFDASBgNVBCkTC2FyYWwtaG93YWxkMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDNkmDXg7MVecfC8emR1vo6LATB6hTW7NVEgZkIj0IF2AsQmIv3Ya1D3sCH +Pdv3o5lKK9M+QsttZVvzLtjY2D2BemqyDzznz4h9X0CATv3qV7Yz5rLpVm1ONm7J +8JPvUzIix6YDw407+WZLNnjKGz15T6dEYqlzAi6xtN1hCQzPrQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS25G4hX/JNf1y0wp7B4xEMUa5wxDCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCIjyvlGQi5rAVmsuhmYsuN +PL93OdgNhbqzS0q0T9er9llS87o0arWjjGjyGJOIF71cteYNbYSJfC4USdn9Be4f +mWG4CtTKsF4N7Dmb2oYQ8S94+j+NCXZXKrpB5zjW/v358dOlAHMQYDuVTvEz240l +207wcSfKsd2wO6OVTEkZdA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-howald.csr b/vpn/coloradio01/keys/aral-howald.csr new file mode 100644 index 0000000..7d2c409 --- /dev/null +++ b/vpn/coloradio01/keys/aral-howald.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7DCCAVUCAQAwgasxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRQwEgYDVQQDEwthcmFsLWhvd2FsZDEUMBIGA1UEKRML +YXJhbC1ob3dhbGQxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJ +KoZIhvcNAQEBBQADgY0AMIGJAoGBAM2SYNeDsxV5x8Lx6ZHW+josBMHqFNbs1USB +mQiPQgXYCxCYi/dhrUPewIc92/ejmUor0z5Cy21lW/Mu2NjYPYF6arIPPOfPiH1f +QIBO/epXtjPmsulWbU42bsnwk+9TMiLHpgPDjTv5Zks2eMobPXlPp0RiqXMCLrG0 +3WEJDM+tAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQA203qdBEJB3f+makj15CSb +RXFk/dWZy7RCmVuE/HGNWI/5x6kh3gijzawR+ziT2CADv2y/GpiDmnVzOvYMOSch +DnPgA6SasWdMg4V8UeDuDIDDNTVx0EZpCiVM8LiYXFjqvetQy4jSDOU9Si1fkxJd +MKez+iK02FrmSwtI2RXwWQ== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-howald.key b/vpn/coloradio01/keys/aral-howald.key new file mode 100644 index 0000000..ebd69ee --- /dev/null +++ b/vpn/coloradio01/keys/aral-howald.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAM2SYNeDsxV5x8Lx +6ZHW+josBMHqFNbs1USBmQiPQgXYCxCYi/dhrUPewIc92/ejmUor0z5Cy21lW/Mu +2NjYPYF6arIPPOfPiH1fQIBO/epXtjPmsulWbU42bsnwk+9TMiLHpgPDjTv5Zks2 +eMobPXlPp0RiqXMCLrG03WEJDM+tAgMBAAECgYEAvkomXLireFCvSlRWSkq+fESs +7rd5LO40CGMSvqqlifVPYMBkp80B7xZuD4KCcLw+tDrXIwX/erddo0EVN70LSHu7 +HVeVAzYAwfOUEt14bO2QdA1gjrxm0rryDKjBT4wV8n0YWNcULftOq6LlhiXSbuGb +r/YbYIrR1LWn3AVO0iECQQDplJI1qMKAXZOtHp4zZHgZ+NZ1FJz5c/gkhbzMmMOt +w7rHUQncOYiy6/cNuRQjINyIk/WCFEV8hFS1QjGsVVpFAkEA4U2X9TevOUzdyS5r +Li6+l3/f0ov6r/Bhi3phyuDOugW0OIu+BYDbbgYiV0XFw0a2GvOvn5ydYMpbNh3M +9BfqSQJBAM6+IPd7qsRhjy9g9Ve5qpAabv9sQlCNM+pnsSdKY5BuuOhoMxkIl5T+ +REqSMV+yW2BLzbbX6HUAz9UrhLnrRh0CQFHcY44RgXUMXLkwSHkrOszJBYX2nks2 +x/ppqQaR0Ar+75BsFcriGthLGkcjbsuY8amxSOpxeS0l2SY8ha9a0SECQAccD/C3 +oiGb4GsLu2ULm1awhrSXQFe3f3qseeCaoay9jT7vsvbkYjPNTM/FyB/NpC4wR1+6 +CfICXuFBoUJASfQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-junglinster.crt b/vpn/coloradio01/keys/aral-junglinster.crt new file mode 100644 index 0000000..aa36d0e --- /dev/null +++ b/vpn/coloradio01/keys/aral-junglinster.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:54 2015 GMT + Not After : Feb 8 17:48:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-junglinster/name=aral-junglinster/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d7:d2:cb:4c:be:98:5b:13:02:f3:01:04:f2:bb: + 5c:b9:e5:de:e9:f7:f5:80:09:57:53:35:f6:67:a5: + 90:01:e7:89:79:41:c5:0a:62:b1:ac:a4:10:90:4b: + 88:c9:e1:e7:19:02:f3:d6:03:b5:d7:e0:8c:88:46: + ae:c0:00:9c:84:42:0d:1b:2b:77:93:83:c2:9d:cf: + 12:52:30:6d:46:75:3a:68:77:9d:84:84:3f:ce:6e: + df:70:0d:42:2e:4e:c3:87:51:6e:19:11:dd:d5:0d: + 7a:68:df:1f:e1:d0:ea:10:fb:60:0a:e8:e8:89:bd: + 7c:e0:dd:5f:82:72:e5:cf:d5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FA:91:BE:0D:F3:06:EB:6A:00:F1:6A:D7:B1:09:D3:7B:11:DC:68:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 54:06:7f:2d:fc:d6:46:a6:86:1a:fa:85:80:57:c1:07:fd:ea: + e5:ec:c8:94:59:07:15:17:c3:d9:2d:71:d4:8c:89:2f:a5:2d: + a6:fa:07:15:01:70:98:e3:60:a2:c1:5e:23:6a:6e:3b:68:58: + 1b:3a:71:bd:9a:77:95:4b:5d:a6:56:10:c0:3e:59:77:72:1c: + 4e:34:3d:dd:ba:ba:49:b6:68:ad:30:69:95:00:e7:f8:c3:ff: + 76:43:43:ab:65:43:4c:b1:53:a4:25:94:98:ad:a7:53:1b:82: + af:ec:9e:ab:5c:bd:44:53:bc:52:77:9e:eb:fd:a2:54:35:2b: + 04:47 +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NTRaFw0yNTAyMDgxNzQ4NTRaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1qdW5nbGluc3RlcjEZMBcGA1UEKRMQYXJhbC1qdW5nbGlu +c3RlcjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA19LLTL6YWxMC8wEE8rtcueXe6ff1gAlXUzX2Z6WQAeeJ +eUHFCmKxrKQQkEuIyeHnGQLz1gO11+CMiEauwACchEINGyt3k4PCnc8SUjBtRnU6 +aHedhIQ/zm7fcA1CLk7Dh1FuGRHd1Q16aN8f4dDqEPtgCujoib184N1fgnLlz9UC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU+pG+DfMG62oA8WrXsQnT +exHcaKAwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAVAZ/LfzW +RqaGGvqFgFfBB/3q5ezIlFkHFRfD2S1x1IyJL6UtpvoHFQFwmONgosFeI2puO2hY +GzpxvZp3lUtdplYQwD5Zd3IcTjQ93bq6SbZorTBplQDn+MP/dkNDq2VDTLFTpCWU +mK2nUxuCr+yeq1y9RFO8Unee6/2iVDUrBEc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-junglinster.csr b/vpn/coloradio01/keys/aral-junglinster.csr new file mode 100644 index 0000000..655be7d --- /dev/null +++ b/vpn/coloradio01/keys/aral-junglinster.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9jCCAV8CAQAwgbUxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRkwFwYDVQQDExBhcmFsLWp1bmdsaW5zdGVyMRkwFwYD +VQQpExBhcmFsLWp1bmdsaW5zdGVyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5z +YXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDX0stMvphbEwLzAQTyu1y5 +5d7p9/WACVdTNfZnpZAB54l5QcUKYrGspBCQS4jJ4ecZAvPWA7XX4IyIRq7AAJyE +Qg0bK3eTg8KdzxJSMG1GdTpod52EhD/Obt9wDUIuTsOHUW4ZEd3VDXpo3x/h0OoQ ++2AK6OiJvXzg3V+CcuXP1QIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEALbFCLSPs +fYYcetPZPpKCIRACibmQYHw0hJF6U7Sl8gLKTYqIDV6MmwIBjmAqcXQFSX6PbgK7 +xNeMYXD6LPoW0gkPltRYTTijJAUXJnSVmHNef84pd8Dl4v5s/623ETMjms5JjCl9 +KZbFdYA8Ss2rA8bif9BPaxYqmmVxylBgyrg= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-junglinster.key b/vpn/coloradio01/keys/aral-junglinster.key new file mode 100644 index 0000000..0f38ec4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-junglinster.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANfSy0y+mFsTAvMB +BPK7XLnl3un39YAJV1M19melkAHniXlBxQpisaykEJBLiMnh5xkC89YDtdfgjIhG +rsAAnIRCDRsrd5ODwp3PElIwbUZ1Omh3nYSEP85u33ANQi5Ow4dRbhkR3dUNemjf +H+HQ6hD7YAro6Im9fODdX4Jy5c/VAgMBAAECgYBnXmnK1xqnvEJUWy+ghoaR7vxG +OWHXMiImE5lx6QVBNEFO12ZlZAHPO0FHqzXX45/JBfX9kgddXwpQFvKJuYE8oa1B +IqJm9+ZleckpdfTAY4hiXrO2monU9PTd5L3ePAmEHfF6LpmdRMNjAvAESUxZkbBx +zBjiDrUKuGtQ7/yd3QJBAPt0xuP6nqQWjMBzShZu6zEEgZq0lH8dE3H2Rf29pzWj +Gl6ysyDxuRSTIVFEBS3kJpLE5n4yGa5ME6RSDQX0XIMCQQDbuS6Xsf0ApItC0AmR +kBrI9HgfskqvaEUuI+MAxBPLFioXisfqSQMeY9PQSXb9TUE+Bl6nBt5DR8oFpZF0 +TaLHAkEAiOkdPZYAeHE6s7JSHYLJFchRVM2LqOZI5xzjIPP5LdAflH4R4Bcc4aH2 +WwwBEeqOQg1pPj7DEs6jRy3Rn3NcRwJBAMUu9O9R3hl7kTaOeGfXiRIawsq/OGMe +EieMMSX40UKKS5ABDdPlXhUhxW7A3zYG5KwDD2KZuVFr1ZMnuNdE7PUCQQDZBJ2N +HesMtZVVvRC0Ks67jH1pNX06HsdBtyYZHbkXEa0IqUJSWbz1QVtNemmoqJXawMil +xyiY0qQmaYDsHLJT +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-lintgen.crt b/vpn/coloradio01/keys/aral-lintgen.crt new file mode 100644 index 0000000..750b2ce --- /dev/null +++ b/vpn/coloradio01/keys/aral-lintgen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lintgen/name=aral-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c0:b5:1f:8c:6a:e1:ab:9c:17:94:17:00:d4:63: + a8:96:c8:b4:f9:97:5d:7e:5b:37:75:b2:9d:63:c4: + 09:07:63:a1:83:6b:5d:eb:4f:da:64:58:d1:b5:22: + a2:ff:27:50:22:94:12:c4:90:2a:86:e5:e4:ea:be: + 66:6e:df:fe:80:9e:0a:37:65:68:ab:19:bd:f2:58: + 4b:eb:a7:8c:cb:87:f3:e2:d2:4f:8b:a8:92:10:8e: + f1:97:e9:61:db:ae:cf:a2:68:65:06:2b:1d:72:4f: + f5:07:10:29:23:7b:20:c6:4f:3b:ac:dd:ab:64:62: + 59:e2:8a:99:f6:81:bc:2b:31 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 62:CE:EB:EE:00:A6:44:3F:E9:3C:7C:77:FE:75:FE:14:ED:65:BD:A0 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:bd:da:83:e0:f5:ff:06:6c:ae:75:ee:24:44:95:7e:ed:5a: + 2d:e1:33:28:01:6b:6e:18:c1:62:2e:c8:2b:fd:48:60:fd:7e: + cd:77:8c:a1:be:5e:40:59:a8:57:13:7b:dd:a8:d2:58:7f:e5: + a1:03:c2:ae:cd:ca:1b:57:79:3c:61:25:70:ad:10:6a:e0:17: + 33:e2:c3:85:37:74:7e:a5:a7:86:68:fb:01:f7:e3:db:b2:24: + 86:cb:f1:08:7d:11:77:10:fb:0e:ed:16:c1:65:54:b5:37:39: + 5f:7e:ee:8b:e7:ee:6d:af:1d:24:ac:0b:ef:8b:c4:eb:2a:cc: + fb:79 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1saW50Z2VuMRUwEwYDVQQpEwxhcmFsLWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMC1H4xq4aucF5QXANRjqJbItPmXXX5bN3WynWPECQdjoYNrXetP2mRY +0bUiov8nUCKUEsSQKobl5Oq+Zm7f/oCeCjdlaKsZvfJYS+unjMuH8+LST4uokhCO +8ZfpYduuz6JoZQYrHXJP9QcQKSN7IMZPO6zdq2RiWeKKmfaBvCsxAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGLO6+4ApkQ/6Tx8d/51/hTtZb2gMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAGm92oPg9f8GbK517iRE +lX7tWi3hMygBa24YwWIuyCv9SGD9fs13jKG+XkBZqFcTe92o0lh/5aEDwq7NyhtX +eTxhJXCtEGrgFzPiw4U3dH6lp4Zo+wH349uyJIbL8Qh9EXcQ+w7tFsFlVLU3OV9+ +7ovn7m2vHSSsC++LxOsqzPt5 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-lintgen.csr b/vpn/coloradio01/keys/aral-lintgen.csr new file mode 100644 index 0000000..b434d1d --- /dev/null +++ b/vpn/coloradio01/keys/aral-lintgen.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLWxpbnRnZW4xFTATBgNVBCkT +DGFyYWwtbGludGdlbjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwLUfjGrhq5wXlBcA1GOolsi0+Zddfls3 +dbKdY8QJB2Ohg2td60/aZFjRtSKi/ydQIpQSxJAqhuXk6r5mbt/+gJ4KN2Voqxm9 +8lhL66eMy4fz4tJPi6iSEI7xl+lh267PomhlBisdck/1BxApI3sgxk87rN2rZGJZ +4oqZ9oG8KzECAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAGFYnJ8GJRX6TXm2Bp56 +AzYKMc5OfVUG4xAfz1HP7OKgg9EQ45fJoR5X7hkpIVuBnnW/Qg94bvO+T3R31hT2 +1Ak5FaB49mJOjRumeHGKpU46Iv/YmEV72ApJ6mKBxNq95I+LDtG1RvXmYLaPKFcP +raq09O5wyCDmBPtxoWTmf9Bd +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-lintgen.key b/vpn/coloradio01/keys/aral-lintgen.key new file mode 100644 index 0000000..e365755 --- /dev/null +++ b/vpn/coloradio01/keys/aral-lintgen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMC1H4xq4aucF5QX +ANRjqJbItPmXXX5bN3WynWPECQdjoYNrXetP2mRY0bUiov8nUCKUEsSQKobl5Oq+ +Zm7f/oCeCjdlaKsZvfJYS+unjMuH8+LST4uokhCO8ZfpYduuz6JoZQYrHXJP9QcQ +KSN7IMZPO6zdq2RiWeKKmfaBvCsxAgMBAAECgYEAhXXrH4h2Oi+kdL9pp65NeAAQ +tjsKWRQ7WJwXPJzr095AYY/eP7XR/mU090nBsQw9B3WdedyOV1aoL5slvewLiTqq +esl8qdZGqTlmO2OENphnLD86WEXbSJPjcCN2hArhAHpWx0TnClfkQxqZQTbDjYAd +wOYpB9/1eR+8jm4O/nECQQD1778wXNZzHZXVIRJPJ4tRJ100DrLeb+bke40CoV/t +alX74xtkwBKAxGBXPWfttoLm9Ute1NpUVWzNL+QNOVbbAkEAyJfJsqWFLKLYjXVR +imSbcofR5/IRCHjZ30bBJ9NTHXviwHBPd27ojslCfXhyYwqJDhpKdg0JBcwvxXWL +Houl4wJAUeLiuLqgmLGoGs+pJfvXsky2BshCHDgMG9VbbR3IL+ew+25xx4kAYCmC +nmmOuiKD0VypHMkobN4InQUuHI0T8wJAfOdHCJ5YVnrwLOUoaOxMfvxjj/IC+SuH +PqhoDcxgrLM/dmR4lv3QgViAtnARieo9fTKRuwBS5fFGrcWLYvHB0QJAZJB7zRUE +qQU9QjxPQUlQNc3Va5nCvSIK9hGrk2kbZuqBWVOuMxhTSyRtpH1ddQf35L92Tnrl +SMcuHkH9O5BEog== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-merl.crt b/vpn/coloradio01/keys/aral-merl.crt new file mode 100644 index 0000000..bfffa68 --- /dev/null +++ b/vpn/coloradio01/keys/aral-merl.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl/name=aral-merl/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a1:fe:c3:c0:57:be:58:a1:a4:93:e2:33:05:1d: + d5:15:9a:69:a8:2b:49:f1:d4:b9:66:2e:f8:03:48: + a7:29:36:99:93:75:a3:ce:35:a3:d5:90:e2:bc:26: + db:a2:38:37:a4:ee:51:0a:56:32:f7:52:a0:e8:61: + 51:cc:77:d2:18:60:21:75:4e:89:61:94:9f:4a:8f: + a2:2f:97:00:eb:0d:9d:b3:3b:bf:22:cd:e9:5d:1f: + 9a:92:37:77:9c:19:0d:89:36:01:1b:0e:e4:84:71: + 9b:fe:66:0e:30:af:c4:9e:67:b8:3a:f2:05:b1:ab: + f7:e6:74:1e:dc:c8:d0:df:8b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2B:E5:FC:40:2C:5F:B3:56:E0:CF:ED:60:8B:3F:74:25:F7:4E:F6:37 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:70:73:77:9e:32:68:3e:aa:92:6d:ee:8b:64:0f:3c:0a:cd: + 85:0c:6f:f4:db:25:f9:d3:69:50:51:51:a7:8c:d9:74:27:92: + cc:bd:ee:47:df:b5:b0:f6:e0:1b:9f:a1:42:5f:94:b5:c0:9b: + ef:0a:47:04:d9:c8:f6:fe:29:bb:85:34:1c:28:c2:72:cc:b5: + 58:da:33:96:55:83:05:0b:98:3b:82:45:81:a5:6b:f0:e4:ac: + 27:fc:12:6a:a5:26:11:19:a6:38:d9:1d:02:11:37:f9:62:0e: + f9:2f:d3:8b:10:a8:79:4d:d7:e8:5d:34:a3:36:0e:38:c3:4a: + b4:70 +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJYXJhbC1tZXJsMRIwEAYDVQQpEwlhcmFsLW1lcmwxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +AKH+w8BXvlihpJPiMwUd1RWaaagrSfHUuWYu+ANIpyk2mZN1o841o9WQ4rwm26I4 +N6TuUQpWMvdSoOhhUcx30hhgIXVOiWGUn0qPoi+XAOsNnbM7vyLN6V0fmpI3d5wZ +DYk2ARsO5IRxm/5mDjCvxJ5nuDryBbGr9+Z0HtzI0N+LAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFCvl/EAsX7NW4M/tYIs/dCX3TvY3MIHdBgNVHSME +gdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1wc3eeMmg+qpJt7otkDzwKzYUM +b/TbJfnTaVBRUaeM2XQnksy97kfftbD24BufoUJflLXAm+8KRwTZyPb+KbuFNBwo +wnLMtVjaM5ZVgwULmDuCRYGla/DkrCf8EmqlJhEZpjjZHQIRN/liDvkv04sQqHlN +1+hdNKM2DjjDSrRw +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-merl.csr b/vpn/coloradio01/keys/aral-merl.csr new file mode 100644 index 0000000..96eed54 --- /dev/null +++ b/vpn/coloradio01/keys/aral-merl.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6DCCAVECAQAwgacxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRIwEAYDVQQDEwlhcmFsLW1lcmwxEjAQBgNVBCkTCWFy +YWwtbWVybDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG +9w0BAQEFAAOBjQAwgYkCgYEAof7DwFe+WKGkk+IzBR3VFZppqCtJ8dS5Zi74A0in +KTaZk3WjzjWj1ZDivCbbojg3pO5RClYy91Kg6GFRzHfSGGAhdU6JYZSfSo+iL5cA +6w2dszu/Is3pXR+akjd3nBkNiTYBGw7khHGb/mYOMK/Enme4OvIFsav35nQe3MjQ +34sCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAAvLlpBSvhP+FHl4MSRMj4fyiyi8 +rLxF9k6gAhUjvl6plkrCkYT1c6wdVKkSQ3WqepdAja6Nu8yfDcIpLi4197Nquh5Z +kv+3TbOWIJ6jhN24Huz1tti1KBgtQ1AkFLSp5+5TlVe3DnWdFzJsImcw1z1xUDQT +Q/xL9FO6DNYK6Bei +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-merl.key b/vpn/coloradio01/keys/aral-merl.key new file mode 100644 index 0000000..e4e2b6d --- /dev/null +++ b/vpn/coloradio01/keys/aral-merl.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAKH+w8BXvlihpJPi +MwUd1RWaaagrSfHUuWYu+ANIpyk2mZN1o841o9WQ4rwm26I4N6TuUQpWMvdSoOhh +Ucx30hhgIXVOiWGUn0qPoi+XAOsNnbM7vyLN6V0fmpI3d5wZDYk2ARsO5IRxm/5m +DjCvxJ5nuDryBbGr9+Z0HtzI0N+LAgMBAAECgYEAlkqITfCZ1hzRVaosb3jH8mz5 +zV2sEsKq5xR4YIONIn1XailgObYmM8Nht/HNHulNJqU7Zn2mdzKfujhf7XTU4vKa +zCvM2Qo/YfAXdvOtPimDBvtbX45EYk45FA/CI3RVqS1LZHcm6lMVLunUy8j3shoH ++93fLvp8UJZjlWKFn5ECQQDNhtTbfiFiECFzywMAxlth7o9iukdwDlkH4CxVyZ3V +8Dqp0rNMolRIMIXRbN7pVZtfEjZDXWQ2UbnJDbyZx/OXAkEAyccrXUnudfljTGwo +lzAacRzV3H7JMAv40rjyypJ8YM0rGbtrrjyOjN8JqpFHi32KpspSGFVwRb8NqPPb +JlciLQJACADQGRv4QNFP/CpTm5wdwtp/SuDmFz73yI66Kz0GoGYSYrqJsNpBXe5F +x7ntlDh5LGKRKl5goJzeFy4pwfM/UQJAEcuzE2M12MnJ7C+N1Oe1LUyxv+SesdIc +e9k78InC1nbB2l8hPBizKdFx9M0jVjYYSGWHoAXJBR24grIfHd6JcQJBAIUYjsxy +JhhUC+J5fkA2ZzH4esflk4OvdbwsDhPilZWPWhrz//Kw8Gs2O2vLUtcUmMUJM2OL +M/PhiJWl1yiTpdI= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-mondorf.crt b/vpn/coloradio01/keys/aral-mondorf.crt new file mode 100644 index 0000000..a97e700 --- /dev/null +++ b/vpn/coloradio01/keys/aral-mondorf.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-mondorf/name=aral-mondorf/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:22:31:a1:d9:ed:af:8c:a9:b6:8c:91:54:92: + 29:27:1b:a2:2d:14:a0:18:b3:cb:8d:1c:86:b9:e4: + 2a:51:40:db:ce:a7:57:a8:54:60:ff:bd:9f:d4:ef: + 29:b2:19:69:fb:55:c8:f9:32:d9:06:7a:35:12:d8: + 93:01:64:e3:e2:44:c6:eb:b0:52:28:4c:b9:98:ff: + 52:04:da:d6:07:cf:8c:6d:33:d1:e8:08:42:5b:1d: + fc:8e:96:52:f4:0c:75:c1:6f:a9:78:7b:27:a3:37: + f5:ad:8d:0d:ce:6d:dd:71:d2:1a:22:78:79:29:bf: + eb:34:d7:5e:83:10:af:d5:89 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 98:6E:59:0E:4E:76:63:BE:50:03:11:08:CD:A1:50:14:FE:9F:7D:A5 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a2:88:98:47:0e:90:84:44:37:43:96:8e:be:f8:43:90:d7:c8: + 29:e0:92:86:14:0f:57:a4:24:bf:69:7c:6b:9a:9c:8a:63:85: + 89:39:78:d9:76:40:a1:3e:4c:2f:ef:3f:1a:df:3c:74:99:5f: + 6d:b0:21:c2:ea:25:44:c2:00:3a:f3:37:fb:a7:93:2a:a7:eb: + fa:ff:30:fb:75:c7:46:bf:82:e1:71:0c:56:e9:d8:e0:31:89: + d6:b5:e9:1a:fa:67:83:26:5d:1a:73:24:4c:4d:da:44:f4:b1: + ac:86:a8:ed:2b:8d:42:4e:3c:2e:53:ca:6d:95:10:07:25:32: + fe:99 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1tb25kb3JmMRUwEwYDVQQpEwxhcmFsLW1vbmRvcmYxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOEiMaHZ7a+MqbaMkVSSKScboi0UoBizy40chrnkKlFA286nV6hUYP+9 +n9TvKbIZaftVyPky2QZ6NRLYkwFk4+JExuuwUihMuZj/UgTa1gfPjG0z0egIQlsd +/I6WUvQMdcFvqXh7J6M39a2NDc5t3XHSGiJ4eSm/6zTXXoMQr9WJAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJhuWQ5OdmO+UAMRCM2hUBT+n32lMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAKKImEcOkIREN0OWjr74 +Q5DXyCngkoYUD1ekJL9pfGuanIpjhYk5eNl2QKE+TC/vPxrfPHSZX22wIcLqJUTC +ADrzN/unkyqn6/r/MPt1x0a/guFxDFbp2OAxida16Rr6Z4MmXRpzJExN2kT0sayG +qO0rjUJOPC5Tym2VEAclMv6Z +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-mondorf.csr b/vpn/coloradio01/keys/aral-mondorf.csr new file mode 100644 index 0000000..24eb927 --- /dev/null +++ b/vpn/coloradio01/keys/aral-mondorf.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLW1vbmRvcmYxFTATBgNVBCkT +DGFyYWwtbW9uZG9yZjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4SIxodntr4yptoyRVJIpJxuiLRSgGLPL +jRyGueQqUUDbzqdXqFRg/72f1O8pshlp+1XI+TLZBno1EtiTAWTj4kTG67BSKEy5 +mP9SBNrWB8+MbTPR6AhCWx38jpZS9Ax1wW+peHsnozf1rY0Nzm3dcdIaInh5Kb/r +NNdegxCv1YkCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAARFFa2S+GsgoK/Qq36S +PFvZot0xhHS/fXOz2oxwrucUbNOF9d+OFR3SqXbT1+KyFqiP/ifZUEugMpuNgQ+J +74kn19MCBavV3rAEx+WLz3NMyWPWFGaW+7TQP3pIu9VSW4IB6g9UZGq9cVAjTgz3 +QLn06cNvTciZle/eTZM6jekl +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-mondorf.key b/vpn/coloradio01/keys/aral-mondorf.key new file mode 100644 index 0000000..ba92431 --- /dev/null +++ b/vpn/coloradio01/keys/aral-mondorf.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOEiMaHZ7a+MqbaM +kVSSKScboi0UoBizy40chrnkKlFA286nV6hUYP+9n9TvKbIZaftVyPky2QZ6NRLY +kwFk4+JExuuwUihMuZj/UgTa1gfPjG0z0egIQlsd/I6WUvQMdcFvqXh7J6M39a2N +Dc5t3XHSGiJ4eSm/6zTXXoMQr9WJAgMBAAECgYEA1AV36I1sox891YWceKEN0J7d +pMb/30O0NzjeSMLwd4U1fPFsRELy9uaGV+rEwc3dWa34j3erm8YLpawBBhcV5IWK +jZEqkk9OWc718M+K1DkmsK2nI4qBx05B92f+KqPo7bVhtvV7NpOMd+VzBmkJDgf7 +8E+Or3ymfa+Sd2fkfGECQQD5k8njrrc/sekHH/GoXXU2MIgSuCpBYGfrPP+HdOcn +zqmtz/aHwTu1eG/ieSieZMJ73atLWjf17BvEHNOdpgfjAkEA5u1ezkwGh02p8QeA +1175P31eQlmLqkHwNjGmC48qYip0Pib4SBJe0jaU9eRVyqEJyXgxLkDTz8/NwoYc +cVzwowJAA2p7a+tbRLrppphQVW6aCRjW8/KjWWu5YGXgVXlLJKdWeTOMe0UwzQYN ++fqQjMJySwG4s3pTo8EMjD2cw96e4wJAE5SrBkkSAKUINOTS+vAVqFmEBZI8MnqW +2LGLB83i5SH+a0q4oLvWCHMSXGs5Dw5qmwey+94JV8SiCM2AWehsiwJBALWoiYjW +x6hKkmYrdVy+q/6FRgD38GkdPvVtxLrTXhtBAR7dqoSjttAadMN+jOY5ewVSYUvG +sxKUo+CE9eumpU8= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-niederfeulen.crt b/vpn/coloradio01/keys/aral-niederfeulen.crt new file mode 100644 index 0000000..94267c9 --- /dev/null +++ b/vpn/coloradio01/keys/aral-niederfeulen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-niederfeulen/name=aral-niederfeulen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9e:f8:4f:68:ef:e9:12:66:c1:99:27:98:76:b1: + a3:15:44:a4:2b:05:4a:22:86:97:ba:2b:f1:91:39: + 04:1b:9f:0e:1a:6f:3f:f1:8c:03:42:32:cc:f0:54: + 82:43:4a:b7:f5:a6:c5:46:47:58:5e:82:3c:02:47: + 89:b1:8d:6c:59:6c:74:25:0c:8f:14:77:11:1c:94: + a9:b8:97:54:9b:34:40:89:21:83:fd:54:6a:ad:20: + 92:75:72:f8:59:59:02:d0:c6:01:9e:71:a3:1f:a2: + 26:2a:08:b8:f7:ee:cc:15:b7:e5:5d:53:59:73:35: + d0:e3:89:43:dd:75:99:df:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:C6:35:EA:56:0A:7C:16:AB:47:8D:9E:8E:75:60:51:DA:F8:A1:0E + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 08:7e:c1:e1:05:1b:8f:1f:0a:23:fd:a4:d6:87:de:0b:9a:31: + 18:13:7b:57:a7:2c:3a:38:ac:0c:dd:1c:e1:03:5a:c3:8e:d3: + f6:93:a0:a0:a1:c0:ef:82:77:ca:6c:8b:9d:36:26:7f:99:86: + e0:80:59:85:9d:0c:10:dd:d7:db:45:63:68:b3:6d:ec:6f:68: + cb:a3:32:ec:9f:ec:34:74:d5:fe:b1:b9:0d:7f:91:5f:b0:64: + 14:8b:b0:70:b1:bc:5f:d5:c6:b3:ac:22:9e:70:ec:2d:d9:92: + a1:c0:39:35:54:fd:3a:7f:d3:ed:36:8f:44:6b:97:11:49:32: + 51:3b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC1uaWVkZXJmZXVsZW4xGjAYBgNVBCkTEWFyYWwtbmllZGVy +ZmV1bGVuMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCe+E9o7+kSZsGZJ5h2saMVRKQrBUoihpe6K/GROQQb +nw4abz/xjANCMszwVIJDSrf1psVGR1hegjwCR4mxjWxZbHQlDI8UdxEclKm4l1Sb +NECJIYP9VGqtIJJ1cvhZWQLQxgGecaMfoiYqCLj37swVt+VdU1lzNdDjiUPddZnf +pwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTCxjXqVgp8FqtHjZ6O +dWBR2vihDjCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQAIfsHh +BRuPHwoj/aTWh94LmjEYE3tXpyw6OKwM3RzhA1rDjtP2k6CgocDvgnfKbIudNiZ/ +mYbggFmFnQwQ3dfbRWNos23sb2jLozLsn+w0dNX+sbkNf5FfsGQUi7Bwsbxf1caz +rCKecOwt2ZKhwDk1VP06f9PtNo9Ea5cRSTJROw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-niederfeulen.csr b/vpn/coloradio01/keys/aral-niederfeulen.csr new file mode 100644 index 0000000..53dace4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-niederfeulen.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFhcmFsLW5pZWRlcmZldWxlbjEaMBgG +A1UEKRMRYXJhbC1uaWVkZXJmZXVsZW4xHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ74T2jv6RJmwZknmHax +oxVEpCsFSiKGl7or8ZE5BBufDhpvP/GMA0IyzPBUgkNKt/WmxUZHWF6CPAJHibGN +bFlsdCUMjxR3ERyUqbiXVJs0QIkhg/1Uaq0gknVy+FlZAtDGAZ5xox+iJioIuPfu +zBW35V1TWXM10OOJQ911md+nAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQCMsCxN +woIXTpPLeV+TQOGe6PSeWZZGqDj2acWUMdQf1TE8pH91o89VPUVOGYwBuL4xs37m +l6hjpyRJNSdtFYdv+XrzYbREVJF5n4FNooEaSaVcddxI02EaZlkmwMp5lUsTsUjp +Eb6cQ9gvZBkgBg1uWukKjC7PqGU1Qy8zPL+Fqw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-niederfeulen.key b/vpn/coloradio01/keys/aral-niederfeulen.key new file mode 100644 index 0000000..ff07679 --- /dev/null +++ b/vpn/coloradio01/keys/aral-niederfeulen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAJ74T2jv6RJmwZkn +mHaxoxVEpCsFSiKGl7or8ZE5BBufDhpvP/GMA0IyzPBUgkNKt/WmxUZHWF6CPAJH +ibGNbFlsdCUMjxR3ERyUqbiXVJs0QIkhg/1Uaq0gknVy+FlZAtDGAZ5xox+iJioI +uPfuzBW35V1TWXM10OOJQ911md+nAgMBAAECgYBUtgdC6Q0vJBioL2RcY55+19wP +nLr7mPNDXuVUOKjKu0A9r+jII48c+IsiyjW7/BX5TkwzfhNGEWo+4LYsKiuAyGF9 +yTmpDnxFoVsGbUQcLd4bl2ACFxwWkUVJhtwMptI8qHioTrG7S3LAiCMV9stKXNwU +Z5ywBvGsP4H0JK5ayQJBANA7jfLb6KoFGwJhzn+NjHqexsnzQ0hqjuX7DXNHPOgD +23rS0/T3JXP1zXlyDhRgCAl2i9RnvcsXu/qGrS49lO0CQQDDb88bWJCsd9fOMeU8 +7nZp+j2++njMSmClqRa0FOzy1yDnicU03r9u5OUl57ZyJwWUhiJrJsERTyBDMphU +TWhjAkEAjM2oZ27R/Z1kLREry85QDl4st0P53A7Jv7Mp3ihug8iP8ZZ74mn39lhg +b11zLc3dwWBanu7jRGAxKO9GTT0w5QJBAKjyaOlM4JQXbblULMVFp5vptaL4x6Bi +07WhvHykcklja5B86rvPq1FkEit4aaG41fwVEH/smo4qBsvQWxrVZ90CQH/iQuAN +u29MtcR5hsnGCscEqxWa9dkPFqRuYzSfdwPWnJr55XTwPlWzL8+HAAcQbo45jrt6 +kOoAMlzJ+vNPB1M= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-petange.crt b/vpn/coloradio01/keys/aral-petange.crt new file mode 100644 index 0000000..88e94ea --- /dev/null +++ b/vpn/coloradio01/keys/aral-petange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-petange/name=aral-petange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b1:2e:95:e7:98:68:02:e7:b5:2a:6f:1d:f1:46: + 38:6d:08:da:d6:44:42:59:83:dc:67:ca:3b:04:15: + c8:7a:a2:cc:ee:d6:ff:e5:88:d2:c6:48:22:4f:10: + 3d:80:06:50:26:70:e1:a2:00:95:a9:49:95:bc:a9: + 75:ee:f7:a8:b9:0b:8c:b4:ea:2a:1f:af:86:1c:28: + d6:0d:50:1a:01:d8:98:bd:6c:4d:54:d5:d7:59:55: + 53:00:8b:68:6b:04:57:1c:6f:b8:43:bf:02:46:ea: + 04:24:07:41:4c:3c:67:a9:b2:b5:6d:50:ef:bf:7e: + 3f:e3:09:ca:50:ff:5d:5e:27 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + A3:1A:2B:9B:07:4D:D4:58:C0:D0:D7:8A:F2:35:4F:3C:00:07:DF:85 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 36:3c:0d:1c:a9:3c:a3:d2:58:d9:c0:97:68:e8:99:ef:27:7b: + 3b:0f:bd:3d:01:5a:88:03:e7:cd:00:48:a4:5d:2f:a0:8e:f3: + a6:88:c4:d0:a2:f3:27:67:41:fa:5b:96:32:5f:6b:83:99:06: + 12:6e:71:9f:3f:c1:de:64:f1:47:ae:e1:64:38:f8:1b:b1:bd: + f0:36:61:32:2e:42:41:22:1a:cb:6c:c0:66:5d:2d:37:10:ef: + 7d:b3:27:ad:3e:3c:e6:1e:b0:be:19:4f:2c:86:00:e2:b6:a7: + fa:3c:a3:50:05:8a:1a:51:1d:a6:e2:b4:6d:7f:16:4c:10:ca: + 91:b6 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1wZXRhbmdlMRUwEwYDVQQpEwxhcmFsLXBldGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALEuleeYaALntSpvHfFGOG0I2tZEQlmD3GfKOwQVyHqizO7W/+WI0sZI +Ik8QPYAGUCZw4aIAlalJlbypde73qLkLjLTqKh+vhhwo1g1QGgHYmL1sTVTV11lV +UwCLaGsEVxxvuEO/AkbqBCQHQUw8Z6mytW1Q779+P+MJylD/XV4nAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFKMaK5sHTdRYwNDXivI1TzwAB9+FMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADY8DRypPKPSWNnAl2jo +me8nezsPvT0BWogD580ASKRdL6CO86aIxNCi8ydnQfpbljJfa4OZBhJucZ8/wd5k +8Ueu4WQ4+BuxvfA2YTIuQkEiGstswGZdLTcQ732zJ60+POYesL4ZTyyGAOK2p/o8 +o1AFihpRHabitG1/FkwQypG2 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-petange.csr b/vpn/coloradio01/keys/aral-petange.csr new file mode 100644 index 0000000..1e91a72 --- /dev/null +++ b/vpn/coloradio01/keys/aral-petange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXBldGFuZ2UxFTATBgNVBCkT +DGFyYWwtcGV0YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsS6V55hoAue1Km8d8UY4bQja1kRCWYPc +Z8o7BBXIeqLM7tb/5YjSxkgiTxA9gAZQJnDhogCVqUmVvKl17veouQuMtOoqH6+G +HCjWDVAaAdiYvWxNVNXXWVVTAItoawRXHG+4Q78CRuoEJAdBTDxnqbK1bVDvv34/ +4wnKUP9dXicCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAG/Hkyk5rJB+PvGHHjwC +0EI88IfC/pXt1m9jJuHizYTHozLjQITyrFL3Ny7+U32nMtg1fWp+1abwzf8r7FMc +9WSvBmn3lXdod1YViWkMDwuqxn2eWKzbwQzf1XN7Hu03ZlvLFbS21B3x+xJRk+IX +EUi+FfbKtWh3etXnKwaK0ndB +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-petange.key b/vpn/coloradio01/keys/aral-petange.key new file mode 100644 index 0000000..5180a3b --- /dev/null +++ b/vpn/coloradio01/keys/aral-petange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBALEuleeYaALntSpv +HfFGOG0I2tZEQlmD3GfKOwQVyHqizO7W/+WI0sZIIk8QPYAGUCZw4aIAlalJlbyp +de73qLkLjLTqKh+vhhwo1g1QGgHYmL1sTVTV11lVUwCLaGsEVxxvuEO/AkbqBCQH +QUw8Z6mytW1Q779+P+MJylD/XV4nAgMBAAECgYASU8pHwXkIy+Tudb34JhZSGPdh +8H+YeM5EoiOGoaYyIULnda/Uk1mSDwYVfY2O/5gs0cJVGpBgiW8Gq9S6Gj4GcfsD +Nywq1dyG/q2T5+c/0ZbKjnbJbMjejBc6ce0y3C/aEF6Bs1n0aBOT01NyVppkGgFS +zedmJfPg3jRWP/TwaQJBANq4rjgLJyJyQlUNrhY6poi40NJr0Y16TbndpWc3Asgm +BhdnVaQXjZxRDHhGZqwrgPoqhjXzW0UKcwINDDdkK7MCQQDPYXGZCAxM50HlbzpG +Z3etu3Bi/1AECbA4fQB3Ba9UXxLwGsY7aBvAk8oliJlHZinWvMu32TtGPHfrclQQ +ePm9AkEAkOzoO6hgMPnmq/bZkE8ig9t6OsNIYedVUz/jVkXkKPzQ8nb9DzKwGZC2 +o4d6hsB4wMqmjV8H7fJjjEta+eT88wJABgzZu5U4hqXYjlEIajVqkG7/gGPiebuu +oHdFJDPOQa/kZYzia6lF5gBpzV6G2kZowhMP/nUf/ZSWCxBy02g0IQJBAK5HNVdd +lJIKWgxfN0bZgVN371/9D3valocmdMa3ug2VoXFiiLk5cCTLK/+68PWnlXmjsxpQ +FA3Yf+otHoE9yxU= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-pommerloch.crt b/vpn/coloradio01/keys/aral-pommerloch.crt new file mode 100644 index 0000000..3b88abe --- /dev/null +++ b/vpn/coloradio01/keys/aral-pommerloch.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-pommerloch/name=aral-pommerloch/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:03:f3:76:ec:71:29:61:88:3f:37:c3:9f:76: + 55:51:52:5d:26:39:64:4b:d3:d7:69:7a:1e:bf:c3: + d1:07:c6:1c:c1:da:b2:9b:cb:5c:6c:3c:a6:ea:bc: + ce:b2:c9:6f:55:88:e5:8d:00:d4:d7:ec:01:70:b1: + d4:fc:08:cd:9b:ed:73:1e:b0:a2:c2:fd:33:95:aa: + 35:c9:56:3d:3f:df:31:be:ac:70:09:9d:ed:51:57: + d9:79:0a:46:b7:cd:5f:22:64:01:89:11:fb:ba:e4: + 80:f3:a4:32:e8:7c:c5:d9:1a:97:6f:ad:68:f2:ec: + 4d:d8:22:e6:5f:7e:c5:8c:dd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 82:40:9E:14:D0:AD:F7:75:2A:89:48:D3:10:7D:12:5D:33:71:04:D3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:4e:b2:21:65:8b:7b:44:e8:b4:81:1f:02:4b:53:ff:ee:12: + 36:b4:38:ae:6b:d8:ab:1f:d5:b7:03:3c:c9:6e:80:43:1a:d9: + 26:c0:f6:26:df:66:a2:cb:21:6f:2f:d6:3e:19:41:20:30:e5: + 44:46:a7:27:73:22:f5:00:ce:1f:76:cd:c3:91:7f:e2:e0:88: + 6d:c0:9e:81:87:53:7d:fb:0f:5d:9a:94:34:c6:f4:16:c7:8d: + 62:15:e2:dd:0d:74:e2:66:4a:b9:e5:e6:e8:a9:9e:d6:4f:d8: + da:12:82:dd:63:a0:74:14:89:04:b2:97:b3:56:ce:fa:72:44: + a1:df +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1wb21tZXJsb2NoMRgwFgYDVQQpEw9hcmFsLXBvbW1lcmxv +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBAMMD83bscSlhiD83w592VVFSXSY5ZEvT12l6Hr/D0QfGHMHa +spvLXGw8puq8zrLJb1WI5Y0A1NfsAXCx1PwIzZvtcx6wosL9M5WqNclWPT/fMb6s +cAmd7VFX2XkKRrfNXyJkAYkR+7rkgPOkMuh8xdkal2+taPLsTdgi5l9+xYzdAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFIJAnhTQrfd1KolI0xB9El0z +cQTTMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADJOsiFli3tE +6LSBHwJLU//uEja0OK5r2Ksf1bcDPMlugEMa2SbA9ibfZqLLIW8v1j4ZQSAw5URG +pydzIvUAzh92zcORf+LgiG3AnoGHU337D12alDTG9BbHjWIV4t0NdOJmSrnl5uip +ntZP2NoSgt1joHQUiQSyl7NWzvpyRKHf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-pommerloch.csr b/vpn/coloradio01/keys/aral-pommerloch.csr new file mode 100644 index 0000000..bbf5691 --- /dev/null +++ b/vpn/coloradio01/keys/aral-pommerloch.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9DCCAV0CAQAwgbMxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRgwFgYDVQQDEw9hcmFsLXBvbW1lcmxvY2gxGDAWBgNV +BCkTD2FyYWwtcG9tbWVybG9jaDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2Fy +bDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwwPzduxxKWGIPzfDn3ZVUVJd +JjlkS9PXaXoev8PRB8Ycwdqym8tcbDym6rzOsslvVYjljQDU1+wBcLHU/AjNm+1z +HrCiwv0zlao1yVY9P98xvqxwCZ3tUVfZeQpGt81fImQBiRH7uuSA86Qy6HzF2RqX +b61o8uxN2CLmX37FjN0CAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAHiQ8jgxIP6V +Ga2vGnblu9EPJauqUSmEgQmVZqJR07yf0QZZMFDHkWF6aeekSoYSreIfU4rDSqwi +YKS/AnP/1UEfIoglSqV4OzsCWP1hrxSCZ4v9NbmgpIhUwBzmHZ4ZXd6/tdC78TgR +N6Vb29pjav3jXYy1TSjrQQXo3/pMUclk +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-pommerloch.key b/vpn/coloradio01/keys/aral-pommerloch.key new file mode 100644 index 0000000..7435b41 --- /dev/null +++ b/vpn/coloradio01/keys/aral-pommerloch.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMMD83bscSlhiD83 +w592VVFSXSY5ZEvT12l6Hr/D0QfGHMHaspvLXGw8puq8zrLJb1WI5Y0A1NfsAXCx +1PwIzZvtcx6wosL9M5WqNclWPT/fMb6scAmd7VFX2XkKRrfNXyJkAYkR+7rkgPOk +Muh8xdkal2+taPLsTdgi5l9+xYzdAgMBAAECgYEAnbWsRxify19c2AM46NTB2qpJ +OohfXBNNubdQ9rRdb3P//aXnm6ayb7X9JwjaACx3JS04tvddKeFqqMCoBcr4ux7n +S/HDd+bxLgAVc2cWqDDYXfDTfgnEW62/Z71Mw4K22a7xOByzlddUTsDBPn7hLSlX +d8AgfuDvTsqhUQAtcwECQQDvP4VL0At2kvbtRwTTor7KxG6CnrDf2/c57ig+sF6T +OtovI67ZWaQgT2IjLZ0drelj/jPmv/z9Spk4Y1TNOQelAkEA0KuRPECa9UqebDuI +DYxnTu10SZL8F+XQvHNOpbJl+zjRbuRjLUEzz4s51zD2g5x+8ffcfO5J0UR5VSl0 +Bekq2QJBAMsKqpJ7nq7j7OHUatk9fhRRfsQl71AcuwUUBF2niqwCv1ZQPzzAodS1 +6kCWnoeop7Ev9FY5y3gfDkfXrQl6A+0CQA6TjYep86ki10I0PmLD5guLZs4k6Fs7 +AIPJgjrs5VbRN0AJ0Cu/HEFpNlcj4nR7IBsC93H6q0llARzD0oj/KrECQGRjIZNK +LdBOqZnrqx2G5XPIRpin8Fgj/PyAkAzqJ/bECqVnSOBK/uAnq8p45GlnKPlCzYXv +AAJ3jpodY5/LG3A= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-redange.crt b/vpn/coloradio01/keys/aral-redange.crt new file mode 100644 index 0000000..fbae72b --- /dev/null +++ b/vpn/coloradio01/keys/aral-redange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 11 17:48:41 2015 GMT + Not After : Feb 8 17:48:41 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-redange/name=aral-redange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cd:9e:df:06:d0:f0:33:0f:cf:aa:71:97:59:21: + a2:59:82:7a:03:8b:a1:64:ae:23:b7:d2:8f:5a:1c: + dc:0a:11:0b:44:32:21:40:05:52:88:d7:b3:4a:1b: + 7c:ea:c4:24:34:4c:31:7c:c5:0b:3a:63:1a:6b:bc: + 3b:e7:db:17:64:3e:ad:81:ce:fc:40:87:d8:6b:8c: + 9c:14:10:48:9e:23:88:62:2b:36:91:23:6e:15:a0: + e8:44:80:a9:2d:11:60:85:46:88:e6:c2:79:e5:8c: + a5:96:92:b6:c7:0e:d2:c0:ae:4f:45:0e:b3:a4:ad: + 00:49:a4:53:ab:6e:40:a2:41 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B8:28:BE:C9:99:FB:A8:9A:9F:7A:D8:9C:69:9E:6D:B6:8B:9F:0D:74 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 47:86:20:c6:a2:14:02:55:e9:0d:88:f4:e6:6e:fe:be:51:2a: + c9:a0:02:81:4e:8d:3a:8c:8e:77:f0:17:bb:43:73:6c:3e:5d: + cc:d5:b9:cc:f7:d1:03:5d:48:b8:d7:c5:8d:76:d6:e5:56:31: + 24:aa:a2:fe:00:eb:64:01:47:c4:b4:be:e2:55:5a:9b:5d:5f: + 43:ff:a3:c8:91:71:c4:4c:7e:42:a5:3b:66:fd:d9:b5:29:e0: + fc:a9:7a:0c:6c:70:58:81:c1:3e:34:92:e1:a6:dc:f1:f9:da: + d8:43:4d:74:9e:ad:33:01:65:85:79:70:6b:7d:1c:3c:12:35: + 58:ea +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMTExNzQ4NDFaFw0yNTAyMDgxNzQ4NDFaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZWRhbmdlMRUwEwYDVQQpEwxhcmFsLXJlZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAM2e3wbQ8DMPz6pxl1kholmCegOLoWSuI7fSj1oc3AoRC0QyIUAFUojX +s0obfOrEJDRMMXzFCzpjGmu8O+fbF2Q+rYHO/ECH2GuMnBQQSJ4jiGIrNpEjbhWg +6ESAqS0RYIVGiObCeeWMpZaStscO0sCuT0UOs6StAEmkU6tuQKJBAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFLgovsmZ+6ian3rYnGmebbaLnw10MIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAEeGIMaiFAJV6Q2I9OZu +/r5RKsmgAoFOjTqMjnfwF7tDc2w+XczVucz30QNdSLjXxY121uVWMSSqov4A62QB +R8S0vuJVWptdX0P/o8iRccRMfkKlO2b92bUp4PypegxscFiBwT40kuGm3PH52thD +TXSerTMBZYV5cGt9HDwSNVjq +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-redange.csr b/vpn/coloradio01/keys/aral-redange.csr new file mode 100644 index 0000000..b87c35a --- /dev/null +++ b/vpn/coloradio01/keys/aral-redange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXJlZGFuZ2UxFTATBgNVBCkT +DGFyYWwtcmVkYW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAzZ7fBtDwMw/PqnGXWSGiWYJ6A4uhZK4j +t9KPWhzcChELRDIhQAVSiNezSht86sQkNEwxfMULOmMaa7w759sXZD6tgc78QIfY +a4ycFBBIniOIYis2kSNuFaDoRICpLRFghUaI5sJ55YyllpK2xw7SwK5PRQ6zpK0A +SaRTq25AokECAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBADoF9mRiZY32tdzMmiUm +/naGcz7Me42l6as7E0J3Xp17UEC018oRDJWN3BaXgEEXab2t+53cOzyez8iCyVZu +ieYZXCzPcBZ4LW1arYxz5ZNG8PMa+PWVNCcHnDskTV+LOxM4B6CEzQibnrAOPqRr +3uSQuKe8RgD7LWA4FtQWQccD +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-redange.key b/vpn/coloradio01/keys/aral-redange.key new file mode 100644 index 0000000..cbcbd86 --- /dev/null +++ b/vpn/coloradio01/keys/aral-redange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAM2e3wbQ8DMPz6px +l1kholmCegOLoWSuI7fSj1oc3AoRC0QyIUAFUojXs0obfOrEJDRMMXzFCzpjGmu8 +O+fbF2Q+rYHO/ECH2GuMnBQQSJ4jiGIrNpEjbhWg6ESAqS0RYIVGiObCeeWMpZaS +tscO0sCuT0UOs6StAEmkU6tuQKJBAgMBAAECgYEAzIQlruDo2ND0K8K51+SVV1Ro +ydf7Gmn+itr6zJWB4t1bCGSYH9ZrZkKtSJuYnuWiYQYb/s76QQPLhrb+GroXQ0xb +STSEp0y8EiA2MO9GsY5NPmR1YT5aoV0bCjhEMqLycqVVlCOXs/9pYjhQlwglQPin +Yc1gLDgBYro9oFy7jNUCQQDsdMwRui5J3qufimkzuNor+eaBYOh7hTT4nTdbONTd +Uh1VqoAn8RayfRzTqseKQ8zpwdBoSw36dhH6HgrD8KNzAkEA3p2eiKMQaRN5VgA4 +y7MEd//KUvvOQbrn6H+t+qZCOMXJyDx3Gfu1zbMDD56pQo4rlCrC3+dyCRhJuVgG +OTL+ewJAF7nggCbeXisprWiGBdqWibMZngHLUhmbpxafZ1fchBipON9S3K8kR+Sl +79dDDmyfMxVvhAeD743JX/+DtQWAYQJABwqjTh0iUsCL8P12znKuLIGJy9AtOQUJ +euA3B5ukspkHBe9rsQW2PXhxG1hgcDuBA2HK4jw27jS3eEZhhAOp6wJARRAdVPhy +MNn/3Z/Sws9NaGxGFrx2cygY0M1bnrKRunefFTP1VjhlIoAKQPyrK/8b8VZ+MXS5 +pcStng2PLaD8og== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-rodange.crt b/vpn/coloradio01/keys/aral-rodange.crt new file mode 100644 index 0000000..02287fc --- /dev/null +++ b/vpn/coloradio01/keys/aral-rodange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 31 (0x1f) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 7 09:53:16 2015 GMT + Not After : Aug 4 09:53:16 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange/name=aral-rodange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c1:2b:6c:2a:e9:07:7f:6d:7e:23:ef:ef:6f:b3: + c6:79:8d:79:57:34:cd:72:de:cd:95:a1:34:c4:af: + 63:6b:9c:b3:24:0c:2a:67:72:19:09:63:eb:87:47: + bb:b8:b6:7c:6e:a0:64:e9:6a:9e:2d:6b:10:ed:ce: + ae:9d:35:56:72:f6:d9:7d:31:e5:b5:e5:34:90:4f: + 46:29:73:69:5d:8a:01:45:bc:4e:8b:2d:14:b7:90: + 53:98:98:57:2a:61:2f:f5:41:6a:3a:14:75:b2:45: + af:27:86:03:52:ba:6c:e3:83:c8:bc:e7:d5:00:9a: + 60:b8:9e:7f:43:09:3e:49:57 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 34:9D:52:DC:C9:30:95:B0:A0:E2:7B:9C:95:75:A6:FD:D3:23:75:8C + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:f3:d8:db:32:ca:38:4f:b5:42:8c:29:43:c0:6f:b3:c1:58: + 07:44:4d:ba:8a:28:99:e3:ad:fc:59:de:fe:ab:21:ff:2b:bf: + e6:2a:7a:cc:63:78:85:c2:b7:e0:c9:cd:9d:dd:0c:9b:93:20: + a8:a8:93:49:a4:43:ae:36:d8:a1:65:3d:49:47:2f:5f:da:44: + 14:23:b6:4f:b1:c3:34:92:60:8b:96:29:98:e7:22:42:df:df: + e7:ce:8c:d1:93:f3:69:ae:8a:af:9b:c5:e2:c2:fe:06:bf:c6: + 90:8d:cf:3a:28:fd:d2:16:ed:12:f5:e1:b4:f7:07:64:99:64: + 97:5f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBHzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDcwOTUzMTZaFw0yNTA4MDQwOTUzMTZaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yb2RhbmdlMRUwEwYDVQQpEwxhcmFsLXJvZGFuZ2UxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMErbCrpB39tfiPv72+zxnmNeVc0zXLezZWhNMSvY2ucsyQMKmdyGQlj +64dHu7i2fG6gZOlqni1rEO3Orp01VnL22X0x5bXlNJBPRilzaV2KAUW8TostFLeQ +U5iYVyphL/VBajoUdbJFryeGA1K6bOODyLzn1QCaYLief0MJPklXAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDSdUtzJMJWwoOJ7nJV1pv3TI3WMMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAHDz2NsyyjhPtUKMKUPA +b7PBWAdETbqKKJnjrfxZ3v6rIf8rv+YqesxjeIXCt+DJzZ3dDJuTIKiok0mkQ642 +2KFlPUlHL1/aRBQjtk+xwzSSYIuWKZjnIkLf3+fOjNGT82muiq+bxeLC/ga/xpCN +zzoo/dIW7RL14bT3B2SZZJdf +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-rodange.csr b/vpn/coloradio01/keys/aral-rodange.csr new file mode 100644 index 0000000..410aca4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-rodange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXJvZGFuZ2UxFTATBgNVBCkT +DGFyYWwtcm9kYW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwStsKukHf21+I+/vb7PGeY15VzTNct7N +laE0xK9ja5yzJAwqZ3IZCWPrh0e7uLZ8bqBk6WqeLWsQ7c6unTVWcvbZfTHlteU0 +kE9GKXNpXYoBRbxOiy0Ut5BTmJhXKmEv9UFqOhR1skWvJ4YDUrps44PIvOfVAJpg +uJ5/Qwk+SVcCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBALmItSO40HQA6K4usvAH +2OHIdk3y7vbcmv7sp5RzA6uU9Hgh+bPeJA6RFClX5B0e63BeIOIQFL5t8BxgXpBb +p0Qrkv1NQFHN5g7ONdaXLwwM/mxWehL6aMeKCqQqIdbztjj0TnUrFHtnSzYWIVhz +hNC8xGhFOtHtYX8uZt4iBueV +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-rodange.key b/vpn/coloradio01/keys/aral-rodange.key new file mode 100644 index 0000000..d8c8535 --- /dev/null +++ b/vpn/coloradio01/keys/aral-rodange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMErbCrpB39tfiPv +72+zxnmNeVc0zXLezZWhNMSvY2ucsyQMKmdyGQlj64dHu7i2fG6gZOlqni1rEO3O +rp01VnL22X0x5bXlNJBPRilzaV2KAUW8TostFLeQU5iYVyphL/VBajoUdbJFryeG +A1K6bOODyLzn1QCaYLief0MJPklXAgMBAAECgYBwicCx2yMwHPUhMLbY5+6YgFCR ++sQ6yQ0SwGFCuT99wUQomyHVNIbbjqf4H1WBTmd999nyltfic/7f3Mqj8iATQ6mk +PVaH0rGo/HMvYNKAtkZn3Sl2PIFaCdGRROvHSbYivuVwuOxGpj3MC5WmiHgt1vkB +Rdare+LTpLOgcY8q0QJBAPcYb6KoK68F8bC2V5OgcPglS2V3UkHyTL92TNNg8YQ7 +ZyXuw5AAI8RWk4CCFEBm8EvJBgwdRaPfLCHY4H0xw08CQQDIIX86WeMcSNaCv6rM +RIaEEQazAsgMX5iKzQJY7pqcUukBa0elzzX4YA1gs0gvPs/zLkc4/ymHn/xJpNeD +TTd5AkEAjYmtyJpUC3l4LCUGnUV18G5Mdd6Xe7bzR2jYMOyC65+rQgs2cjHiSwDc +lOvt9cYBNyf7Es1hqrCXcvvr+0qZ+QJAVcp2Pc9WmkNnIXmEgDhH6clas9ZXZ2Z7 +f9TOUs1GHgk0tVUFy8B+BFE4quFv6kDk5/xIr9hCN0+P2Qn/ENxDEQJAQMKdpsno +sauin7I0B6KkfOqkLFcDinP5m2xUTXFVhurFZM5+3z4UJ8Q7X6oNw3EX6B4am8qj +J+VCq5PGFCFnTg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-rollingergrund.crt b/vpn/coloradio01/keys/aral-rollingergrund.crt new file mode 100644 index 0000000..351a5f7 --- /dev/null +++ b/vpn/coloradio01/keys/aral-rollingergrund.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rollingergrund/name=aral-rollingergrund/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e0:6d:c3:a0:c1:d2:0a:85:9d:e4:47:da:15:f5: + 97:ff:73:89:5d:fb:71:0e:6c:4d:f2:36:8d:9f:28: + c6:a1:48:50:d5:a7:bb:9d:0d:e9:62:56:8d:24:83: + 57:e3:47:ee:78:39:04:9f:69:4a:42:2e:39:93:bd: + e2:df:d8:39:97:6d:48:f3:a7:45:76:09:af:29:15: + 03:d2:1f:67:91:69:c3:96:90:18:ba:cb:e3:ee:3f: + 37:55:e2:9b:13:6e:b6:07:f1:29:c1:a0:4e:a4:29: + 81:f1:86:7f:e1:e1:ca:ba:1e:f8:d6:79:81:e0:fd: + 4c:08:9d:d2:12:8d:0c:27:c3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 88:34:58:CD:28:24:8C:CF:A4:FB:35:1B:57:03:74:E1:91:08:F0:41 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 8b:93:52:40:85:3c:8e:49:6c:3d:2b:e2:d4:75:e3:45:c5:55: + 3b:86:a3:ca:84:3e:2d:c5:91:92:7b:d8:c3:f7:df:39:5c:b7: + 4d:34:c6:80:6f:1e:11:42:ae:ec:6c:15:0d:14:2d:15:e7:c4: + 02:b2:1b:67:28:08:32:69:82:7e:73:b5:1e:1c:b7:a4:98:a8: + 38:0c:bc:ca:a0:7a:bc:c9:c0:69:6d:bf:08:3a:8b:c6:ee:3a: + 71:84:20:82:61:bf:72:82:9d:8d:be:22:08:da:cf:69:21:5d: + f7:48:7b:59:c5:c1:99:d2:23:7a:e6:b4:9f:4d:c1:c2:57:7d: + 45:87 +-----BEGIN CERTIFICATE----- +MIIEPDCCA6WgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIG7MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEc +MBoGA1UEAxMTYXJhbC1yb2xsaW5nZXJncnVuZDEcMBoGA1UEKRMTYXJhbC1yb2xs +aW5nZXJncnVuZDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkq +hkiG9w0BAQEFAAOBjQAwgYkCgYEA4G3DoMHSCoWd5EfaFfWX/3OJXftxDmxN8jaN +nyjGoUhQ1ae7nQ3pYlaNJINX40fueDkEn2lKQi45k73i39g5l21I86dFdgmvKRUD +0h9nkWnDlpAYusvj7j83VeKbE262B/EpwaBOpCmB8YZ/4eHKuh741nmB4P1MCJ3S +Eo0MJ8MCAwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVh +c3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUiDRYzSgkjM+k ++zUbVwN04ZEI8EEwgd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qh +ga6kgaswgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAV +BgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UE +CxMGUE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NE +QUIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNV +HSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEA +i5NSQIU8jklsPSvi1HXjRcVVO4ajyoQ+LcWRknvYw/ffOVy3TTTGgG8eEUKu7GwV +DRQtFefEArIbZygIMmmCfnO1Hhy3pJioOAy8yqB6vMnAaW2/CDqLxu46cYQggmG/ +coKdjb4iCNrPaSFd90h7WcXBmdIjeua0n03Bwld9RYc= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-rollingergrund.csr b/vpn/coloradio01/keys/aral-rollingergrund.csr new file mode 100644 index 0000000..f3b210b --- /dev/null +++ b/vpn/coloradio01/keys/aral-rollingergrund.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB/DCCAWUCAQAwgbsxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRwwGgYDVQQDExNhcmFsLXJvbGxpbmdlcmdydW5kMRww +GgYDVQQpExNhcmFsLXJvbGxpbmdlcmdydW5kMRwwGgYJKoZIhvcNAQkBFg1pbmZv +QGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDgbcOgwdIKhZ3k +R9oV9Zf/c4ld+3EObE3yNo2fKMahSFDVp7udDeliVo0kg1fjR+54OQSfaUpCLjmT +veLf2DmXbUjzp0V2Ca8pFQPSH2eRacOWkBi6y+PuPzdV4psTbrYH8SnBoE6kKYHx +hn/h4cq6HvjWeYHg/UwIndISjQwnwwIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEA +dGc6vsNJf+szSTwi++zqJCoKhOoG9sXH6tBK778EHd718b+XEGTUJFHBgcIaLSV1 +5FzB40TX3YgEL6iu5v9bddp75YCmtJSycnyoEXCLHjUCC+CoTY12VrRNlJtFFS38 +tBK314jad5kLbL72ywnju37k+K5ZriFcYRNoNU/PuTc= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-rollingergrund.key b/vpn/coloradio01/keys/aral-rollingergrund.key new file mode 100644 index 0000000..2a72efa --- /dev/null +++ b/vpn/coloradio01/keys/aral-rollingergrund.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAOBtw6DB0gqFneRH +2hX1l/9ziV37cQ5sTfI2jZ8oxqFIUNWnu50N6WJWjSSDV+NH7ng5BJ9pSkIuOZO9 +4t/YOZdtSPOnRXYJrykVA9IfZ5Fpw5aQGLrL4+4/N1XimxNutgfxKcGgTqQpgfGG +f+Hhyroe+NZ5geD9TAid0hKNDCfDAgMBAAECgYACTR3UaChfMz+LN7FkyD/mvqiJ +7ioam8Gw2h5Zo3Fl9ffeOPoTgjECcSDBXxdnnTU0xmDlwY6hXxf4C9pnsS/l+KxZ +Iql8uB+eEYtY31S5XX1wXAUle5wpTzZmZbciJGGpUS3ClsJmPHvGBqKyJy+3Ruzr +Try4A2Oy1DgscZg3AQJBAP4iwWadxV7fd3Ar0MhR0eGWX7CxAnsru7/s18y9dUee +PT1R7Qy+pWw0ryRIVaUnYzGtLbp5sJJ7X/zA2ZRilEcCQQDiEzi5j4t7cegO+Ju/ +nqA2WLNE7T4fVMyj+R4KnawNQ1XPn4m2O85nM+wh8SbyyH8QRLaXZyQvfw07Whze +gbqlAkEAtc3fVa3gmLJ9G3386pG9+Ag/hIPdJohu1Cp3ZzzSPd3yKYAGeWuZpAM8 +mFQ3EONQjyU45YJQ0zn3vTWpcgHj2QJADlmqAB1cfTl9wXWGbWNkSA7ZUka86sA3 +PTFS9tmLUkwz5jn6Q9cIAwUIuB7WmhKf/ihebr3dTiaCcIIH0xfpAQJABbxCVn5h +3OV+oElQ1ymtCIFsXmZIPYcsNmD1EBDNIkh208+gzOTG70T0ofEbototrAc+5Zl2 +fLKzUdYGcVkvGg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-schengen.crt b/vpn/coloradio01/keys/aral-schengen.crt new file mode 100644 index 0000000..46212a2 --- /dev/null +++ b/vpn/coloradio01/keys/aral-schengen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 30 (0x1e) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 6 12:02:55 2015 GMT + Not After : Aug 3 12:02:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schengen/name=aral-schengen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d2:25:34:65:46:e6:95:f7:82:16:e7:ff:95:41: + af:5c:81:d9:2d:c8:2e:01:a2:d4:fe:78:91:c0:c3: + 8a:bb:4e:3e:a3:63:1d:1a:a2:b7:0f:c2:96:e1:65: + bd:e2:2a:14:43:03:f1:4f:bf:b8:6d:7b:ae:80:f7: + ae:7d:87:e9:fc:23:92:ea:8b:72:91:f6:aa:9f:e4: + da:81:dc:c1:96:8d:89:06:5f:86:3d:c6:a3:67:58: + 75:e0:5e:4f:50:73:45:50:5b:a1:68:f3:98:d8:10: + 08:b3:41:9b:68:34:5f:68:dd:c1:60:3e:0d:ff:2a: + af:5d:10:17:ae:3b:61:0d:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 08:75:49:41:BE:2C:62:78:BA:2F:C7:FE:70:2B:E7:FF:51:5F:4D:E9 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 70:8c:2e:39:42:70:36:1f:4c:ff:42:45:a2:34:bb:6e:f5:54: + 08:e3:4e:12:f4:4f:e7:6f:55:0c:7f:ca:37:a6:3a:ec:2c:63: + 92:2b:ad:b0:eb:bc:43:78:cd:ac:ee:6a:e3:1a:55:84:bb:43: + f1:51:f7:9f:1c:99:e7:ab:8b:9c:33:18:e0:7d:cb:6f:85:72: + cf:4f:dd:63:91:9a:04:2a:16:b4:7b:fe:76:57:1d:9f:8a:79: + 90:9a:d6:13:bc:83:87:a5:c0:8f:f3:90:e7:43:a0:a9:64:de: + 6e:7e:e3:6d:ab:05:65:97:bf:28:3b:f8:c8:82:4a:53:0e:8c: + 1b:7b +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBHjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDYxMjAyNTVaFw0yNTA4MDMxMjAyNTVaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1zY2hlbmdlbjEWMBQGA1UEKRMNYXJhbC1zY2hlbmdlbjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA0iU0ZUbmlfeCFuf/lUGvXIHZLcguAaLU/niRwMOKu04+o2MdGqK3 +D8KW4WW94ioUQwPxT7+4bXuugPeufYfp/COS6otykfaqn+TagdzBlo2JBl+GPcaj +Z1h14F5PUHNFUFuhaPOY2BAIs0GbaDRfaN3BYD4N/yqvXRAXrjthDc0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUCHVJQb4sYni6L8f+cCvn/1FfTekw +gd0GA1UdIwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAcIwuOUJwNh9M/0JF +ojS7bvVUCONOEvRP529VDH/KN6Y67CxjkiutsOu8Q3jNrO5q4xpVhLtD8VH3nxyZ +56uLnDMY4H3Lb4Vyz0/dY5GaBCoWtHv+dlcdn4p5kJrWE7yDh6XAj/OQ50OgqWTe +bn7jbasFZZe/KDv4yIJKUw6MG3s= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-schengen.csr b/vpn/coloradio01/keys/aral-schengen.csr new file mode 100644 index 0000000..41b3e04 --- /dev/null +++ b/vpn/coloradio01/keys/aral-schengen.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1hcmFsLXNjaGVuZ2VuMRYwFAYDVQQp +Ew1hcmFsLXNjaGVuZ2VuMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDSJTRlRuaV94IW5/+VQa9cgdktyC4B +otT+eJHAw4q7Tj6jYx0aorcPwpbhZb3iKhRDA/FPv7hte66A9659h+n8I5Lqi3KR +9qqf5NqB3MGWjYkGX4Y9xqNnWHXgXk9Qc0VQW6Fo85jYEAizQZtoNF9o3cFgPg3/ +Kq9dEBeuO2ENzQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEABUQLmPt/M8m03W3f +jSNuRkwCUQ9/WcNCvaBlpg130Hii10s28rftwOKLT35WiJFOV9AFKkOIsi2RLlxQ +Bzu2L9T74lgB0X9nAsS0Fxvd+b+lUH6filN5WY7dW+xjePGQegr7pv7Rqc/TBa2I +XimOziBnpG7ZVity8ohV1isI22Q= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-schengen.key b/vpn/coloradio01/keys/aral-schengen.key new file mode 100644 index 0000000..d483c9b --- /dev/null +++ b/vpn/coloradio01/keys/aral-schengen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANIlNGVG5pX3ghbn +/5VBr1yB2S3ILgGi1P54kcDDirtOPqNjHRqitw/CluFlveIqFEMD8U+/uG17roD3 +rn2H6fwjkuqLcpH2qp/k2oHcwZaNiQZfhj3Go2dYdeBeT1BzRVBboWjzmNgQCLNB +m2g0X2jdwWA+Df8qr10QF647YQ3NAgMBAAECgYBgzFpyPFKCydvWiU8lhXgteHJ9 +sDPg9Qx/mzIoROpmlQgtYr5JQqJoVA4EDUWGJDPpGqvRPFLLu6kKJwztLeoNMI77 +bNIwHNlzNYDFU8VeBiRfZrUVOcJW1uOHdpQT1amsNKchWREguUbvocBKNTFMBMFQ +b6PNDIocVpDFmS5i0QJBAPa9NgzrbrNKkyNSzWkuVNVXocZFPl43Jqqbmx3Zxjpg +i2HuVdxn/RaQCIZ2mam6lGSOMl0IEAGYQ7KjuJ/jpm8CQQDaCGIAKMvS2MX445J9 +//3QdbrvTohbGH9JU0ekbXJCaZ8IQdSBTtN91UNNAPPxkEwyQqMRMEugKMOs636q +JM2DAkEAv5N31R4zrKf5iJKxBLrBiYhqBm0bGMIPlqYNEWdWf1sYvef06JYhLxSU +WfraIqvIri6uMgehjetwnNJ79kEmpwJANmkvI8EKlJS6WxFXxo/y5Gns+7mKd8lW +QpNA5rzVbdNz95iOErL8PoPRJs9dEWSkT0qn7SszREXIB0hBtO44RwJBAO8kUd0N +ahpY8bv4FZ/BgxdkZYGvMvsbeElFo7jlqRj6tKZ75bsVZGqxay411iadxojgx2Zx +lnR5hUA8ld83INo= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-steinfort.crt b/vpn/coloradio01/keys/aral-steinfort.crt new file mode 100644 index 0000000..2bb3e89 --- /dev/null +++ b/vpn/coloradio01/keys/aral-steinfort.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-steinfort/name=aral-steinfort/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c5:8f:85:f5:21:40:3f:9e:44:86:62:3b:4c:63: + f6:0d:81:3e:48:ef:a6:1e:cc:f2:c0:74:32:ef:e0: + b9:2b:e0:67:cf:5d:75:a6:07:cb:c7:c0:3f:41:76: + 7c:91:87:af:21:5c:4e:b6:81:d1:4f:a0:81:f9:e3: + 28:05:f9:0f:6f:51:8e:b1:7e:38:f2:93:96:50:ba: + 1e:ca:68:0b:68:b1:44:af:a2:e4:c9:08:e4:6d:2e: + 68:a7:2d:61:12:63:72:9e:d3:36:51:09:95:81:0c: + 4a:88:d5:9a:28:c7:a8:73:c9:9e:cb:35:79:69:9c: + 40:b0:cc:10:87:41:a9:ed:a3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 63:79:E2:C9:FC:2C:C0:FA:7D:F0:BF:95:68:6C:EB:A4:1F:37:CE:9D + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:13:fc:10:f9:8a:86:7c:86:82:97:aa:55:a0:4a:2e:f9:bf: + d2:f2:49:ff:99:2d:5f:9b:0f:cd:59:50:1f:81:5c:ff:ae:04: + b2:12:6b:5a:1a:12:43:63:2c:1f:d2:e3:f1:05:3f:5a:d0:9c: + 1d:d0:9c:f4:02:d5:9e:47:9e:5f:42:e9:9c:f1:d5:52:b3:41: + 67:92:22:b9:d3:5b:51:d6:c8:f1:e0:c6:d0:3b:ad:42:84:cc: + df:11:e5:67:c0:d8:8a:92:1a:67:fa:7a:dd:ca:28:89:27:da: + a2:12:06:df:ac:c3:7a:67:78:53:4e:3a:9a:75:82:62:dc:8a: + f9:ad +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOYXJhbC1zdGVpbmZvcnQxFzAVBgNVBCkTDmFyYWwtc3RlaW5mb3J0 +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDFj4X1IUA/nkSGYjtMY/YNgT5I76YezPLAdDLv4Lkr4GfPXXWm +B8vHwD9BdnyRh68hXE62gdFPoIH54ygF+Q9vUY6xfjjyk5ZQuh7KaAtosUSvouTJ +CORtLminLWESY3Ke0zZRCZWBDEqI1Zoox6hzyZ7LNXlpnECwzBCHQantowIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRjeeLJ/CzA+n3wv5VobOukHzfO +nTCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUE/wQ+YqGfIaC +l6pVoEou+b/S8kn/mS1fmw/NWVAfgVz/rgSyEmtaGhJDYywf0uPxBT9a0Jwd0Jz0 +AtWeR55fQumc8dVSs0FnkiK501tR1sjx4MbQO61ChMzfEeVnwNiKkhpn+nrdyiiJ +J9qiEgbfrMN6Z3hTTjqadYJi3Ir5rQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-steinfort.csr b/vpn/coloradio01/keys/aral-steinfort.csr new file mode 100644 index 0000000..adcb75a --- /dev/null +++ b/vpn/coloradio01/keys/aral-steinfort.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8jCCAVsCAQAwgbExCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRcwFQYDVQQDEw5hcmFsLXN0ZWluZm9ydDEXMBUGA1UE +KRMOYXJhbC1zdGVpbmZvcnQxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmww +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMWPhfUhQD+eRIZiO0xj9g2BPkjv +ph7M8sB0Mu/guSvgZ89ddaYHy8fAP0F2fJGHryFcTraB0U+ggfnjKAX5D29RjrF+ +OPKTllC6HspoC2ixRK+i5MkI5G0uaKctYRJjcp7TNlEJlYEMSojVmijHqHPJnss1 +eWmcQLDMEIdBqe2jAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQAjidNxUpKUIuLv +6Wf5YE/2HALAchqbDkTAoaOwJXT0YidY7d4+XVYks/BLmxZigOjYdlk9/XFAgSa+ +MedC1SYAEeKSZYpYxbweiDcMr9PsBqASFY2TobeiaVPkTY12bG6JKV/30q+9Ntbh +EN7kNL5VaIJphPUr0U7WLmP7isRU1g== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-steinfort.key b/vpn/coloradio01/keys/aral-steinfort.key new file mode 100644 index 0000000..06fb7d0 --- /dev/null +++ b/vpn/coloradio01/keys/aral-steinfort.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMWPhfUhQD+eRIZi +O0xj9g2BPkjvph7M8sB0Mu/guSvgZ89ddaYHy8fAP0F2fJGHryFcTraB0U+ggfnj +KAX5D29RjrF+OPKTllC6HspoC2ixRK+i5MkI5G0uaKctYRJjcp7TNlEJlYEMSojV +mijHqHPJnss1eWmcQLDMEIdBqe2jAgMBAAECgYEAj8/xiMbCuUzhvx1k4y/lHmGV +0Iw7VjKFB5nOtpXU1d7OUsJK8Si9q9QDeAjjlyC5WMSUPAD2OEu0Mg6sxORP2cUW +UMYgmOub3x5Ms5A1pPzWBpbCJWc5Bj3fuqBDUd8/3d1GYi0PtpLeho4c9p8sI4Oc +ifIlcYyRHh6Any6+DJkCQQD3PjlHKoUwxGxy38wlKXvCu46OuXcRwf4nNMygxf7/ +RumFgMZVKyGNDpiI5xjJhoe8jkduVqDKZwcIma3TooVdAkEAzI7TBIQ78ReVI2gs +Xf8KdXMlvjo0cG1iflXS4DLw0eR+hpf+Y86Ftg8WLOcRELCSDAXwyUp8Am0F4p2k +eawO/wJBAOUy58JTZplo3eg4E3W32SUS3frtb7YkkkkiJzg7lEJuKHk8gZ/elgG/ +sCPpqA7aCecANrPQ1soLbHfKj1wL43kCQCv0HH+B8mdRi+g5wB7KaHLoNRn048Os +nVdMFa27BGf1UwKUskK745tFDpzDYbVWW2td82ktKgxTZMpW2TqTr/0CQFKeIJYc +mERJ35mAn5sk1Avr8TMjMvYbLYuhzAny8OuvPCqugmvOcxSpbAy9ohyUBmjMh4Ki +c6KJ+B+7IYjXEyI= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-vianden.crt b/vpn/coloradio01/keys/aral-vianden.crt new file mode 100644 index 0000000..5c9a126 --- /dev/null +++ b/vpn/coloradio01/keys/aral-vianden.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:55 2015 GMT + Not After : Feb 6 16:30:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-vianden/name=aral-vianden/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:17:91:21:fe:4c:df:0d:3f:49:2c:85:0a:68: + 29:a6:2f:33:42:f0:4d:19:d6:8d:8d:32:19:b1:95: + 16:8a:d2:a5:b0:c2:fc:8e:99:98:fb:b1:6f:c5:d9: + 12:59:e5:65:24:84:9f:a9:85:dc:83:ce:32:53:3e: + e7:44:cf:bd:14:33:fe:5b:c2:ae:dc:75:25:23:05: + e5:9e:92:b8:3c:d2:20:61:b6:39:14:70:31:a5:c2: + 28:c7:22:73:ad:5e:78:92:06:f3:f5:e5:34:f4:b4: + f3:d1:91:c1:69:73:a8:b8:45:dc:86:dc:85:99:6a: + ad:d4:41:cf:d6:1e:32:ec:23 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 38:CC:0C:22:42:94:00:8C:21:2B:73:D9:63:B7:7A:73:E7:14:F5:6B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 2d:aa:8f:84:93:53:6c:aa:fa:6c:bc:23:d8:ae:e1:bd:7a:59: + c3:47:b7:08:19:bf:1e:df:f1:a3:7c:bd:19:65:d2:b0:e7:00: + 25:0e:d6:60:63:4c:5d:de:73:8e:f0:37:40:0b:5c:f7:ea:b2: + 2e:bf:7e:eb:67:85:21:b6:8b:f5:47:84:ac:05:df:ad:ec:19: + 3f:42:d0:b8:1e:e5:02:a2:de:bf:48:9d:1b:65:a2:a1:d4:7e: + 2d:50:61:ff:a3:7e:9a:af:78:a1:c8:23:03:fc:18:38:c3:6a: + da:c0:3a:d6:1d:7d:e6:9e:1d:07:67:ce:f1:c0:62:ea:5a:71: + cf:6b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTVaFw0yNTAyMDYxNjMwNTVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC12aWFuZGVuMRUwEwYDVQQpEwxhcmFsLXZpYW5kZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBANoXkSH+TN8NP0kshQpoKaYvM0LwTRnWjY0yGbGVForSpbDC/I6ZmPux +b8XZElnlZSSEn6mF3IPOMlM+50TPvRQz/lvCrtx1JSMF5Z6SuDzSIGG2ORRwMaXC +KMcic61eeJIG8/XlNPS089GRwWlzqLhF3IbchZlqrdRBz9YeMuwjAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDjMDCJClACMIStz2WO3enPnFPVrMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAC2qj4STU2yq+my8I9iu +4b16WcNHtwgZvx7f8aN8vRll0rDnACUO1mBjTF3ec47wN0ALXPfqsi6/futnhSG2 +i/VHhKwF363sGT9C0Lge5QKi3r9InRtloqHUfi1QYf+jfpqveKHIIwP8GDjDatrA +OtYdfeaeHQdnzvHAYupacc9r +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-vianden.csr b/vpn/coloradio01/keys/aral-vianden.csr new file mode 100644 index 0000000..9960291 --- /dev/null +++ b/vpn/coloradio01/keys/aral-vianden.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXZpYW5kZW4xFTATBgNVBCkT +DGFyYWwtdmlhbmRlbjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA2heRIf5M3w0/SSyFCmgppi8zQvBNGdaN +jTIZsZUWitKlsML8jpmY+7FvxdkSWeVlJISfqYXcg84yUz7nRM+9FDP+W8Ku3HUl +IwXlnpK4PNIgYbY5FHAxpcIoxyJzrV54kgbz9eU09LTz0ZHBaXOouEXchtyFmWqt +1EHP1h4y7CMCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAAxjvf1EZhxD+CRMKh96 +XmpoX7XGSnWmwq+f8oQ0Tk6vpfPu0wchr3ntWpwQi7VzxOoJRrgf1SaD256Q3zKR +vjwgTA/KkvASHyAGPWnfxhVFtqiRE1GJe/B28gFVNdvadxO8L1cQ0iL9U18ve9Lb +dabSCeTnvcJTFNoBxRNTOb0y +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-vianden.key b/vpn/coloradio01/keys/aral-vianden.key new file mode 100644 index 0000000..21c7aa5 --- /dev/null +++ b/vpn/coloradio01/keys/aral-vianden.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANoXkSH+TN8NP0ks +hQpoKaYvM0LwTRnWjY0yGbGVForSpbDC/I6ZmPuxb8XZElnlZSSEn6mF3IPOMlM+ +50TPvRQz/lvCrtx1JSMF5Z6SuDzSIGG2ORRwMaXCKMcic61eeJIG8/XlNPS089GR +wWlzqLhF3IbchZlqrdRBz9YeMuwjAgMBAAECgYEAyZinS6jqHfT83wMMJ8aJWVig +JexDGPM+/ZmmLoUFxWVaS76x/o703xPxog057Wciy1Lc07MtV5ku48xtsynkOCbW +4/cl3woApZpdzLlLlBEenYqsr7KgKEA8SMHATDuxIwPXS7ztbP8kb0JDoGQ+jvo0 +k+QxBe5AILUDMXvUc0ECQQD8pDM7xZFsp0llBn52QHnpDMqr3cEy4MgnLpsdUpYy +io1oFgVJ+8E699QX9MGMeg1mnxV7OdrY+bElFA3ANKrLAkEA3P3JeKdyFIuCdmEZ +N+8xsQfmCnc0nRt5FHnFQafIxjeNf8Wm0pf4NhPukpWXOFbd4gOXTshuTHE4tbVh ++KZhCQJAMnQYRzeNc0V1QtepKbR2pDQJxYjjrGV3k1ubXp+/nxhMZR0AsWW1kTEt +Chu3C3bUdkoO4C0Np4c1+VGn7VqXQQJAeiodpwJB0VOyAkj5DO/As5GfPKfbQQJ/ +867BOeNL3S+2nCyiZQa3owVvvD7PwshajmfXzCiGuOFaLTEhALjRKQJAVwjqMUHM +3TJriH6/w730+kA0sbWGPlhAgUqppBegymXQUmDHhE3UdXYdX/xt5xHsyN3nlwiJ +hr4DmSwcIqLylg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/aral-wasserbillig.crt b/vpn/coloradio01/keys/aral-wasserbillig.crt new file mode 100644 index 0000000..1e0c7f4 --- /dev/null +++ b/vpn/coloradio01/keys/aral-wasserbillig.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 9 16:30:54 2015 GMT + Not After : Feb 6 16:30:54 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-wasserbillig/name=aral-wasserbillig/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d1:b0:06:da:6e:40:ba:50:40:60:87:e6:c1:5c: + ba:07:73:e7:59:de:f6:53:cc:a7:6b:31:cb:85:63: + a5:3f:2c:75:cb:01:94:7f:86:2d:8b:7a:7b:50:6f: + f5:81:5d:da:d0:ac:85:bd:d6:26:18:25:58:5c:c5: + 4e:e6:1c:71:17:43:b1:9a:98:f0:39:f8:16:8f:bf: + 52:35:c9:86:15:a6:5a:5e:71:c0:9c:e0:fd:53:b0: + 5b:3b:8d:e8:5b:a7:7e:18:5c:77:89:19:de:1e:7f: + 78:68:a1:52:bd:15:ea:c5:0d:a8:c5:95:25:97:d3: + 4e:6a:4c:1a:4c:b8:74:c6:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2C:78:BD:63:E1:2D:7B:DF:2E:B8:E3:A2:C0:BA:FB:FF:F7:FC:95:E3 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 94:c4:56:24:24:e4:72:33:3e:0d:68:f2:37:36:a0:26:13:e2: + c6:d3:3e:9d:43:5b:dc:d2:96:c1:5d:b5:0a:f1:dd:14:13:a7: + 37:d3:33:48:84:c7:aa:d6:12:2a:a8:0c:26:b1:d6:bf:5e:df: + 5d:a6:bd:ed:b0:75:43:14:6a:62:da:e8:b1:c8:53:bc:9a:23: + a6:e4:5f:ba:7e:42:56:d4:01:9c:40:8b:e1:2c:12:50:52:1a: + f4:c1:1c:1f:bb:ce:97:ae:ef:ea:50:d8:e6:81:dd:d7:b5:e3: + 5c:3f:29:d8:5b:77:99:da:8f:70:51:f0:c0:03:43:1a:9a:00: + 65:73 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDkxNjMwNTRaFw0yNTAyMDYxNjMwNTRaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYXJhbC13YXNzZXJiaWxsaWcxGjAYBgNVBCkTEWFyYWwtd2Fzc2Vy +YmlsbGlnMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDRsAbabkC6UEBgh+bBXLoHc+dZ3vZTzKdrMcuFY6U/ +LHXLAZR/hi2LentQb/WBXdrQrIW91iYYJVhcxU7mHHEXQ7GamPA5+BaPv1I1yYYV +plpeccCc4P1TsFs7jehbp34YXHeJGd4ef3hooVK9FerFDajFlSWX005qTBpMuHTG +gQIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQseL1j4S173y6446LA +uvv/9/yV4zCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCUxFYk +JORyMz4NaPI3NqAmE+LG0z6dQ1vc0pbBXbUK8d0UE6c30zNIhMeq1hIqqAwmsda/ +Xt9dpr3tsHVDFGpi2uixyFO8miOm5F+6fkJW1AGcQIvhLBJQUhr0wRwfu86Xru/q +UNjmgd3XteNcPynYW3eZ2o9wUfDAA0MamgBlcw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/aral-wasserbillig.csr b/vpn/coloradio01/keys/aral-wasserbillig.csr new file mode 100644 index 0000000..c3bb34b --- /dev/null +++ b/vpn/coloradio01/keys/aral-wasserbillig.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFhcmFsLXdhc3NlcmJpbGxpZzEaMBgG +A1UEKRMRYXJhbC13YXNzZXJiaWxsaWcxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANGwBtpuQLpQQGCH5sFc +ugdz51ne9lPMp2sxy4VjpT8sdcsBlH+GLYt6e1Bv9YFd2tCshb3WJhglWFzFTuYc +cRdDsZqY8Dn4Fo+/UjXJhhWmWl5xwJzg/VOwWzuN6Funfhhcd4kZ3h5/eGihUr0V +6sUNqMWVJZfTTmpMGky4dMaBAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQAWL9SD +v9Z7SZ5UAAY5P8IIDJkcZxPx20n73ef6JyZ2Yc8HXE3PSC3dRATYkRD1v60Osfmc +UN2CiylNwP7KWI5LKp3PLxuKF8chbKzzoqinSpHisM37/U4C9LORQlR/cGUfgosO +Fz19TmAOBDxTxb37J8YzZ/8fmnWf/T9qWSxXOw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/aral-wasserbillig.key b/vpn/coloradio01/keys/aral-wasserbillig.key new file mode 100644 index 0000000..2c1ead7 --- /dev/null +++ b/vpn/coloradio01/keys/aral-wasserbillig.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANGwBtpuQLpQQGCH +5sFcugdz51ne9lPMp2sxy4VjpT8sdcsBlH+GLYt6e1Bv9YFd2tCshb3WJhglWFzF +TuYccRdDsZqY8Dn4Fo+/UjXJhhWmWl5xwJzg/VOwWzuN6Funfhhcd4kZ3h5/eGih +Ur0V6sUNqMWVJZfTTmpMGky4dMaBAgMBAAECgYBInqbw9SgTnoF9LPPc2alPtXNV +K6Oxx/nfZQJwMt9i7pno8aYlOCoD2Spl5DBpWkDS7jzvTwAocp6UmnzFsunzHS6+ +lA/dZvdfocxVS8wuKWbtIsM78+o1JLSLY5bhkEwFX+gypyQEuw5aXXSEjiuDcPkB +iHvi6NgH7B0r8TV1MQJBAOrJyUZccHoUxqjh9o3QPnrAgHKQQwdvKgnqrGEB4l6r +1MIIovsLeqTRqkuPrntIhCgJOXJmUBL+MjZjmEhfYHUCQQDkobW/XqhbOZlAWgmc +fYCTHnIvJKKhtgiMFYlXtmDXPwrtThT4Os2kXU0P2xqTGUBoD2JugO/KBnfa0ylC +/ExdAkAYgSb4qP00QKbbSXoqIunideTyEAxu4jNJBa0oEsJFjzmNZslb2j7apOdZ +K43SYCcq5ouQXQ1Obilfc9WY+BthAkEAtIVCXeG9iJoH+RmecSNe+8qUWcjRaGG0 +ifcPRGRKPmoWlJyMThsP9/F7QUO8zdyoUAGltJ61tow44lzMPYm8OQJBAL/MJv+5 +kN9rfEKq0ZyvJObis2WEnBr9EcpnMka/kE7DPmZFQJNlnHqfx42l/DfUOl8tRWn9 +hUNbutQqbqXD8H4= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/ban-coloradiotp02.crt b/vpn/coloradio01/keys/ban-coloradiotp02.crt new file mode 100644 index 0000000..137bc05 --- /dev/null +++ b/vpn/coloradio01/keys/ban-coloradiotp02.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 32 (0x20) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 5 06:37:41 2015 GMT + Not After : Oct 2 06:37:41 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:df:cf:c8:31:6c:9c:3e:ca:1e:ef:e6:2f:fb:8c: + a6:ce:20:76:a9:a3:63:a2:05:ac:51:16:db:c7:68: + c2:e0:49:0d:fd:38:1f:7a:61:a3:e2:5e:a7:60:a6: + 92:c1:3b:d7:5a:24:94:79:8e:fa:db:21:39:7d:1b: + 54:58:9e:c3:c9:1a:af:e2:17:5f:de:57:3d:8c:6e: + 60:37:32:18:99:4b:de:f0:7f:c5:a5:f4:fc:35:04: + b4:04:d0:f3:cc:03:a3:cd:27:ee:f1:f6:b4:69:6d: + a5:28:34:54:51:ac:3d:39:8c:d7:e3:b5:5a:9a:1f: + a3:c9:60:9f:c1:8e:e6:13:0b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 70:64:03:45:D3:19:34:10:8F:77:2F:41:31:51:12:8D:BA:B4:89:51 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 83:a4:52:98:3c:2c:8c:c8:fc:6c:4f:cb:53:1e:a1:14:62:d8: + a6:73:67:12:17:51:1a:47:ca:30:8e:d3:d9:61:fe:39:b2:ce: + c0:25:43:e4:3e:28:a0:12:2b:22:f2:6e:15:a4:19:e8:61:87: + cf:af:94:95:04:ee:7a:b5:f2:30:ad:c2:7c:93:32:a3:9e:e2: + 01:90:62:df:74:f8:3b:78:41:51:79:b8:f4:e6:88:1f:a0:41: + 45:f9:c8:f7:b3:0d:35:57:f3:59:f5:e2:7e:a1:87:31:d1:73: + 49:53:5e:4e:89:33:a5:43:71:3f:a5:b1:32:11:22:91:40:47: + 8e:14 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBIDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMDUwNjM3NDFaFw0yNTEwMDIwNjM3NDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDIxGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDfz8gxbJw+yh7v5i/7jKbOIHapo2OiBaxRFtvHaMLg +SQ39OB96YaPiXqdgppLBO9daJJR5jvrbITl9G1RYnsPJGq/iF1/eVz2MbmA3MhiZ +S97wf8Wl9Pw1BLQE0PPMA6PNJ+7x9rRpbaUoNFRRrD05jNfjtVqaH6PJYJ/BjuYT +CwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRwZANF0xk0EI93L0Ex +URKNurSJUTCB3QYDVR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCDpFKY +PCyMyPxsT8tTHqEUYtimc2cSF1EaR8owjtPZYf45ss7AJUPkPiigEisi8m4VpBno +YYfPr5SVBO56tfIwrcJ8kzKjnuIBkGLfdPg7eEFRebj05ogfoEFF+cj3sw01V/NZ +9eJ+oYcx0XNJU15OiTOlQ3E/pbEyESKRQEeOFA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/ban-coloradiotp02.csr b/vpn/coloradio01/keys/ban-coloradiotp02.csr new file mode 100644 index 0000000..2f66c6d --- /dev/null +++ b/vpn/coloradio01/keys/ban-coloradiotp02.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFiYW4tY29sb3JhZGlvdHAwMjEaMBgG +A1UEKRMRYmFuLWNvbG9yYWRpb3RwMDIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAN/PyDFsnD7KHu/mL/uM +ps4gdqmjY6IFrFEW28dowuBJDf04H3pho+Jep2CmksE711oklHmO+tshOX0bVFie +w8kar+IXX95XPYxuYDcyGJlL3vB/xaX0/DUEtATQ88wDo80n7vH2tGltpSg0VFGs +PTmM1+O1Wpofo8lgn8GO5hMLAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQCAugTz +IJRfi9L7YpQp28d68YDWUg+IXd2wGk0eIuJhNVVGNbxDPiojErRtaJpEYKlBuOxs +o+zI54IuZpP65/1spEDI0A12op5r27dFn+WR7uPsqoeDwF3RzNopn4IcmeZzUYuA +Bso40TYi19PHBrh1NoopnUflY8ZK5lPaDLhf/A== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/ban-coloradiotp02.key b/vpn/coloradio01/keys/ban-coloradiotp02.key new file mode 100644 index 0000000..af46bb3 --- /dev/null +++ b/vpn/coloradio01/keys/ban-coloradiotp02.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAN/PyDFsnD7KHu/m +L/uMps4gdqmjY6IFrFEW28dowuBJDf04H3pho+Jep2CmksE711oklHmO+tshOX0b +VFiew8kar+IXX95XPYxuYDcyGJlL3vB/xaX0/DUEtATQ88wDo80n7vH2tGltpSg0 +VFGsPTmM1+O1Wpofo8lgn8GO5hMLAgMBAAECgYBCw5r2k22wlV7RNZuOsJB54NlF +FYZ9KLAUqHr7a1bmzSQtK3bIbSQUPSQ1Aru4hP9i1pKsCGjwwWKC3Yo1vXatkj6S +xjReWdYIR0avO8kVZQbIKhiTqTmjIcuTsXdid3oKmm9+VuVdZDnMjkJmX8IH/V2c +iRWq7hAU6A2WN3kpkQJBAPSZIlet4knDYEJZ9HzdcpNMp0F+LtmyZLreTIhVBo5/ +FSpBPxT7FMunQok6vCblYgjmF+zsafoPUVDnCf8in0UCQQDqPpiB0j4Stccd3qEq +m28HMHQhOb7KCEHaO65sP+op5SFRYMwEsMNQXtbsTHYk4f5V9h5ZOmlmaUvg3M1j +uKYPAkEA1eDZcMWxa0KV9y7lZBHXUAnk7pXBrcYZ4nTjgwqmEw/4l9w5psTuKC33 +NjvPrktBb/qSzS7kdC3UsuNzkE7b6QJAbkIIhxLvJN9rWiPwuJ1xJXEpOHp106MP +XCm7cDilgBLaG/P0FEEfrjT19UQIWFQH42512ookEpB9ptpH0yiXAQJBAJzAJx+Y +sugG+0hHOrs61RstUccTp5vMjuxPc6w7vyX961cpQU4DszQ5YNKYxnxJlwAHqtCD +xvw5PZK5dIbJq0Q= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/ca.crt b/vpn/coloradio01/keys/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio01/keys/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/ca.key b/vpn/coloradio01/keys/ca.key new file mode 100644 index 0000000..1e7a8df --- /dev/null +++ b/vpn/coloradio01/keys/ca.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBALP1axnWsQK5JK54 +QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3XXz90pW4LhRS9uAqUbcmOSXl5rocu +dgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94oQIMgp0zcHtKQG3nO0tkPgbrmB1ql +W0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAECgYBjd8M7BO/SEYO068PXdLI/+s/3 +BGjc3/EcE9cmYubiEXrJs2ZoACMlb9QAf12PmU2gi2ojfgIeoqNVFNkllOFXkzGV +S29a6x0dq5kOxusK3upadmf8+lrHYGg43os5qggydQBDtGD2PPOxvaniAjvdPTfn +9wrJVwzG8oXUlLFQAQJBAO/Dm/uj+yH5M6iC8n/xpnGBAisBHZJIdGiC9EbVgIf1 +cGgGmekIG99MSP9eS1gB6yUku7RXO/6tQrGn5IbMrU0CQQDAJQ/Y2wr2k0QHO3JQ +pEwWeVOBg8nXYlXDkLf4T3tESnivtiK8YOVfiXBIKuIQMLSCSxXVFIJOZQwdMrGA +flspAkEA1n7Cnv72flA4vLpZQ8jlxIlLbTmUQPf83Dq7WltKn1cd9pJhQq50cPII +JB0xfkxJF3OjURTxoUdTcSfoNAgLyQJBAKdfoW5FYEdqANhL8EhO1fi9twAazLfR +8ONqLNcgZUAXnwlwntF5llSiZCx5LnLr+lGFFn+GXfvsCaFlhzlm2AECQFY82Jh3 +E4PcNDCC8sXeYA0bpCTnqT5yQeipdCbiAVrgxI1PgRodP0FI6ZCFdoMVNXq6a4S2 +PrmwpcAU5TC+dqc= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/dh1024.pem b/vpn/coloradio01/keys/dh1024.pem new file mode 100644 index 0000000..7b8f41e --- /dev/null +++ b/vpn/coloradio01/keys/dh1024.pem @@ -0,0 +1,5 @@ +-----BEGIN DH PARAMETERS----- +MIGHAoGBAJRRRIwYjjzRlO4lQwMUrMzdggG5OlxU3r7Du6yYYHE+GZvndtLJ+A/m +OYOu00Lg909/CAnqwlvA5Qq6i+j5ISxhYhmzpRNiXOsjsoBS/v355Z6WDHUERen3 ++flmrJmpnBd9tdsKp3FtsowixnS7aX8E9GMbJElzfd/pengpEjc7AgEC +-----END DH PARAMETERS----- diff --git a/vpn/coloradio01/keys/dks-laptop.crt b/vpn/coloradio01/keys/dks-laptop.crt new file mode 100644 index 0000000..3d6bfd7 --- /dev/null +++ b/vpn/coloradio01/keys/dks-laptop.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 28 (0x1c) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 5 21:19:58 2015 GMT + Not After : Aug 2 21:19:58 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b8:bb:9d:f2:6b:f1:8f:37:84:b6:f5:34:55:5e: + 8b:8b:af:d7:3d:0a:7e:f9:99:bb:6f:30:0b:39:f4: + 66:b3:39:94:ff:98:e6:66:e1:63:df:40:50:1a:d4: + 6c:54:98:c5:26:66:36:c1:a3:de:ad:d5:43:21:b1: + 3e:c3:f7:72:ca:6c:1c:50:7e:2c:aa:19:a6:24:f7: + 4c:fc:ac:03:b6:32:a3:b8:10:e9:ce:83:ea:f5:fc: + 96:04:bc:cf:87:44:44:2a:87:06:2a:8e:af:62:41: + 2c:17:b7:34:b0:15:6f:9e:4b:f4:69:95:a1:1e:f4: + 90:62:f4:2a:3f:2b:f7:75:6b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FF:A1:4D:6F:A0:EF:B4:61:F9:15:DF:4E:D1:A1:BD:6A:74:B4:9D:0F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:8a:29:5a:82:b5:50:86:44:b0:da:61:3f:83:23:c4:65:ac: + ff:11:fb:18:9b:a3:87:ac:b7:a1:97:ba:dd:f4:67:b3:8f:26: + f9:f3:b7:87:3c:38:b9:15:a4:ae:db:e5:13:86:6a:d5:1b:35: + a9:23:6b:39:c2:45:5d:83:2d:e5:90:84:f2:9c:8a:87:f5:42: + 26:dc:d4:8e:02:ff:97:05:16:37:7a:05:d7:11:50:e7:83:75: + 7f:95:e3:62:79:21:8c:6d:e2:bc:bd:5a:1b:29:5b:3c:f9:9e: + f3:c9:e9:30:2c:8a:16:26:bc:13:43:8d:3e:e3:aa:f2:51:1c: + c8:26 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBHDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDUyMTE5NThaFw0yNTA4MDIyMTE5NThaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAuLud8mvxjzeEtvU0VV6Li6/XPQp++Zm7bzALOfRmszmU/5jmZuFj30BQGtRs +VJjFJmY2waPerdVDIbE+w/dyymwcUH4sqhmmJPdM/KwDtjKjuBDpzoPq9fyWBLzP +h0REKocGKo6vYkEsF7c0sBVvnkv0aZWhHvSQYvQqPyv3dWsCAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU/6FNb6DvtGH5Fd9O0aG9anS0nQ8wgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAf4opWoK1UIZEsNphP4MjxGWs +/xH7GJujh6y3oZe63fRns48m+fO3hzw4uRWkrtvlE4Zq1Rs1qSNrOcJFXYMt5ZCE +8pyKh/VCJtzUjgL/lwUWN3oF1xFQ54N1f5XjYnkhjG3ivL1aGylbPPme88npMCyK +Fia8E0ONPuOq8lEcyCY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/dks-laptop.csr b/vpn/coloradio01/keys/dks-laptop.csr new file mode 100644 index 0000000..0c786d9 --- /dev/null +++ b/vpn/coloradio01/keys/dks-laptop.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6jCCAVMCAQAwgakxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRMwEQYDVQQDEwpka3MtbGFwdG9wMRMwEQYDVQQpEwpk +a3MtbGFwdG9wMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqG +SIb3DQEBAQUAA4GNADCBiQKBgQC4u53ya/GPN4S29TRVXouLr9c9Cn75mbtvMAs5 +9GazOZT/mOZm4WPfQFAa1GxUmMUmZjbBo96t1UMhsT7D93LKbBxQfiyqGaYk90z8 +rAO2MqO4EOnOg+r1/JYEvM+HREQqhwYqjq9iQSwXtzSwFW+eS/RplaEe9JBi9Co/ +K/d1awIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEADg4kNsy+naHccnORjh/Mzq9x +wE75ois2vRtx4IdZY28zgPLeISbP5r62ZglR8/8MDSjc+hekOD1qViJMT+CWGlXr +bAeE3PNj5tqcYskDses6uWfm4e+zqaXkAQJME5LqJAoyHzGFxJ+fEuviHU1N/dPV +SRsXSmdufwamnYDNz9E= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/dks-laptop.key b/vpn/coloradio01/keys/dks-laptop.key new file mode 100644 index 0000000..4fe9ce0 --- /dev/null +++ b/vpn/coloradio01/keys/dks-laptop.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALi7nfJr8Y83hLb1 +NFVei4uv1z0KfvmZu28wCzn0ZrM5lP+Y5mbhY99AUBrUbFSYxSZmNsGj3q3VQyGx +PsP3cspsHFB+LKoZpiT3TPysA7Yyo7gQ6c6D6vX8lgS8z4dERCqHBiqOr2JBLBe3 +NLAVb55L9GmVoR70kGL0Kj8r93VrAgMBAAECgYBJa4/f7JTqJdeiW5w8HcJ6dx2l +jglfLIF5NHARzZgPvWABogRYeVYXQdlUgH65tKoOk+tJVNbI4gy3VFmsyykcq6pu +6KK+cYLdSxo6hPozDMWgzLJYZ24UHyTUM5GvS++z/HMyydPq51rksBF2XL9v85Go +mJ/RGTaCNqhnMITLwQJBAN4k7+oV78E5aOnX9W2js/beNmw9JgTo7bdtDVXrUZe+ +OFsWvn6eZdpnUtaPO4uYK9h/I7JIe+DGnT9OfKs4JYsCQQDU4w5sHD2o9J0sDr98 +DQmGw+iaLSJFpQzjJt6cXmrKTaFNWZYFF0dcIGEIBHE+bisYy4j+Vzv6K1+yLdaQ +PKuhAkEAnU7Y2hJospL9+UJl2Rso0LOxJFr09lsgI1lFLUezgtpAPDjR8wYmKFAs +uCW7y/GZcvkthQ2RM65SIkdpPzJGWwJAJ9CjZOLPQWcmchP8ChZiHrtLKHKig0YA +KAegALzD2jw0m8PSg/c7mGZR3279QwDVvJhsca0dAYfVKPzbsTQ3oQJAVVXN7nBK +gDuE/gSESl1Rul3Wngxpj+8qHbOqNOzJcsPLHw2qVMrxOMYBun8nd83TmdgrxD+W +UZIbE0F51svF3w== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/dks-rpi2test.crt b/vpn/coloradio01/keys/dks-rpi2test.crt new file mode 100644 index 0000000..972b5a4 --- /dev/null +++ b/vpn/coloradio01/keys/dks-rpi2test.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 27 (0x1b) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 19 12:04:05 2015 GMT + Not After : Apr 16 12:04:05 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-rpi2test/name=dks-rpi2test/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:bb:5f:37:53:30:39:ef:24:4e:6d:9f:e0:0f:9a: + 22:67:2f:17:f3:da:22:d4:e1:af:7b:20:99:1d:4e: + c5:48:99:c3:b8:b5:cc:43:7a:44:c5:22:cd:ed:ec: + 92:39:b6:9e:1c:6b:de:92:81:0f:66:5c:f1:a6:74: + c5:05:4f:e9:19:bc:71:0c:34:4d:a3:d9:3c:b8:a4: + 45:60:2b:2a:bc:dd:9e:44:ac:76:7f:6f:7d:34:b0: + 35:fd:f6:29:d7:08:17:ec:20:5e:5d:c0:09:d5:98: + ae:e5:3d:c8:5d:42:9f:9a:fd:d7:4e:57:40:c5:82: + ce:33:8d:7c:65:fa:7a:1a:8f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 60:14:81:89:49:9B:8E:B8:4A:7E:A5:A4:B9:B7:88:69:97:E1:A8:4B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 25:9f:6c:81:18:5d:64:75:eb:b3:73:dc:90:25:82:b0:51:40: + 77:99:9c:bd:cd:4e:9b:4b:7b:fe:09:51:3c:aa:41:25:81:c2: + dc:fc:6f:b4:b0:37:92:0b:fd:53:e2:ba:41:57:2d:b3:b2:2f: + 15:7e:64:89:05:f0:2d:c2:e7:81:a2:6f:13:ff:d5:b5:a0:ed: + 54:e1:07:c9:30:8d:fd:11:f0:6a:67:a8:c0:eb:e5:d4:88:1f: + e7:36:cd:e0:db:25:85:45:6a:4d:df:56:25:9b:28:7d:75:cd: + 41:68:79:b3:40:21:50:7b:cc:52:83:6c:db:08:dd:6d:af:44: + 05:9b +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA0MTkxMjA0MDVaFw0yNTA0MTYxMjA0MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMZGtzLXJwaTJ0ZXN0MRUwEwYDVQQpEwxka3MtcnBpMnRlc3QxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALtfN1MwOe8kTm2f4A+aImcvF/PaItThr3sgmR1OxUiZw7i1zEN6RMUi +ze3skjm2nhxr3pKBD2Zc8aZ0xQVP6Rm8cQw0TaPZPLikRWArKrzdnkSsdn9vfTSw +Nf32KdcIF+wgXl3ACdWYruU9yF1Cn5r9105XQMWCzjONfGX6ehqPAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFGAUgYlJm464Sn6lpLm3iGmX4ahLMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBACWfbIEYXWR167Nz3JAl +grBRQHeZnL3NTptLe/4JUTyqQSWBwtz8b7SwN5IL/VPiukFXLbOyLxV+ZIkF8C3C +54GibxP/1bWg7VThB8kwjf0R8GpnqMDr5dSIH+c2zeDbJYVFak3fViWbKH11zUFo +ebNAIVB7zFKDbNsI3W2vRAWb +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/dks-rpi2test.csr b/vpn/coloradio01/keys/dks-rpi2test.csr new file mode 100644 index 0000000..78c7e33 --- /dev/null +++ b/vpn/coloradio01/keys/dks-rpi2test.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxka3MtcnBpMnRlc3QxFTATBgNVBCkT +DGRrcy1ycGkydGVzdDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAu183UzA57yRObZ/gD5oiZy8X89oi1OGv +eyCZHU7FSJnDuLXMQ3pExSLN7eySObaeHGvekoEPZlzxpnTFBU/pGbxxDDRNo9k8 +uKRFYCsqvN2eRKx2f299NLA1/fYp1wgX7CBeXcAJ1Ziu5T3IXUKfmv3XTldAxYLO +M418Zfp6Go8CAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAAs7+nsozddBwhKRUVwl +I2kIdwWJgVKswn7s4au1wnVLK7oJ6BVsN9VdtiZcHdfs5mvYDJ61Rmcyy/Us7IIW +jsWMmMOpf4jpIm0W4gRL3hUDy980b/oTfIPAxRiaPBaov5GwgnW//fuhsUYuLh1n +vJ/MF8JexXu/7dioAfHpUV0I +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/dks-rpi2test.key b/vpn/coloradio01/keys/dks-rpi2test.key new file mode 100644 index 0000000..6950efb --- /dev/null +++ b/vpn/coloradio01/keys/dks-rpi2test.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBALtfN1MwOe8kTm2f +4A+aImcvF/PaItThr3sgmR1OxUiZw7i1zEN6RMUize3skjm2nhxr3pKBD2Zc8aZ0 +xQVP6Rm8cQw0TaPZPLikRWArKrzdnkSsdn9vfTSwNf32KdcIF+wgXl3ACdWYruU9 +yF1Cn5r9105XQMWCzjONfGX6ehqPAgMBAAECgYEAsxeaePACn/pS4GNMtXz83yVb +PqBEZLfmk8ifsSymUvNt6PITcHfAnbDbpktVpMZRMBdGoT+sqYmzDAhWfPJZeLRR +toZjbh2yvPe6eG/10b6O0JbUq8hayRcEoxIZ4z4aifvihBgCH5KmKGxj3C9w+Wkd +t1lxMArhzmbA2hu8UuECQQDxGFlFcJn7HeramK+zGUZ3ir1PJgdmeHgRMH2LFqkX +seFu2ea4V5rvr1TCcJ1rjyWRe6EK7fo90+uN6c+TUJSRAkEAxvSgaU7BVsudXqsq +DqDT9LLTp2TzBtqxvBu0aloK9djgN8D9gew45lFEWdzafBNYNN4G6Ie8fL4Nntdx +MMDNHwJBAOrlejS5nIyZfXQ1RxoMCif2OLOgrZ0cyn6U6/xTu7OmT6mdC7mXQRE9 +litLZVSiR0wTU7g+XI1YqCvAHcm9vMECQQC8FmZUSC0FpicXaY+wFqFq02i+9vO+ +RiADKtnsNUXpV+fZLa08F5tPOgL5RY6UACHCkShMyo4KDA6KXTjYE12XAkBR6gIW +V6KB9OAr/XFi6ZVIwqvO5enRt7yx5b8V5eLOfBx8gQ1Kf2GHRI2FGMkZyXXIPrBJ +pkayPIZh+F0a2wQ0 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/dks-testrpi.crt b/vpn/coloradio01/keys/dks-testrpi.crt new file mode 100644 index 0000000..6e17529 --- /dev/null +++ b/vpn/coloradio01/keys/dks-testrpi.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 24 (0x18) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 20 19:41:48 2015 GMT + Not After : Feb 17 19:41:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-testrpi/name=dks-testrpi/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ed:d7:bc:aa:20:35:7c:eb:ac:89:37:42:c5:d9: + ce:20:e2:5c:3f:f3:77:5b:59:0e:65:6b:2c:a0:19: + 2a:5e:b5:a1:fb:85:fb:4f:b7:ad:37:20:93:be:09: + a4:71:34:6f:58:e1:aa:9f:db:b1:b0:9e:41:ba:a2: + 8d:78:a2:0b:28:ed:22:af:59:3f:7e:fe:6e:c9:dc: + 37:66:26:7b:22:22:57:0e:0f:b6:23:00:29:4c:49: + 0b:48:18:3a:8c:3e:5a:0b:41:5d:0f:c3:ed:b2:fc: + 93:f9:c5:eb:db:9a:f9:3b:b1:2d:02:8e:2c:02:a0: + a5:6c:b9:93:e0:70:2a:25:9f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0B:F0:5F:07:58:B5:28:F9:F0:98:09:24:C3:93:5D:08:B8:33:CC:3B + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 6b:a2:b0:58:0c:b0:55:82:b2:ed:ad:09:fe:2b:c8:41:81:4e: + e3:1e:43:6b:4b:0c:3f:ea:c7:fa:1f:d7:6f:2f:46:98:9f:16: + e8:00:d2:35:e0:11:5e:d5:1c:37:21:c7:4c:d4:13:08:a3:76: + cc:41:62:47:01:a1:19:ac:70:30:2b:c2:8f:fe:9e:7d:6f:e1: + 2b:94:2b:ce:8b:06:84:48:6c:b9:63:d7:d2:fc:b2:1c:26:74: + 40:81:4e:68:3c:f3:c9:08:62:8f:c4:2a:cd:bc:05:ee:31:cb: + de:17:e4:42:9f:71:2a:95:c7:58:ff:e8:35:f1:6c:d8:0f:19: + c9:6d +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBGDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMjAxOTQxNDhaFw0yNTAyMTcxOTQxNDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLZGtzLXRlc3RycGkxFDASBgNVBCkTC2Rrcy10ZXN0cnBpMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDt17yqIDV866yJN0LF2c4g4lw/83dbWQ5layygGSpetaH7hftPt603IJO+ +CaRxNG9Y4aqf27GwnkG6oo14ogso7SKvWT9+/m7J3DdmJnsiIlcOD7YjAClMSQtI +GDqMPloLQV0Pw+2y/JP5xevbmvk7sS0CjiwCoKVsuZPgcColnwIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBQL8F8HWLUo+fCYCSTDk10IuDPMOzCB3QYD +VR0jBIHVMIHSgBTnTMWxPqSsICLl/C87Zp4J6a8TeqGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJAMswD47MnbhSMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBrorBYDLBVgrLtrQn+K8hB +gU7jHkNrSww/6sf6H9dvL0aYnxboANI14BFe1Rw3IcdM1BMIo3bMQWJHAaEZrHAw +K8KP/p59b+ErlCvOiwaESGy5Y9fS/LIcJnRAgU5oPPPJCGKPxCrNvAXuMcveF+RC +n3EqlcdY/+g18WzYDxnJbQ== +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/dks-testrpi.csr b/vpn/coloradio01/keys/dks-testrpi.csr new file mode 100644 index 0000000..86aa245 --- /dev/null +++ b/vpn/coloradio01/keys/dks-testrpi.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7DCCAVUCAQAwgasxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRQwEgYDVQQDEwtka3MtdGVzdHJwaTEUMBIGA1UEKRML +ZGtzLXRlc3RycGkxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJ +KoZIhvcNAQEBBQADgY0AMIGJAoGBAO3XvKogNXzrrIk3QsXZziDiXD/zd1tZDmVr +LKAZKl61ofuF+0+3rTcgk74JpHE0b1jhqp/bsbCeQbqijXiiCyjtIq9ZP37+bsnc +N2YmeyIiVw4PtiMAKUxJC0gYOow+WgtBXQ/D7bL8k/nF69ua+TuxLQKOLAKgpWy5 +k+BwKiWfAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQAtOUxs9OIWDYuBc77tZdNL +zj9dQNa8Rp+bI4fYOKSpp1vaimpdofvgZFgnWVH8oP5GqeULpMOd7LjA+9+MrjSP +Nd/nGtLIt3GJeFKVoy6l9/D+PWFzAwuNGhweol0bAGXRus1t9LRwVI1w/epOfq2Y +HspDSouSdvh6qayoXas5pA== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/dks-testrpi.key b/vpn/coloradio01/keys/dks-testrpi.key new file mode 100644 index 0000000..af3f5f9 --- /dev/null +++ b/vpn/coloradio01/keys/dks-testrpi.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAO3XvKogNXzrrIk3 +QsXZziDiXD/zd1tZDmVrLKAZKl61ofuF+0+3rTcgk74JpHE0b1jhqp/bsbCeQbqi +jXiiCyjtIq9ZP37+bsncN2YmeyIiVw4PtiMAKUxJC0gYOow+WgtBXQ/D7bL8k/nF +69ua+TuxLQKOLAKgpWy5k+BwKiWfAgMBAAECgYB8SI2XwLjyjBxen3fO91+VI3Pd +HxYxr7msGXL6Pew8DWGVk4+dOnfTJLzPQy6g0SuWIGYOnrideDUUl7ihXtvBBxIb +r+fru6wODDzY8BtD100JEk3PjL7qQOjIiaGwpPrSRkuYjfQoF2Jk72H79FL2coC5 +DPoSUXw+mqaapbDwMQJBAP8ldE/7PzmGzNHikppHxQ9he2H7EBo5vg18iEUUUTHf +NcsiUsBKFL1B1UzPP1mMQPnXLn223guQnuAR/aAJ6qUCQQDuo3YTgr7aTVsfY990 +yVGpmHFMfDFGFHYWsk5ceCh9b5yJTrS/95h61fXBBHwner4+qOmYcLkH2mvPwCF7 +4c/zAkEA3lqrxNA2x1F8yiTkkmOdjsvrlPYRkGlmAabXsywDnqzh2oetCjsFW/I1 +i1zJ3qZmMdWfhJuLYxTEAI5tM72wqQJAaVLx4UiabYUoy6Dr1gKorT6f+s7xfGm5 +eOj3lu5diIdDQoLfWb6wqL5YOfl9xnrxDnzEpMhTkfjADrBQ1vliKwJBALNXrfzs +i1361eKJEFxW/zVpGOQU2CQlkwhcYpDGQE4c2HYdnYVTjKept3x393FuAM5NSO2Y +b5Y/FeBGzPb245o= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/index.txt b/vpn/coloradio01/keys/index.txt new file mode 100644 index 0000000..c0f9ead --- /dev/null +++ b/vpn/coloradio01/keys/index.txt @@ -0,0 +1,32 @@ +V 250205084607Z 01 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl +V 250206163054Z 02 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-merl/name=aral-merl/emailAddress=info@dks.sarl +V 250206163054Z 03 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-ettelbruck/name=aral-ettelbruck/emailAddress=info@dks.sarl +V 250206163054Z 04 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-petange/name=aral-petange/emailAddress=info@dks.sarl +V 250206163054Z 05 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-frisange/name=aral-frisange/emailAddress=info@dks.sarl +V 250206163054Z 06 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-mondorf/name=aral-mondorf/emailAddress=info@dks.sarl +V 250206163054Z 07 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-wasserbillig/name=aral-wasserbillig/emailAddress=info@dks.sarl +V 250206163055Z 08 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rollingergrund/name=aral-rollingergrund/emailAddress=info@dks.sarl +V 250206163055Z 09 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bettembourg/name=aral-bettembourg/emailAddress=info@dks.sarl +V 250206163055Z 0A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-pommerloch/name=aral-pommerloch/emailAddress=info@dks.sarl +V 250206163055Z 0B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-howald/name=aral-howald/emailAddress=info@dks.sarl +V 250206163055Z 0C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-steinfort/name=aral-steinfort/emailAddress=info@dks.sarl +V 250206163055Z 0D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-differdange/name=aral-differdange/emailAddress=info@dks.sarl +V 250206163055Z 0E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-gonderange/name=aral-gonderange/emailAddress=info@dks.sarl +V 250206163055Z 0F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-foetz/name=aral-foetz/emailAddress=info@dks.sarl +V 250206163055Z 10 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-diekirch/name=aral-diekirch/emailAddress=info@dks.sarl +V 250206163055Z 11 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-vianden/name=aral-vianden/emailAddress=info@dks.sarl +V 250206163055Z 12 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-lintgen/name=aral-lintgen/emailAddress=info@dks.sarl +V 250206163055Z 13 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bascharage/name=aral-bascharage/emailAddress=info@dks.sarl +V 250206163055Z 14 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-hoscheiddickt/name=aral-hoscheiddickt/emailAddress=info@dks.sarl +V 250206163055Z 15 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-niederfeulen/name=aral-niederfeulen/emailAddress=info@dks.sarl +V 250208174841Z 16 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-redange/name=aral-redange/emailAddress=info@dks.sarl +V 250208174854Z 17 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-junglinster/name=aral-junglinster/emailAddress=info@dks.sarl +V 250217194148Z 18 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-testrpi/name=dks-testrpi/emailAddress=info@dks.sarl +V 250326161027Z 19 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=rb75-lintgen/name=rb75-lintgen/emailAddress=info@dks.sarl +V 250409082801Z 1A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bertrange/name=aral-bertrange/emailAddress=info@dks.sarl +V 250416120405Z 1B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-rpi2test/name=dks-rpi2test/emailAddress=info@dks.sarl +V 250802211958Z 1C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl +V 250803120247Z 1D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-dudelange/name=aral-dudelange/emailAddress=info@dks.sarl +V 250803120255Z 1E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-schengen/name=aral-schengen/emailAddress=info@dks.sarl +V 250804095316Z 1F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rodange/name=aral-rodange/emailAddress=info@dks.sarl +V 251002063741Z 20 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl diff --git a/vpn/coloradio01/keys/index.txt.attr b/vpn/coloradio01/keys/index.txt.attr new file mode 100644 index 0000000..8f7e63a --- /dev/null +++ b/vpn/coloradio01/keys/index.txt.attr @@ -0,0 +1 @@ +unique_subject = yes diff --git a/vpn/coloradio01/keys/index.txt.attr.old b/vpn/coloradio01/keys/index.txt.attr.old new file mode 100644 index 0000000..8f7e63a --- /dev/null +++ b/vpn/coloradio01/keys/index.txt.attr.old @@ -0,0 +1 @@ +unique_subject = yes diff --git a/vpn/coloradio01/keys/index.txt.old b/vpn/coloradio01/keys/index.txt.old new file mode 100644 index 0000000..2879604 --- /dev/null +++ b/vpn/coloradio01/keys/index.txt.old @@ -0,0 +1,31 @@ +V 250205084607Z 01 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl +V 250206163054Z 02 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-merl/name=aral-merl/emailAddress=info@dks.sarl +V 250206163054Z 03 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-ettelbruck/name=aral-ettelbruck/emailAddress=info@dks.sarl +V 250206163054Z 04 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-petange/name=aral-petange/emailAddress=info@dks.sarl +V 250206163054Z 05 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-frisange/name=aral-frisange/emailAddress=info@dks.sarl +V 250206163054Z 06 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-mondorf/name=aral-mondorf/emailAddress=info@dks.sarl +V 250206163054Z 07 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-wasserbillig/name=aral-wasserbillig/emailAddress=info@dks.sarl +V 250206163055Z 08 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rollingergrund/name=aral-rollingergrund/emailAddress=info@dks.sarl +V 250206163055Z 09 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bettembourg/name=aral-bettembourg/emailAddress=info@dks.sarl +V 250206163055Z 0A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-pommerloch/name=aral-pommerloch/emailAddress=info@dks.sarl +V 250206163055Z 0B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-howald/name=aral-howald/emailAddress=info@dks.sarl +V 250206163055Z 0C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-steinfort/name=aral-steinfort/emailAddress=info@dks.sarl +V 250206163055Z 0D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-differdange/name=aral-differdange/emailAddress=info@dks.sarl +V 250206163055Z 0E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-gonderange/name=aral-gonderange/emailAddress=info@dks.sarl +V 250206163055Z 0F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-foetz/name=aral-foetz/emailAddress=info@dks.sarl +V 250206163055Z 10 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-diekirch/name=aral-diekirch/emailAddress=info@dks.sarl +V 250206163055Z 11 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-vianden/name=aral-vianden/emailAddress=info@dks.sarl +V 250206163055Z 12 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-lintgen/name=aral-lintgen/emailAddress=info@dks.sarl +V 250206163055Z 13 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bascharage/name=aral-bascharage/emailAddress=info@dks.sarl +V 250206163055Z 14 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-hoscheiddickt/name=aral-hoscheiddickt/emailAddress=info@dks.sarl +V 250206163055Z 15 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-niederfeulen/name=aral-niederfeulen/emailAddress=info@dks.sarl +V 250208174841Z 16 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-redange/name=aral-redange/emailAddress=info@dks.sarl +V 250208174854Z 17 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-junglinster/name=aral-junglinster/emailAddress=info@dks.sarl +V 250217194148Z 18 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-testrpi/name=dks-testrpi/emailAddress=info@dks.sarl +V 250326161027Z 19 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=rb75-lintgen/name=rb75-lintgen/emailAddress=info@dks.sarl +V 250409082801Z 1A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-bertrange/name=aral-bertrange/emailAddress=info@dks.sarl +V 250416120405Z 1B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-rpi2test/name=dks-rpi2test/emailAddress=info@dks.sarl +V 250802211958Z 1C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl +V 250803120247Z 1D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-dudelange/name=aral-dudelange/emailAddress=info@dks.sarl +V 250803120255Z 1E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-schengen/name=aral-schengen/emailAddress=info@dks.sarl +V 250804095316Z 1F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rodange/name=aral-rodange/emailAddress=info@dks.sarl diff --git a/vpn/coloradio01/keys/rb75-lintgen.crt b/vpn/coloradio01/keys/rb75-lintgen.crt new file mode 100644 index 0000000..552ff2a --- /dev/null +++ b/vpn/coloradio01/keys/rb75-lintgen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 25 (0x19) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 16:10:27 2015 GMT + Not After : Mar 26 16:10:27 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=rb75-lintgen/name=rb75-lintgen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c9:86:4f:1f:04:e0:9d:f7:2a:af:99:c6:14:e6: + 4f:27:41:a9:c7:b9:bc:fa:1b:71:dd:65:79:b0:54: + dc:b4:f0:5f:95:3c:cb:c7:e9:26:59:ca:e5:96:31: + 36:55:b9:55:2a:fb:ed:64:72:25:65:40:49:98:02: + 28:44:54:c2:65:80:5b:57:eb:c2:1b:40:dc:b3:4a: + 77:97:5a:69:0b:a9:7d:dc:a3:f0:2e:19:f1:ce:37: + df:c8:b1:15:9f:38:86:d9:58:bf:48:b7:bc:4c:f5: + 57:c3:b0:69:58:7a:02:96:c9:38:4d:af:21:c6:64: + c2:c3:9b:64:7e:88:29:fc:19 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 19:6A:3F:80:EA:31:87:5F:49:18:63:0D:CA:F6:B0:FF:3D:D8:07:60 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1d:58:2f:bf:2a:28:62:ec:33:e5:93:40:31:f2:a1:76:82:62: + cd:99:e3:eb:7c:61:47:4d:fb:05:5d:25:a0:22:4d:50:4c:de: + 6c:12:c5:ef:db:6f:85:95:56:61:6e:ca:55:01:db:9d:6b:6d: + 9f:08:d2:a3:ad:bf:d1:86:a8:e7:49:d6:97:0a:fa:c6:5e:4f: + c9:bf:76:35:de:95:30:06:d8:8b:3a:82:6f:97:50:25:d1:1a: + de:4c:75:93:e7:b0:e2:c0:c8:1e:98:bc:87:8e:ee:8c:13:6b: + 0a:50:f9:ae:87:76:ed:8e:e7:06:36:7a:92:89:5b:06:98:bc: + f6:ac +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBGTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAzMjkxNjEwMjdaFw0yNTAzMjYxNjEwMjdaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMcmI3NS1saW50Z2VuMRUwEwYDVQQpEwxyYjc1LWxpbnRnZW4xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAMmGTx8E4J33Kq+ZxhTmTydBqce5vPobcd1lebBU3LTwX5U8y8fpJlnK +5ZYxNlW5VSr77WRyJWVASZgCKERUwmWAW1frwhtA3LNKd5daaQupfdyj8C4Z8c43 +38ixFZ84htlYv0i3vEz1V8OwaVh6ApbJOE2vIcZkwsObZH6IKfwZAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFBlqP4DqMYdfSRhjDcr2sP892AdgMIHd +BgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8LztmngnprxN6oYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyduFIwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB1YL78qKGLsM+WTQDHy +oXaCYs2Z4+t8YUdN+wVdJaAiTVBM3mwSxe/bb4WVVmFuylUB251rbZ8I0qOtv9GG +qOdJ1pcK+sZeT8m/djXelTAG2Is6gm+XUCXRGt5MdZPnsOLAyB6YvIeO7owTawpQ ++a6Hdu2O5wY2epKJWwaYvPas +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/rb75-lintgen.csr b/vpn/coloradio01/keys/rb75-lintgen.csr new file mode 100644 index 0000000..0b19316 --- /dev/null +++ b/vpn/coloradio01/keys/rb75-lintgen.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxyYjc1LWxpbnRnZW4xFTATBgNVBCkT +DHJiNzUtbGludGdlbjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyYZPHwTgnfcqr5nGFOZPJ0Gpx7m8+htx +3WV5sFTctPBflTzLx+kmWcrlljE2VblVKvvtZHIlZUBJmAIoRFTCZYBbV+vCG0Dc +s0p3l1ppC6l93KPwLhnxzjffyLEVnziG2Vi/SLe8TPVXw7BpWHoClsk4Ta8hxmTC +w5tkfogp/BkCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBABNLBTn337SbzJy/8895 +J76fCwQaoVe7y9iHGkHe8SQ/3YRAkao6O2g5Zti+0brpNMiQJiyOnRiZ7nF2Y6ye ++Nf8lzEG7b5fIQbQrNSXr1nQ0Umk2Nxa5SVJYrN+ysmvASHhIxNVgtlrqq9s7p72 +AWb56IrYJe6agH7uXWmY5z1v +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/rb75-lintgen.key b/vpn/coloradio01/keys/rb75-lintgen.key new file mode 100644 index 0000000..83676ee --- /dev/null +++ b/vpn/coloradio01/keys/rb75-lintgen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMmGTx8E4J33Kq+Z +xhTmTydBqce5vPobcd1lebBU3LTwX5U8y8fpJlnK5ZYxNlW5VSr77WRyJWVASZgC +KERUwmWAW1frwhtA3LNKd5daaQupfdyj8C4Z8c4338ixFZ84htlYv0i3vEz1V8Ow +aVh6ApbJOE2vIcZkwsObZH6IKfwZAgMBAAECgYEAmFM2AQtNwPkvwbWpHOkM0W53 +p6kEZ8RQ5/ko5xjuDrJWfVaL7dqUi3Cq40DlghxpfOkaAj+pdoQGXKjcyPGMUZcP +ux2q0dnFX55cJJxpxTSNv3o2kzZYAmlf1z09Hr5IcFqbEq7ZyLhUa7n4ZzQcYUVY +MKs81yfRhAWb5nnS+yUCQQDqSICECmVl20k5tEebLaT+WzfE49csAgQN/pHYe45Y ++Ol/LL362sENipF/8CIsE4x8PhKVxdXhHTEgIg1NXY8LAkEA3DRzxaN3GBFW8h+7 +yyr1ewCOg+2mkQXOV6fBPvmj6tRrATp0Ue9fa4TjG9u15WaKK5sy+RVQRr7MHN0p +iZcn6wJAXbpxx+GM3WoUaoSIXTmul6AQuLFaRR3tV1fwK0aLFWdHqvxQaQqZT3yP +Zzq/wRh1DMOcldTXEz+lhrB41+nFLwJAYLAHRXiJCmBStO2KH6M1NlUAPp1Szcqm +14YpK+WhO7MZaOipunBIjYVD0y+dpqRnds4mi4f4P5f3N5VEb82XEQJBALEfAX6c +3K9CP2od1OyktNx047NGR8WbbAqLkNkqzetcQvJsCjum2lcMy3XbVpU2s0F/Hp9B +23/9MJ+AMWN26Yo= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/keys/serial b/vpn/coloradio01/keys/serial new file mode 100644 index 0000000..aabe6ec --- /dev/null +++ b/vpn/coloradio01/keys/serial @@ -0,0 +1 @@ +21 diff --git a/vpn/coloradio01/keys/serial.old b/vpn/coloradio01/keys/serial.old new file mode 100644 index 0000000..209e3ef --- /dev/null +++ b/vpn/coloradio01/keys/serial.old @@ -0,0 +1 @@ +20 diff --git a/vpn/coloradio01/keys/server.crt b/vpn/coloradio01/keys/server.crt new file mode 100644 index 0000000..e14c2ef --- /dev/null +++ b/vpn/coloradio01/keys/server.crt @@ -0,0 +1,76 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 1 (0x1) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 8 08:46:07 2015 GMT + Not After : Feb 5 08:46:07 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ce:97:26:db:3e:30:a6:d3:b6:aa:13:09:6f:10: + e9:66:61:f7:dd:d6:2c:32:fc:6c:07:da:b0:69:d2: + aa:45:38:79:5b:ea:9c:d8:1f:b8:83:f1:e0:cf:57: + 50:3d:cc:34:45:ed:b0:45:d5:75:cb:18:1d:6c:b6: + 40:7e:42:04:f5:d0:a2:5c:9a:80:e8:c7:c5:50:c0: + a4:3e:8a:f2:c2:18:87:75:fc:84:a8:9f:5f:a1:21: + 68:e8:a2:8b:4a:dc:75:2f:b1:48:9d:e8:c3:dd:b5: + a7:71:49:53:99:a1:90:56:7d:ed:c7:e2:b5:5b:7c: + 08:c6:5a:57:10:20:26:7d:23 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Cert Type: + SSL Server + Netscape Comment: + Easy-RSA Generated Server Certificate + X509v3 Subject Key Identifier: + 2F:B9:7E:3C:A0:B2:EE:F5:21:F8:D1:B7:69:04:EC:26:B9:24:E3:C6 + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Server Authentication + X509v3 Key Usage: + Digital Signature, Key Encipherment + Signature Algorithm: sha1WithRSAEncryption + 70:53:83:2d:40:c9:50:7d:45:a7:25:50:ac:2c:ef:0a:21:3b: + 76:d1:91:42:9f:6f:d0:6b:9b:b2:20:8e:51:5c:31:2a:7a:95: + 56:fb:fb:cf:3b:10:89:78:e3:42:8d:8e:ca:5a:ea:a0:27:7f: + 19:46:42:a5:12:e8:fc:60:e8:02:66:6a:ab:70:ac:28:a6:95: + b0:30:1f:7c:4a:e9:f0:0d:67:53:8e:3b:e4:8f:ea:50:ed:24: + 03:6c:cf:a3:04:38:fa:38:40:2b:8e:63:b5:cc:11:4f:34:bb: + 89:42:5f:83:17:c5:4f:fb:f1:97:4c:81:72:52:9b:3e:61:8e: + a2:d0 +-----BEGIN CERTIFICATE----- +MIIEQzCCA6ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDgwODQ2MDdaFw0yNTAyMDUwODQ2MDdaMIGoMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZI +hvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB +gQDOlybbPjCm07aqEwlvEOlmYffd1iwy/GwH2rBp0qpFOHlb6pzYH7iD8eDPV1A9 +zDRF7bBF1XXLGB1stkB+QgT10KJcmoDox8VQwKQ+ivLCGId1/ISon1+hIWjoootK +3HUvsUid6MPdtadxSVOZoZBWfe3H4rVbfAjGWlcQICZ9IwIDAQABo4IBeTCCAXUw +CQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVh +c3ktUlNBIEdlbmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFC+5 +fjygsu71IfjRt2kE7Ca5JOPGMIHdBgNVHSMEgdUwgdKAFOdMxbE+pKwgIuX8Lztm +ngnprxN6oYGupIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFj +aGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwx +DzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UE +KRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAyzAPjsyd +uFIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgWgMA0GCSqGSIb3DQEB +BQUAA4GBAHBTgy1AyVB9RaclUKws7wohO3bRkUKfb9Brm7IgjlFcMSp6lVb7+887 +EIl440KNjspa6qAnfxlGQqUS6Pxg6AJmaqtwrCimlbAwH3xK6fANZ1OOO+SP6lDt +JANsz6MEOPo4QCuOY7XMEU80u4lCX4MXxU/78ZdMgXJSmz5hjqLQ +-----END CERTIFICATE----- diff --git a/vpn/coloradio01/keys/server.csr b/vpn/coloradio01/keys/server.csr new file mode 100644 index 0000000..3124eb1 --- /dev/null +++ b/vpn/coloradio01/keys/server.csr @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIICHzCCAYgCAQAwgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQp +EwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZI +hvcNAQEBBQADgY0AMIGJAoGBAM6XJts+MKbTtqoTCW8Q6WZh993WLDL8bAfasGnS +qkU4eVvqnNgfuIPx4M9XUD3MNEXtsEXVdcsYHWy2QH5CBPXQolyagOjHxVDApD6K +8sIYh3X8hKifX6EhaOiii0rcdS+xSJ3ow921p3FJU5mhkFZ97cfitVt8CMZaVxAg +Jn0jAgMBAAGgNjAXBgkqhkiG9w0BCQIxChMIREtTIHNhcmwwGwYJKoZIhvcNAQkH +MQ4TDFNhZWthZThvZ2g3STANBgkqhkiG9w0BAQUFAAOBgQC4ZrFYscGmx8BlB5Bm +VnOvnhV3EGRdb5MNt0jqiLiRIOk6GK2L0HmE4FkKMDTGZE7fvxzgBWvcCqITbSfT +UBM2VOPv2mK4r6RWjuxi9I0tGR6KfzBjhtDoyY1Cf96gdXqHTwuT/ehszfv+guPv +yD/J+vMF2zUXYxRJfsUbu+xXLQ== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio01/keys/server.key b/vpn/coloradio01/keys/server.key new file mode 100644 index 0000000..be968fd --- /dev/null +++ b/vpn/coloradio01/keys/server.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAM6XJts+MKbTtqoT +CW8Q6WZh993WLDL8bAfasGnSqkU4eVvqnNgfuIPx4M9XUD3MNEXtsEXVdcsYHWy2 +QH5CBPXQolyagOjHxVDApD6K8sIYh3X8hKifX6EhaOiii0rcdS+xSJ3ow921p3FJ +U5mhkFZ97cfitVt8CMZaVxAgJn0jAgMBAAECgYEAwOZuR8VYFE4Xf9LquiRma00K +7r6u4qTEEslmdEla5+uFlggJj9x+o+VUbwYuTKXCIZGBSJO6u3q27u12Zu4qRdYE +IeXLkbu2tDZDzBTV1as775kFs/wSHFD4ev6C4ZNdyZmzwJMD7Qwy44nOW+GAo90q +2MsJx8LBPmAzeQDIB9ECQQD62CI+i/sjtNm2DpbOvPKHsJowaXSZNV0/EuAevUg8 +b0X1Fbu+8rHXbMVKY9angVj3CIGpNTdX3J5UNeHRh8cdAkEA0tYq9Md5JwdNuvDP +d3XU6oREHowvShYu4yCpUBkk4LwfM4vFgxjzPac3RGpJbrCmCSfmSn2+sxctC96x +Z+zhPwJBAII6Q00Fj1RyR7TkzhZ2sdMQNHx9wzLnKYndWs2apy349vDOX7I6fWnB +5otAWeiMlotptycJobnTp79AWgRV4WECQHzIjPv641WaGQM/a0sEzlNOnRKHXaW3 +o2CCADOL7iukq8LSQr/okG44/ZjcX0HIAz0ABGiqK6fLW7nev5kGtfkCQGu3gdwO +LrJ7X64IX7XjzfjW74+Qw1l6xZAHcUWY7waruCeMTzUX9PSA+Y5byKUkWv9SvOIz ++ImOJql3GcA5IGA= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio01/log/openvpn-status.log b/vpn/coloradio01/log/openvpn-status.log new file mode 100644 index 0000000..c5cf651 --- /dev/null +++ b/vpn/coloradio01/log/openvpn-status.log @@ -0,0 +1,58 @@ +OpenVPN CLIENT LIST +Updated,Thu Nov 23 10:51:29 2017 +Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since +aral-niederfeulen,82.214.232.98:43674,403384,397626,Wed Nov 22 17:46:39 2017 +aral-howald,82.214.232.162:36163,404116,397443,Wed Nov 22 17:46:36 2017 +aral-mondorf,82.214.232.114:53465,405677,408438,Wed Nov 22 17:46:34 2017 +aral-redange,82.214.232.154:53932,405267,407751,Wed Nov 22 17:46:32 2017 +aral-gonderange,82.214.232.2:38781,405375,407676,Wed Nov 22 17:46:34 2017 +aral-diekirch,82.214.232.34:37386,405201,407891,Wed Nov 22 17:46:41 2017 +aral-steinfort,82.214.232.178:38461,405630,408249,Wed Nov 22 17:46:32 2017 +aral-petange,82.214.232.82:49129,405194,407863,Wed Nov 22 17:46:34 2017 +aral-bettembourg,82.214.232.138:59672,406175,407764,Wed Nov 22 17:46:36 2017 +aral-foetz,82.214.232.18:31556,408461,408799,Wed Nov 22 17:46:34 2017 +aral-hoscheiddickt,82.214.232.106:53194,405540,408290,Wed Nov 22 17:46:39 2017 +aral-ettelbruck,82.214.232.242:52537,405061,407385,Wed Nov 22 17:46:40 2017 +aral-schengen,82.214.232.26:43038,403995,407032,Wed Nov 22 17:46:36 2017 +aral-rollingergrund,82.214.232.130:16555,408833,409408,Wed Nov 22 17:46:42 2017 +aral-pommerloch,82.214.232.146:10828,401761,398514,Wed Nov 22 17:46:36 2017 +aral-wasserbillig,82.214.232.122:38782,405672,407940,Wed Nov 22 17:46:39 2017 +aral-rodange,82.214.232.202:59369,405565,408261,Wed Nov 22 17:46:41 2017 +aral-bascharage,82.214.232.82:45686,405369,407841,Wed Nov 22 17:46:33 2017 +aral-merl,82.214.232.58:60527,405890,407949,Wed Nov 22 17:46:37 2017 +aral-dudelange,82.214.232.90:53820,404161,407383,Wed Nov 22 17:46:40 2017 +aral-lintgen,82.214.232.58:60564,402401,406851,Wed Nov 22 17:46:39 2017 +aral-vianden,82.214.232.50:33711,405531,408254,Wed Nov 22 17:46:38 2017 +aral-frisange,82.214.232.106:56875,407179,408921,Wed Nov 22 17:46:33 2017 +aral-differdange,82.214.232.186:45865,405422,407143,Wed Nov 22 17:46:41 2017 +aral-bertrange,82.214.232.178:49990,399722,403681,Wed Nov 22 17:46:40 2017 +ROUTING TABLE +Virtual Address,Common Name,Real Address,Last Ref +10.1.0.18,aral-ettelbruck,82.214.232.242:52537,Thu Nov 23 06:15:08 2017 +10.1.0.82,aral-differdange,82.214.232.186:45865,Thu Nov 23 06:15:12 2017 +10.1.0.78,aral-petange,82.214.232.82:49129,Thu Nov 23 06:15:36 2017 +10.1.0.42,aral-merl,82.214.232.58:60527,Thu Nov 23 06:15:19 2017 +10.1.0.30,aral-diekirch,82.214.232.34:37386,Thu Nov 23 06:15:05 2017 +10.1.0.10,aral-hoscheiddickt,82.214.232.106:53194,Thu Nov 23 04:15:07 2017 +10.1.0.106,aral-bertrange,82.214.232.178:49990,Wed Nov 22 18:01:37 2017 +10.1.0.150,aral-schengen,82.214.232.26:43038,Thu Nov 23 06:15:02 2017 +10.1.0.98,aral-foetz,82.214.232.18:31556,Thu Nov 23 06:15:06 2017 +10.1.0.6,aral-vianden,82.214.232.50:33711,Thu Nov 23 06:15:34 2017 +10.1.0.54,aral-redange,82.214.232.154:53932,Thu Nov 23 07:15:04 2017 +10.1.0.34,aral-steinfort,82.214.232.178:38461,Thu Nov 23 06:15:25 2017 +10.1.0.86,aral-bascharage,82.214.232.82:45686,Thu Nov 23 06:15:14 2017 +10.1.0.14,aral-niederfeulen,82.214.232.98:43674,Thu Nov 23 06:15:28 2017 +10.1.0.50,aral-rollingergrund,82.214.232.130:16555,Thu Nov 23 06:15:10 2017 +10.1.0.22,aral-pommerloch,82.214.232.146:10828,Thu Nov 23 06:15:29 2017 +10.1.0.46,aral-howald,82.214.232.162:36163,Thu Nov 23 07:15:08 2017 +10.1.0.70,aral-bettembourg,82.214.232.138:59672,Thu Nov 23 06:15:23 2017 +10.1.0.90,aral-frisange,82.214.232.106:56875,Thu Nov 23 06:15:18 2017 +10.1.0.154,aral-rodange,82.214.232.202:59369,Thu Nov 23 05:15:04 2017 +10.1.0.202,aral-dudelange,82.214.232.90:53820,Thu Nov 23 06:15:10 2017 +10.1.0.38,aral-wasserbillig,82.214.232.122:38782,Thu Nov 23 07:15:05 2017 +10.1.0.62,aral-gonderange,82.214.232.2:38781,Thu Nov 23 06:15:15 2017 +10.1.0.66,aral-mondorf,82.214.232.114:53465,Thu Nov 23 06:15:03 2017 +10.1.0.26,aral-lintgen,82.214.232.58:60564,Thu Nov 23 06:15:30 2017 +GLOBAL STATS +Max bcast/mcast queue length,0 +END diff --git a/vpn/coloradio01/log/openvpn.log b/vpn/coloradio01/log/openvpn.log new file mode 100644 index 0000000..e69de29 diff --git a/vpn/coloradio01/log/openvpn.log.1 b/vpn/coloradio01/log/openvpn.log.1 new file mode 100644 index 0000000..f64f39c --- /dev/null +++ b/vpn/coloradio01/log/openvpn.log.1 @@ -0,0 +1,540 @@ +Wed Nov 22 17:44:40 2017 OpenVPN 2.3.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Nov 12 2015 +Wed Nov 22 17:44:40 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.08 +Wed Nov 22 17:44:40 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505 +Wed Nov 22 17:44:40 2017 Diffie-Hellman initialized with 1024 bit key +Wed Nov 22 17:44:40 2017 WARNING: file '/home/posdab/vpn/keys/server.key' is group or others accessible +Wed Nov 22 17:44:40 2017 Socket Buffers: R=[212992->131072] S=[212992->131072] +Wed Nov 22 17:44:40 2017 ROUTE_GATEWAY 172.31.1.1/255.255.255.0 IFACE=eth0 HWADDR=52:54:a2:01:d0:f3 +Wed Nov 22 17:44:40 2017 TUN/TAP device tun0 opened +Wed Nov 22 17:44:40 2017 TUN/TAP TX queue length set to 100 +Wed Nov 22 17:44:40 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 +Wed Nov 22 17:44:40 2017 /sbin/ip link set dev tun0 up mtu 1500 +Wed Nov 22 17:44:40 2017 /sbin/ip addr add dev tun0 local 10.1.0.1 peer 10.1.0.2 +Wed Nov 22 17:44:40 2017 /sbin/ip route add 10.1.0.0/16 via 10.1.0.2 +Wed Nov 22 17:44:40 2017 UDPv4 link local (bound): [undef] +Wed Nov 22 17:44:40 2017 UDPv4 link remote: [undef] +Wed Nov 22 17:44:40 2017 MULTI: multi_init called, r=256 v=256 +Wed Nov 22 17:44:40 2017 IFCONFIG POOL: base=10.1.0.4 size=16382, ipv6=0 +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-vianden,10.1.0.4', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-hoscheiddickt,10.1.0.8', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-niederfeulen,10.1.0.12', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-ettelbruck,10.1.0.16', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-pommerloch,10.1.0.20', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-lintgen,10.1.0.24', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-diekirch,10.1.0.28', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-steinfort,10.1.0.32', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-wasserbillig,10.1.0.36', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-merl,10.1.0.40', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-howald,10.1.0.44', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-rollingergrund,10.1.0.48', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-redange,10.1.0.52', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-junglinster,10.1.0.56', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-gonderange,10.1.0.60', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-mondorf,10.1.0.64', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bettembourg,10.1.0.68', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-testrpi,10.1.0.72', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-petange,10.1.0.76', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-differdange,10.1.0.80', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bascharage,10.1.0.84', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-frisange,10.1.0.88', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-pommerloch,10.1.0.92', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-foetz,10.1.0.96', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='rb75-lintgen,10.1.0.100', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bertrange,10.1.0.104', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-rpi2test,10.1.0.108', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-merl,10.1.0.112', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-frisange,10.1.0.116', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-rollingergrund,10.1.0.120', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-diekirch,10.1.0.124', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-howald,10.1.0.128', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bertrange,10.1.0.132', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-hoscheiddickt,10.1.0.136', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-ettelbruck,10.1.0.140', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-laptop,10.1.0.144', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-schengen,10.1.0.148', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-rodange,10.1.0.152', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-rpi2test,10.1.0.156', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-rodange,10.1.0.160', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-niederfeulen,10.1.0.164', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-lintgen,10.1.0.168', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-petange,10.1.0.172', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bascharage,10.1.0.176', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-differdange,10.1.0.180', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-steinfort,10.1.0.184', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-wasserbillig,10.1.0.188', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-vianden,10.1.0.192', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-bettembourg,10.1.0.196', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-dudelange,10.1.0.200', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-redange,10.1.0.204', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-dudelange,10.1.0.208', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 IFCONFIG POOL LIST +Wed Nov 22 17:44:40 2017 aral-vianden,10.1.0.4 +Wed Nov 22 17:44:40 2017 aral-hoscheiddickt,10.1.0.8 +Wed Nov 22 17:44:40 2017 aral-niederfeulen,10.1.0.12 +Wed Nov 22 17:44:40 2017 aral-ettelbruck,10.1.0.16 +Wed Nov 22 17:44:40 2017 aral-pommerloch,10.1.0.20 +Wed Nov 22 17:44:40 2017 aral-lintgen,10.1.0.24 +Wed Nov 22 17:44:40 2017 aral-diekirch,10.1.0.28 +Wed Nov 22 17:44:40 2017 aral-steinfort,10.1.0.32 +Wed Nov 22 17:44:40 2017 aral-wasserbillig,10.1.0.36 +Wed Nov 22 17:44:40 2017 aral-merl,10.1.0.40 +Wed Nov 22 17:44:40 2017 aral-howald,10.1.0.44 +Wed Nov 22 17:44:40 2017 aral-rollingergrund,10.1.0.48 +Wed Nov 22 17:44:40 2017 aral-redange,10.1.0.52 +Wed Nov 22 17:44:40 2017 aral-junglinster,10.1.0.56 +Wed Nov 22 17:44:40 2017 aral-gonderange,10.1.0.60 +Wed Nov 22 17:44:40 2017 aral-mondorf,10.1.0.64 +Wed Nov 22 17:44:40 2017 aral-bettembourg,10.1.0.68 +Wed Nov 22 17:44:40 2017 dks-testrpi,10.1.0.72 +Wed Nov 22 17:44:40 2017 aral-petange,10.1.0.76 +Wed Nov 22 17:44:40 2017 NOTE: --mute triggered... +Wed Nov 22 17:44:40 2017 33 variation(s) on previous 20 message(s) suppressed by --mute +Wed Nov 22 17:44:40 2017 Initialization Sequence Completed +Wed Nov 22 17:46:32 2017 82.214.232.154:53932 TLS: Initial packet from [AF_INET]82.214.232.154:53932, sid=dd09b516 b27c8a8c +Wed Nov 22 17:46:32 2017 82.214.232.178:38461 TLS: Initial packet from [AF_INET]82.214.232.178:38461, sid=3ca5cf10 5c4575c6 +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-redange, name=aral-redange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-steinfort, name=aral-steinfort, emailAddress=info@dks.sarl +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:33 2017 82.214.232.154:53932 [aral-redange] Peer Connection Initiated with [AF_INET]82.214.232.154:53932 +Wed Nov 22 17:46:33 2017 aral-redange/82.214.232.154:53932 MULTI_sva: pool returned IPv4=10.1.0.54, IPv6=(Not enabled) +Wed Nov 22 17:46:33 2017 aral-redange/82.214.232.154:53932 MULTI: Learn: 10.1.0.54 -> aral-redange/82.214.232.154:53932 +Wed Nov 22 17:46:33 2017 aral-redange/82.214.232.154:53932 MULTI: primary virtual IP for aral-redange/82.214.232.154:53932: 10.1.0.54 +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:33 2017 82.214.232.178:38461 [aral-steinfort] Peer Connection Initiated with [AF_INET]82.214.232.178:38461 +Wed Nov 22 17:46:33 2017 aral-steinfort/82.214.232.178:38461 MULTI_sva: pool returned IPv4=10.1.0.34, IPv6=(Not enabled) +Wed Nov 22 17:46:33 2017 aral-steinfort/82.214.232.178:38461 MULTI: Learn: 10.1.0.34 -> aral-steinfort/82.214.232.178:38461 +Wed Nov 22 17:46:33 2017 aral-steinfort/82.214.232.178:38461 MULTI: primary virtual IP for aral-steinfort/82.214.232.178:38461: 10.1.0.34 +Wed Nov 22 17:46:33 2017 82.214.232.106:56875 TLS: Initial packet from [AF_INET]82.214.232.106:56875, sid=058629e7 2670a3c9 +Wed Nov 22 17:46:33 2017 82.214.232.82:45686 TLS: Initial packet from [AF_INET]82.214.232.82:45686, sid=cbb6c2f6 fc13b924 +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 TLS: Initial packet from [AF_INET]82.214.232.2:38781, sid=93e4b18b 55f96e50 +Wed Nov 22 17:46:34 2017 82.214.232.18:31556 TLS: Initial packet from [AF_INET]82.214.232.18:31556, sid=4c170e74 dae13b7d +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-frisange, name=aral-frisange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.114:53465 TLS: Initial packet from [AF_INET]82.214.232.114:53465, sid=48175545 a6ec8dee +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:34 2017 82.214.232.106:56875 [aral-frisange] Peer Connection Initiated with [AF_INET]82.214.232.106:56875 +Wed Nov 22 17:46:34 2017 aral-frisange/82.214.232.106:56875 MULTI_sva: pool returned IPv4=10.1.0.90, IPv6=(Not enabled) +Wed Nov 22 17:46:34 2017 aral-frisange/82.214.232.106:56875 MULTI: Learn: 10.1.0.90 -> aral-frisange/82.214.232.106:56875 +Wed Nov 22 17:46:34 2017 aral-frisange/82.214.232.106:56875 MULTI: primary virtual IP for aral-frisange/82.214.232.106:56875: 10.1.0.90 +Wed Nov 22 17:46:34 2017 82.214.232.82:49129 TLS: Initial packet from [AF_INET]82.214.232.82:49129, sid=5b495861 c5f2a826 +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bascharage, name=aral-bascharage, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:34 2017 82.214.232.82:45686 [aral-bascharage] Peer Connection Initiated with [AF_INET]82.214.232.82:45686 +Wed Nov 22 17:46:34 2017 aral-bascharage/82.214.232.82:45686 MULTI_sva: pool returned IPv4=10.1.0.86, IPv6=(Not enabled) +Wed Nov 22 17:46:34 2017 aral-bascharage/82.214.232.82:45686 MULTI: Learn: 10.1.0.86 -> aral-bascharage/82.214.232.82:45686 +Wed Nov 22 17:46:34 2017 aral-bascharage/82.214.232.82:45686 MULTI: primary virtual IP for aral-bascharage/82.214.232.82:45686: 10.1.0.86 +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-gonderange, name=aral-gonderange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.2:38781 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:35 2017 82.214.232.2:38781 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:35 2017 82.214.232.2:38781 [aral-gonderange] Peer Connection Initiated with [AF_INET]82.214.232.2:38781 +Wed Nov 22 17:46:35 2017 aral-gonderange/82.214.232.2:38781 MULTI_sva: pool returned IPv4=10.1.0.62, IPv6=(Not enabled) +Wed Nov 22 17:46:35 2017 aral-gonderange/82.214.232.2:38781 MULTI: Learn: 10.1.0.62 -> aral-gonderange/82.214.232.2:38781 +Wed Nov 22 17:46:35 2017 aral-gonderange/82.214.232.2:38781 MULTI: primary virtual IP for aral-gonderange/82.214.232.2:38781: 10.1.0.62 +Wed Nov 22 17:46:35 2017 aral-redange/82.214.232.154:53932 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:35 2017 aral-redange/82.214.232.154:53932 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:35 2017 aral-redange/82.214.232.154:53932 SENT CONTROL [aral-redange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.54 10.1.0.53' (status=1) +Wed Nov 22 17:46:35 2017 aral-steinfort/82.214.232.178:38461 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:35 2017 aral-steinfort/82.214.232.178:38461 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:35 2017 aral-steinfort/82.214.232.178:38461 SENT CONTROL [aral-steinfort]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.34 10.1.0.33' (status=1) +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 TLS: Initial packet from [AF_INET]82.214.232.162:36163, sid=7f762391 c0fa3881 +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 TLS: Initial packet from [AF_INET]82.214.232.138:59672, sid=a6518d61 b42b9873 +Wed Nov 22 17:46:36 2017 aral-frisange/82.214.232.106:56875 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:36 2017 aral-frisange/82.214.232.106:56875 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:36 2017 aral-frisange/82.214.232.106:56875 SENT CONTROL [aral-frisange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.90 10.1.0.89' (status=1) +Wed Nov 22 17:46:36 2017 82.214.232.26:43038 TLS: Initial packet from [AF_INET]82.214.232.26:43038, sid=bcf2c0af d316522d +Wed Nov 22 17:46:36 2017 82.214.232.146:10828 TLS: Initial packet from [AF_INET]82.214.232.146:10828, sid=1c8f6ce9 66de1909 +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-howald, name=aral-howald, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:36 2017 82.214.232.162:36163 [aral-howald] Peer Connection Initiated with [AF_INET]82.214.232.162:36163 +Wed Nov 22 17:46:36 2017 aral-howald/82.214.232.162:36163 MULTI_sva: pool returned IPv4=10.1.0.46, IPv6=(Not enabled) +Wed Nov 22 17:46:36 2017 aral-howald/82.214.232.162:36163 MULTI: Learn: 10.1.0.46 -> aral-howald/82.214.232.162:36163 +Wed Nov 22 17:46:36 2017 aral-howald/82.214.232.162:36163 MULTI: primary virtual IP for aral-howald/82.214.232.162:36163: 10.1.0.46 +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bettembourg, name=aral-bettembourg, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.138:59672 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:37 2017 82.214.232.138:59672 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:37 2017 82.214.232.138:59672 [aral-bettembourg] Peer Connection Initiated with [AF_INET]82.214.232.138:59672 +Wed Nov 22 17:46:37 2017 aral-bettembourg/82.214.232.138:59672 MULTI_sva: pool returned IPv4=10.1.0.70, IPv6=(Not enabled) +Wed Nov 22 17:46:37 2017 aral-bettembourg/82.214.232.138:59672 MULTI: Learn: 10.1.0.70 -> aral-bettembourg/82.214.232.138:59672 +Wed Nov 22 17:46:37 2017 aral-bettembourg/82.214.232.138:59672 MULTI: primary virtual IP for aral-bettembourg/82.214.232.138:59672: 10.1.0.70 +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-pommerloch, name=aral-pommerloch, emailAddress=info@dks.sarl +Wed Nov 22 17:46:37 2017 aral-bascharage/82.214.232.82:45686 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:37 2017 aral-bascharage/82.214.232.82:45686 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:37 2017 aral-bascharage/82.214.232.82:45686 SENT CONTROL [aral-bascharage]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.86 10.1.0.85' (status=1) +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:37 2017 82.214.232.58:60527 TLS: Initial packet from [AF_INET]82.214.232.58:60527, sid=e07e8ca2 b2759f93 +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:37 2017 82.214.232.146:10828 [aral-pommerloch] Peer Connection Initiated with [AF_INET]82.214.232.146:10828 +Wed Nov 22 17:46:37 2017 aral-pommerloch/82.214.232.146:10828 MULTI_sva: pool returned IPv4=10.1.0.22, IPv6=(Not enabled) +Wed Nov 22 17:46:37 2017 aral-pommerloch/82.214.232.146:10828 MULTI: Learn: 10.1.0.22 -> aral-pommerloch/82.214.232.146:10828 +Wed Nov 22 17:46:37 2017 aral-pommerloch/82.214.232.146:10828 MULTI: primary virtual IP for aral-pommerloch/82.214.232.146:10828: 10.1.0.22 +Wed Nov 22 17:46:37 2017 aral-gonderange/82.214.232.2:38781 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:37 2017 aral-gonderange/82.214.232.2:38781 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:37 2017 aral-gonderange/82.214.232.2:38781 SENT CONTROL [aral-gonderange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.62 10.1.0.61' (status=1) +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-petange, name=aral-petange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:37 2017 82.214.232.82:49129 [aral-petange] Peer Connection Initiated with [AF_INET]82.214.232.82:49129 +Wed Nov 22 17:46:37 2017 aral-petange/82.214.232.82:49129 MULTI_sva: pool returned IPv4=10.1.0.78, IPv6=(Not enabled) +Wed Nov 22 17:46:37 2017 aral-petange/82.214.232.82:49129 MULTI: Learn: 10.1.0.78 -> aral-petange/82.214.232.82:49129 +Wed Nov 22 17:46:37 2017 aral-petange/82.214.232.82:49129 MULTI: primary virtual IP for aral-petange/82.214.232.82:49129: 10.1.0.78 +Wed Nov 22 17:46:38 2017 aral-howald/82.214.232.162:36163 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:38 2017 aral-howald/82.214.232.162:36163 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:38 2017 aral-howald/82.214.232.162:36163 SENT CONTROL [aral-howald]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.46 10.1.0.45' (status=1) +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl, name=aral-merl, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schengen, name=aral-schengen, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:38 2017 82.214.232.58:60527 [aral-merl] Peer Connection Initiated with [AF_INET]82.214.232.58:60527 +Wed Nov 22 17:46:38 2017 aral-merl/82.214.232.58:60527 MULTI_sva: pool returned IPv4=10.1.0.42, IPv6=(Not enabled) +Wed Nov 22 17:46:38 2017 aral-merl/82.214.232.58:60527 MULTI: Learn: 10.1.0.42 -> aral-merl/82.214.232.58:60527 +Wed Nov 22 17:46:38 2017 aral-merl/82.214.232.58:60527 MULTI: primary virtual IP for aral-merl/82.214.232.58:60527: 10.1.0.42 +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:38 2017 82.214.232.26:43038 [aral-schengen] Peer Connection Initiated with [AF_INET]82.214.232.26:43038 +Wed Nov 22 17:46:38 2017 aral-schengen/82.214.232.26:43038 MULTI_sva: pool returned IPv4=10.1.0.150, IPv6=(Not enabled) +Wed Nov 22 17:46:38 2017 aral-schengen/82.214.232.26:43038 MULTI: Learn: 10.1.0.150 -> aral-schengen/82.214.232.26:43038 +Wed Nov 22 17:46:38 2017 aral-schengen/82.214.232.26:43038 MULTI: primary virtual IP for aral-schengen/82.214.232.26:43038: 10.1.0.150 +Wed Nov 22 17:46:38 2017 82.214.232.50:33711 TLS: Initial packet from [AF_INET]82.214.232.50:33711, sid=fa5c5c16 6e2571c8 +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 TLS: Initial packet from [AF_INET]82.214.232.106:53194, sid=a25938e8 8e02a4f7 +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-mondorf, name=aral-mondorf, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 aral-bettembourg/82.214.232.138:59672 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:39 2017 aral-bettembourg/82.214.232.138:59672 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:39 2017 aral-bettembourg/82.214.232.138:59672 SENT CONTROL [aral-bettembourg]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.70 10.1.0.69' (status=1) +Wed Nov 22 17:46:39 2017 82.214.232.122:38782 TLS: Initial packet from [AF_INET]82.214.232.122:38782, sid=b5359841 668ba2fe +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 TLS: Initial packet from [AF_INET]82.214.232.98:43674, sid=6953a4b9 bfe55479 +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 82.214.232.114:53465 [aral-mondorf] Peer Connection Initiated with [AF_INET]82.214.232.114:53465 +Wed Nov 22 17:46:39 2017 aral-mondorf/82.214.232.114:53465 MULTI_sva: pool returned IPv4=10.1.0.66, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 aral-mondorf/82.214.232.114:53465 MULTI: Learn: 10.1.0.66 -> aral-mondorf/82.214.232.114:53465 +Wed Nov 22 17:46:39 2017 aral-mondorf/82.214.232.114:53465 MULTI: primary virtual IP for aral-mondorf/82.214.232.114:53465: 10.1.0.66 +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-vianden, name=aral-vianden, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 82.214.232.50:33711 [aral-vianden] Peer Connection Initiated with [AF_INET]82.214.232.50:33711 +Wed Nov 22 17:46:39 2017 aral-vianden/82.214.232.50:33711 MULTI_sva: pool returned IPv4=10.1.0.6, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 aral-vianden/82.214.232.50:33711 MULTI: Learn: 10.1.0.6 -> aral-vianden/82.214.232.50:33711 +Wed Nov 22 17:46:39 2017 aral-vianden/82.214.232.50:33711 MULTI: primary virtual IP for aral-vianden/82.214.232.50:33711: 10.1.0.6 +Wed Nov 22 17:46:39 2017 82.214.232.58:60564 TLS: Initial packet from [AF_INET]82.214.232.58:60564, sid=4245d01f ebe6e3a3 +Wed Nov 22 17:46:39 2017 aral-pommerloch/82.214.232.146:10828 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:39 2017 aral-pommerloch/82.214.232.146:10828 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:39 2017 aral-pommerloch/82.214.232.146:10828 SENT CONTROL [aral-pommerloch]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.22 10.1.0.21' (status=1) +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-hoscheiddickt, name=aral-hoscheiddickt, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-niederfeulen, name=aral-niederfeulen, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.122:38782 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.122:38782 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-wasserbillig, name=aral-wasserbillig, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 82.214.232.106:53194 [aral-hoscheiddickt] Peer Connection Initiated with [AF_INET]82.214.232.106:53194 +Wed Nov 22 17:46:39 2017 aral-hoscheiddickt/82.214.232.106:53194 MULTI_sva: pool returned IPv4=10.1.0.10, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 aral-hoscheiddickt/82.214.232.106:53194 MULTI: Learn: 10.1.0.10 -> aral-hoscheiddickt/82.214.232.106:53194 +Wed Nov 22 17:46:39 2017 aral-hoscheiddickt/82.214.232.106:53194 MULTI: primary virtual IP for aral-hoscheiddickt/82.214.232.106:53194: 10.1.0.10 +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 82.214.232.98:43674 [aral-niederfeulen] Peer Connection Initiated with [AF_INET]82.214.232.98:43674 +Wed Nov 22 17:46:39 2017 aral-niederfeulen/82.214.232.98:43674 MULTI_sva: pool returned IPv4=10.1.0.14, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 aral-niederfeulen/82.214.232.98:43674 MULTI: Learn: 10.1.0.14 -> aral-niederfeulen/82.214.232.98:43674 +Wed Nov 22 17:46:39 2017 aral-niederfeulen/82.214.232.98:43674 MULTI: primary virtual IP for aral-niederfeulen/82.214.232.98:43674: 10.1.0.14 +Wed Nov 22 17:46:40 2017 82.214.232.242:52537 TLS: Initial packet from [AF_INET]82.214.232.242:52537, sid=b699f6da 860bd7c0 +Wed Nov 22 17:46:40 2017 aral-petange/82.214.232.82:49129 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:40 2017 aral-petange/82.214.232.82:49129 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:40 2017 aral-petange/82.214.232.82:49129 SENT CONTROL [aral-petange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.78 10.1.0.77' (status=1) +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 TLS: Initial packet from [AF_INET]82.214.232.90:53820, sid=f8b65c95 e15bf24b +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lintgen, name=aral-lintgen, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 82.214.232.58:60564 [aral-lintgen] Peer Connection Initiated with [AF_INET]82.214.232.58:60564 +Wed Nov 22 17:46:40 2017 aral-lintgen/82.214.232.58:60564 MULTI_sva: pool returned IPv4=10.1.0.26, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 aral-lintgen/82.214.232.58:60564 MULTI: Learn: 10.1.0.26 -> aral-lintgen/82.214.232.58:60564 +Wed Nov 22 17:46:40 2017 aral-lintgen/82.214.232.58:60564 MULTI: primary virtual IP for aral-lintgen/82.214.232.58:60564: 10.1.0.26 +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-dudelange, name=aral-dudelange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 82.214.232.90:53820 [aral-dudelange] Peer Connection Initiated with [AF_INET]82.214.232.90:53820 +Wed Nov 22 17:46:40 2017 aral-dudelange/82.214.232.90:53820 MULTI_sva: pool returned IPv4=10.1.0.202, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 aral-dudelange/82.214.232.90:53820 MULTI: Learn: 10.1.0.202 -> aral-dudelange/82.214.232.90:53820 +Wed Nov 22 17:46:40 2017 aral-dudelange/82.214.232.90:53820 MULTI: primary virtual IP for aral-dudelange/82.214.232.90:53820: 10.1.0.202 +Wed Nov 22 17:46:40 2017 aral-schengen/82.214.232.26:43038 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:40 2017 aral-schengen/82.214.232.26:43038 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:40 2017 aral-schengen/82.214.232.26:43038 SENT CONTROL [aral-schengen]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.150 10.1.0.149' (status=1) +Wed Nov 22 17:46:40 2017 aral-merl/82.214.232.58:60527 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:40 2017 aral-merl/82.214.232.58:60527 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:40 2017 aral-merl/82.214.232.58:60527 SENT CONTROL [aral-merl]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.42 10.1.0.41' (status=1) +Wed Nov 22 17:46:40 2017 82.214.232.178:49990 TLS: Initial packet from [AF_INET]82.214.232.178:49990, sid=645bd9bc a5597cb6 +Wed Nov 22 17:46:41 2017 aral-niederfeulen/82.214.232.98:43674 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 aral-niederfeulen/82.214.232.98:43674 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 aral-niederfeulen/82.214.232.98:43674 SENT CONTROL [aral-niederfeulen]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.14 10.1.0.13' (status=1) +Wed Nov 22 17:46:41 2017 82.214.232.34:37386 TLS: Initial packet from [AF_INET]82.214.232.34:37386, sid=ed4d4ae0 cf5c8a34 +Wed Nov 22 17:46:41 2017 82.214.232.186:45865 TLS: Initial packet from [AF_INET]82.214.232.186:45865, sid=813a6353 ef9dd5a5 +Wed Nov 22 17:46:41 2017 82.214.232.202:59369 TLS: Initial packet from [AF_INET]82.214.232.202:59369, sid=5711797b 7ac159b4 +Wed Nov 22 17:46:41 2017 aral-mondorf/82.214.232.114:53465 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 aral-mondorf/82.214.232.114:53465 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 aral-mondorf/82.214.232.114:53465 SENT CONTROL [aral-mondorf]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.66 10.1.0.65' (status=1) +Wed Nov 22 17:46:41 2017 aral-vianden/82.214.232.50:33711 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 aral-vianden/82.214.232.50:33711 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 aral-vianden/82.214.232.50:33711 SENT CONTROL [aral-vianden]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.6 10.1.0.5' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.130:16555 TLS: Initial packet from [AF_INET]82.214.232.130:16555, sid=d93dd829 d6efa329 +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-differdange, name=aral-differdange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 aral-hoscheiddickt/82.214.232.106:53194 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 aral-hoscheiddickt/82.214.232.106:53194 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 aral-hoscheiddickt/82.214.232.106:53194 SENT CONTROL [aral-hoscheiddickt]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.10 10.1.0.9' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:42 2017 82.214.232.186:45865 [aral-differdange] Peer Connection Initiated with [AF_INET]82.214.232.186:45865 +Wed Nov 22 17:46:42 2017 aral-differdange/82.214.232.186:45865 MULTI_sva: pool returned IPv4=10.1.0.82, IPv6=(Not enabled) +Wed Nov 22 17:46:42 2017 aral-differdange/82.214.232.186:45865 MULTI: Learn: 10.1.0.82 -> aral-differdange/82.214.232.186:45865 +Wed Nov 22 17:46:42 2017 aral-differdange/82.214.232.186:45865 MULTI: primary virtual IP for aral-differdange/82.214.232.186:45865: 10.1.0.82 +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-foetz, name=aral-foetz, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:42 2017 82.214.232.122:38782 [aral-wasserbillig] Peer Connection Initiated with [AF_INET]82.214.232.122:38782 +Wed Nov 22 17:46:42 2017 aral-wasserbillig/82.214.232.122:38782 MULTI_sva: pool returned IPv4=10.1.0.38, IPv6=(Not enabled) +Wed Nov 22 17:46:42 2017 aral-wasserbillig/82.214.232.122:38782 MULTI: Learn: 10.1.0.38 -> aral-wasserbillig/82.214.232.122:38782 +Wed Nov 22 17:46:42 2017 aral-wasserbillig/82.214.232.122:38782 MULTI: primary virtual IP for aral-wasserbillig/82.214.232.122:38782: 10.1.0.38 +Wed Nov 22 17:46:42 2017 aral-lintgen/82.214.232.58:60564 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 aral-lintgen/82.214.232.58:60564 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 aral-lintgen/82.214.232.58:60564 SENT CONTROL [aral-lintgen]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.26 10.1.0.25' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:42 2017 82.214.232.18:31556 [aral-foetz] Peer Connection Initiated with [AF_INET]82.214.232.18:31556 +Wed Nov 22 17:46:42 2017 aral-foetz/82.214.232.18:31556 MULTI_sva: pool returned IPv4=10.1.0.98, IPv6=(Not enabled) +Wed Nov 22 17:46:42 2017 aral-foetz/82.214.232.18:31556 MULTI: Learn: 10.1.0.98 -> aral-foetz/82.214.232.18:31556 +Wed Nov 22 17:46:42 2017 aral-foetz/82.214.232.18:31556 MULTI: primary virtual IP for aral-foetz/82.214.232.18:31556: 10.1.0.98 +Wed Nov 22 17:46:42 2017 aral-dudelange/82.214.232.90:53820 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 aral-dudelange/82.214.232.90:53820 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 aral-dudelange/82.214.232.90:53820 SENT CONTROL [aral-dudelange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.202 10.1.0.201' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.130:16555 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.130:16555 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rollingergrund, name=aral-rollingergrund, emailAddress=info@dks.sarl +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:43 2017 82.214.232.130:16555 [aral-rollingergrund] Peer Connection Initiated with [AF_INET]82.214.232.130:16555 +Wed Nov 22 17:46:43 2017 aral-rollingergrund/82.214.232.130:16555 MULTI_sva: pool returned IPv4=10.1.0.50, IPv6=(Not enabled) +Wed Nov 22 17:46:43 2017 aral-rollingergrund/82.214.232.130:16555 MULTI: Learn: 10.1.0.50 -> aral-rollingergrund/82.214.232.130:16555 +Wed Nov 22 17:46:43 2017 aral-rollingergrund/82.214.232.130:16555 MULTI: primary virtual IP for aral-rollingergrund/82.214.232.130:16555: 10.1.0.50 +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-bertrange, name=aral-bertrange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:43 2017 82.214.232.178:49990 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:44 2017 82.214.232.178:49990 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:44 2017 82.214.232.178:49990 [aral-bertrange] Peer Connection Initiated with [AF_INET]82.214.232.178:49990 +Wed Nov 22 17:46:44 2017 aral-bertrange/82.214.232.178:49990 MULTI_sva: pool returned IPv4=10.1.0.106, IPv6=(Not enabled) +Wed Nov 22 17:46:44 2017 aral-bertrange/82.214.232.178:49990 MULTI: Learn: 10.1.0.106 -> aral-bertrange/82.214.232.178:49990 +Wed Nov 22 17:46:44 2017 aral-bertrange/82.214.232.178:49990 MULTI: primary virtual IP for aral-bertrange/82.214.232.178:49990: 10.1.0.106 +Wed Nov 22 17:46:44 2017 aral-differdange/82.214.232.186:45865 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:44 2017 aral-differdange/82.214.232.186:45865 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:44 2017 aral-differdange/82.214.232.186:45865 SENT CONTROL [aral-differdange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.82 10.1.0.81' (status=1) +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-ettelbruck, name=aral-ettelbruck, emailAddress=info@dks.sarl +Wed Nov 22 17:46:44 2017 aral-wasserbillig/82.214.232.122:38782 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:44 2017 aral-wasserbillig/82.214.232.122:38782 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:44 2017 aral-wasserbillig/82.214.232.122:38782 SENT CONTROL [aral-wasserbillig]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.38 10.1.0.37' (status=1) +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:44 2017 82.214.232.242:52537 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:45 2017 82.214.232.242:52537 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:45 2017 82.214.232.242:52537 [aral-ettelbruck] Peer Connection Initiated with [AF_INET]82.214.232.242:52537 +Wed Nov 22 17:46:45 2017 aral-ettelbruck/82.214.232.242:52537 MULTI_sva: pool returned IPv4=10.1.0.18, IPv6=(Not enabled) +Wed Nov 22 17:46:45 2017 aral-ettelbruck/82.214.232.242:52537 MULTI: Learn: 10.1.0.18 -> aral-ettelbruck/82.214.232.242:52537 +Wed Nov 22 17:46:45 2017 aral-ettelbruck/82.214.232.242:52537 MULTI: primary virtual IP for aral-ettelbruck/82.214.232.242:52537: 10.1.0.18 +Wed Nov 22 17:46:45 2017 aral-rollingergrund/82.214.232.130:16555 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:45 2017 aral-rollingergrund/82.214.232.130:16555 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:45 2017 aral-rollingergrund/82.214.232.130:16555 SENT CONTROL [aral-rollingergrund]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.50 10.1.0.49' (status=1) +Wed Nov 22 17:46:45 2017 aral-foetz/82.214.232.18:31556 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:45 2017 aral-foetz/82.214.232.18:31556 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:45 2017 aral-foetz/82.214.232.18:31556 SENT CONTROL [aral-foetz]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.98 10.1.0.97' (status=1) +Wed Nov 22 17:46:46 2017 aral-bertrange/82.214.232.178:49990 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:46 2017 aral-bertrange/82.214.232.178:49990 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:46 2017 aral-bertrange/82.214.232.178:49990 SENT CONTROL [aral-bertrange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.106 10.1.0.105' (status=1) +Wed Nov 22 17:46:46 2017 82.214.232.34:37386 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:46 2017 82.214.232.34:37386 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-diekirch, name=aral-diekirch, emailAddress=info@dks.sarl +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:47 2017 82.214.232.34:37386 [aral-diekirch] Peer Connection Initiated with [AF_INET]82.214.232.34:37386 +Wed Nov 22 17:46:47 2017 aral-diekirch/82.214.232.34:37386 MULTI_sva: pool returned IPv4=10.1.0.30, IPv6=(Not enabled) +Wed Nov 22 17:46:47 2017 aral-diekirch/82.214.232.34:37386 MULTI: Learn: 10.1.0.30 -> aral-diekirch/82.214.232.34:37386 +Wed Nov 22 17:46:47 2017 aral-diekirch/82.214.232.34:37386 MULTI: primary virtual IP for aral-diekirch/82.214.232.34:37386: 10.1.0.30 +Wed Nov 22 17:46:47 2017 aral-ettelbruck/82.214.232.242:52537 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:47 2017 aral-ettelbruck/82.214.232.242:52537 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:47 2017 aral-ettelbruck/82.214.232.242:52537 SENT CONTROL [aral-ettelbruck]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.18 10.1.0.17' (status=1) +Wed Nov 22 17:46:49 2017 aral-diekirch/82.214.232.34:37386 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:49 2017 aral-diekirch/82.214.232.34:37386 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:49 2017 aral-diekirch/82.214.232.34:37386 SENT CONTROL [aral-diekirch]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.30 10.1.0.29' (status=1) +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange, name=aral-rodange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:51 2017 82.214.232.202:59369 [aral-rodange] Peer Connection Initiated with [AF_INET]82.214.232.202:59369 +Wed Nov 22 17:46:51 2017 aral-rodange/82.214.232.202:59369 MULTI_sva: pool returned IPv4=10.1.0.154, IPv6=(Not enabled) +Wed Nov 22 17:46:51 2017 aral-rodange/82.214.232.202:59369 MULTI: Learn: 10.1.0.154 -> aral-rodange/82.214.232.202:59369 +Wed Nov 22 17:46:51 2017 aral-rodange/82.214.232.202:59369 MULTI: primary virtual IP for aral-rodange/82.214.232.202:59369: 10.1.0.154 +Wed Nov 22 17:46:54 2017 aral-rodange/82.214.232.202:59369 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:54 2017 aral-rodange/82.214.232.202:59369 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:54 2017 aral-rodange/82.214.232.202:59369 SENT CONTROL [aral-rodange]: 'PUSH_REPLY,route 10.1.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.1.0.154 10.1.0.153' (status=1) +Wed Nov 22 18:46:33 2017 aral-steinfort/82.214.232.178:38461 TLS: soft reset sec=0 bytes=44662/0 pkts=764/0 +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-redange, name=aral-redange, emailAddress=info@dks.sarl +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-steinfort, name=aral-steinfort, emailAddress=info@dks.sarl +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:34 2017 aral-redange/82.214.232.154:53932 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 18:46:34 2017 aral-steinfort/82.214.232.178:38461 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 18:46:36 2017 aral-howald/82.214.232.162:36163 TLS: soft reset sec=0 bytes=46588/0 pkts=773/0 +Wed Nov 22 18:46:36 2017 aral-gonderange/82.214.232.2:38781 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:36 2017 aral-gonderange/82.214.232.2:38781 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-gonderange, name=aral-gonderange, emailAddress=info@dks.sarl +Wed Nov 22 18:46:36 2017 aral-gonderange/82.214.232.2:38781 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:36 2017 aral-gonderange/82.214.232.2:38781 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:36 2017 aral-gonderange/82.214.232.2:38781 NOTE: --mute triggered... diff --git a/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.crt b/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.crt new file mode 100644 index 0000000..6073a0f --- /dev/null +++ b/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:05 2016 GMT + Not After : Mar 27 07:47:05 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-berchem/name=aral-berchem/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a4:a7:6f:87:d5:80:f9:97:57:d1:00:77:8c:bc: + aa:ef:fc:7b:1c:ff:fc:3c:74:73:50:2f:77:a3:87: + 8f:6d:2a:64:c0:5c:bb:c4:08:ea:9a:a7:8b:f8:be: + 22:50:28:9d:c3:18:3e:cd:19:24:c6:6a:44:93:b4: + 2a:bf:54:16:df:d2:6f:dd:99:38:f7:a6:78:20:11: + 4d:43:e8:69:ac:ce:4f:5c:d9:d7:d9:f9:c6:09:be: + cd:0b:e5:09:7b:69:c0:8c:e2:6d:4b:c0:66:70:98: + 46:22:4a:80:e2:61:bd:75:b8:db:51:19:95:b7:35: + 01:1e:62:8c:30:8d:ad:f8:47 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E9:2D:0F:9B:FE:30:B0:89:79:22:3A:60:B8:60:13:4C:BF:56:12:4E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1e:a2:4d:fd:47:85:04:02:a2:be:31:82:be:5f:91:6a:63:5d: + e0:ce:02:3f:63:a7:09:5b:6b:aa:c5:75:e4:1d:26:74:f5:ee: + 9a:ad:52:26:36:f0:3a:20:94:a5:4c:63:15:4c:57:74:d8:44: + e1:c7:af:07:5d:cc:4e:7a:f2:11:62:3d:2a:19:58:83:f3:b4: + 94:30:10:15:fb:dc:77:ef:a9:d1:24:46:bb:d8:11:ca:ad:3c: + 66:37:68:4b:d5:a7:02:78:7e:59:7a:ad:23:f2:37:ff:f5:a7: + 4a:2a:fc:e7:e4:00:81:c3:86:5c:ec:a2:90:40:fd:82:10:31: + 8b:6f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MDVaFw0yNjAzMjcwNzQ3MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1iZXJjaGVtMRUwEwYDVQQpEwxhcmFsLWJlcmNoZW0xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAKSnb4fVgPmXV9EAd4y8qu/8exz//Dx0c1Avd6OHj20qZMBcu8QI6pqn +i/i+IlAoncMYPs0ZJMZqRJO0Kr9UFt/Sb92ZOPemeCARTUPoaazOT1zZ19n5xgm+ +zQvlCXtpwIzibUvAZnCYRiJKgOJhvXW421EZlbc1AR5ijDCNrfhHAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOktD5v+MLCJeSI6YLhgE0y/VhJOMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB6iTf1HhQQCor4xgr5f +kWpjXeDOAj9jpwlba6rFdeQdJnT17pqtUiY28DoglKVMYxVMV3TYROHHrwddzE56 +8hFiPSoZWIPztJQwEBX73HfvqdEkRrvYEcqtPGY3aEvVpwJ4fll6rSPyN//1p0oq +/OfkAIHDhlzsopBA/YIQMYtv +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.key b/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.key new file mode 100644 index 0000000..17a2538 --- /dev/null +++ b/vpn/coloradio02/clients/aral-berchem/2/aral-berchem.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAKSnb4fVgPmXV9EA +d4y8qu/8exz//Dx0c1Avd6OHj20qZMBcu8QI6pqni/i+IlAoncMYPs0ZJMZqRJO0 +Kr9UFt/Sb92ZOPemeCARTUPoaazOT1zZ19n5xgm+zQvlCXtpwIzibUvAZnCYRiJK +gOJhvXW421EZlbc1AR5ijDCNrfhHAgMBAAECgYAsZhnk/uVwaCb97KpQAO/3FpX8 +E+roQl512Nbh+cPrI+tXE6puChl46oUL5flKtCkWWotUstr/xdgIHCUKwpoIAdXs +rpVaXMQgukNy5z23Byu6hXBgPyh3/raXlQAZUUDWw+XYNZUFPwY3XGsIfaXvoX9H +PN2uDjltJu2S+fQFwQJBANc1V3YaMO5OrjWieyKzqtOWKEB2kXyj36P76fEZjyVi +0fFPYotkcxEONn0aU0e/p1kwqfE7wum5CM7t/E9YtpMCQQDD3QXIO7wkil1ecifD +RLFdiYzj2uKDQ+aNkWsG8pzc9h/tzh6VHs5NdI4CcX9Up4ICvS9EjqRGEvU9Ak4X +/PP9AkBhpkGGREIZj7f6fDxVNaL4mPSws1w2awEqHj87d/Z850cNsJCtYSnY/lL5 +Fv3c23iqvqsN26kIdj4p7tCCjGVjAkBVCxr/njBLDWkNITPyrVj17Euog9nmdQ0e +Ww3FroI9zwB+GQleZkndh8ZBeVZ4Q2NIHSzw756UbpbdLqsJ72NhAkEA1y4v/xPW +/2bHWDAY1qeAU6gO8myS8eZh+pQzso4Ss8fdZ7oDVoINwJXiBXfq5ccX9X8LrKdY +84idRAsxil7xkg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-berchem/2/ca.crt b/vpn/coloradio02/clients/aral-berchem/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-berchem/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-berchem/client2.conf b/vpn/coloradio02/clients/aral-berchem/client2.conf new file mode 100644 index 0000000..92920ce --- /dev/null +++ b/vpn/coloradio02/clients/aral-berchem/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-berchem.crt +key 2/aral-berchem.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.crt b/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.crt new file mode 100644 index 0000000..cae11b3 --- /dev/null +++ b/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:34 2016 GMT + Not After : Mar 27 07:47:34 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-echternach/name=aral-echternach/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:4f:ce:e5:90:a0:32:18:b0:75:60:8a:75:97: + 4d:4b:5a:58:72:4e:2f:05:fc:2c:cc:a8:6b:23:18: + 6c:23:2f:a9:6f:d9:65:cf:76:5e:8f:8d:2d:21:fe: + d8:cb:0c:1d:c8:d2:a6:ae:12:a5:2b:1e:95:d2:ae: + af:2d:7d:69:48:b9:ef:ef:d1:d9:7e:ea:a7:b8:3a: + 80:35:6d:4d:94:30:59:b4:26:27:b0:4b:fb:9b:71: + e9:da:fc:ee:f1:e8:9d:2a:5e:31:2c:3a:fd:00:4b: + 47:41:41:73:0b:4d:ec:45:af:40:10:22:9d:38:96: + 58:39:0e:d7:41:fd:ca:6c:21 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 27:55:DE:04:C1:6B:AC:11:8D:4E:61:BF:45:69:11:45:10:84:5E:3E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + da:9a:3a:80:37:e6:24:19:5c:1c:0c:a0:f6:44:fc:26:8c:63: + 0e:c0:82:89:b6:e9:29:cd:49:b1:6e:5f:c9:52:06:90:38:bf: + 37:0f:bf:e0:ab:49:6a:8f:47:09:fc:50:0c:12:9e:92:bf:fd: + 52:c4:28:7a:b6:84:69:25:3b:2a:34:fd:e6:aa:f5:77:e3:29: + d8:92:30:58:60:65:4c:4e:46:5f:82:a8:06:c8:b0:41:a3:84: + e4:b4:7d:f8:b8:16:a7:99:2b:86:53:d0:5d:bc:e4:09:4b:48: + 2e:6a:7d:f5:aa:8b:eb:07:66:0b:a6:2f:04:53:f3:87:a4:34: + cd:3f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MzRaFw0yNjAzMjcwNzQ3MzRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1lY2h0ZXJuYWNoMRgwFgYDVQQpEw9hcmFsLWVjaHRlcm5h +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANNPzuWQoDIYsHVginWXTUtaWHJOLwX8LMyoayMYbCMvqW/Z +Zc92Xo+NLSH+2MsMHcjSpq4SpSseldKury19aUi57+/R2X7qp7g6gDVtTZQwWbQm +J7BL+5tx6dr87vHonSpeMSw6/QBLR0FBcwtN7EWvQBAinTiWWDkO10H9ymwhAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFCdV3gTBa6wRjU5hv0VpEUUQ +hF4+MIHdBgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBANqaOoA35iQZ +XBwMoPZE/CaMYw7Agom26SnNSbFuX8lSBpA4vzcPv+CrSWqPRwn8UAwSnpK//VLE +KHq2hGklOyo0/eaq9XfjKdiSMFhgZUxORl+CqAbIsEGjhOS0ffi4FqeZK4ZT0F28 +5AlLSC5qffWqi+sHZgumLwRT84ekNM0/ +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.key b/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.key new file mode 100644 index 0000000..4478690 --- /dev/null +++ b/vpn/coloradio02/clients/aral-echternach/2/aral-echternach.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANNPzuWQoDIYsHVg +inWXTUtaWHJOLwX8LMyoayMYbCMvqW/ZZc92Xo+NLSH+2MsMHcjSpq4SpSseldKu +ry19aUi57+/R2X7qp7g6gDVtTZQwWbQmJ7BL+5tx6dr87vHonSpeMSw6/QBLR0FB +cwtN7EWvQBAinTiWWDkO10H9ymwhAgMBAAECgYAb7P8lvYA+Pp8LVA/YTH+NhsoL +iSOTwejVvygxgifAWqskufFHgpgqlnixdnGGG/rPsG8QsCwdz7PzHNzPwTQph9cH +c+5RzXcy0HOGc8CCO0Tuo1xK5EpikqcgkYfhbT+hXpe+XoRKb4KG+hUVIyW5R1m9 +0ZFu6SOTcc9np/rucQJBAOpNNgNAVjc5h7/X8tvi8H/En9ZpsiNxI78xJncNl/6A +yhVyuC5/7VdQ1kWDhvJEeuZ25Wkuws0kX/77QlQ0reUCQQDm4Y6YP4wy4jIGx9wz +gztjDCQOoN71KUkdKv+jsNkgnRyPiBFvsc55Nc4SyDLcQ/Z/gu6+EIp1oNb7QxUc +KcGNAkEAikY46yBMAVl1cNWsIPLEhlLvFaXZGKuLsij6j2Y5Xlx5ZsEGS4L5+f7e +BbZCrLWXZm2ipDmRg2nFMYDtOy6/tQI/Z7brV3k0gaca0fD1+i35f4T0rZ2WiosB +TRkDvYS0BPKO4es96e710X1aFRXZwxjEooMuvDKyACVAbZ603PHlAkEAmdn0aQOR +IstoHtpMKgNnQyb+TF5PI5dD7N/UbQWDbi2i13AtukgLrvtLxnaGIN//oc7W0RKX +3WQx3C6t5YnObw== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-echternach/2/ca.crt b/vpn/coloradio02/clients/aral-echternach/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-echternach/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-echternach/client2.conf b/vpn/coloradio02/clients/aral-echternach/client2.conf new file mode 100644 index 0000000..85d0d0f --- /dev/null +++ b/vpn/coloradio02/clients/aral-echternach/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-echternach.crt +key 2/aral-echternach.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-findel/2/aral-findel.crt b/vpn/coloradio02/clients/aral-findel/2/aral-findel.crt new file mode 100644 index 0000000..8abbd6c --- /dev/null +++ b/vpn/coloradio02/clients/aral-findel/2/aral-findel.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Dec 15 11:18:48 2015 GMT + Not After : Dec 12 11:18:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-findel/name=aral-findel/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:11:e0:1e:39:4e:73:48:6b:f1:bb:ad:22:15: + ca:87:13:c1:4b:51:bc:2b:17:39:14:50:29:2b:e1: + 98:22:b2:86:b3:f2:6a:72:67:13:8b:0a:5f:30:af: + 32:0e:80:61:1c:7a:54:54:1b:fd:36:67:e8:b4:08: + 95:e3:18:6a:3a:14:e9:12:46:e2:0f:92:ad:3b:8b: + 6a:e6:9a:f6:9f:62:98:a7:f5:87:c7:ac:01:2a:8f: + f7:e6:94:e9:e8:92:19:78:04:58:a2:07:25:85:a8: + 3b:ac:d0:30:8c:b7:c9:2f:61:74:79:f9:b1:9b:0a: + 0f:cd:54:dc:3e:c8:d9:ba:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E4:9A:75:64:C6:4C:ED:F7:85:C6:85:A1:1A:48:C3:0B:EA:B1:69:CA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 87:6b:83:ce:a7:fb:eb:67:2b:96:4c:9c:bc:40:f0:82:f6:b0: + a8:27:0b:f6:0d:71:3b:4e:11:37:e2:ef:6d:bc:f5:03:c8:bf: + 9a:dc:2b:48:13:14:68:98:f7:0c:15:d0:4a:58:3e:e3:0b:64: + ed:e3:9b:77:79:56:38:7a:69:a4:82:65:3d:81:93:0a:f0:29: + af:06:16:ad:16:aa:75:f7:0f:19:c9:be:2d:7c:76:d4:50:5d: + fb:39:85:f3:3b:4d:75:d5:d9:3c:6c:41:49:87:39:a7:91:6f: + 6a:a9:07:c1:df:f5:09:ee:10:4c:a8:62:1e:89:8f:6b:35:c2: + 93:f6 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEyMTUxMTE4NDhaFw0yNTEyMTIxMTE4NDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1maW5kZWwxFDASBgNVBCkTC2FyYWwtZmluZGVsMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDKEeAeOU5zSGvxu60iFcqHE8FLUbwrFzkUUCkr4Zgisoaz8mpyZxOLCl8w +rzIOgGEcelRUG/02Z+i0CJXjGGo6FOkSRuIPkq07i2rmmvafYpin9YfHrAEqj/fm +lOnokhl4BFiiByWFqDus0DCMt8kvYXR5+bGbCg/NVNw+yNm6EQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBTkmnVkxkzt94XGhaEaSMML6rFpyjCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCHa4POp/vrZyuWTJy8QPCC +9rCoJwv2DXE7ThE34u9tvPUDyL+a3CtIExRomPcMFdBKWD7jC2Tt45t3eVY4emmk +gmU9gZMK8CmvBhatFqp19w8Zyb4tfHbUUF37OYXzO0111dk8bEFJhzmnkW9qqQfB +3/UJ7hBMqGIeiY9rNcKT9g== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-findel/2/aral-findel.key b/vpn/coloradio02/clients/aral-findel/2/aral-findel.key new file mode 100644 index 0000000..7aa81a8 --- /dev/null +++ b/vpn/coloradio02/clients/aral-findel/2/aral-findel.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMoR4B45TnNIa/G7 +rSIVyocTwUtRvCsXORRQKSvhmCKyhrPyanJnE4sKXzCvMg6AYRx6VFQb/TZn6LQI +leMYajoU6RJG4g+SrTuLauaa9p9imKf1h8esASqP9+aU6eiSGXgEWKIHJYWoO6zQ +MIy3yS9hdHn5sZsKD81U3D7I2boRAgMBAAECgYBd65MM2Tvyb13kvIOLTS+WOwNj +u7jHGoMoQt3wDGoG7o2Xg/wf8nLt9EMsQLH2dYstjlo1wdCeggtx6m+oXwe35Gr7 ++aTatqvZuATj6xES6GzdEemsyizv1ZxWQFLvf9lqc4w+Iv/GnofsIjSpSMM6Z7n1 +15AsP6Qhbf5NEAWbZQJBAP/uZ7qTLDf2U6bzfcSmTPs4i/DQyvdN1C/n01TDpZZm +mju1jauCIvN7DEnT7xty223wwO4oiMAj7Zpsq7fFUBMCQQDKH8Rz8iLvn6GgSVrn +Q9vTLYmLLxgJnEBCXGc4PVMA3jRHqz4dyLyrmqjk8+DoaoFGgLnl2/0ewz9bxfgV +FTnLAkEA01Klb9dJ8cOBex8ewBuZAO7GDkg4707iX9QKGbmapr99psPYgL9p4KW/ +lc5bZszGBtd+Vqg9knmYHaSRfaJ85QJBAJQX5obVeMd9fJzGYnZj/+Kg0NBL9x7D +f0mgDnjkZbaTGFcSnvaPp71MGkd2cOmZb5LKqmpCXxl1ES0axgQcgzUCQEofn54E +QObqbcVHu+vygbUoHRHrnXQIpJbTjeCM5pfYeK8VFOjgOJ4DS4bbTI6YVFYB3bXI +NnqIEcbmLJ3zwdY= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-findel/2/ca.crt b/vpn/coloradio02/clients/aral-findel/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-findel/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-findel/client2.conf b/vpn/coloradio02/clients/aral-findel/client2.conf new file mode 100644 index 0000000..2a30c0d --- /dev/null +++ b/vpn/coloradio02/clients/aral-findel/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-findel.crt +key 2/aral-findel.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.crt b/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.crt new file mode 100644 index 0000000..714f32f --- /dev/null +++ b/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:20 2016 GMT + Not After : Mar 27 07:47:20 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lallange/name=aral-lallange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b0:8e:29:dc:e0:d3:a5:0c:10:0f:02:74:24:50: + aa:60:4a:9b:45:36:df:b4:4e:07:d4:ae:90:09:c1: + f6:97:7f:93:ee:26:43:42:d6:6c:b4:32:49:46:ce: + 27:c0:95:8c:63:20:19:44:49:cf:cd:28:a2:24:47: + 9b:4e:b4:52:a6:26:92:f2:fb:5d:bf:76:25:06:18: + 8d:51:dd:b8:94:78:2b:ff:16:1d:f3:7a:03:42:6e: + 76:08:c0:01:ec:c8:74:f1:95:64:19:a6:3a:d1:27: + 20:77:f8:d3:7e:4f:22:45:54:73:e3:84:76:a8:09: + fd:a5:86:71:94:8f:0e:74:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:AA:B1:1E:C3:32:5C:14:A9:9D:3E:B3:89:FF:ED:EE:1D:1C:44:C9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a3:42:e2:36:0b:e7:88:b4:21:23:01:1d:ad:6d:3d:2c:7d:03: + 2f:fe:44:e9:9b:1d:e5:a5:fd:a8:b0:c0:3c:b2:a0:ef:0f:7a: + 92:1a:a5:90:5d:a7:d6:e8:8e:50:3c:59:e6:d6:ff:65:86:f5: + 51:7a:e8:e5:9d:6c:f2:72:83:cc:95:29:7e:a8:eb:03:a6:c3: + d9:f0:f9:c1:61:f1:cc:35:d4:42:50:cd:48:fa:6f:47:66:e5: + 1c:4b:fe:33:5a:ad:8c:e6:dc:d6:51:2e:e6:40:1e:ac:63:77: + 73:4a:6c:3e:78:38:9b:8b:28:b3:01:c3:f3:67:a3:18:78:f9: + 1a:b2 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MjBaFw0yNjAzMjcwNzQ3MjBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1sYWxsYW5nZTEWMBQGA1UEKRMNYXJhbC1sYWxsYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAsI4p3ODTpQwQDwJ0JFCqYEqbRTbftE4H1K6QCcH2l3+T7iZDQtZs +tDJJRs4nwJWMYyAZREnPzSiiJEebTrRSpiaS8vtdv3YlBhiNUd24lHgr/xYd83oD +Qm52CMAB7Mh08ZVkGaY60Scgd/jTfk8iRVRz44R2qAn9pYZxlI8OdM0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUwqqxHsMyXBSpnT6zif/t7h0cRMkw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAo0LiNgvniLQhIwEd +rW09LH0DL/5E6Zsd5aX9qLDAPLKg7w96khqlkF2n1uiOUDxZ5tb/ZYb1UXro5Z1s +8nKDzJUpfqjrA6bD2fD5wWHxzDXUQlDNSPpvR2blHEv+M1qtjObc1lEu5kAerGN3 +c0psPng4m4soswHD82ejGHj5GrI= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.key b/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.key new file mode 100644 index 0000000..8abb982 --- /dev/null +++ b/vpn/coloradio02/clients/aral-lallange/2/aral-lallange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALCOKdzg06UMEA8C +dCRQqmBKm0U237ROB9SukAnB9pd/k+4mQ0LWbLQySUbOJ8CVjGMgGURJz80ooiRH +m060UqYmkvL7Xb92JQYYjVHduJR4K/8WHfN6A0JudgjAAezIdPGVZBmmOtEnIHf4 +035PIkVUc+OEdqgJ/aWGcZSPDnTNAgMBAAECgYAvcZRoSXY2NN6f2e3x0EdoZsQA +vnUw04MhMON968RjA6Jx7ZBHhq1hYt30C/P8uXMnM/n2MsuHevLPQvrGFIjcsKhA +lFBFLeJ/oV5/eA7M5OIPkeQuJtyNPsQbV+EwIZyJzl/JBsJLqvqRtK1+nFtsRwL9 +ah9LWZ+iv4ORf+agQQJBAOIuEWmJkVc3L8dbtkXn7jpKiOtBnwqjxfWqMEPOP0AQ +6YELoRmr++WYNHwIbrE3ci8ONPnZhmJDvub/fEs8wT0CQQDH1S+I1T+p+V8e8I9U +rqKN2I8KM3mIAH1PcyDrivCE75bT8N1HNvvJtJ5hOrXt+62BToihBMEezu353zCm +bprRAkEAvv3hzDnTlk9OtEy4nU1deLGp7ubJ0yU6q9kbypYmCQZ+926HinMVUep2 +H2rLdjB45k1b5MOP2/iTAuMo5SuXjQJAVXoiMBSPe+RYRMK/fIiKrcQBQ2rLRFp5 +P3/OiBJRWXumd5fi/vBM+XWR/aMAaQCrsdDm7oE7HjODZcuLYtWS0QJAXozAGint +U1Oqu2isPWHLCR540UdZhmTEajqPqi9akeEIcvPDOi2qT/izEa7KNWNExt0WNEtr +83x1wBONuGaiFQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-lallange/2/ca.crt b/vpn/coloradio02/clients/aral-lallange/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-lallange/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-lallange/client2.conf b/vpn/coloradio02/clients/aral-lallange/client2.conf new file mode 100644 index 0000000..3cfa236 --- /dev/null +++ b/vpn/coloradio02/clients/aral-lallange/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-lallange.crt +key 2/aral-lallange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.crt b/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.crt new file mode 100644 index 0000000..411fc11 --- /dev/null +++ b/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 23 08:01:13 2016 GMT + Not After : May 21 08:01:13 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl2/name=aral-merl2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:28:b9:b9:3b:1f:d8:9e:fb:48:0b:39:69:22: + a9:a8:fa:07:cb:62:dc:47:3e:a3:9f:22:09:91:13: + 58:e8:3d:c3:e3:dd:e4:52:ac:4c:82:b7:89:41:84: + e2:cf:dd:f1:18:fd:ab:7b:e0:b2:ee:3e:81:2f:7c: + c5:53:56:7a:e3:6e:e7:13:04:14:cd:95:15:f7:31: + ae:c6:50:de:f1:56:cd:7b:bf:3d:fc:dd:00:4e:1f: + 48:b2:b4:de:a5:e2:26:0e:97:27:2a:34:8a:6f:93: + 9e:72:bc:02:e3:d8:38:b7:1c:b2:6a:0f:93:62:57: + 03:ce:69:f6:f9:2e:07:ca:4d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:B5:5B:8D:A5:2C:46:9B:A9:86:9A:BE:38:66:51:F5:CE:19:A0:28 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + cd:5b:18:07:76:31:78:d1:a3:10:21:13:7d:2a:40:63:5c:ca: + 30:6d:d3:0f:81:7e:cc:48:7a:f6:48:00:ae:7a:25:26:00:1c: + 60:ef:15:c3:c4:a4:1c:54:8b:80:a0:d2:02:79:82:62:ee:11: + 1a:39:71:cf:70:fb:79:6f:bb:76:89:dc:96:e0:4e:f9:72:22: + f0:2e:be:ec:2d:af:34:ac:05:96:e3:74:09:a5:4b:5b:f5:07: + 92:56:4c:05:fa:c6:f0:72:90:44:75:f3:3e:68:21:5e:0e:89: + 76:0b:06:83:f1:e9:3a:2c:0c:2f:fc:00:9e:35:92:a2:65:39: + 51:d3 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MjMwODAxMTNaFw0yNjA1MjEwODAxMTNaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1tZXJsMjETMBEGA1UEKRMKYXJhbC1tZXJsMjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA0yi5uTsf2J77SAs5aSKpqPoHy2LcRz6jnyIJkRNY6D3D493kUqxMgreJQYTi +z93xGP2re+Cy7j6BL3zFU1Z6427nEwQUzZUV9zGuxlDe8VbNe789/N0ATh9IsrTe +peImDpcnKjSKb5OecrwC49g4txyyag+TYlcDzmn2+S4Hyk0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUdrVbjaUsRpuphpq+OGZR9c4ZoCgwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAzVsYB3YxeNGjECETfSpAY1zK +MG3TD4F+zEh69kgArnolJgAcYO8Vw8SkHFSLgKDSAnmCYu4RGjlxz3D7eW+7donc +luBO+XIi8C6+7C2vNKwFluN0CaVLW/UHklZMBfrG8HKQRHXzPmghXg6JdgsGg/Hp +OiwML/wAnjWSomU5UdM= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.key b/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.key new file mode 100644 index 0000000..7d9ff7e --- /dev/null +++ b/vpn/coloradio02/clients/aral-merl2/2/aral-merl2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANMoubk7H9ie+0gL +OWkiqaj6B8ti3Ec+o58iCZETWOg9w+Pd5FKsTIK3iUGE4s/d8Rj9q3vgsu4+gS98 +xVNWeuNu5xMEFM2VFfcxrsZQ3vFWzXu/PfzdAE4fSLK03qXiJg6XJyo0im+TnnK8 +AuPYOLccsmoPk2JXA85p9vkuB8pNAgMBAAECgYAjMMRS9GGITmZ+STCWLuqreI/X ++2/Oh8fo+1kwzlKg0bpVvWMRzBksJ74+JxFNpyVJDu2HRZlMTypkaZzRGLZ95y1U +Yv72Z0zPmvVq34QYwDLCphs+NY25pX7nm7sii4jUJ+DZZKOBbYFq/dDGORTv2l25 +lcbg/IfIjbNN8BZ0mQJBAPHb68jIFSrXACobTuwJEegXb2MzxATHd8HZQmKPxCpJ +XVKw9eZHy492FxyYKA1nlNArl7/CJdbxcWbxUDh1wV8CQQDfgUux6np7s/Ns5um1 +BU6SrYsk0gISliSfVSlJYkhdcwl5mQE4iOi3KhSq6FGGBRmAkirIMFVoAV4+I2+Y +UjfTAkEAmkzXIXJc5sbiCPsBH98teGezHZQCA5aKVbbY/m6AFQZXLpFNYAv/11fc +qNZ9/wdNTn3xQ1qGr5m74pQjvNGLewJBANawc+1qtkytBl7NUCC6AEeUu9uafrMr +1fHW89mxtqFNJwTOnAWaPS/0E/Y3Qlfh/iUqQj4Zb3CAH+7ASymdkFECQGA8YUN1 +obTYVZzhETdFfha7IbujStY6M2i66Sk06oPcGUvDIA1dLXQfkn0LnkdweZvLuXPD +RyE10aV1WY8qpbM= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-merl2/2/ca.crt b/vpn/coloradio02/clients/aral-merl2/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-merl2/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-merl2/client2.conf b/vpn/coloradio02/clients/aral-merl2/client2.conf new file mode 100644 index 0000000..b181782 --- /dev/null +++ b/vpn/coloradio02/clients/aral-merl2/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-merl2.crt +key 2/aral-merl2.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.crt b/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.crt new file mode 100644 index 0000000..e679ebf --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:49 2016 GMT + Not After : Mar 27 07:47:49 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich1/name=aral-remich1/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b4:cc:c3:56:fa:32:b1:fc:5a:70:16:37:e4:c2: + 57:5a:d7:a7:fd:3d:f7:1f:fb:da:b2:10:a2:2a:a8: + 18:74:fe:27:40:3a:fd:c8:23:2d:b9:af:f0:39:a5: + 2d:04:df:74:dc:73:79:e9:a4:b4:01:88:ab:51:4a: + fd:f3:a0:56:6b:e3:91:a4:4b:60:79:8a:6b:11:2e: + 89:08:a0:be:c8:60:40:26:7a:a0:49:cf:86:6e:69: + 93:65:9b:75:e8:62:59:79:61:68:c1:e0:c4:b4:ef: + a9:02:81:4f:c9:0a:29:ca:5d:12:13:00:8b:57:20: + d7:05:15:02:fe:1f:7e:57:73 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C9:01:C1:B8:7D:5B:60:3C:B6:85:C7:A1:E8:1A:80:62:C5:34:1B:B9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + af:21:44:09:ee:90:81:1e:08:8f:5b:65:9a:30:3a:5d:9a:a4: + 9b:db:75:02:78:1c:a6:f0:c2:d0:fb:be:40:57:aa:34:f4:03: + 59:0a:d9:36:49:05:e5:99:48:e0:9b:13:e6:ed:81:83:45:0e: + 80:ec:6d:91:74:91:92:2b:cd:37:9b:14:16:23:41:f0:c9:36: + 43:af:2a:25:d5:4e:3c:b0:47:1a:d4:c7:7b:cc:8c:70:9a:9a: + 3c:5e:53:82:97:d9:78:82:b1:7f:59:6c:4a:ba:21:01:13:d3: + cd:85:aa:88:0b:33:91:c2:17:34:34:37:aa:4e:4c:42:26:11: + 1c:8a +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NDlaFw0yNjAzMjcwNzQ3NDlaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gxMRUwEwYDVQQpEwxhcmFsLXJlbWljaDExHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALTMw1b6MrH8WnAWN+TCV1rXp/099x/72rIQoiqoGHT+J0A6/cgjLbmv +8DmlLQTfdNxzeemktAGIq1FK/fOgVmvjkaRLYHmKaxEuiQigvshgQCZ6oEnPhm5p +k2WbdehiWXlhaMHgxLTvqQKBT8kKKcpdEhMAi1cg1wUVAv4ffldzAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFMkBwbh9W2A8toXHoegagGLFNBu5MIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAK8hRAnukIEeCI9bZZow +Ol2apJvbdQJ4HKbwwtD7vkBXqjT0A1kK2TZJBeWZSOCbE+btgYNFDoDsbZF0kZIr +zTebFBYjQfDJNkOvKiXVTjywRxrUx3vMjHCamjxeU4KX2XiCsX9ZbEq6IQET082F +qogLM5HCFzQ0N6pOTEImERyK +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.key b/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.key new file mode 100644 index 0000000..8dff230 --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich1/2/aral-remich1.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBALTMw1b6MrH8WnAW +N+TCV1rXp/099x/72rIQoiqoGHT+J0A6/cgjLbmv8DmlLQTfdNxzeemktAGIq1FK +/fOgVmvjkaRLYHmKaxEuiQigvshgQCZ6oEnPhm5pk2WbdehiWXlhaMHgxLTvqQKB +T8kKKcpdEhMAi1cg1wUVAv4ffldzAgMBAAECgYEAnIf7Rz5uzbISCqDx21h2kOvN +QW94mXRPr4K/I/dM1V2FVhK8zZ3HZNByRzY+d82PO52umx5BymItEMDAhUD4EBGp +LU/xUn6zyq7iWdSPDlVYqHzYVE8cXgh+loXRtGQtu4GJJ2yOqcRcZ9ux3/nqk2JF +pDUmE/WYiV+RSAgDeoECQQDwiHgdG+5DkhLcZwtkcfxIqzk3CL0N6T5/x3cUXyfy +7G+iPoOfRPLCM7m7M4ard5iI5Mhn3MyJHqGfSWQtmWLRAkEAwGz/F/xO2sCfmM0S +4QyXFehsT00Lr11+Sdv2TeDMbZyTbrB+Ak5oKZF0e9szUcfhrV7o/ADiynwiKhz4 +ogT/AwJBALsKQ+zO1V5x7ny5HGDFSlrv2pPzFaAFqfYPE4gh3pzGQqC1YACvyt48 +/saVcLlRTKnWzggF6H8P9Lo6hc33oqECQE+fSla0cjSWK/PgN4Wj3giUqeyOZt1j +hFQvjlVfRXe9qEvO//UYWIWKyHZPl4apfLpuYV2VSEKc5s4iOsdf5d0CQBfJaF/R +7Trc2zktzDp0LTwoMCmj3brEj9QVm9YM0DQPV9cY8Bx2r3BBQYeyHlB/N4GsGZxL +0Ckj/pWvtmsyVmQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-remich1/2/ca.crt b/vpn/coloradio02/clients/aral-remich1/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich1/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-remich1/client2.conf b/vpn/coloradio02/clients/aral-remich1/client2.conf new file mode 100644 index 0000000..40980bd --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich1/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-remich1.crt +key 2/aral-remich1.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.crt b/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.crt new file mode 100644 index 0000000..e76c617 --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:52 2016 GMT + Not After : Mar 27 07:47:52 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2/name=aral-remich2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e5:f8:b5:a2:f2:48:9e:4b:a7:3f:ee:d7:9f:2e: + fc:2e:ed:d1:b4:97:89:c2:d9:c1:64:2a:26:13:c2: + ff:20:30:f2:44:28:8a:de:4e:60:35:40:83:98:e1: + 7f:3b:f6:81:a6:87:49:6b:b0:c9:2a:d0:00:6c:8a: + 96:14:65:0f:63:19:83:c0:d3:e4:b8:c4:ee:6e:6b: + 10:a1:89:07:52:92:af:7d:ea:f9:32:a5:a0:3a:bc: + d5:ed:95:df:55:91:e4:92:2c:36:57:35:c5:d3:d8: + 21:d0:05:08:85:b5:dd:96:84:de:f6:7d:10:b2:a4: + 6b:a1:42:42:f4:82:25:a7:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3F:FE:05:D7:07:95:D8:FA:A0:1A:5F:22:D8:54:79:19:50:AE:BD:8E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:f2:c9:ea:59:a4:74:70:31:02:33:08:61:91:5f:8a:6b:21: + d0:9e:2a:24:84:b6:ef:d9:89:42:6c:aa:66:9f:c7:fb:f2:93: + 2e:48:7f:17:09:75:34:99:84:eb:08:41:f4:a7:14:35:9b:cd: + 7c:8c:50:02:0d:a9:c2:56:e8:22:fa:9c:0e:40:9a:c2:37:65: + 95:39:37:79:8c:61:32:8a:93:c7:32:33:0f:a3:ac:ed:99:63: + ee:78:f2:bb:fc:db:8d:83:fa:f6:af:39:79:81:58:4c:95:24: + 33:55:10:2c:41:05:3d:ca:b6:fc:0f:bb:17:05:84:6c:c3:bb: + 84:13 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NTJaFw0yNjAzMjcwNzQ3NTJaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gyMRUwEwYDVQQpEwxhcmFsLXJlbWljaDIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOX4taLySJ5Lpz/u158u/C7t0bSXicLZwWQqJhPC/yAw8kQoit5OYDVA +g5jhfzv2gaaHSWuwySrQAGyKlhRlD2MZg8DT5LjE7m5rEKGJB1KSr33q+TKloDq8 +1e2V31WR5JIsNlc1xdPYIdAFCIW13ZaE3vZ9ELKka6FCQvSCJaenAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFD/+BdcHldj6oBpfIthUeRlQrr2OMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAH/yyepZpHRwMQIzCGGR +X4prIdCeKiSEtu/ZiUJsqmafx/vyky5IfxcJdTSZhOsIQfSnFDWbzXyMUAINqcJW +6CL6nA5AmsI3ZZU5N3mMYTKKk8cyMw+jrO2ZY+548rv8242D+vavOXmBWEyVJDNV +ECxBBT3KtvwPuxcFhGzDu4QT +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.key b/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.key new file mode 100644 index 0000000..74fbc2d --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich2/2/aral-remich2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOX4taLySJ5Lpz/u +158u/C7t0bSXicLZwWQqJhPC/yAw8kQoit5OYDVAg5jhfzv2gaaHSWuwySrQAGyK +lhRlD2MZg8DT5LjE7m5rEKGJB1KSr33q+TKloDq81e2V31WR5JIsNlc1xdPYIdAF +CIW13ZaE3vZ9ELKka6FCQvSCJaenAgMBAAECgYBvRJe1gF6MYHRKpagj99rCZgSp +yQw5f5xnd1E3DIjeLXB6c9dE2k0IVu+VH72s6IcwaJKojT+3/C3IVoFo2sDHOjs9 +RxMKJp6M9fW+A3iUS3fvwSAaDNre1o8rd/5sSOhmW2J4nUzcqTkOEQ5WqEy1pfcf +l6/OoU0z7GQx4hRG0QJBAPQyiNGk4PEy8gkvBi9oPiGp23mre6/ZBUno595blkXp +nfajxffGqLSKggRzwF7YG/cZrZHyb9Uq8e5BLESCh58CQQDxFihaFep+3fRlzJ28 +87MAxoG2Y5N6Tc+wJ5QfXziKbDKYJGv2AqPw3jghZ4WL9LHLdBHgGlOgKWpcN3fc +D4L5AkA028N17cSrMSXnCwDBvkTEsKnLWm05kTZt2zZlkVmj5H/G5Yhyq9PU0K54 +HD4lyY20HSDPGLVQZS1dL0pPwhltAkEAxe3IETW/AIte9BjKQ+/bvT48Di6wTJAH +e/rye9MkS1jLLOdyD1ZZnA4FDT+9f4rUUVGov1E96Nc3sCAF8pB1mQJBAMKlaIgO +A3mCe7qFMOXvHW9cDoZHrD9JbaNBP3FgBhu7Q2kD0q/8lSplnnWzEfXO8hxBkTTc +DLsGwgJvV2Jt1Zw= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-remich2/2/ca.crt b/vpn/coloradio02/clients/aral-remich2/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich2/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-remich2/client2.conf b/vpn/coloradio02/clients/aral-remich2/client2.conf new file mode 100644 index 0000000..6966b72 --- /dev/null +++ b/vpn/coloradio02/clients/aral-remich2/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-remich2.crt +key 2/aral-remich2.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.crt b/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.crt new file mode 100644 index 0000000..3547333 --- /dev/null +++ b/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:30 2016 GMT + Not After : Mar 27 07:48:30 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange2/name=aral-rodange2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:12:62:8a:30:47:15:0e:08:6a:46:e6:3d:b4: + 1f:34:52:eb:15:e8:98:3d:e8:1e:e0:7e:a5:11:b3: + ec:3e:1a:07:18:5e:88:57:2b:41:6c:c0:5a:88:ba: + 92:40:6f:e4:a1:59:ab:40:a2:91:ab:3e:bb:49:52: + e1:03:aa:f6:cf:91:77:41:b2:8e:e2:30:85:d7:92: + bd:26:3c:d4:d2:da:68:13:36:8c:70:70:a6:57:8f: + 46:c8:ac:16:c7:d3:4e:64:e9:68:b4:db:84:05:d0: + f5:49:76:f3:44:8e:e4:4c:84:15:a0:43:71:d1:05: + bd:94:84:13:4e:fd:0a:58:05 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2A:AE:E1:B7:0C:64:97:35:D5:68:40:B7:83:14:36:83:FE:53:2C:16 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 9a:f8:a2:78:a8:8e:44:22:cf:5f:09:2e:0b:fb:7b:60:6a:9f: + 3f:3d:89:25:bf:03:92:b4:49:c1:24:e0:ed:e7:98:80:dc:81: + 8d:2c:86:e7:08:4d:94:5b:d4:78:ce:4f:4a:58:e7:05:4a:0f: + 28:51:b3:cd:fb:c7:d3:3e:ae:98:f2:a6:8f:09:49:07:67:ba: + 84:c4:4f:c6:70:58:67:2c:fa:e9:6b:c1:1e:70:18:6e:fd:95: + f0:fa:34:77:d0:9c:d8:16:b2:44:60:f8:1b:15:97:32:53:1b: + 73:f3:91:5c:88:cc:9a:68:85:18:86:0b:5a:38:b3:2c:f1:33: + 7c:39 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MzBaFw0yNjAzMjcwNzQ4MzBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1yb2RhbmdlMjEWMBQGA1UEKRMNYXJhbC1yb2RhbmdlMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA4RJiijBHFQ4IakbmPbQfNFLrFeiYPege4H6lEbPsPhoHGF6IVytB +bMBaiLqSQG/koVmrQKKRqz67SVLhA6r2z5F3QbKO4jCF15K9JjzU0tpoEzaMcHCm +V49GyKwWx9NOZOlotNuEBdD1SXbzRI7kTIQVoENx0QW9lIQTTv0KWAUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUKq7htwxklzXVaEC3gxQ2g/5TLBYw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAmviieKiORCLPXwku +C/t7YGqfPz2JJb8DkrRJwSTg7eeYgNyBjSyG5whNlFvUeM5PSljnBUoPKFGzzfvH +0z6umPKmjwlJB2e6hMRPxnBYZyz66WvBHnAYbv2V8Po0d9Cc2BayRGD4GxWXMlMb +c/ORXIjMmmiFGIYLWjizLPEzfDk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.key b/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.key new file mode 100644 index 0000000..e70d7f2 --- /dev/null +++ b/vpn/coloradio02/clients/aral-rodange2/2/aral-rodange2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOESYoowRxUOCGpG +5j20HzRS6xXomD3oHuB+pRGz7D4aBxheiFcrQWzAWoi6kkBv5KFZq0Cikas+u0lS +4QOq9s+Rd0GyjuIwhdeSvSY81NLaaBM2jHBwplePRsisFsfTTmTpaLTbhAXQ9Ul2 +80SO5EyEFaBDcdEFvZSEE079ClgFAgMBAAECgYEAtXoogDobJovxFxhhz4Dr5Dmz +mi+4ibofI26aVKLZqt07uVeH4ZlcIH8cwMCG6nQOSldN8Ujj4cssIhw0mMuCQynZ +MhLiFeI3sDkiGgrbJV8D7XLwdFwgVZmAcQ4cHxqcYVR8u8T5dgsW71q6decPt6XX +Y1ofhr0DuaBhVcTgaAUCQQD919jLN1v6NfE14pTWvDk5UJrRXH0/BTuWQ6qMJFpA +q4YvwRwPtRjqgJz5ir6DUKsxdxLG8A6txmY1oRd0aKq7AkEA4vv0lMBceZhbhOH0 +fT4NWZlv9ikeI0z4e36rjHuybzNube8ovku3PojQsxisQGdD6ZbtKxrLQoHAQKTt +yMW8PwJAciRFspMxA6CP1vgMj0ZRwOjyxKN/GgBjW90PajbKcnvuObjuwk1fZ8rv +SvJNWkTCxdpSEixNnWwx93l5T3nlEwJBAIRYa+8ficvMLfB43tj3iUko0cMxjkT+ +6BL5dITgytVTo5utyo/KDfoEQ8tpI2YZz9svCPINGV6Z0MLgZ1SdFnkCQCGZr9dE +IunvT/111TiPCUVyJ4feKSObHeUOD9GOF12n9Ebz6DE+HgWGg89Gwebc3u76zH49 +TLbPNtSumJk/9Xg= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-rodange2/2/ca.crt b/vpn/coloradio02/clients/aral-rodange2/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-rodange2/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-rodange2/client2.conf b/vpn/coloradio02/clients/aral-rodange2/client2.conf new file mode 100644 index 0000000..c09312f --- /dev/null +++ b/vpn/coloradio02/clients/aral-rodange2/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-rodange2.crt +key 2/aral-rodange2.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.crt b/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.crt new file mode 100644 index 0000000..ad9ed13 --- /dev/null +++ b/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:23 2016 GMT + Not After : Mar 27 07:48:23 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schifflange/name=aral-schifflange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d5:4f:31:47:b7:c6:88:96:56:4c:11:06:fe:d2: + c6:4a:c0:b9:42:2d:18:a4:5d:6a:c5:b8:8f:46:6e: + 5e:a6:87:c6:a7:75:05:a1:3d:3e:0b:68:08:a0:ec: + 30:07:73:8b:b3:47:ee:6c:d1:80:08:f1:ae:ca:49: + 6b:7e:05:3d:5b:a5:47:c3:00:66:f9:b0:93:9f:0f: + 06:0b:45:91:31:05:68:af:23:b3:a5:21:5b:46:b4: + 38:b3:47:42:9f:a6:a7:10:3f:cf:60:17:4a:a4:8d: + 84:c2:52:9b:a7:f8:be:13:93:6a:82:af:2e:9a:a4: + ad:34:32:46:3e:1c:14:2d:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0E:BB:A6:45:1D:76:F7:77:D6:D7:DF:8A:BA:84:F4:32:75:2C:ED:8C + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a9:11:e7:44:26:1b:eb:75:d6:25:0f:52:4d:f5:9d:78:6a:a6: + 67:56:be:21:66:62:2b:98:c4:79:07:70:63:41:2c:6e:56:e0: + 23:20:c5:6d:66:9e:c2:70:55:ac:62:f2:9b:c4:49:94:13:3b: + 9f:aa:dd:3e:01:24:c9:0c:61:ba:9d:1e:03:be:04:8f:df:ce: + 2b:71:e8:f7:fe:c5:4e:c2:60:60:2c:10:02:06:3a:6e:35:97: + 72:56:07:77:28:b7:68:8c:ed:a0:03:aa:65:98:66:f6:fe:3e: + 96:08:f7:bf:08:35:de:18:05:eb:c4:97:7c:37:8d:7a:7f:72: + f1:da +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MjNaFw0yNjAzMjcwNzQ4MjNaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1zY2hpZmZsYW5nZTEZMBcGA1UEKRMQYXJhbC1zY2hpZmZs +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA1U8xR7fGiJZWTBEG/tLGSsC5Qi0YpF1qxbiPRm5epofG +p3UFoT0+C2gIoOwwB3OLs0fubNGACPGuyklrfgU9W6VHwwBm+bCTnw8GC0WRMQVo +ryOzpSFbRrQ4s0dCn6anED/PYBdKpI2EwlKbp/i+E5Nqgq8umqStNDJGPhwULWUC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUDrumRR1293fW19+KuoT0 +MnUs7Ywwgd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAqRHnRCYb +63XWJQ9STfWdeGqmZ1a+IWZiK5jEeQdwY0EsblbgIyDFbWaewnBVrGLym8RJlBM7 +n6rdPgEkyQxhup0eA74Ej9/OK3Ho9/7FTsJgYCwQAgY6bjWXclYHdyi3aIztoAOq +ZZhm9v4+lgj3vwg13hgF68SXfDeNen9y8do= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.key b/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.key new file mode 100644 index 0000000..c5b66b2 --- /dev/null +++ b/vpn/coloradio02/clients/aral-schifflange/2/aral-schifflange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANVPMUe3xoiWVkwR +Bv7SxkrAuUItGKRdasW4j0ZuXqaHxqd1BaE9PgtoCKDsMAdzi7NH7mzRgAjxrspJ +a34FPVulR8MAZvmwk58PBgtFkTEFaK8js6UhW0a0OLNHQp+mpxA/z2AXSqSNhMJS +m6f4vhOTaoKvLpqkrTQyRj4cFC1lAgMBAAECgYBykmu0ysgPWziU+NxaCNpLEoMv +QUuoFSkhdEU4nlWmeu0/ysIwXdWyiLmBvfr6NZzGug8dUdXEeBPbQV5EPQo78URb +chAW9zV0PZxfzVukYiy57Bu5UxrIH8qdRMBEgEv720guOA7skC3pSGQ87cvKL1Df +t/01jttoZ55gZfn8AQJBAPBM0u9j/BjtOH9gf49cg5tUtpypnTRmXYGwuoFZyTgb +8jwWvV09hHKckDVGeiH6EUYfEfAJUK8LXMZbQrhummUCQQDjPu4+yc56lCSxhIDx +bhEV6Y6IHjsahKwlzl6MonATAglQpHVB2Zoz5FaExBji9Nn0BimBjEVmLpWtgqZ5 +BJcBAkEA296fPnUwzKn5gOsNrGIM9Up80DmN4s0rD6hh7kr2B0XizcJMwAyyrJ++ +f1CeHYqO1adGJWiQj6mI2OHV2aUx1QJBALf/FFiyfgSyPqOdbeoN/LeJTGbaU3C9 +S8Wwus2UGLrLQ0+QWYDf+ANcNtF5Fc1uA6uZ8bF7KhX6UicTSkdieAECQEOU2e9x +vd23zg3FvnOemoFyh/8oWXk3jQHuvGs2e8T9ehD9UIWE6IuDuCm1POc8qfQKyW0/ +MoBy/GElNP2FBtQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/aral-schifflange/2/ca.crt b/vpn/coloradio02/clients/aral-schifflange/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/aral-schifflange/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/aral-schifflange/client2.conf b/vpn/coloradio02/clients/aral-schifflange/client2.conf new file mode 100644 index 0000000..7bb7aad --- /dev/null +++ b/vpn/coloradio02/clients/aral-schifflange/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/aral-schifflange.crt +key 2/aral-schifflange.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.crt b/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.crt new file mode 100644 index 0000000..9929397 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:47:17 2015 GMT + Not After : Oct 9 12:47:17 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp01/name=ban-coloradiotp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d0:6a:05:1e:04:e4:65:32:34:6b:c6:07:4a:df: + bb:6a:7d:c9:3b:f3:06:10:8c:44:9e:f7:10:59:02: + 2e:71:4e:28:48:f8:41:4a:e0:ed:f1:69:91:20:1e: + 3a:59:bc:c0:f4:46:99:b8:48:58:0a:5e:43:a0:0f: + 66:21:c4:9d:bb:2d:2b:f5:f5:3f:31:bd:a4:97:56: + fa:c7:52:56:28:a9:a2:3e:3c:38:24:c4:6f:04:e5: + 81:f9:84:28:6d:20:ae:bb:16:01:e6:b4:73:e8:b1: + b1:72:37:86:64:ec:db:72:0e:2d:3c:3c:b4:bd:c4: + c5:d8:0d:78:0b:b0:a7:50:e5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E8:39:32:15:C6:01:07:40:E0:11:E2:1D:CD:CE:5B:8E:61:5F:C9:B7 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 93:f9:31:e7:53:ac:f6:b2:a7:d2:5c:2e:37:bc:4e:bc:94:be: + 0f:5f:ba:d4:c7:e7:e1:a8:1a:1f:d3:72:44:f8:7f:79:96:3e: + 9a:9a:f4:95:0b:01:10:dc:6b:ad:2c:fd:c0:b4:a9:ca:dd:54: + a1:60:16:cf:93:4a:ad:dc:e3:61:e0:01:08:7b:59:a4:ca:65: + 02:df:01:a6:de:51:80:52:2d:5b:91:a0:7f:be:b5:ea:69:2b: + 25:e7:9c:50:61:50:6d:df:c3:cc:7d:b4:ce:5d:60:c4:6d:e7: + 2c:94:b9:f6:78:29:e0:c5:4f:21:82:b9:ac:f4:6e:1e:d7:5b: + c1:e3 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ3MTdaFw0yNTEwMDkxMjQ3MTdaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDExGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAxMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDQagUeBORlMjRrxgdK37tqfck78wYQjESe9xBZAi5x +TihI+EFK4O3xaZEgHjpZvMD0Rpm4SFgKXkOgD2YhxJ27LSv19T8xvaSXVvrHUlYo +qaI+PDgkxG8E5YH5hChtIK67FgHmtHPosbFyN4Zk7NtyDi08PLS9xMXYDXgLsKdQ +5QIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBToOTIVxgEHQOAR4h3N +zluOYV/JtzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCT+THn +U6z2sqfSXC43vE68lL4PX7rUx+fhqBof03JE+H95lj6amvSVCwEQ3GutLP3AtKnK +3VShYBbPk0qt3ONh4AEIe1mkymUC3wGm3lGAUi1bkaB/vrXqaSsl55xQYVBt38PM +fbTOXWDEbecslLn2eCngxU8hgrms9G4e11vB4w== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.key b/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.key new file mode 100644 index 0000000..cccaf36 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp01/2/ban-coloradiotp01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANBqBR4E5GUyNGvG +B0rfu2p9yTvzBhCMRJ73EFkCLnFOKEj4QUrg7fFpkSAeOlm8wPRGmbhIWApeQ6AP +ZiHEnbstK/X1PzG9pJdW+sdSViipoj48OCTEbwTlgfmEKG0grrsWAea0c+ixsXI3 +hmTs23IOLTw8tL3ExdgNeAuwp1DlAgMBAAECgYBQIdNh3WOrfQgmv/ch1LAMm9x5 +jlEwn53quPeyIWKV8gUPOVRxY9ZY0cwY20Z4JljSEysbbcVcBy5dJk6QgTZbhbo9 +jI6hvO3cWcZu4BSbs1EH1UTItXJiF3eSX/bKxQ8EKHnAHnTKXf1mfLcUbqyInuu5 +Aa3YqkAKYXRSFMs0KQJBAOmfu6VU7t3XrCm3EHSm4EnY/4hjBIXuNcTTnnEqkWGq +HELUPqZxVlXdZFf4duynlebCHRH/BKjBbVgRzcVBKe8CQQDkYCm+eCV05+jia+Dm +oV3Kji+fZ9RzoF6Ki/9wnC1ZXSiX6JX9LTaMmLKEfR05jbKgmRBcPTUI1DF5kqoB +c9ZrAkBqIjvwH0apF8rJ5LWgGRO52NA12K38XjylH3JSfQEw+kP+hEe1+7U6Kurk +ICd+2Z97BuKIA2/NbppLMUNnAnSXAkBJERtJ/Va+mJRCHRHPuEEx1VwXPDkU5XJa +EYCgntdDiDK8p4WVgym4wgIbsYvwJg3IpDA/0rVtJbbOlsYdwNoRAkEAqrTWInCe +qnt+b6Z/JCVYazSPId74FBXiwXkEmDlcm778fSQmb3PmmnGTUdwJAd+LKnwCBRsz +0NdlHVR/V3wBBQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp01/2/ca.crt b/vpn/coloradio02/clients/ban-coloradiotp01/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp01/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp01/client2.conf b/vpn/coloradio02/clients/ban-coloradiotp01/client2.conf new file mode 100644 index 0000000..1bac1a2 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp01/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/ban-coloradiotp01.crt +key 2/ban-coloradiotp01.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.crt b/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.crt new file mode 100644 index 0000000..c770fbe --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 5 06:41:01 2015 GMT + Not After : Oct 2 06:41:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:97:c7:87:ea:97:30:86:d3:12:ce:51:18:da:d0: + bd:55:18:e7:52:2d:e8:04:78:f6:9c:a8:fc:95:ab: + 88:98:b4:bd:b8:03:a5:5b:8b:70:86:11:e8:33:6f: + cb:23:f3:a3:b4:fe:cc:ec:3d:57:73:33:d1:26:94: + ef:de:a6:5b:2b:54:e2:3d:3b:c3:05:1a:97:da:22: + 2c:29:ca:ce:49:dc:43:eb:f5:d6:3f:f7:70:f6:3b: + 79:d4:ef:2a:8b:8c:aa:67:a8:2c:fa:81:e4:6c:34: + 1a:ca:26:94:4e:20:fc:45:da:c6:24:94:9a:bd:21: + de:b3:84:35:ce:ac:d4:89:0f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 13:2D:AB:DC:C9:A0:7F:CF:4F:88:65:76:F6:3B:CE:3D:85:8E:9E:83 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 57:1a:71:a5:b6:02:f8:2f:25:57:b3:c9:58:e7:a0:63:7f:e2: + aa:27:16:f4:1b:eb:02:a1:d5:b4:60:b3:cc:d7:6f:59:6b:ff: + 9e:8d:76:d3:ec:71:95:aa:98:6d:7e:7f:14:b2:19:c7:4a:05: + 3d:2f:88:02:e1:97:38:73:99:50:ff:a4:71:ed:46:a7:6f:a8: + 27:e3:13:4e:6c:35:7a:53:ef:95:53:f0:4a:f7:e4:11:17:10: + 4f:f5:ec:4e:31:97:0b:0e:12:93:f9:bd:54:c1:2b:9a:5e:cb: + fb:b3:39:7b:ad:a8:a0:e0:ca:a1:d7:12:b7:ac:66:2f:41:4b: + f8:38 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMDUwNjQxMDFaFw0yNTEwMDIwNjQxMDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDIxGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCXx4fqlzCG0xLOURja0L1VGOdSLegEePacqPyVq4iY +tL24A6Vbi3CGEegzb8sj86O0/szsPVdzM9EmlO/eplsrVOI9O8MFGpfaIiwpys5J +3EPr9dY/93D2O3nU7yqLjKpnqCz6geRsNBrKJpROIPxF2sYklJq9Id6zhDXOrNSJ +DwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQTLavcyaB/z0+IZXb2 +O849hY6egzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBXGnGl +tgL4LyVXs8lY56Bjf+KqJxb0G+sCodW0YLPM129Za/+ejXbT7HGVqphtfn8UshnH +SgU9L4gC4Zc4c5lQ/6Rx7Uanb6gn4xNObDV6U++VU/BK9+QRFxBP9exOMZcLDhKT ++b1UwSuaXsv7szl7raig4Mqh1xK3rGYvQUv4OA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.key b/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.key new file mode 100644 index 0000000..1d6e000 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp02/2/ban-coloradiotp02.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAJfHh+qXMIbTEs5R +GNrQvVUY51It6AR49pyo/JWriJi0vbgDpVuLcIYR6DNvyyPzo7T+zOw9V3Mz0SaU +796mWytU4j07wwUal9oiLCnKzkncQ+v11j/3cPY7edTvKouMqmeoLPqB5Gw0Gsom +lE4g/EXaxiSUmr0h3rOENc6s1IkPAgMBAAECgYASaDRnkuZjs314YAVvpBkSFO8Y +3FBjGnhuD2Byllb+jgzkIC0RqRuAZvOOKWSte4LDFJOtotLUOdiHoVBl5C7yJosP +FfHOj7ZM5FgogjqDMtu1obRW7+Lfxr5j3aXLuEvkuPLRLhRTdZ7Qr9WkP9jj1pq8 +EOAtmOi6beme8GJyoQJBAMkIMqvT5Iqu/R+i7V9nOV6FMxnG8fG1qocI2yk/huXy +NEqN3vVjvDCd0wBzXRTp84OCgQt4OGGzXWXSOTUg9ysCQQDBR8IfjyCDYndmm+PU +0rn/QwW64pPYUo/OyIBHN6Hk9eGG3UR9glAYi1Im06LseD4AN1AwvpcCtA3ielxT ++AOtAkBOnz0qBGnqbzuhxtetKzK9q7xrhWoUTSdPPoBwJl88yTf4PHoJYKM2JFNk +Zrnttv283ipX8QGj/EE31Dr5c1YXAkBC6rc4+fLFyjeQnPRaYMLor6myNHP/d0Y2 +z5AqGAbDIKX+bWkjExTsCoBc1PUZbd/5by0iUzoxQ2lzOe3xXHLZAkBMl7K2jRAh +jJujs46JglYc0CVHwVBWsmclm9MKpxWqSteWmdC8RFnMGuXIA40fL97F91T9GM9H +ZFgIMtqSd3y9 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp02/2/ca.crt b/vpn/coloradio02/clients/ban-coloradiotp02/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp02/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/ban-coloradiotp02/client2.conf b/vpn/coloradio02/clients/ban-coloradiotp02/client2.conf new file mode 100644 index 0000000..a1b2f0d --- /dev/null +++ b/vpn/coloradio02/clients/ban-coloradiotp02/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/ban-coloradiotp02.crt +key 2/ban-coloradiotp02.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.crt b/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.crt new file mode 100644 index 0000000..3376cc2 --- /dev/null +++ b/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:52:33 2016 GMT + Not After : Mar 27 07:52:33 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=bp-capellen/name=bp-capellen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:8b:28:f1:66:1c:65:dd:c8:de:bd:ef:a4:6c: + 12:7c:0b:a6:7d:6b:06:66:8e:b7:56:e7:e5:f3:ea: + 70:16:61:7b:b2:f4:2c:89:8f:5b:be:a5:ac:ab:91: + 4e:9b:d5:f8:ae:d1:92:8a:cb:0b:e5:e0:6e:76:ae: + 3d:9c:69:7b:4b:1e:05:2a:40:9b:0b:02:81:4d:78: + 01:ce:cc:f5:4d:a3:0a:51:68:6a:91:46:6c:5d:4d: + 15:a2:86:f4:2d:76:39:7d:59:4f:5b:4a:8b:cb:e4: + 84:ca:df:29:e5:21:63:85:eb:34:2c:8d:7d:f8:49: + bc:be:1a:42:c9:96:52:6d:2d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B7:AD:4C:4D:CC:11:99:97:B8:F9:21:C6:A3:EA:D7:5D:68:C7:3F:DD + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + bc:a7:77:5c:ff:b2:d0:39:c0:19:62:1a:61:c7:8e:40:1d:d1: + d5:6d:cf:79:3b:37:29:54:c3:4f:2e:09:c4:c4:48:da:f8:c8: + cd:6b:f1:01:41:0b:bf:ea:9e:a6:50:30:e9:3d:79:ba:1c:0b: + c2:cc:66:9a:1f:f0:32:a0:cd:8c:27:c6:ff:2f:04:fa:26:8d: + 3d:0b:6a:39:41:d0:94:41:68:c2:50:55:6c:37:31:65:4a:68: + a5:f9:49:1d:34:3e:00:82:5d:17:39:d1:3c:d8:f5:26:f0:ff: + 6c:df:0a:f1:8c:a1:49:d2:50:10:44:9f:b8:8d:51:93:45:3b: + 30:8c +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUyMzNaFw0yNjAzMjcwNzUyMzNaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYnAtY2FwZWxsZW4xFDASBgNVBCkTC2JwLWNhcGVsbGVuMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDDiyjxZhxl3cjeve+kbBJ8C6Z9awZmjrdW5+Xz6nAWYXuy9CyJj1u+payr +kU6b1fiu0ZKKywvl4G52rj2caXtLHgUqQJsLAoFNeAHOzPVNowpRaGqRRmxdTRWi +hvQtdjl9WU9bSovL5ITK3ynlIWOF6zQsjX34Sby+GkLJllJtLQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS3rUxNzBGZl7j5Icaj6tddaMc/3TCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQC8p3dc/7LQOcAZYhphx45A +HdHVbc95OzcpVMNPLgnExEja+MjNa/EBQQu/6p6mUDDpPXm6HAvCzGaaH/AyoM2M +J8b/LwT6Jo09C2o5QdCUQWjCUFVsNzFlSmil+UkdND4Agl0XOdE82PUm8P9s3wrx +jKFJ0lAQRJ+4jVGTRTswjA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.key b/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.key new file mode 100644 index 0000000..fb81ae7 --- /dev/null +++ b/vpn/coloradio02/clients/bp-capellen/2/bp-capellen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMOLKPFmHGXdyN69 +76RsEnwLpn1rBmaOt1bn5fPqcBZhe7L0LImPW76lrKuRTpvV+K7RkorLC+Xgbnau +PZxpe0seBSpAmwsCgU14Ac7M9U2jClFoapFGbF1NFaKG9C12OX1ZT1tKi8vkhMrf +KeUhY4XrNCyNffhJvL4aQsmWUm0tAgMBAAECgYAdx8rTgOagSPe3nJurod3q0Gdp +wGv4IJIhhS3LSRALCIurRG6oAJJLZbX3ZyjeqOa30SkNREEqoFSSdJTjhlkFYoKk +7pjuE3FhI2vbWcR+LNbAfAbeVPZX2R0DxW++dHNayw7E2DunSKKRkkgMiB93Euos +/zvqbj21FsEWKjLogQJBAOPuFTQfPWVdC6mDAN8GGMfbNsYq7u+9YTjDPCTgbi9R +nOsShfSUI1JgKDDc8E/WEXoYQ6+sC6p9QB8hj028Qc0CQQDboAj812c263Sy5b0W +fTMG0HpCB/eZbgwFbGkkQB9NA9prEYPgGUVNiVpN0d9y4hcy7hpvWmjpa60prYCu +lvjhAkBzxnZcwFWGTEnlM5bYshcaRT5AUISHoBFnLLw7Gwi83l6vhPwn7Ks4Z4Fi +uIcUdm7wLq0K6YAPfIl6hqhs2ugtAkBZz6fdPXjHzKF8RtZ8S9aCAt78AaYO6CGi +ViLo4A/svpajEhaLncnpWzHCgQCPSkWSXiwRPTeJvK6jTIBC5RoBAkEAo3v7rNPW +GZQMD2eJeCoXapICvm5tkhqNdXOzuaNrHstU08E6zs4S54Gw4co0HDkuUBTY5Qwn +v228fkSQcs1wQQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/bp-capellen/2/ca.crt b/vpn/coloradio02/clients/bp-capellen/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/bp-capellen/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/bp-capellen/client2.conf b/vpn/coloradio02/clients/bp-capellen/client2.conf new file mode 100644 index 0000000..ef52058 --- /dev/null +++ b/vpn/coloradio02/clients/bp-capellen/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/bp-capellen.crt +key 2/bp-capellen.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/coloradio-tp01/2/ca.crt b/vpn/coloradio02/clients/coloradio-tp01/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/coloradio-tp01/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.crt b/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.crt new file mode 100644 index 0000000..a5e117f --- /dev/null +++ b/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:44:47 2015 GMT + Not After : Oct 9 12:44:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=coloradio-tp01/name=coloradio-tp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9c:92:64:5c:71:63:0a:68:0a:42:f0:bd:f2:2b: + c7:f4:1b:ca:44:75:86:de:9f:c4:d5:b8:18:f4:7b: + e8:87:b8:3d:27:e3:7a:1a:99:a3:df:f1:47:21:2b: + a1:f8:51:d0:90:c0:1d:d4:80:52:20:ca:1f:14:20: + e4:5e:69:79:31:66:1e:7c:1e:6f:de:63:0a:57:ca: + 9a:9f:dc:30:1b:3d:76:c5:e3:12:cd:2b:81:e6:d7: + 35:2e:67:f8:09:09:3e:10:d3:6c:c8:90:ef:bc:bf: + 90:23:af:9e:f6:e7:2e:a7:05:78:7d:84:f2:f3:ff: + c7:c4:ab:cc:99:1e:ff:6b:b1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:A7:0B:A9:7F:35:9B:18:D7:B9:C0:60:D2:B9:CC:BE:DE:54:F0:53 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + d9:26:5e:8b:e9:6d:e8:39:b6:f9:f0:5d:64:39:86:44:8b:62: + 47:5f:6b:89:ed:8a:fb:dc:db:34:64:f9:a1:46:c7:4b:3f:f0: + 5a:88:bb:76:33:19:cb:0c:c8:d3:66:57:ed:f4:34:88:95:6c: + e3:0f:af:c2:fe:d8:ca:7f:3a:44:63:a2:8a:83:a3:e5:3e:a7: + f4:20:6a:fa:f7:76:95:ee:e9:6c:96:d6:10:87:97:af:99:b0: + 3c:bd:00:21:a0:46:5f:28:e5:2d:d1:45:b1:15:a6:a3:8c:c4: + 23:3e:52:de:63:99:d8:43:5b:72:71:45:11:32:3b:18:31:75: + b7:37 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ0NDdaFw0yNTEwMDkxMjQ0NDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOY29sb3JhZGlvLXRwMDExFzAVBgNVBCkTDmNvbG9yYWRpby10cDAx +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCckmRccWMKaApC8L3yK8f0G8pEdYben8TVuBj0e+iHuD0n43oa +maPf8UchK6H4UdCQwB3UgFIgyh8UIOReaXkxZh58Hm/eYwpXypqf3DAbPXbF4xLN +K4Hm1zUuZ/gJCT4Q02zIkO+8v5Ajr5725y6nBXh9hPLz/8fEq8yZHv9rsQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQipwupfzWbGNe5wGDSucy+3lTw +UzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDZJl6L6W3oObb5 +8F1kOYZEi2JHX2uJ7Yr73Ns0ZPmhRsdLP/BaiLt2MxnLDMjTZlft9DSIlWzjD6/C +/tjKfzpEY6KKg6PlPqf0IGr693aV7ulsltYQh5evmbA8vQAhoEZfKOUt0UWxFaaj +jMQjPlLeY5nYQ1tycUURMjsYMXW3Nw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.key b/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.key new file mode 100644 index 0000000..18cb582 --- /dev/null +++ b/vpn/coloradio02/clients/coloradio-tp01/2/coloradio-tp01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAJySZFxxYwpoCkLw +vfIrx/QbykR1ht6fxNW4GPR76Ie4PSfjehqZo9/xRyErofhR0JDAHdSAUiDKHxQg +5F5peTFmHnweb95jClfKmp/cMBs9dsXjEs0rgebXNS5n+AkJPhDTbMiQ77y/kCOv +nvbnLqcFeH2E8vP/x8SrzJke/2uxAgMBAAECgYBgUxPZZ4yV92Hwwuko1tSCEqLC +sUdTKRnQnh0ENELfVHKTWrhhKwqNmIO5HX3dJoBYvUjc1kEwmQi7umykxODgk9pY +0aoYHNSv0C70x5qrzNOEfzojs1BvQSryP855d5dPaUBnkLTmqywIoxTnusZJW8+Y +4vkRXHVVoNlzdZ6KnQJBAMzJq1APUYJDv+AFUH3AdtSVRtJXi09UTWm+XTzAokDY +aBIW3ZSSgqur2j4gUoW4/T13a8kCu9EmFJRUuXwTCI8CQQDDuftt6wzmljHJo0qk +MzZ3oN7XPYPSG2/AvblfetLa2yq3fso47YOG1G8JhTpEDJy1EhZltTtT/kEy6OJK +Pee/AkEApTTUNUQGV3ZcZlcjNi98Lcc3WR0yz46M3Q+rnAUzX+i1HFLB8se3DtMW +vyPILwSrl1it5X2FExcLZxZqhIO+VQJAWtWicVXHq/ACdTDaQDAgVA6NvNiop8bh +61JhiIVI/BcA0R3/ncHk65sFWSbCbrhntcUKLfOY8BcsjQL1mjz2owJAcvR2zq+F +nBX2851WrimXhAoOqy72yLHHjDP8PdtnpaoVWCU340Wdn5LFJHMrN0Xw6OcpKjCT +00HRKl3JPZ14ZQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/coloradio-tp01/client2.conf b/vpn/coloradio02/clients/coloradio-tp01/client2.conf new file mode 100644 index 0000000..7a5af71 --- /dev/null +++ b/vpn/coloradio02/clients/coloradio-tp01/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/coloradio-tp01.crt +key 2/coloradio-tp01.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-backup/2/ca.crt b/vpn/coloradio02/clients/dks-backup/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-backup/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-backup/2/dks-backup.crt b/vpn/coloradio02/clients/dks-backup/2/dks-backup.crt new file mode 100644 index 0000000..9e3b580 --- /dev/null +++ b/vpn/coloradio02/clients/dks-backup/2/dks-backup.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:46:49 2017 GMT + Not After : Nov 20 14:46:49 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup/name=dks-backup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cb:9c:82:7b:ad:96:c6:51:56:ee:a0:0f:56:82: + de:6a:93:d5:ab:9f:42:b8:a7:27:5b:de:1e:2b:10: + 34:49:7a:a9:b0:e4:64:24:98:a1:2d:58:33:fb:c6: + 8a:5d:2a:64:a3:4d:35:88:04:34:89:68:ea:8a:07: + ff:a6:1e:f6:56:3d:7e:67:b9:ae:e1:72:1e:71:28: + bd:61:ef:8d:d1:89:09:e3:06:c3:a4:bf:aa:36:6c: + ff:7b:f8:d6:16:23:22:d4:ce:15:98:73:36:98:9e: + da:97:07:1a:ab:5f:6c:17:6b:c9:ed:9e:18:4f:fc: + 0a:9c:8f:47:8c:8a:d9:21:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 04:7F:8A:31:2E:C2:3B:E9:DA:7F:EF:C5:85:3A:FB:7B:36:43:6D:0B + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c8:48:ee:77:fd:6b:5e:1b:83:28:79:8a:ce:52:8c:86:97:91: + da:15:64:32:87:b2:87:ab:72:19:9f:ef:49:eb:1d:4a:01:82: + e5:d7:32:bb:aa:c1:82:7d:09:a4:97:7c:16:42:ce:d4:02:2e: + 9c:4a:31:47:71:33:69:8c:69:af:7c:01:d7:09:fe:82:22:2a: + 71:4f:c6:6b:0d:cd:01:e6:1a:03:c8:db:a3:dd:76:67:e7:f4: + bd:92:f5:33:8e:4f:83:51:5b:a3:2c:06:b6:41:c3:ea:cd:0a: + 58:af:a6:3d:ba:90:68:f0:a5:cf:82:16:71:dd:cf:53:51:98: + ba:25 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ2NDlaFw0yNzExMjAxNDQ2NDlaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWJhY2t1cDETMBEGA1UEKRMKZGtzLWJhY2t1cDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAy5yCe62WxlFW7qAPVoLeapPVq59CuKcnW94eKxA0SXqpsORkJJihLVgz+8aK +XSpko001iAQ0iWjqigf/ph72Vj1+Z7mu4XIecSi9Ye+N0YkJ4wbDpL+qNmz/e/jW +FiMi1M4VmHM2mJ7alwcaq19sF2vJ7Z4YT/wKnI9HjIrZId8CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUBH+KMS7CO+naf+/FhTr7ezZDbQswgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAyEjud/1rXhuDKHmKzlKMhpeR +2hVkMoeyh6tyGZ/vSesdSgGC5dcyu6rBgn0JpJd8FkLO1AIunEoxR3EzaYxpr3wB +1wn+giIqcU/Gaw3NAeYaA8jbo912Z+f0vZL1M45Pg1FboywGtkHD6s0KWK+mPbqQ +aPClz4IWcd3PU1GYuiU= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-backup/2/dks-backup.key b/vpn/coloradio02/clients/dks-backup/2/dks-backup.key new file mode 100644 index 0000000..d633f1f --- /dev/null +++ b/vpn/coloradio02/clients/dks-backup/2/dks-backup.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAMucgnutlsZRVu6g +D1aC3mqT1aufQrinJ1veHisQNEl6qbDkZCSYoS1YM/vGil0qZKNNNYgENIlo6ooH +/6Ye9lY9fme5ruFyHnEovWHvjdGJCeMGw6S/qjZs/3v41hYjItTOFZhzNpie2pcH +GqtfbBdrye2eGE/8CpyPR4yK2SHfAgMBAAECgYBaEdcK3QRooEzDbJy8WVIIdXM8 +40vBoXfgxMY1qIpowtFUBgRix/3ssCr2wqIsindQYfQ/QhT3gCjYfKdTljjDrVXP +Pnjx+Ydc6dJxQKYKGn9UpwbXm63Wi968ggPb5o2N8AKZNe94S2QAWHrY0MNNjOaD +WsLFQ6QK1ZR0emeAgQJBAPCLG3TgUSvbeCGlW+RYguC4KkHwRPZ7ccWtGocEXEil +Ol5Hs5h9n9EdiOOjsQuSEMTUrScQhFQmoT6Vjt+Crh8CQQDYseC0PnLdg2dcawux +w2XyePQdRA+p6RqOvpfMJnZpopJOzzdwkTK0kce2YczUDJ75OITcvK8+ujyOl+NP +35RBAkEAs6YRAX8u4GRvGiHXuXjpdk/VL530w2l6lTotX70/9vl/2D4QwcjA/Xrj +a7ArYArc/0Qfddd+HSMktgsYw5Fj3QJBAIgxVA806LC8c+wsA0+YhaydxJ/YNRgP +P/fTZkiTK/08hkQuDKQdPgcrUKAaW8gynn/4u9iYZnRATOs6H04GMYECQQCrAqmF +mV1iAprilWJIOXT84FkftLD2ZjqG2gwQ0vG1LU28MfY0C7Rfit7fNaholu1nZvvw +06QJlcgd3Yu8TTC8 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-backup/client2.conf b/vpn/coloradio02/clients/dks-backup/client2.conf new file mode 100644 index 0000000..103d3e7 --- /dev/null +++ b/vpn/coloradio02/clients/dks-backup/client2.conf @@ -0,0 +1,16 @@ +client +dev tap +proto udp +remote posdab.dks.lu 1195 +remote 88.99.170.20 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-backup.crt +key 2/dks-backup.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-homebackup/2/ca.crt b/vpn/coloradio02/clients/dks-homebackup/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-homebackup/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.crt b/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.crt new file mode 100644 index 0000000..763160b --- /dev/null +++ b/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:16 2017 GMT + Not After : Nov 20 14:47:16 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup/name=dks-homebackup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:7f:f1:3f:78:d1:20:83:c6:65:6c:b0:7c:3d: + 51:b1:ff:3b:c1:e5:7b:3a:eb:94:da:38:26:d9:77: + f4:b2:fc:d9:08:a7:88:cd:ef:2d:21:2a:13:72:65: + 54:6a:6d:d9:ae:21:49:37:ab:4b:40:78:fe:95:42: + 30:7f:e9:7f:39:58:d3:78:c2:25:21:8e:0a:dd:18: + ea:e2:bc:21:e4:a1:ee:78:a8:cd:f2:bb:b6:4b:61: + 93:52:48:c3:18:60:88:4d:e5:35:c3:55:fe:48:ff: + 73:4d:29:03:0e:d5:f9:ae:17:35:ea:63:f0:58:f8: + 69:32:e8:d5:4a:20:7a:b4:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + D6:DF:0D:3E:14:BA:DD:69:04:67:76:69:CF:71:22:F1:1D:04:CA:07 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c2:39:26:33:7b:75:fb:fd:37:b5:4c:41:34:a1:8e:b1:fb:82: + bc:75:74:c8:38:62:40:a6:72:c2:38:73:16:90:e3:e3:b6:49: + 3f:f4:9d:9e:81:0b:bd:d0:1b:88:cb:81:45:42:c6:2d:58:d3: + 41:70:30:3d:38:b7:c6:88:d9:08:b4:2f:09:7e:11:5e:2d:11: + d8:47:be:41:41:33:f5:cf:c4:1d:48:ea:fb:a6:d2:e0:b1:e6: + 52:57:65:88:8c:aa:5b:19:11:a7:a5:12:1a:0d:12:a9:bd:db: + 9a:ac:ed:63:c7:8c:f8:5c:e0:b9:6d:9f:c5:40:0f:5e:71:6e: + e9:7a +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MTZaFw0yNzExMjAxNDQ3MTZaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOZGtzLWhvbWViYWNrdXAxFzAVBgNVBCkTDmRrcy1ob21lYmFja3Vw +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDaf/E/eNEgg8ZlbLB8PVGx/zvB5Xs665TaOCbZd/Sy/NkIp4jN +7y0hKhNyZVRqbdmuIUk3q0tAeP6VQjB/6X85WNN4wiUhjgrdGOrivCHkoe54qM3y +u7ZLYZNSSMMYYIhN5TXDVf5I/3NNKQMO1fmuFzXqY/BY+Gky6NVKIHq0gQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTW3w0+FLrdaQRndmnPcSLxHQTK +BzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDCOSYze3X7/Te1 +TEE0oY6x+4K8dXTIOGJApnLCOHMWkOPjtkk/9J2egQu90BuIy4FFQsYtWNNBcDA9 +OLfGiNkItC8JfhFeLRHYR75BQTP1z8QdSOr7ptLgseZSV2WIjKpbGRGnpRIaDRKp +vduarO1jx4z4XOC5bZ/FQA9ecW7peg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.key b/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.key new file mode 100644 index 0000000..8d49645 --- /dev/null +++ b/vpn/coloradio02/clients/dks-homebackup/2/dks-homebackup.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANp/8T940SCDxmVs +sHw9UbH/O8HlezrrlNo4Jtl39LL82QiniM3vLSEqE3JlVGpt2a4hSTerS0B4/pVC +MH/pfzlY03jCJSGOCt0Y6uK8IeSh7niozfK7tkthk1JIwxhgiE3lNcNV/kj/c00p +Aw7V+a4XNepj8Fj4aTLo1UogerSBAgMBAAECgYEArhkBpdxjbW/yFgCLgwLs5FIF +UFLEZMcvPM0/D0pIXJGhcQbkt4nawLEg+6aHo6HRr7BwAX5oIIAIAe/Saykmp5aB +HOBcZnIwzs1Pex9Gouo8CWokuBBaJq3nG5UgsBwztsK2uDo+7kYbWiNkrq/zJMkC +5q4f2p0EWy9rGN+17V0CQQD6Th0jaw8A798y7s3qTZofkIYrL2i4IFSLc5gYLLYw +9j5zuiyKXvBJyhpJlQy2d7uYFZO9Ftynenk8yGouLzDjAkEA33iUjfWMuMUnua9Y +q6P4xYuTbAETssruDk/NlSjSpyvM+93ALU639rGJW5gtuOGGvYusfkE7bF3eBlJ/ +Z2K2SwJBAN8HGSmE7CJ+mZdNd0btjIXRhesW3C0sCYkUH5JyzIgF8ZG2cpd8joiB +PzkPSPuQ5iNWHoTeyQ+lrj89qHasb9cCQBZVoNNHVVcqLTw7sCsHalekCYnj2aom +6f/4Ld3YhKU8lXIeyZQ9p9k6CTZkUT2HHMZY7VZ5Ao1kHEqZeC5HCV0CQQCT54DW +u46jtlozbWI6alo4EmYgIKCanRq1UoGwI3QzzV+pnlUE3YcH5S6E5D5tToM/avBM +GXVx5NCFJvuGMGwr +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-homebackup/client2.conf b/vpn/coloradio02/clients/dks-homebackup/client2.conf new file mode 100644 index 0000000..2c71a8c --- /dev/null +++ b/vpn/coloradio02/clients/dks-homebackup/client2.conf @@ -0,0 +1,16 @@ +client +dev tap +proto udp +remote posdab.dks.lu 1195 +remote 88.99.170.20 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-homebackup.crt +key 2/dks-homebackup.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-ksmac/2/ca.crt b/vpn/coloradio02/clients/dks-ksmac/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmac/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.crt b/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.crt new file mode 100644 index 0000000..59a39e8 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:30 2017 GMT + Not After : Nov 20 14:47:30 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac/name=dks-ksmac/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:f2:8c:4e:ad:af:34:75:42:0f:a7:81:58:f7:f7: + ea:e3:ba:db:0f:12:2d:c9:87:7d:86:4d:47:f2:f1: + 86:b1:a7:de:42:07:73:54:89:6d:03:37:62:28:d9: + c0:f5:5c:a8:77:7e:c9:55:81:51:52:94:63:16:c8: + 4a:8a:ed:83:86:5c:35:2d:70:6b:5c:15:76:2a:65: + 97:3a:a9:ce:ac:c0:c3:4b:a3:b1:69:8f:d4:14:b8: + 32:fb:25:8a:b6:4e:cd:03:6b:ef:14:1f:32:16:84: + 0b:bb:7a:1a:96:42:1c:77:51:fd:1e:9e:91:ae:44: + d9:53:02:1d:de:ac:91:13:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FD:1D:CA:F1:A2:E5:CB:E3:A6:61:AB:64:0F:7F:0F:9E:48:B1:A6:95 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:87:45:1d:f2:d5:1e:b4:05:52:32:16:1b:80:e8:b4:f3:91: + 76:50:66:9e:b5:bf:b2:88:f5:42:ac:fa:63:27:3a:6c:f0:9f: + 42:33:68:d7:69:bb:91:fa:e5:56:8a:61:f6:e3:91:fd:55:4a: + 4e:96:9d:c7:1c:95:44:71:a8:92:94:ac:24:36:05:c6:79:95: + 57:49:bd:f6:81:85:52:c7:27:9c:84:26:e5:ab:75:69:5b:af: + 57:38:49:b6:f7:a1:13:24:30:4f:a7:14:9a:33:46:8a:92:56: + 8b:b3:25:de:4c:34:85:44:70:ab:90:24:59:44:b0:bc:d7:b9: + 52:4c +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MzBaFw0yNzExMjAxNDQ3MzBaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJZGtzLWtzbWFjMRIwEAYDVQQpEwlka3Mta3NtYWMxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +APKMTq2vNHVCD6eBWPf36uO62w8SLcmHfYZNR/LxhrGn3kIHc1SJbQM3YijZwPVc +qHd+yVWBUVKUYxbISortg4ZcNS1wa1wVdipllzqpzqzAw0ujsWmP1BS4MvslirZO +zQNr7xQfMhaEC7t6GpZCHHdR/R6eka5E2VMCHd6skRMdAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFP0dyvGi5cvjpmGrZA9/D55IsaaVMIHdBgNVHSME +gdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADKHRR3y1R60BVIyFhuA6LTzkXZQ +Zp61v7KI9UKs+mMnOmzwn0IzaNdpu5H65VaKYfbjkf1VSk6WnccclURxqJKUrCQ2 +BcZ5lVdJvfaBhVLHJ5yEJuWrdWlbr1c4Sbb3oRMkME+nFJozRoqSVouzJd5MNIVE +cKuQJFlEsLzXuVJM +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.key b/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.key new file mode 100644 index 0000000..96d9ea7 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmac/2/dks-ksmac.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAPKMTq2vNHVCD6eB +WPf36uO62w8SLcmHfYZNR/LxhrGn3kIHc1SJbQM3YijZwPVcqHd+yVWBUVKUYxbI +Sortg4ZcNS1wa1wVdipllzqpzqzAw0ujsWmP1BS4MvslirZOzQNr7xQfMhaEC7t6 +GpZCHHdR/R6eka5E2VMCHd6skRMdAgMBAAECgYBZUnB7KAWylRR8xHbGQwe+vAaG +Q1SXXg1NE1LG1kmbTU3dlS7U2BNMVu4QSzjzYx8reoactZYESl8/eZ1yEkwXzHWj +1729YroTvLUTxflDBThNGeekqnj4uP2w15uMfq11xSpC9b0MNrXZPq5nAjdXIk4w +3OgjMubG6F2MjRJaoQJBAP4auTxsWG/+/i4DcC11FvLNpbtthPS//VdNP8GUxXwd +zf1CYoNnlhevjLiD5x47KH6/GfsZx3AP5WeGHQ+pPtkCQQD0W4OZtgwdzAuHUp3O ++mXjOSMUDbpC6ruIaimFElWml3G8swkS6w4XzOda16JUuL42iqQtbEvnqC1dyeLI +99PlAkEA+fiiFy3ihjKMLAnX1fAk5jCmBE7GB9vCxppIyQ+oguPzG1yt+uTxQ1XA +Elg4CYZa3Oz0CxAeIUCSBZhqiFiPaQJBAMmTgLFZkw81lsEQLyxiNZDHPp+5X1D6 +cK9s3ElxQYTG48WFb9PSYfLSTnwK7Fe1evxlTGBIOSml+56l/1ZH0t0CQQD15hQt +mox21nqGRShnIron6JXSw6npdKsYBjp2iHBU6DpH3ZtD2MRXI4taIAFA8031Vpgz +3jbJBuGwCelm478I +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-ksmac/client2.conf b/vpn/coloradio02/clients/dks-ksmac/client2.conf new file mode 100644 index 0000000..5b44014 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmac/client2.conf @@ -0,0 +1,16 @@ +client +dev tap +proto udp +remote posdab.dks.lu 1195 +remote 88.99.170.20 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-ksmac.crt +key 2/dks-ksmac.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-ksmachome/2/ca.crt b/vpn/coloradio02/clients/dks-ksmachome/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmachome/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.crt b/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.crt new file mode 100644 index 0000000..0de5244 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:46 2017 GMT + Not After : Nov 20 14:47:46 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmachome/name=dks-ksmachome/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a0:c4:8c:eb:a8:d0:25:f0:09:a7:26:74:0d:d2: + b4:a9:2d:c4:dc:2d:80:56:5a:e3:20:1c:cf:a4:8a: + 2e:e7:d1:2b:0b:85:c4:8e:d8:2a:0a:e6:95:51:42: + b7:29:74:2d:62:49:96:6f:cc:fd:47:da:92:e2:3d: + 75:f0:87:1f:b0:31:3a:56:79:89:e6:9e:db:18:eb: + 49:ae:ad:ce:c0:83:6e:8e:82:8d:6d:ff:1b:6a:03: + 91:69:c7:a5:7a:68:30:15:e9:56:72:da:59:9f:5d: + 9b:a9:79:69:aa:28:5a:b6:cb:e0:7c:90:2f:b1:0e: + 80:8e:8e:01:05:e6:89:49:15 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 4A:4D:42:15:D0:32:86:4B:74:7F:9F:A1:AD:8B:07:C1:C8:5F:C7:E2 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:17:ef:f8:82:05:ee:c2:b8:8a:85:15:a7:15:05:64:b4:4d: + 4a:22:af:c3:a5:0e:96:c7:6e:b9:c5:15:08:b1:ed:57:aa:d0: + 7f:f2:66:b5:ab:62:47:4e:95:6d:96:be:38:55:e6:ac:c3:29: + b8:cb:88:60:5f:3a:25:05:4c:ba:af:09:de:5a:f3:bd:20:de: + 16:62:8a:d9:65:0a:4c:ef:64:41:64:f6:0d:4b:4c:7e:3e:17: + 72:d9:15:c2:31:8b:14:ea:d0:41:41:2b:ca:04:6f:0a:66:d5: + 68:f4:3a:e0:6a:6c:28:7e:ca:8e:3e:1e:97:35:23:a0:d7:d7: + e5:46 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3NDZaFw0yNzExMjAxNDQ3NDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLWtzbWFjaG9tZTEWMBQGA1UEKRMNZGtzLWtzbWFjaG9tZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAoMSM66jQJfAJpyZ0DdK0qS3E3C2AVlrjIBzPpIou59ErC4XEjtgq +CuaVUUK3KXQtYkmWb8z9R9qS4j118IcfsDE6VnmJ5p7bGOtJrq3OwINujoKNbf8b +agORacelemgwFelWctpZn12bqXlpqihatsvgfJAvsQ6Ajo4BBeaJSRUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUSk1CFdAyhkt0f5+hrYsHwchfx+Iw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAaRfv+IIF7sK4ioUV +pxUFZLRNSiKvw6UOlsduucUVCLHtV6rQf/JmtatiR06VbZa+OFXmrMMpuMuIYF86 +JQVMuq8J3lrzvSDeFmKK2WUKTO9kQWT2DUtMfj4XctkVwjGLFOrQQUErygRvCmbV +aPQ64GpsKH7Kjj4elzUjoNfX5UY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.key b/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.key new file mode 100644 index 0000000..eb7c04b --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmachome/2/dks-ksmachome.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAKDEjOuo0CXwCacm +dA3StKktxNwtgFZa4yAcz6SKLufRKwuFxI7YKgrmlVFCtyl0LWJJlm/M/UfakuI9 +dfCHH7AxOlZ5ieae2xjrSa6tzsCDbo6CjW3/G2oDkWnHpXpoMBXpVnLaWZ9dm6l5 +aaooWrbL4HyQL7EOgI6OAQXmiUkVAgMBAAECgYA0K3QbaR2aoglP34+biLuthrey +R2W1ICtCGXdcSqcr/Nl+FLuTKxyBiw/7Xa34WsX7divGPfwXHBu8JPunwQGL9KaQ +I5FAz6Sg2es3TkdlOAyUWCR1VwjS/aw+gIA36Q1hBRomfloAN/noQZ3VK+9z9IlZ +MOOlTDAjnIhAzKoIwQJBANWNe5kltKOiroH5LWGGHr+RQjLMKdXeNS6oTTiCVwXz +MFed6dYztDsD1bqpqWOBm4PdGEGO47LDAMwkgzO/OBECQQDAuSK9CGGXMjLKuHUl +cUnQdUD81/Bf6T64cHI+n0yh/A/yfNiyrD/UrFw1B1n1AJc07iYnsGNuVUB4CZYz +NOTFAkBXOG0F1NedieE6Zpo5Xb0LQvnFo4tmtVYFU2oOrXV7kaLp9i4+dWmkPOG7 +VnY/lPz+c3vnssOfDHQz7KnFpdDxAkAd+Ky+WR9UNCpR/H27ZPLlyFZi+/IV+GAY +ruQVeRCh4GFahK/umXsTx/pPBOWohH7/bEniwju0XO25vUPukrtBAkAQQwWBLcu9 +TByRZYXoksZBoL750yt4bxiEe6hTsUbUddWhHEJ/zh6fdazyS3+GZjzRqAv77Nt5 +gSzKhfw73foq +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-ksmachome/client2.conf b/vpn/coloradio02/clients/dks-ksmachome/client2.conf new file mode 100644 index 0000000..dda6018 --- /dev/null +++ b/vpn/coloradio02/clients/dks-ksmachome/client2.conf @@ -0,0 +1,16 @@ +client +dev tap +proto udp +remote posdab.dks.lu 1195 +remote 88.99.170.20 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-ksmachome.crt +key 2/dks-ksmachome.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-laptop/1/ca.crt b/vpn/coloradio02/clients/dks-laptop/1/ca.crt new file mode 100644 index 0000000..72616fa --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/1/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJAMswD47MnbhSMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NDUxOFoXDTI1MDIwNTA4NDUx +OFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBALP1axnWsQK5JK54QoKpOkQpuVdv8U8206WTW8aEKhlGT1gSbo3X +Xz90pW4LhRS9uAqUbcmOSXl5rocudgKWNiTioX6UTYrOUNOQeD+ACIETNYnrZ94o +QIMgp0zcHtKQG3nO0tkPgbrmB1qlW0RVaZLw27pZYj9x3SYYqyUkSCBVAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU50zFsT6krCAi5fwvO2aeCemvE3owgd0GA1UdIwSB +1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQDLMA+OzJ24UjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBAF5NvJe0VDQ+/0X8bA8344WzovlnZimqcll3LtB7Ur/X3uTSHhWl0cps +CUwKLPNjKN8BXCbhfuExajM90d7KTQo+1DQ/UTNmqarC3ZVsWXN0p8afiG75PXbN +Qo4tFIVo8fTgJieXpbf9l2oV1Np16SWu7kHUVVvbtSz+R8XRFY95 +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.crt b/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.crt new file mode 100644 index 0000000..3d6bfd7 --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 28 (0x1c) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Aug 5 21:19:58 2015 GMT + Not After : Aug 2 21:19:58 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b8:bb:9d:f2:6b:f1:8f:37:84:b6:f5:34:55:5e: + 8b:8b:af:d7:3d:0a:7e:f9:99:bb:6f:30:0b:39:f4: + 66:b3:39:94:ff:98:e6:66:e1:63:df:40:50:1a:d4: + 6c:54:98:c5:26:66:36:c1:a3:de:ad:d5:43:21:b1: + 3e:c3:f7:72:ca:6c:1c:50:7e:2c:aa:19:a6:24:f7: + 4c:fc:ac:03:b6:32:a3:b8:10:e9:ce:83:ea:f5:fc: + 96:04:bc:cf:87:44:44:2a:87:06:2a:8e:af:62:41: + 2c:17:b7:34:b0:15:6f:9e:4b:f4:69:95:a1:1e:f4: + 90:62:f4:2a:3f:2b:f7:75:6b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FF:A1:4D:6F:A0:EF:B4:61:F9:15:DF:4E:D1:A1:BD:6A:74:B4:9D:0F + X509v3 Authority Key Identifier: + keyid:E7:4C:C5:B1:3E:A4:AC:20:22:E5:FC:2F:3B:66:9E:09:E9:AF:13:7A + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:CB:30:0F:8E:CC:9D:B8:52 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:8a:29:5a:82:b5:50:86:44:b0:da:61:3f:83:23:c4:65:ac: + ff:11:fb:18:9b:a3:87:ac:b7:a1:97:ba:dd:f4:67:b3:8f:26: + f9:f3:b7:87:3c:38:b9:15:a4:ae:db:e5:13:86:6a:d5:1b:35: + a9:23:6b:39:c2:45:5d:83:2d:e5:90:84:f2:9c:8a:87:f5:42: + 26:dc:d4:8e:02:ff:97:05:16:37:7a:05:d7:11:50:e7:83:75: + 7f:95:e3:62:79:21:8c:6d:e2:bc:bd:5a:1b:29:5b:3c:f9:9e: + f3:c9:e9:30:2c:8a:16:26:bc:13:43:8d:3e:e3:aa:f2:51:1c: + c8:26 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBHDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTA4MDUyMTE5NThaFw0yNTA4MDIyMTE5NThaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAuLud8mvxjzeEtvU0VV6Li6/XPQp++Zm7bzALOfRmszmU/5jmZuFj30BQGtRs +VJjFJmY2waPerdVDIbE+w/dyymwcUH4sqhmmJPdM/KwDtjKjuBDpzoPq9fyWBLzP +h0REKocGKo6vYkEsF7c0sBVvnkv0aZWhHvSQYvQqPyv3dWsCAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQU/6FNb6DvtGH5Fd9O0aG9anS0nQ8wgd0GA1Ud +IwSB1TCB0oAU50zFsT6krCAi5fwvO2aeCemvE3qhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQDLMA+OzJ24UjATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAf4opWoK1UIZEsNphP4MjxGWs +/xH7GJujh6y3oZe63fRns48m+fO3hzw4uRWkrtvlE4Zq1Rs1qSNrOcJFXYMt5ZCE +8pyKh/VCJtzUjgL/lwUWN3oF1xFQ54N1f5XjYnkhjG3ivL1aGylbPPme88npMCyK +Fia8E0ONPuOq8lEcyCY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.key b/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.key new file mode 100644 index 0000000..4fe9ce0 --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/1/dks-laptop.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALi7nfJr8Y83hLb1 +NFVei4uv1z0KfvmZu28wCzn0ZrM5lP+Y5mbhY99AUBrUbFSYxSZmNsGj3q3VQyGx +PsP3cspsHFB+LKoZpiT3TPysA7Yyo7gQ6c6D6vX8lgS8z4dERCqHBiqOr2JBLBe3 +NLAVb55L9GmVoR70kGL0Kj8r93VrAgMBAAECgYBJa4/f7JTqJdeiW5w8HcJ6dx2l +jglfLIF5NHARzZgPvWABogRYeVYXQdlUgH65tKoOk+tJVNbI4gy3VFmsyykcq6pu +6KK+cYLdSxo6hPozDMWgzLJYZ24UHyTUM5GvS++z/HMyydPq51rksBF2XL9v85Go +mJ/RGTaCNqhnMITLwQJBAN4k7+oV78E5aOnX9W2js/beNmw9JgTo7bdtDVXrUZe+ +OFsWvn6eZdpnUtaPO4uYK9h/I7JIe+DGnT9OfKs4JYsCQQDU4w5sHD2o9J0sDr98 +DQmGw+iaLSJFpQzjJt6cXmrKTaFNWZYFF0dcIGEIBHE+bisYy4j+Vzv6K1+yLdaQ +PKuhAkEAnU7Y2hJospL9+UJl2Rso0LOxJFr09lsgI1lFLUezgtpAPDjR8wYmKFAs +uCW7y/GZcvkthQ2RM65SIkdpPzJGWwJAJ9CjZOLPQWcmchP8ChZiHrtLKHKig0YA +KAegALzD2jw0m8PSg/c7mGZR3279QwDVvJhsca0dAYfVKPzbsTQ3oQJAVVXN7nBK +gDuE/gSESl1Rul3Wngxpj+8qHbOqNOzJcsPLHw2qVMrxOMYBun8nd83TmdgrxD+W +UZIbE0F51svF3w== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-laptop/2/ca.crt b/vpn/coloradio02/clients/dks-laptop/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.crt b/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.crt new file mode 100644 index 0000000..80d8ad9 --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 13 07:14:55 2015 GMT + Not After : Oct 10 07:14:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:a6:e8:74:63:47:c5:71:ca:00:20:7a:9b:d9: + 70:a1:df:90:ce:77:d0:be:6b:34:ee:24:c3:89:be: + 86:86:93:3a:f8:c1:5f:a8:96:c9:51:12:ec:af:05: + 70:ed:61:2d:bf:37:8e:a5:38:f0:1b:c5:ea:98:9a: + b7:f0:46:b0:b6:b7:95:aa:fb:e5:76:5e:9a:d7:eb: + 48:e2:c0:18:3f:a4:67:50:60:9a:d3:07:a8:89:da: + 75:f7:fb:19:31:37:62:1b:4a:1c:99:5e:ae:87:46: + 0f:9b:64:46:88:89:f9:64:07:db:4c:3c:25:44:b6: + c2:ff:10:d8:11:cb:8d:1e:f1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0A:16:B0:54:73:46:D6:27:12:C8:A1:2E:87:61:6A:E4:5B:08:5E:B4 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a0:cb:10:73:c3:36:b6:0f:d5:a0:8e:56:1e:21:7d:18:3b:de: + b0:57:71:1d:9a:c4:da:5b:fe:07:b7:d4:6d:e0:52:bc:77:5a: + 32:be:09:a9:cc:a3:4f:9a:fe:22:66:1f:f2:5a:88:ad:fe:b1: + 48:63:95:d0:11:f0:1b:0e:8c:cc:59:8f:81:b2:eb:69:d3:35: + 5a:56:6a:72:ac:da:92:4a:26:b6:79:b0:78:17:8d:cf:3e:db: + ec:ae:42:20:c3:98:e9:86:ca:28:01:f1:46:ff:b3:83:00:86: + 97:e7:8a:22:82:ff:73:c2:0c:a3:a6:20:0f:5c:d3:0c:98:2b: + b3:11 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTMwNzE0NTVaFw0yNTEwMTAwNzE0NTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAw6bodGNHxXHKACB6m9lwod+QznfQvms07iTDib6GhpM6+MFfqJbJURLsrwVw +7WEtvzeOpTjwG8XqmJq38EawtreVqvvldl6a1+tI4sAYP6RnUGCa0weoidp19/sZ +MTdiG0ocmV6uh0YPm2RGiIn5ZAfbTDwlRLbC/xDYEcuNHvECAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUChawVHNG1icSyKEuh2Fq5FsIXrQwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAoMsQc8M2tg/VoI5WHiF9GDve +sFdxHZrE2lv+B7fUbeBSvHdaMr4JqcyjT5r+ImYf8lqIrf6xSGOV0BHwGw6MzFmP +gbLradM1WlZqcqzakkomtnmweBeNzz7b7K5CIMOY6YbKKAHxRv+zgwCGl+eKIoL/ +c8IMo6YgD1zTDJgrsxE= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.key b/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.key new file mode 100644 index 0000000..2384fae --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/2/dks-laptop.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMOm6HRjR8VxygAg +epvZcKHfkM530L5rNO4kw4m+hoaTOvjBX6iWyVES7K8FcO1hLb83jqU48BvF6pia +t/BGsLa3lar75XZemtfrSOLAGD+kZ1BgmtMHqInadff7GTE3YhtKHJlerodGD5tk +RoiJ+WQH20w8JUS2wv8Q2BHLjR7xAgMBAAECgYEAwdxbDh/lWJ10IwYLlusv8CTe +jcYontUJQEJLQev3zdaKozqv9xNZbKzMumswxvT4aDS7cbjmKQ7Fceo0Aa95ngSi +hOniZARUChA2WkI2hOV6kFJfajLcpzUcUrVoNxXvlc0P2DeRD7yqXR+OceLmM/5L +hnwSwB18Hty57Hf95vECQQD3vV4HvYwBw+sI1w4mz3Elw7/vwQWR4qGYc5jWrZww +ujYJD63Xf9Benxenm9IMc81eyuoVs8LnrIki3OtPSyj1AkEAyizvb/A+MkdIZE5E +64h6XctAgN+OWdSsvfzumFjo158sGy+tk9D/USXBBSO4LyQZqRXqUHKOEowRxMXx +zA9QjQJAdCn9T0/XuHQvXyPH5PbcLUMOWtN9UxybfSqm/fLGDCskbzdE4olyIQwk +QVlVMrWSFOK8xJRXzd4fJ5PDWpj5iQJAT70ZUpT2cu4aZzVXiW3ylTus3SdPBa8T +0nsHv56RdzmYM8DCPSKZEHBLiLNl2XHrjPzPxZro3ffQqkNH8qu3oQJBAKG16qhj +KTf++DXaVre0yh6rvaBuXdItLm8GHZhyVJlKsDSAgUDqzyXMYQKDbGZY3B6m5g+/ +hTFLdMRnUB3RJdM= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-laptop/client.conf b/vpn/coloradio02/clients/dks-laptop/client.conf new file mode 100644 index 0000000..ca1d5cf --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/client.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1194 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 1/ca.crt +cert 1/dks-laptop.crt +key 1/dks-laptop.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-laptop/client2.conf b/vpn/coloradio02/clients/dks-laptop/client2.conf new file mode 100644 index 0000000..2f6db9a --- /dev/null +++ b/vpn/coloradio02/clients/dks-laptop/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-laptop.crt +key 2/dks-laptop.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-station01/2/ca.crt b/vpn/coloradio02/clients/dks-station01/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station01/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station01/2/dks-station01.crt b/vpn/coloradio02/clients/dks-station01/2/dks-station01.crt new file mode 100644 index 0000000..9ce664c --- /dev/null +++ b/vpn/coloradio02/clients/dks-station01/2/dks-station01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 13 07:26:40 2016 GMT + Not After : Apr 11 07:26:40 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station01/name=dks-station01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c8:e3:88:d0:e4:54:91:f1:bf:a3:f5:ed:44:cf: + c9:9b:e8:9c:0f:f9:f5:74:10:fc:66:3e:6e:2c:20: + 5d:5b:8a:79:03:55:65:50:f4:56:b9:ca:09:38:8c: + c4:7d:45:75:b4:d6:e2:1d:49:73:a8:93:e5:a7:e1: + fc:4b:3c:63:1f:7c:26:1c:ec:0d:3f:f2:38:fc:68: + 0d:d4:02:2f:53:3c:15:c0:d0:29:10:7b:fe:0b:05: + 4b:42:3f:ed:d8:90:e6:11:fc:f0:3e:79:00:5e:57: + e6:bc:4b:3c:9d:81:86:d0:8b:ba:62:33:b6:90:12: + 6d:fa:46:fb:59:cc:09:8f:d3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 1B:A4:F7:11:00:41:ED:E5:FF:00:B9:8E:96:DD:D5:9B:DA:F8:43:88 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 00:41:c2:f9:8a:f7:a6:a5:7f:c7:5e:e3:35:2d:b8:a4:8b:91: + 8f:8f:ac:69:bf:06:b9:1e:cc:58:06:52:56:b6:a5:8c:ad:5c: + 43:8a:08:27:ed:99:7f:0e:0e:77:1c:de:97:56:8b:87:af:6a: + d0:b4:20:93:96:18:af:ce:66:04:e5:63:87:bf:7d:d8:38:37: + e8:91:4a:f6:dc:bb:f1:5e:8e:f5:07:5b:71:c4:84:2f:a5:23: + 5f:cf:db:b6:a9:c7:e0:73:e3:3c:17:44:d0:cc:33:4d:d0:28: + 6a:0a:fa:e7:20:c1:46:90:cc:bf:99:8e:b9:46:80:34:d3:f9: + 71:7f +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA0MTMwNzI2NDBaFw0yNjA0MTEwNzI2NDBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMTEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAyOOI0ORUkfG/o/XtRM/Jm+icD/n1dBD8Zj5uLCBdW4p5A1VlUPRW +ucoJOIzEfUV1tNbiHUlzqJPlp+H8SzxjH3wmHOwNP/I4/GgN1AIvUzwVwNApEHv+ +CwVLQj/t2JDmEfzwPnkAXlfmvEs8nYGG0Iu6YjO2kBJt+kb7WcwJj9MCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUG6T3EQBB7eX/ALmOlt3Vm9r4Q4gw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAAEHC+Yr3pqV/x17j +NS24pIuRj4+sab8GuR7MWAZSVraljK1cQ4oIJ+2Zfw4Odxzel1aLh69q0LQgk5YY +r85mBOVjh7992Dg36JFK9ty78V6O9QdbccSEL6UjX8/btqnH4HPjPBdE0MwzTdAo +agr65yDBRpDMv5mOuUaANNP5cX8= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station01/2/dks-station01.key b/vpn/coloradio02/clients/dks-station01/2/dks-station01.key new file mode 100644 index 0000000..f29a059 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station01/2/dks-station01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMjjiNDkVJHxv6P1 +7UTPyZvonA/59XQQ/GY+biwgXVuKeQNVZVD0VrnKCTiMxH1FdbTW4h1Jc6iT5afh +/Es8Yx98JhzsDT/yOPxoDdQCL1M8FcDQKRB7/gsFS0I/7diQ5hH88D55AF5X5rxL +PJ2BhtCLumIztpASbfpG+1nMCY/TAgMBAAECgYEAk2ZYoiWXZArE+fJd6SqpnIs9 +z38xubso54CRaDFLLvrYtjh3gcH2zJXQ1Dx9hAluR4WQHbsicSQr01Y+v5mMhGW3 +E49sSitzHzFwK83rbSpFZdcHE2CCokEfGZ7v82zzOCfnFAQxmIq6qeufAcb78pXY +3KV9FdAXdaCqDJPVVXECQQDofJxho4jKYLOKNdxqrmI+Ilpg4TP8+WPearV9Tsci +PpGDqDQzeYa8Zi3mL4MLgSEsYjZ2vLmYMWITvTzf7VwpAkEA3TTPkW+JUfLFmPa/ +VgFSUjoejq+BhvoeXc4Ws7eijRNiwEAMuW+ghYOmsiIZDOAmaT58nR13tas6PecB +bRULmwJBAJVQavN+n30zDDyJCS5vH2O+loNAQC6KUazopfV74gNJYhXHsvcYZwOb +MIF1JFoALjkePtKVtTFdDhuVX4KGJLkCQHpidJDPd9caDU8C/Xs1AfmyZCOnYG9w +RIq7sf2+lLWeyxz4ktGpu9MCsqCNkvR3s2i5BLLckdW2JWQIQda7NQ8CQGgrJGPo +utAsofQCEAiewDuR5EtKuWSn2dqz91aiK3eE09uI4vw5ViH499lQCg6X5bFVIpxT +rnOEvN5m7GH31VA= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-station01/client2.conf b/vpn/coloradio02/clients/dks-station01/client2.conf new file mode 100644 index 0000000..ec6778b --- /dev/null +++ b/vpn/coloradio02/clients/dks-station01/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-station01.crt +key 2/dks-station01.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-station02/2/ca.crt b/vpn/coloradio02/clients/dks-station02/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station02/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station02/2/dks-station02.crt b/vpn/coloradio02/clients/dks-station02/2/dks-station02.crt new file mode 100644 index 0000000..3301582 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station02/2/dks-station02.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:32 2016 GMT + Not After : Apr 29 10:01:32 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station02/name=dks-station02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:44:12:af:2f:69:33:22:36:8f:3a:bc:9d:21: + bf:85:92:3d:8f:5f:3e:5d:0a:cf:83:fd:7c:a1:4a: + d6:5c:60:00:e5:c9:2a:bd:10:d8:00:4c:68:20:b9: + dd:80:0f:37:e7:1d:fa:84:57:05:a4:cc:0a:36:44: + 43:62:48:be:a5:1e:b0:c9:37:9f:09:8a:8e:f6:d8: + 59:ff:2d:4e:52:40:e1:e4:5c:16:d5:77:a8:9e:c7: + 7d:64:44:80:83:ec:b2:82:5c:5f:67:0b:21:6c:b7: + a4:63:2d:cb:75:50:ec:49:36:0f:f7:6c:10:83:07: + 50:a8:fc:e1:61:cd:be:51:e1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 01:F7:3F:18:AE:3A:49:A9:45:80:EF:7A:C9:9B:92:13:F9:1C:CF:15 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 24:26:bc:f9:d7:91:2d:1a:6d:9e:cd:75:fa:da:e3:cf:07:6d: + c2:9c:58:f6:9a:7f:70:f6:c6:2a:88:02:0a:51:75:f4:bd:0b: + 4b:fb:5b:33:ca:a5:0a:30:52:58:8c:f9:d5:ba:f0:d0:76:7a: + 3e:cd:63:ee:dd:da:f3:ea:f1:b5:90:1a:6a:54:ed:cb:c1:52: + ff:32:a4:ff:5d:24:c5:07:1b:10:07:1b:64:5a:f0:ba:76:51: + a7:28:73:53:df:f6:98:a7:84:23:81:d9:23:d4:e3:8e:ee:11: + 60:75:a4:e1:25:4c:b0:92:ed:ff:1f:ef:08:01:d9:54:24:bd: + a9:04 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxMzJaFw0yNjA0MjkxMDAxMzJaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMjEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA70QSry9pMyI2jzq8nSG/hZI9j18+XQrPg/18oUrWXGAA5ckqvRDY +AExoILndgA835x36hFcFpMwKNkRDYki+pR6wyTefCYqO9thZ/y1OUkDh5FwW1Xeo +nsd9ZESAg+yyglxfZwshbLekYy3LdVDsSTYP92wQgwdQqPzhYc2+UeECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAfc/GK46SalFgO96yZuSE/kczxUw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAJCa8+deRLRptns11 ++trjzwdtwpxY9pp/cPbGKogCClF19L0LS/tbM8qlCjBSWIz51brw0HZ6Ps1j7t3a +8+rxtZAaalTty8FS/zKk/10kxQcbEAcbZFrwunZRpyhzU9/2mKeEI4HZI9Tjju4R +YHWk4SVMsJLt/x/vCAHZVCS9qQQ= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station02/2/dks-station02.key b/vpn/coloradio02/clients/dks-station02/2/dks-station02.key new file mode 100644 index 0000000..35192e6 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station02/2/dks-station02.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAO9EEq8vaTMiNo86 +vJ0hv4WSPY9fPl0Kz4P9fKFK1lxgAOXJKr0Q2ABMaCC53YAPN+cd+oRXBaTMCjZE +Q2JIvqUesMk3nwmKjvbYWf8tTlJA4eRcFtV3qJ7HfWREgIPssoJcX2cLIWy3pGMt +y3VQ7Ek2D/dsEIMHUKj84WHNvlHhAgMBAAECgYBtCU6iey6r2MmYWCIgUYLgMhbP +wY3ABO8wrVIghuRNUIrYLObHJmfpKujBETK56zWEo4rIyIeP5FQ7CrzSi2glIdZG +jxR3ljV7wa+w92HSomgesLeq8qKI4ket8NyWkTu2PZlUUcDN8bpl5ylwGNR/zUDm +VH+CZd7GqA7SUhtd4QJBAPhWnFls0f4ffc/b7lTq6C7Atk4OZqHSevAQvr6xX9Q+ +8xIVRKcKkdy2kLgwvF0S1YVLrIVOKY+q/QYApbjGpD0CQQD2pc7O+zc79LXY7LhG +Kri0c9XPttWA6c6zgSXi+mX2HHE6E2WMhUKM0ksQ2/V3Q67jYn50zzdkVXQ5e9xS +BGp1AkAK/DHQVtr3Jcd38V+ajAWXQ9kMnOB3WgssIWF+p/P4PIyeCSjPRs1q+Pxv +2WALsfCWA+Hux6VZAJROtqqeANN1AkAsCGXnZcnyljlwxLIRNMdMz/E35/gtz4/r +U/8jinhxe5prN9NFRvUeltx34gzsgdTTG15gFC5bZzYcnRQ0QD2RAkBP10pVE4OI +gXLFMKx24T5j+1BbfR9kukcIjPC3a3GhplxWxMnAjwLKq995CO13cDQTMG5kKlFX +hdLBXTAg4dQt +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-station02/client2.conf b/vpn/coloradio02/clients/dks-station02/client2.conf new file mode 100644 index 0000000..2103c7f --- /dev/null +++ b/vpn/coloradio02/clients/dks-station02/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-station02.crt +key 2/dks-station02.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/dks-station03/2/ca.crt b/vpn/coloradio02/clients/dks-station03/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station03/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station03/2/dks-station03.crt b/vpn/coloradio02/clients/dks-station03/2/dks-station03.crt new file mode 100644 index 0000000..04dac5e --- /dev/null +++ b/vpn/coloradio02/clients/dks-station03/2/dks-station03.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:46 2016 GMT + Not After : Apr 29 10:01:46 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station03/name=dks-station03/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ba:bb:18:67:40:ab:b0:57:c2:03:bf:21:74:9f: + f4:a8:5c:3c:90:78:45:27:90:e7:29:88:19:0b:3b: + 71:e9:4e:83:39:38:64:45:29:80:83:4b:32:98:73: + 87:00:f3:33:c9:45:d7:70:c5:c8:3f:22:42:1a:f8: + 63:02:2c:8e:60:fc:be:7b:bd:8b:20:ef:7b:15:0d: + dc:f7:9c:e0:1b:24:80:26:71:3b:6c:78:90:f3:f8: + f3:02:ae:08:4e:0e:e1:43:90:dd:68:7f:83:e2:d3: + 75:e3:2f:ae:dc:17:94:ca:16:b4:0b:6a:16:01:82: + 62:4c:fc:86:94:4b:5c:c1:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 21:93:A7:4C:1E:CF:5B:84:4B:57:F0:5B:F6:77:A1:67:2A:38:ED:FE + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 84:53:36:bf:26:60:e1:d9:e9:07:cb:84:49:a6:92:23:62:ae: + 4a:e0:8d:6a:76:ae:ee:c2:5a:b5:ec:aa:8f:4a:f0:dd:4a:30: + 4a:73:f0:bb:b2:ee:1d:57:e2:c2:22:7a:71:b7:52:10:cc:32: + 46:f7:e8:71:63:d6:68:de:75:ad:b1:08:05:3f:31:c3:c7:64: + 80:69:b8:3e:c2:3b:3f:7a:07:a1:b1:9d:eb:3d:18:6c:43:df: + ac:48:ab:41:41:f9:e8:2b:5b:4c:b7:64:73:17:01:4a:45:41: + 20:17:8c:63:4a:fb:85:5a:4f:f9:24:0d:10:ff:4d:e8:bc:cd: + 52:c9 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxNDZaFw0yNjA0MjkxMDAxNDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMzEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMzEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAursYZ0CrsFfCA78hdJ/0qFw8kHhFJ5DnKYgZCztx6U6DOThkRSmA +g0symHOHAPMzyUXXcMXIPyJCGvhjAiyOYPy+e72LIO97FQ3c95zgGySAJnE7bHiQ +8/jzAq4ITg7hQ5DdaH+D4tN14y+u3BeUyha0C2oWAYJiTPyGlEtcwXsCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIZOnTB7PW4RLV/Bb9nehZyo47f4w +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAhFM2vyZg4dnpB8uE +SaaSI2KuSuCNanau7sJateyqj0rw3UowSnPwu7LuHVfiwiJ6cbdSEMwyRvfocWPW +aN51rbEIBT8xw8dkgGm4PsI7P3oHobGd6z0YbEPfrEirQUH56CtbTLdkcxcBSkVB +IBeMY0r7hVpP+SQNEP9N6LzNUsk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/dks-station03/2/dks-station03.key b/vpn/coloradio02/clients/dks-station03/2/dks-station03.key new file mode 100644 index 0000000..33bddd3 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station03/2/dks-station03.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALq7GGdAq7BXwgO/ +IXSf9KhcPJB4RSeQ5ymIGQs7celOgzk4ZEUpgINLMphzhwDzM8lF13DFyD8iQhr4 +YwIsjmD8vnu9iyDvexUN3Pec4BskgCZxO2x4kPP48wKuCE4O4UOQ3Wh/g+LTdeMv +rtwXlMoWtAtqFgGCYkz8hpRLXMF7AgMBAAECgYBjvlLPvJS5MndZRvwY7uRiFjrn +tMbD1rwTzDYMcOltBVpE82FkLEIQX9eb5YIEuOQ9rAfjnlJTnvoOrAU/AQvfydZx +ldGN1Drn4DwcKfs1aJzcvrKLSJFND0F1BKTJ0gWZJDisxx57BqYAiQOjcF2meU2Y +SQBhKNV2ssJUlbT1WQJBAPNcczoOWf+xWndYmqN8wKr3lEpJRhZAmgCdPhiT9Q4d +IZjpMMF7T2L349aBfdMuBu09zACuVJm67jsxs83gitcCQQDEbbsN5W0Zp+YigatN +GGMGVST/MPecQ4NKbqxii0UdDm/lNIqVX0/w7VV2yvpq+dTq90zTj3S8yXOJX6Vs +mm39AkEA2A2gws8Q+Z8zyLbh+vj7eA17GoR487KAxsDS6zEYI2KbfEyym2NlNGEN +ZlfqJD09qwvs/EHJG/5IGEdk8QdDWwJAKbWTLpQ04mnAeDtIgIpZHJMf1AA107yS +OE/f0tz3w/+4ytapRqaCdwouR5c6LVT3XR099v5TL3MnUVg57CGukQJAOJtn/hai +W5/u7R3k7MArL5l/qjWsGMRhtilrA11HR3QM6VnFcvxDWMdnaCfQFdk8SXZdxk8k +/OfuratrN4tEDA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/dks-station03/client2.conf b/vpn/coloradio02/clients/dks-station03/client2.conf new file mode 100644 index 0000000..4410b55 --- /dev/null +++ b/vpn/coloradio02/clients/dks-station03/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/dks-station03.crt +key 2/dks-station03.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/clients/maroq-belleetoile/2/ca.crt b/vpn/coloradio02/clients/maroq-belleetoile/2/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/clients/maroq-belleetoile/2/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.crt b/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.crt new file mode 100644 index 0000000..03b42fb --- /dev/null +++ b/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:50:41 2016 GMT + Not After : Mar 27 07:50:41 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile/name=maroq-belleetoile/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cf:22:e2:62:66:d8:9b:e9:fe:cf:c1:c8:35:89: + 1a:9d:26:f2:fa:0f:8c:f4:fc:9c:e5:bb:21:4b:63: + b9:bb:48:0d:b4:56:ff:94:85:8e:31:ca:c5:52:80: + 93:6c:33:dc:e9:1c:e5:7f:a6:73:f6:ca:4d:6a:1f: + d7:ff:9a:68:26:ef:69:5e:b3:f3:b1:e7:30:64:ca: + f0:6b:aa:3e:c4:d1:e8:35:85:53:33:9e:7e:50:ce: + 65:07:73:cb:5d:d7:8c:91:56:34:94:da:a1:e7:44: + 8a:2a:42:42:9d:b1:33:b7:71:5d:75:5c:f2:e3:5c: + 6b:97:8c:3c:0c:4a:14:62:e3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 32:78:DB:57:01:85:47:51:D7:89:B5:0D:A4:B8:C8:A0:DB:36:DA:EA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 67:2e:a2:74:8e:b7:5b:48:99:fc:c5:38:68:f3:fc:4d:85:44: + 50:3f:e9:f3:6b:3a:6b:26:9a:7c:c3:5b:3e:56:a0:10:e9:91: + 46:00:1e:23:3a:23:da:00:8a:85:5e:50:8c:ea:af:43:f3:c8: + 04:01:43:b9:88:29:ea:d6:8e:3b:3f:52:84:9d:48:3d:51:97: + 63:5e:48:46:50:52:5d:ef:06:d4:88:95:bf:7f:d4:10:6e:65: + 9c:5a:e5:27:07:86:f3:97:39:7b:68:34:73:3c:44:0e:5d:ea: + 84:95:89:68:d1:17:47:5f:81:bc:11:46:58:c6:34:ab:f8:0b: + 66:7b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUwNDFaFw0yNjAzMjcwNzUwNDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRbWFyb3EtYmVsbGVldG9pbGUxGjAYBgNVBCkTEW1hcm9xLWJlbGxl +ZXRvaWxlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDPIuJiZtib6f7Pwcg1iRqdJvL6D4z0/JzluyFLY7m7 +SA20Vv+UhY4xysVSgJNsM9zpHOV/pnP2yk1qH9f/mmgm72les/Ox5zBkyvBrqj7E +0eg1hVMznn5QzmUHc8td14yRVjSU2qHnRIoqQkKdsTO3cV11XPLjXGuXjDwMShRi +4wIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQyeNtXAYVHUdeJtQ2k +uMig2zba6jCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBnLqJ0 +jrdbSJn8xTho8/xNhURQP+nzazprJpp8w1s+VqAQ6ZFGAB4jOiPaAIqFXlCM6q9D +88gEAUO5iCnq1o47P1KEnUg9UZdjXkhGUFJd7wbUiJW/f9QQbmWcWuUnB4bzlzl7 +aDRzPEQOXeqElYlo0RdHX4G8EUZYxjSr+Atmew== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.key b/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.key new file mode 100644 index 0000000..0598b45 --- /dev/null +++ b/vpn/coloradio02/clients/maroq-belleetoile/2/maroq-belleetoile.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdAIBADANBgkqhkiG9w0BAQEFAASCAl4wggJaAgEAAoGBAM8i4mJm2Jvp/s/B +yDWJGp0m8voPjPT8nOW7IUtjubtIDbRW/5SFjjHKxVKAk2wz3Okc5X+mc/bKTWof +1/+aaCbvaV6z87HnMGTK8GuqPsTR6DWFUzOeflDOZQdzy13XjJFWNJTaoedEiipC +Qp2xM7dxXXVc8uNca5eMPAxKFGLjAgMBAAECgYAS+rpNk+jjGGS9up7SsPZcUfZP +jV84D3F851Gcq82X6HlA/fu7KyWlUFQWRCu97V6fiYNJ2AGmKlE/mR1ckVRbmqzB +Wm41e58p/VzpSwsXauo4eeKseSeELNLgMic/V7nm+hzSlKqL46O3zNvBWYcD1G+m +hhJ1Ejm0/dMWgbbwQQJBAPQY+AnRj+tOI8OZ8MaPKJy2WtDWrTFBskQHTaX8oMs6 +F+MOX4DQdyfkc0FvvU0jrVFX/z7WETWzYvrczJ2qs6ECQQDZPIiiOPyah4JGQ/4n +EcUiJ2+Gm+LmppYVxI0gERgRFh8SNu7Rb4h9LlQzyXI4TrwXQu/tNyksyFpxvIL0 +L0gDAkA3btAtUqTvV/BxRC1UukALzrGzCX2NWREFt+7fSg6t+ERicOopU64rpgqy +ipCfywFaHrS9bVm9Kz7IH4psJ87hAj8DZO69miZYQ8XFU0qlUaHC5trXP5hMAk5W +CLwrxBicK7xQjIsuuo9nZVHrfTpLpu9JbcJR8oqyKG9BV7C0IAkCQEKuwi3nriEa +nQ2TkqHU9RQLJEUv/RdaZdcpVunNl+im61WBaIPtUPPLatWbiCwbTfQ52YqxPy/S +nPcog70/G48= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/clients/maroq-belleetoile/client2.conf b/vpn/coloradio02/clients/maroq-belleetoile/client2.conf new file mode 100644 index 0000000..9393863 --- /dev/null +++ b/vpn/coloradio02/clients/maroq-belleetoile/client2.conf @@ -0,0 +1,15 @@ +client +dev tun +proto udp +remote 148.251.15.48 1195 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca 2/ca.crt +cert 2/maroq-belleetoile.crt +key 2/maroq-belleetoile.key +comp-lzo +verb 3 +mute 20 diff --git a/vpn/coloradio02/conf/ipp2.txt b/vpn/coloradio02/conf/ipp2.txt new file mode 100644 index 0000000..ef8f403 --- /dev/null +++ b/vpn/coloradio02/conf/ipp2.txt @@ -0,0 +1,24 @@ +ban-coloradiotp02,10.2.0.4 +dks-laptop,10.2.0.8 +ban-coloradiotp01,10.2.0.12 +aral-schifflange,10.2.0.16 +aral-rodange2,10.2.0.20 +aral-echternach,10.2.0.24 +maroq-belleetoile,10.2.0.28 +aral-findel,10.2.0.32 +aral-remich1,10.2.0.36 +aral-remich2,10.2.0.40 +aral-lallange,10.2.0.44 +aral-berchem,10.2.0.48 +bp-capellen,10.2.0.52 +aral-findel,10.2.0.56 +dks-station01,10.2.0.60 +aral-remich2,10.2.0.64 +dks-station02,10.2.0.68 +dks-station03,10.2.0.72 +aral-merl2,10.2.0.76 +maroq-belleetoile,10.2.0.80 +aral-merl2,10.2.0.84 +dks-homebackup,10.2.0.88 +dks-backup,10.2.0.92 +dks-ksmac,10.2.0.96 diff --git a/vpn/coloradio02/conf/server2.conf b/vpn/coloradio02/conf/server2.conf new file mode 100644 index 0000000..61b3ef1 --- /dev/null +++ b/vpn/coloradio02/conf/server2.conf @@ -0,0 +1,23 @@ +port 1195 +proto udp +dev tun +ca /home/posdab/vpn/keys2/ca.crt +cert /home/posdab/vpn/keys2/server.crt +key /home/posdab/vpn/keys2/server.key +dh /home/posdab/vpn/keys2/dh1024.pem +server 10.2.0.0 255.255.0.0 +ifconfig-pool-persist /home/posdab/vpn/conf/ipp2.txt +client-to-client +keepalive 10 120 +comp-lzo +max-clients 300 +persist-key +persist-tun +status /home/posdab/vpn/log/status-openvpn2.log +log /home/posdab/vpn/log/openvpn2.log +;log-append /home/posdab/vpn/log/openvpn2.log +verb 3 +mute 20 +management localhost 7506 + + diff --git a/vpn/coloradio02/easyrsa/build-ca b/vpn/coloradio02/easyrsa/build-ca new file mode 100644 index 0000000..bce29a6 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-ca @@ -0,0 +1,8 @@ +#!/bin/sh + +# +# Build a root certificate +# + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --initca $* diff --git a/vpn/coloradio02/easyrsa/build-dh b/vpn/coloradio02/easyrsa/build-dh new file mode 100644 index 0000000..4beb127 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-dh @@ -0,0 +1,11 @@ +#!/bin/sh + +# Build Diffie-Hellman parameters for the server side +# of an SSL/TLS connection. + +if [ -d $KEY_DIR ] && [ $KEY_SIZE ]; then + $OPENSSL dhparam -out ${KEY_DIR}/dh${KEY_SIZE}.pem ${KEY_SIZE} +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio02/easyrsa/build-inter b/vpn/coloradio02/easyrsa/build-inter new file mode 100644 index 0000000..87bf98d --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-inter @@ -0,0 +1,7 @@ +#!/bin/sh + +# Make an intermediate CA certificate/private key pair using a locally generated +# root certificate. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --inter $* diff --git a/vpn/coloradio02/easyrsa/build-key b/vpn/coloradio02/easyrsa/build-key new file mode 100644 index 0000000..6c0fed8 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-key @@ -0,0 +1,7 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact $* diff --git a/vpn/coloradio02/easyrsa/build-key-pass b/vpn/coloradio02/easyrsa/build-key-pass new file mode 100644 index 0000000..8ef8307 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-key-pass @@ -0,0 +1,7 @@ +#!/bin/sh + +# Similar to build-key, but protect the private key +# with a password. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --pass $* diff --git a/vpn/coloradio02/easyrsa/build-key-pkcs12 b/vpn/coloradio02/easyrsa/build-key-pkcs12 new file mode 100644 index 0000000..ba90e6a --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-key-pkcs12 @@ -0,0 +1,8 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate and convert it to a PKCS #12 file including the +# the CA certificate as well. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --pkcs12 $* diff --git a/vpn/coloradio02/easyrsa/build-key-server b/vpn/coloradio02/easyrsa/build-key-server new file mode 100644 index 0000000..fee0194 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-key-server @@ -0,0 +1,10 @@ +#!/bin/sh + +# Make a certificate/private key pair using a locally generated +# root certificate. +# +# Explicitly set nsCertType to server using the "server" +# extension in the openssl.cnf file. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --server $* diff --git a/vpn/coloradio02/easyrsa/build-req b/vpn/coloradio02/easyrsa/build-req new file mode 100644 index 0000000..559d512 --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-req @@ -0,0 +1,7 @@ +#!/bin/sh + +# Build a certificate signing request and private key. Use this +# when your root certificate and key is not available locally. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --csr $* diff --git a/vpn/coloradio02/easyrsa/build-req-pass b/vpn/coloradio02/easyrsa/build-req-pass new file mode 100644 index 0000000..b73ee1b --- /dev/null +++ b/vpn/coloradio02/easyrsa/build-req-pass @@ -0,0 +1,7 @@ +#!/bin/sh + +# Like build-req, but protect your private key +# with a password. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --csr --pass $* diff --git a/vpn/coloradio02/easyrsa/clean-all b/vpn/coloradio02/easyrsa/clean-all new file mode 100644 index 0000000..cc6e3b2 --- /dev/null +++ b/vpn/coloradio02/easyrsa/clean-all @@ -0,0 +1,16 @@ +#!/bin/sh + +# Initialize the $KEY_DIR directory. +# Note that this script does a +# rm -rf on $KEY_DIR so be careful! + +if [ "$KEY_DIR" ]; then + rm -rf "$KEY_DIR" + mkdir "$KEY_DIR" && \ + chmod go-rwx "$KEY_DIR" && \ + touch "$KEY_DIR/index.txt" && \ + echo 01 >"$KEY_DIR/serial" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio02/easyrsa/inherit-inter b/vpn/coloradio02/easyrsa/inherit-inter new file mode 100644 index 0000000..aaa5168 --- /dev/null +++ b/vpn/coloradio02/easyrsa/inherit-inter @@ -0,0 +1,39 @@ +#!/bin/sh + +# Build a new PKI which is rooted on an intermediate certificate generated +# by ./build-inter or ./pkitool --inter from a parent PKI. The new PKI should +# have independent vars settings, and must use a different KEY_DIR directory +# from the parent. This tool can be used to generate arbitrary depth +# certificate chains. +# +# To build an intermediate CA, follow the same steps for a regular PKI but +# replace ./build-key or ./pkitool --initca with this script. + +# The EXPORT_CA file will contain the CA certificate chain and should be +# referenced by the OpenVPN "ca" directive in config files. The ca.crt file +# will only contain the local intermediate CA -- it's needed by the easy-rsa +# scripts but not by OpenVPN directly. +EXPORT_CA="export-ca.crt" + +if [ $# -ne 2 ]; then + echo "usage: $0 " + echo "parent-key-dir: the KEY_DIR directory of the parent PKI" + echo "common-name: the common name of the intermediate certificate in the parent PKI" + exit 1; +fi + +if [ "$KEY_DIR" ]; then + cp "$1/$2.crt" "$KEY_DIR/ca.crt" + cp "$1/$2.key" "$KEY_DIR/ca.key" + + if [ -e "$1/$EXPORT_CA" ]; then + PARENT_CA="$1/$EXPORT_CA" + else + PARENT_CA="$1/ca.crt" + fi + cp "$PARENT_CA" "$KEY_DIR/$EXPORT_CA" + cat "$KEY_DIR/ca.crt" >> "$KEY_DIR/$EXPORT_CA" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio02/easyrsa/list-crl b/vpn/coloradio02/easyrsa/list-crl new file mode 100644 index 0000000..d1d8a69 --- /dev/null +++ b/vpn/coloradio02/easyrsa/list-crl @@ -0,0 +1,13 @@ +#!/bin/sh + +# list revoked certificates + +CRL="${1:-crl.pem}" + +if [ "$KEY_DIR" ]; then + cd "$KEY_DIR" && \ + $OPENSSL crl -text -noout -in "$CRL" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio02/easyrsa/openssl-0.9.6.cnf b/vpn/coloradio02/easyrsa/openssl-0.9.6.cnf new file mode 100644 index 0000000..d28341d --- /dev/null +++ b/vpn/coloradio02/easyrsa/openssl-0.9.6.cnf @@ -0,0 +1,265 @@ +# For use with easy-rsa version 2.0 + +# +# OpenSSL example configuration file. +# This is mostly being used for generation of certificate requests. +# + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd + +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # which md to use. +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString. +# utf8only: only UTF8Strings. +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings +# so use this option with caution! +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/vpn/coloradio02/easyrsa/openssl-0.9.8.cnf b/vpn/coloradio02/easyrsa/openssl-0.9.8.cnf new file mode 100644 index 0000000..340b8af --- /dev/null +++ b/vpn/coloradio02/easyrsa/openssl-0.9.8.cnf @@ -0,0 +1,290 @@ +# For use with easy-rsa version 2.0 + +# +# OpenSSL example configuration file. +# This is mostly being used for generation of certificate requests. +# + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd +openssl_conf = openssl_init + +[ openssl_init ] +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids +engines = engine_section + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # which md to use. +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString. +# utf8only: only UTF8Strings. +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings +# so use this option with caution! +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +name = Name +name_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN +name_default = $ENV::KEY_NAME + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + +[ engine_section ] +# +# If you are using PKCS#11 +# Install engine_pkcs11 of opensc (www.opensc.org) +# And uncomment the following +# verify that dynamic_path points to the correct location +# +#pkcs11 = pkcs11_section + +[ pkcs11_section ] +engine_id = pkcs11 +dynamic_path = /usr/lib/engines/engine_pkcs11.so +MODULE_PATH = $ENV::PKCS11_MODULE_PATH +PIN = $ENV::PKCS11_PIN +init = 0 diff --git a/vpn/coloradio02/easyrsa/openssl-1.0.0.cnf b/vpn/coloradio02/easyrsa/openssl-1.0.0.cnf new file mode 100644 index 0000000..fa258a5 --- /dev/null +++ b/vpn/coloradio02/easyrsa/openssl-1.0.0.cnf @@ -0,0 +1,285 @@ +# For use with easy-rsa version 2.0 and OpenSSL 1.0.0* + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . +RANDFILE = $ENV::HOME/.rnd +openssl_conf = openssl_init + +[ openssl_init ] +# Extra OBJECT IDENTIFIER info: +#oid_file = $ENV::HOME/.oid +oid_section = new_oids +engines = engine_section + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] + +# We can add new OIDs in here for use by 'ca' and 'req'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::KEY_DIR # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = usr_cert # The extentions to add to the cert + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 3650 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = md5 # use public key default MD +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +[ req ] +default_bits = $ENV::KEY_SIZE +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extentions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString (PKIX recommendation after 2004). +# utf8only: only UTF8Strings (PKIX recommendation after 2004). +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +string_mask = nombstr + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::KEY_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::KEY_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::KEY_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::KEY_ORG + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +name = Name +name_max = 64 + +emailAddress = Email Address +emailAddress_default = $ENV::KEY_EMAIL +emailAddress_max = 40 + +# JY -- added for batch mode +organizationalUnitName_default = $ENV::KEY_OU +commonName_default = $ENV::KEY_CN +name_default = $ENV::KEY_NAME + + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# Here are some examples of the usage of nsCertType. If it is omitted +# the certificate can be used for anything *except* object signing. + +# This is OK for an SSL server. +# nsCertType = server + +# For an object signing certificate this would be used. +# nsCertType = objsign + +# For normal client use this is typical +# nsCertType = client, email + +# and for everything including object signing: +# nsCertType = client, email, objsign + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "Easy-RSA Generated Certificate" + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=clientAuth +keyUsage = digitalSignature + + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy + +# Copy subject details +# issuerAltName=issuer:copy + +#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem +#nsBaseUrl +#nsRevocationUrl +#nsRenewalUrl +#nsCaPolicyUrl +#nsSslServerName + +[ server ] + +# JY ADDED -- Make a cert with nsCertType set to "server" +basicConstraints=CA:FALSE +nsCertType = server +nsComment = "Easy-RSA Generated Server Certificate" +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer:always +extendedKeyUsage=serverAuth +keyUsage = digitalSignature, keyEncipherment + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer:always + +# This is what PKIX recommends but some broken software chokes on critical +# extensions. +#basicConstraints = critical,CA:true +# So we do this instead. +basicConstraints = CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Some might want this also +# nsCertType = sslCA, emailCA + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + +[ engine_section ] +# +# If you are using PKCS#11 +# Install engine_pkcs11 of opensc (www.opensc.org) +# And uncomment the following +# verify that dynamic_path points to the correct location +# +#pkcs11 = pkcs11_section + +[ pkcs11_section ] +engine_id = pkcs11 +dynamic_path = /usr/lib/engines/engine_pkcs11.so +MODULE_PATH = $ENV::PKCS11_MODULE_PATH +PIN = $ENV::PKCS11_PIN +init = 0 diff --git a/vpn/coloradio02/easyrsa/pkitool b/vpn/coloradio02/easyrsa/pkitool new file mode 100644 index 0000000..49588f5 --- /dev/null +++ b/vpn/coloradio02/easyrsa/pkitool @@ -0,0 +1,379 @@ +#!/bin/sh + +# OpenVPN -- An application to securely tunnel IP networks +# over a single TCP/UDP port, with support for SSL/TLS-based +# session authentication and key exchange, +# packet encryption, packet authentication, and +# packet compression. +# +# Copyright (C) 2002-2010 OpenVPN Technologies, Inc. +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 +# as published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program (see the file COPYING included with this +# distribution); if not, write to the Free Software Foundation, Inc., +# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + +# pkitool is a front-end for the openssl tool. + +# Calling scripts can set the certificate organizational +# unit with the KEY_OU environmental variable. + +# Calling scripts can also set the KEY_NAME environmental +# variable to set the "name" X509 subject field. + +PROGNAME=pkitool +VERSION=2.0 +DEBUG=0 + +die() +{ + local m="$1" + + echo "$m" >&2 + exit 1 +} + +need_vars() +{ + echo ' Please edit the vars script to reflect your configuration,' + echo ' then source it with "source ./vars".' + echo ' Next, to start with a fresh PKI configuration and to delete any' + echo ' previous certificates and keys, run "./clean-all".' + echo " Finally, you can run this tool ($PROGNAME) to build certificates/keys." +} + +usage() +{ + echo "$PROGNAME $VERSION" + echo "Usage: $PROGNAME [options...] [common-name]" + echo "Options:" + echo " --batch : batch mode (default)" + echo " --keysize : Set keysize" + echo " size : size (default=1024)" + echo " --interact : interactive mode" + echo " --server : build server cert" + echo " --initca : build root CA" + echo " --inter : build intermediate CA" + echo " --pass : encrypt private key with password" + echo " --csr : only generate a CSR, do not sign" + echo " --sign : sign an existing CSR" + echo " --pkcs12 : generate a combined PKCS#12 file" + echo " --pkcs11 : generate certificate on PKCS#11 token" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " id : PKCS#11 object id (hex string)" + echo " label : PKCS#11 object label" + echo "Standalone options:" + echo " --pkcs11-slots : list PKCS#11 slots" + echo " lib : PKCS#11 library" + echo " --pkcs11-objects : list PKCS#11 token objects" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " --pkcs11-init : initialize PKCS#11 token DANGEROUS!!!" + echo " lib : PKCS#11 library" + echo " slot : PKCS#11 slot" + echo " label : PKCS#11 token label" + echo "Notes:" + need_vars + echo " In order to use PKCS#11 interface you must have opensc-0.10.0 or higher." + echo "Generated files and corresponding OpenVPN directives:" + echo '(Files will be placed in the $KEY_DIR directory, defined in ./vars)' + echo " ca.crt -> root certificate (--ca)" + echo " ca.key -> root key, keep secure (not directly used by OpenVPN)" + echo " .crt files -> client/server certificates (--cert)" + echo " .key files -> private keys, keep secure (--key)" + echo " .csr files -> certificate signing request (not directly used by OpenVPN)" + echo " dh1024.pem or dh2048.pem -> Diffie Hellman parameters (--dh)" + echo "Examples:" + echo " $PROGNAME --initca -> Build root certificate" + echo " $PROGNAME --initca --pass -> Build root certificate with password-protected key" + echo " $PROGNAME --server server1 -> Build \"server1\" certificate/key" + echo " $PROGNAME client1 -> Build \"client1\" certificate/key" + echo " $PROGNAME --pass client2 -> Build password-protected \"client2\" certificate/key" + echo " $PROGNAME --pkcs12 client3 -> Build \"client3\" certificate/key in PKCS#12 format" + echo " $PROGNAME --csr client4 -> Build \"client4\" CSR to be signed by another CA" + echo " $PROGNAME --sign client4 -> Sign \"client4\" CSR" + echo " $PROGNAME --inter interca -> Build an intermediate key-signing certificate/key" + echo " Also see ./inherit-inter script." + echo " $PROGNAME --pkcs11 /usr/lib/pkcs11/lib1 0 010203 \"client5 id\" client5" + echo " -> Build \"client5\" certificate/key in PKCS#11 token" + echo "Typical usage for initial PKI setup. Build myserver, client1, and client2 cert/keys." + echo "Protect client2 key with a password. Build DH parms. Generated files in ./keys :" + echo " [edit vars with your site-specific info]" + echo " source ./vars" + echo " ./clean-all" + echo " ./build-dh -> takes a long time, consider backgrounding" + echo " ./$PROGNAME --initca" + echo " ./$PROGNAME --server myserver" + echo " ./$PROGNAME client1" + echo " ./$PROGNAME --pass client2" + echo "Typical usage for adding client cert to existing PKI:" + echo " source ./vars" + echo " ./$PROGNAME client-new" +} + +# Set tool defaults +[ -n "$OPENSSL" ] || export OPENSSL="openssl" +[ -n "$PKCS11TOOL" ] || export PKCS11TOOL="pkcs11-tool" +[ -n "$GREP" ] || export GREP="grep" + +# Set defaults +DO_REQ="1" +REQ_EXT="" +DO_CA="1" +CA_EXT="" +DO_P12="0" +DO_P11="0" +DO_ROOT="0" +NODES_REQ="-nodes" +NODES_P12="" +BATCH="-batch" +CA="ca" +# must be set or errors of openssl.cnf +PKCS11_MODULE_PATH="dummy" +PKCS11_PIN="dummy" + +# Process options +while [ $# -gt 0 ]; do + case "$1" in + --keysize ) KEY_SIZE=$2 + shift;; + --server ) REQ_EXT="$REQ_EXT -extensions server" + CA_EXT="$CA_EXT -extensions server" ;; + --batch ) BATCH="-batch" ;; + --interact ) BATCH="" ;; + --inter ) CA_EXT="$CA_EXT -extensions v3_ca" ;; + --initca ) DO_ROOT="1" ;; + --pass ) NODES_REQ="" ;; + --csr ) DO_CA="0" ;; + --sign ) DO_REQ="0" ;; + --pkcs12 ) DO_P12="1" ;; + --pkcs11 ) DO_P11="1" + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + PKCS11_ID="$4" + PKCS11_LABEL="$5" + shift 4;; + + # standalone + --pkcs11-init) + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + PKCS11_LABEL="$4" + if [ -z "$PKCS11_LABEL" ]; then + die "Please specify library name, slot and label" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --init-token --slot "$PKCS11_SLOT" \ + --label "$PKCS11_LABEL" && + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --init-pin --slot "$PKCS11_SLOT" + exit $?;; + --pkcs11-slots) + PKCS11_MODULE_PATH="$2" + if [ -z "$PKCS11_MODULE_PATH" ]; then + die "Please specify library name" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --list-slots + exit 0;; + --pkcs11-objects) + PKCS11_MODULE_PATH="$2" + PKCS11_SLOT="$3" + if [ -z "$PKCS11_SLOT" ]; then + die "Please specify library name and slot" + fi + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --list-objects --login --slot "$PKCS11_SLOT" + exit 0;; + + --help|--usage) + usage + exit ;; + --version) + echo "$PROGNAME $VERSION" + exit ;; + # errors + --* ) die "$PROGNAME: unknown option: $1" ;; + * ) break ;; + esac + shift +done + +if ! [ -z "$BATCH" ]; then + if $OPENSSL version | grep 0.9.6 > /dev/null; then + die "Batch mode is unsupported in openssl<0.9.7" + fi +fi + +if [ $DO_P12 -eq 1 -a $DO_P11 -eq 1 ]; then + die "PKCS#11 and PKCS#12 cannot be specified together" +fi + +if [ $DO_P11 -eq 1 ]; then + if ! grep "^pkcs11.*=" "$KEY_CONFIG" > /dev/null; then + die "Please edit $KEY_CONFIG and setup PKCS#11 engine" + fi +fi + +# If we are generating pkcs12, only encrypt the final step +if [ $DO_P12 -eq 1 ]; then + NODES_P12="$NODES_REQ" + NODES_REQ="-nodes" +fi + +if [ $DO_P11 -eq 1 ]; then + if [ -z "$PKCS11_LABEL" ]; then + die "PKCS#11 arguments incomplete" + fi +fi + +# If undefined, set default key expiration intervals +if [ -z "$KEY_EXPIRE" ]; then + KEY_EXPIRE=3650 +fi +if [ -z "$CA_EXPIRE" ]; then + CA_EXPIRE=3650 +fi + +# Set organizational unit to empty string if undefined +if [ -z "$KEY_OU" ]; then + KEY_OU="" +fi + +# Set X509 Name string to empty string if undefined +if [ -z "$KEY_NAME" ]; then + KEY_NAME="" +fi + +# Set KEY_CN, FN +if [ $DO_ROOT -eq 1 ]; then + if [ -z "$KEY_CN" ]; then + if [ "$1" ]; then + KEY_CN="$1" + elif [ "$KEY_ORG" ]; then + KEY_CN="$KEY_ORG CA" + fi + fi + if [ $BATCH ] && [ "$KEY_CN" ]; then + echo "Using CA Common Name:" "$KEY_CN" + fi + FN="$KEY_CN" +elif [ $BATCH ] && [ "$KEY_CN" ]; then + echo "Using Common Name:" "$KEY_CN" + FN="$KEY_CN" + if [ "$1" ]; then + FN="$1" + fi +else + if [ $# -ne 1 ]; then + usage + exit 1 + else + KEY_CN="$1" + fi + FN="$KEY_CN" +fi + +export CA_EXPIRE KEY_EXPIRE KEY_OU KEY_NAME KEY_CN PKCS11_MODULE_PATH PKCS11_PIN + +# Show parameters (debugging) +if [ $DEBUG -eq 1 ]; then + echo DO_REQ $DO_REQ + echo REQ_EXT $REQ_EXT + echo DO_CA $DO_CA + echo CA_EXT $CA_EXT + echo NODES_REQ $NODES_REQ + echo NODES_P12 $NODES_P12 + echo DO_P12 $DO_P12 + echo KEY_CN $KEY_CN + echo BATCH $BATCH + echo DO_ROOT $DO_ROOT + echo KEY_EXPIRE $KEY_EXPIRE + echo CA_EXPIRE $CA_EXPIRE + echo KEY_OU $KEY_OU + echo KEY_NAME $KEY_NAME + echo DO_P11 $DO_P11 + echo PKCS11_MODULE_PATH $PKCS11_MODULE_PATH + echo PKCS11_SLOT $PKCS11_SLOT + echo PKCS11_ID $PKCS11_ID + echo PKCS11_LABEL $PKCS11_LABEL +fi + +# Make sure ./vars was sourced beforehand +if [ -d "$KEY_DIR" ] && [ "$KEY_CONFIG" ]; then + cd "$KEY_DIR" + + # Make sure $KEY_CONFIG points to the correct version + # of openssl.cnf + if $GREP -i 'easy-rsa version 2\.[0-9]' "$KEY_CONFIG" >/dev/null; then + : + else + echo "$PROGNAME: KEY_CONFIG (set by the ./vars script) is pointing to the wrong" + echo "version of openssl.cnf: $KEY_CONFIG" + echo "The correct version should have a comment that says: easy-rsa version 2.x"; + exit 1; + fi + + # Build root CA + if [ $DO_ROOT -eq 1 ]; then + $OPENSSL req $BATCH -days $CA_EXPIRE $NODES_REQ -new -newkey rsa:$KEY_SIZE -sha1 \ + -x509 -keyout "$CA.key" -out "$CA.crt" -config "$KEY_CONFIG" && \ + chmod 0600 "$CA.key" + else + # Make sure CA key/cert is available + if [ $DO_CA -eq 1 ] || [ $DO_P12 -eq 1 ]; then + if [ ! -r "$CA.crt" ] || [ ! -r "$CA.key" ]; then + echo "$PROGNAME: Need a readable $CA.crt and $CA.key in $KEY_DIR" + echo "Try $PROGNAME --initca to build a root certificate/key." + exit 1 + fi + fi + + # Generate key for PKCS#11 token + PKCS11_ARGS= + if [ $DO_P11 -eq 1 ]; then + stty -echo + echo -n "User PIN: " + read -r PKCS11_PIN + stty echo + export PKCS11_PIN + + echo "Generating key pair on PKCS#11 token..." + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --keypairgen \ + --login --pin "$PKCS11_PIN" \ + --key-type rsa:1024 \ + --slot "$PKCS11_SLOT" --id "$PKCS11_ID" --label "$PKCS11_LABEL" || exit 1 + PKCS11_ARGS="-engine pkcs11 -keyform engine -key $PKCS11_SLOT:$PKCS11_ID" + fi + + # Build cert/key + ( [ $DO_REQ -eq 0 ] || $OPENSSL req $BATCH -days $KEY_EXPIRE $NODES_REQ -new -newkey rsa:$KEY_SIZE \ + -keyout "$FN.key" -out "$FN.csr" $REQ_EXT -config "$KEY_CONFIG" $PKCS11_ARGS ) && \ + ( [ $DO_CA -eq 0 ] || $OPENSSL ca $BATCH -days $KEY_EXPIRE -out "$FN.crt" \ + -in "$FN.csr" $CA_EXT -md sha1 -config "$KEY_CONFIG" ) && \ + ( [ $DO_P12 -eq 0 ] || $OPENSSL pkcs12 -export -inkey "$FN.key" \ + -in "$FN.crt" -certfile "$CA.crt" -out "$FN.p12" $NODES_P12 ) && \ + ( [ $DO_CA -eq 0 -o $DO_P11 -eq 1 ] || chmod 0600 "$FN.key" ) && \ + ( [ $DO_P12 -eq 0 ] || chmod 0600 "$FN.p12" ) + + # Load certificate into PKCS#11 token + if [ $DO_P11 -eq 1 ]; then + $OPENSSL x509 -in "$FN.crt" -inform PEM -out "$FN.crt.der" -outform DER && \ + $PKCS11TOOL --module "$PKCS11_MODULE_PATH" --write-object "$FN.crt.der" --type cert \ + --login --pin "$PKCS11_PIN" \ + --slot "$PKCS11_SLOT" --id "$PKCS11_ID" --label "$PKCS11_LABEL" + [ -e "$FN.crt.der" ]; rm "$FN.crt.der" + fi + + fi + +# Need definitions +else + need_vars +fi diff --git a/vpn/coloradio02/easyrsa/revoke-full b/vpn/coloradio02/easyrsa/revoke-full new file mode 100644 index 0000000..4169c4c --- /dev/null +++ b/vpn/coloradio02/easyrsa/revoke-full @@ -0,0 +1,40 @@ +#!/bin/sh + +# revoke a certificate, regenerate CRL, +# and verify revocation + +CRL="crl.pem" +RT="revoke-test.pem" + +if [ $# -ne 1 ]; then + echo "usage: revoke-full "; + exit 1 +fi + +if [ "$KEY_DIR" ]; then + cd "$KEY_DIR" + rm -f "$RT" + + # set defaults + export KEY_CN="" + export KEY_OU="" + export KEY_NAME="" + + # revoke key and generate a new CRL + $OPENSSL ca -revoke "$1.crt" -config "$KEY_CONFIG" + + # generate a new CRL -- try to be compatible with + # intermediate PKIs + $OPENSSL ca -gencrl -out "$CRL" -config "$KEY_CONFIG" + if [ -e export-ca.crt ]; then + cat export-ca.crt "$CRL" >"$RT" + else + cat ca.crt "$CRL" >"$RT" + fi + + # verify the revocation + $OPENSSL verify -CAfile "$RT" -crl_check "$1.crt" +else + echo 'Please source the vars script first (i.e. "source ./vars")' + echo 'Make sure you have edited it to reflect your configuration.' +fi diff --git a/vpn/coloradio02/easyrsa/sign-req b/vpn/coloradio02/easyrsa/sign-req new file mode 100644 index 0000000..6cae7b4 --- /dev/null +++ b/vpn/coloradio02/easyrsa/sign-req @@ -0,0 +1,7 @@ +#!/bin/sh + +# Sign a certificate signing request (a .csr file) +# with a local root certificate and key. + +export EASY_RSA="${EASY_RSA:-.}" +"$EASY_RSA/pkitool" --interact --sign $* diff --git a/vpn/coloradio02/easyrsa/vars b/vpn/coloradio02/easyrsa/vars new file mode 100644 index 0000000..6c5415c --- /dev/null +++ b/vpn/coloradio02/easyrsa/vars @@ -0,0 +1,75 @@ +# easy-rsa parameter settings + +# NOTE: If you installed from an RPM, +# don't edit this file in place in +# /usr/share/openvpn/easy-rsa -- +# instead, you should copy the whole +# easy-rsa directory to another location +# (such as /etc/openvpn) so that your +# edits will not be wiped out by a future +# OpenVPN package upgrade. + +# This variable should point to +# the top level of the easy-rsa +# tree. +export EASY_RSA="`pwd`" + +# +# This variable should point to +# the requested executables +# +export OPENSSL="openssl" +export PKCS11TOOL="pkcs11-tool" +export GREP="grep" + + +# This variable should point to +# the openssl.cnf file included +# with easy-rsa. +export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA` + +# Edit this variable to point to +# your soon-to-be-created key +# directory. +# +# WARNING: clean-all will do +# a rm -rf on this directory +# so make sure you define +# it correctly! +export KEY_DIR="/home/posdab/vpn/keys2" + +# Issue rm -rf warning +echo NOTE: If you run ./clean-all, I will be doing a rm -rf on $KEY_DIR + +# PKCS11 fixes +export PKCS11_MODULE_PATH="dummy" +export PKCS11_PIN="dummy" + +# Increase this to 2048 if you +# are paranoid. This will slow +# down TLS negotiation performance +# as well as the one-time DH parms +# generation process. +export KEY_SIZE=1024 + +# In how many days should the root CA key expire? +export CA_EXPIRE=3650 + +# In how many days should certificates expire? +export KEY_EXPIRE=3650 + +# These are the default values for fields +# which will be placed in the certificate. +# Don't leave any of these fields blank. +export KEY_COUNTRY="LU" +export KEY_PROVINCE="Grevenmacher" +export KEY_CITY="Roodt-sur-Syre" +export KEY_ORG="DKS sarl" +export KEY_EMAIL="info@dks.sarl" +#export KEY_EMAIL=mail@host.domain +export KEY_CN="POSDAB" +export KEY_NAME="POSDAB" +export KEY_OU="POSDAB" +#export PKCS11_MODULE_PATH=changeme +#export PKCS11_PIN=123 + diff --git a/vpn/coloradio02/easyrsa/whichopensslcnf b/vpn/coloradio02/easyrsa/whichopensslcnf new file mode 100644 index 0000000..2226a8e --- /dev/null +++ b/vpn/coloradio02/easyrsa/whichopensslcnf @@ -0,0 +1,26 @@ +#!/bin/sh + +cnf="$1/openssl.cnf" + +if [ "$OPENSSL" ]; then + if $OPENSSL version | grep -E "0\.9\.6[[:alnum:]]" > /dev/null; then + cnf="$1/openssl-0.9.6.cnf" + elif $OPENSSL version | grep -E "0\.9\.8[[:alnum:]]" > /dev/null; then + cnf="$1/openssl-0.9.8.cnf" + elif $OPENSSL version | grep -E "1\.0\.([[:digit:]][[:alnum:]])" > /dev/null; then + cnf="$1/openssl-1.0.0.cnf" + else + cnf="$1/openssl.cnf" + fi +fi + +echo $cnf + +if [ ! -r $cnf ]; then + echo "**************************************************************" >&2 + echo " No $cnf file could be found" >&2 + echo " Further invocations will fail" >&2 + echo "**************************************************************" >&2 +fi + +exit 0 diff --git a/vpn/coloradio02/keys/01.pem b/vpn/coloradio02/keys/01.pem new file mode 100644 index 0000000..3cc277e --- /dev/null +++ b/vpn/coloradio02/keys/01.pem @@ -0,0 +1,76 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 1 (0x1) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 8 08:56:51 2015 GMT + Not After : Feb 5 08:56:51 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c8:e7:05:de:d0:55:a8:84:66:1d:a6:98:51:4e: + 00:c0:36:66:28:8f:98:97:56:c6:69:2d:15:ab:cf: + 39:93:29:1d:a9:db:75:34:2a:3b:2c:2e:90:65:6d: + ac:f1:bd:7c:66:5f:67:a9:3d:fa:5d:e2:a5:ee:f3: + f7:48:0b:d3:28:d5:0e:4b:e8:d1:31:3d:80:d4:b8: + 0a:a4:77:a1:b3:c6:02:09:a8:e5:97:a1:24:85:f5: + 94:4f:ac:23:4d:71:84:44:bb:f0:be:67:3a:fb:27: + d1:f3:7c:9f:95:a7:b4:fd:c5:30:b9:e3:0c:b8:8a: + 1d:3b:48:ff:37:cf:d1:54:c3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Cert Type: + SSL Server + Netscape Comment: + Easy-RSA Generated Server Certificate + X509v3 Subject Key Identifier: + 3E:6D:DD:DB:F9:F6:DF:78:7C:B9:27:32:13:A5:7F:89:FC:76:93:B4 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Server Authentication + X509v3 Key Usage: + Digital Signature, Key Encipherment + Signature Algorithm: sha1WithRSAEncryption + 50:18:d3:dd:76:97:de:7f:59:a6:de:45:0e:ed:b5:53:4b:4e: + dd:2f:c1:c5:72:00:54:2e:ca:b9:3a:2b:ca:5b:9f:c2:c9:2d: + cd:22:53:6b:fd:19:4a:45:9f:1d:35:8e:d4:c2:54:7b:f5:fc: + f2:9f:65:60:8e:84:fe:b6:9b:4d:bc:dc:a5:2d:04:34:e4:0e: + 4d:53:bc:34:b9:21:17:d7:47:12:52:cb:1b:3a:42:47:88:51: + 38:e5:10:82:df:22:e7:c4:2a:49:e4:98:52:c9:08:3b:71:37: + 63:b5:ca:a1:9f:12:90:04:e2:ce:f1:1a:74:f4:88:33:31:36: + c3:29 +-----BEGIN CERTIFICATE----- +MIIEQzCCA6ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDgwODU2NTFaFw0yNTAyMDUwODU2NTFaMIGoMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZI +hvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB +gQDI5wXe0FWohGYdpphRTgDANmYoj5iXVsZpLRWrzzmTKR2p23U0KjssLpBlbazx +vXxmX2epPfpd4qXu8/dIC9Mo1Q5L6NExPYDUuAqkd6GzxgIJqOWXoSSF9ZRPrCNN +cYREu/C+Zzr7J9HzfJ+Vp7T9xTC54wy4ih07SP83z9FUwwIDAQABo4IBeTCCAXUw +CQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVh +c3ktUlNBIEdlbmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFD5t +3dv59t94fLknMhOlf4n8dpO0MIHdBgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49 +tMypRVFMoYGupIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFj +aGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwx +DzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UE +KRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o +3hUwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgWgMA0GCSqGSIb3DQEB +BQUAA4GBAFAY0912l95/WabeRQ7ttVNLTt0vwcVyAFQuyrk6K8pbn8LJLc0iU2v9 +GUpFnx01jtTCVHv1/PKfZWCOhP62m0283KUtBDTkDk1TvDS5IRfXRxJSyxs6QkeI +UTjlEILfIufEKknkmFLJCDtxN2O1yqGfEpAE4s7xGnT0iDMxNsMp +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/02.pem b/vpn/coloradio02/keys/02.pem new file mode 100644 index 0000000..c770fbe --- /dev/null +++ b/vpn/coloradio02/keys/02.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 5 06:41:01 2015 GMT + Not After : Oct 2 06:41:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:97:c7:87:ea:97:30:86:d3:12:ce:51:18:da:d0: + bd:55:18:e7:52:2d:e8:04:78:f6:9c:a8:fc:95:ab: + 88:98:b4:bd:b8:03:a5:5b:8b:70:86:11:e8:33:6f: + cb:23:f3:a3:b4:fe:cc:ec:3d:57:73:33:d1:26:94: + ef:de:a6:5b:2b:54:e2:3d:3b:c3:05:1a:97:da:22: + 2c:29:ca:ce:49:dc:43:eb:f5:d6:3f:f7:70:f6:3b: + 79:d4:ef:2a:8b:8c:aa:67:a8:2c:fa:81:e4:6c:34: + 1a:ca:26:94:4e:20:fc:45:da:c6:24:94:9a:bd:21: + de:b3:84:35:ce:ac:d4:89:0f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 13:2D:AB:DC:C9:A0:7F:CF:4F:88:65:76:F6:3B:CE:3D:85:8E:9E:83 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 57:1a:71:a5:b6:02:f8:2f:25:57:b3:c9:58:e7:a0:63:7f:e2: + aa:27:16:f4:1b:eb:02:a1:d5:b4:60:b3:cc:d7:6f:59:6b:ff: + 9e:8d:76:d3:ec:71:95:aa:98:6d:7e:7f:14:b2:19:c7:4a:05: + 3d:2f:88:02:e1:97:38:73:99:50:ff:a4:71:ed:46:a7:6f:a8: + 27:e3:13:4e:6c:35:7a:53:ef:95:53:f0:4a:f7:e4:11:17:10: + 4f:f5:ec:4e:31:97:0b:0e:12:93:f9:bd:54:c1:2b:9a:5e:cb: + fb:b3:39:7b:ad:a8:a0:e0:ca:a1:d7:12:b7:ac:66:2f:41:4b: + f8:38 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMDUwNjQxMDFaFw0yNTEwMDIwNjQxMDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDIxGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCXx4fqlzCG0xLOURja0L1VGOdSLegEePacqPyVq4iY +tL24A6Vbi3CGEegzb8sj86O0/szsPVdzM9EmlO/eplsrVOI9O8MFGpfaIiwpys5J +3EPr9dY/93D2O3nU7yqLjKpnqCz6geRsNBrKJpROIPxF2sYklJq9Id6zhDXOrNSJ +DwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQTLavcyaB/z0+IZXb2 +O849hY6egzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBXGnGl +tgL4LyVXs8lY56Bjf+KqJxb0G+sCodW0YLPM129Za/+ejXbT7HGVqphtfn8UshnH +SgU9L4gC4Zc4c5lQ/6Rx7Uanb6gn4xNObDV6U++VU/BK9+QRFxBP9exOMZcLDhKT ++b1UwSuaXsv7szl7raig4Mqh1xK3rGYvQUv4OA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/03.pem b/vpn/coloradio02/keys/03.pem new file mode 100644 index 0000000..a5e117f --- /dev/null +++ b/vpn/coloradio02/keys/03.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:44:47 2015 GMT + Not After : Oct 9 12:44:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=coloradio-tp01/name=coloradio-tp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9c:92:64:5c:71:63:0a:68:0a:42:f0:bd:f2:2b: + c7:f4:1b:ca:44:75:86:de:9f:c4:d5:b8:18:f4:7b: + e8:87:b8:3d:27:e3:7a:1a:99:a3:df:f1:47:21:2b: + a1:f8:51:d0:90:c0:1d:d4:80:52:20:ca:1f:14:20: + e4:5e:69:79:31:66:1e:7c:1e:6f:de:63:0a:57:ca: + 9a:9f:dc:30:1b:3d:76:c5:e3:12:cd:2b:81:e6:d7: + 35:2e:67:f8:09:09:3e:10:d3:6c:c8:90:ef:bc:bf: + 90:23:af:9e:f6:e7:2e:a7:05:78:7d:84:f2:f3:ff: + c7:c4:ab:cc:99:1e:ff:6b:b1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:A7:0B:A9:7F:35:9B:18:D7:B9:C0:60:D2:B9:CC:BE:DE:54:F0:53 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + d9:26:5e:8b:e9:6d:e8:39:b6:f9:f0:5d:64:39:86:44:8b:62: + 47:5f:6b:89:ed:8a:fb:dc:db:34:64:f9:a1:46:c7:4b:3f:f0: + 5a:88:bb:76:33:19:cb:0c:c8:d3:66:57:ed:f4:34:88:95:6c: + e3:0f:af:c2:fe:d8:ca:7f:3a:44:63:a2:8a:83:a3:e5:3e:a7: + f4:20:6a:fa:f7:76:95:ee:e9:6c:96:d6:10:87:97:af:99:b0: + 3c:bd:00:21:a0:46:5f:28:e5:2d:d1:45:b1:15:a6:a3:8c:c4: + 23:3e:52:de:63:99:d8:43:5b:72:71:45:11:32:3b:18:31:75: + b7:37 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ0NDdaFw0yNTEwMDkxMjQ0NDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOY29sb3JhZGlvLXRwMDExFzAVBgNVBCkTDmNvbG9yYWRpby10cDAx +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCckmRccWMKaApC8L3yK8f0G8pEdYben8TVuBj0e+iHuD0n43oa +maPf8UchK6H4UdCQwB3UgFIgyh8UIOReaXkxZh58Hm/eYwpXypqf3DAbPXbF4xLN +K4Hm1zUuZ/gJCT4Q02zIkO+8v5Ajr5725y6nBXh9hPLz/8fEq8yZHv9rsQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQipwupfzWbGNe5wGDSucy+3lTw +UzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDZJl6L6W3oObb5 +8F1kOYZEi2JHX2uJ7Yr73Ns0ZPmhRsdLP/BaiLt2MxnLDMjTZlft9DSIlWzjD6/C +/tjKfzpEY6KKg6PlPqf0IGr693aV7ulsltYQh5evmbA8vQAhoEZfKOUt0UWxFaaj +jMQjPlLeY5nYQ1tycUURMjsYMXW3Nw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/04.pem b/vpn/coloradio02/keys/04.pem new file mode 100644 index 0000000..9929397 --- /dev/null +++ b/vpn/coloradio02/keys/04.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:47:17 2015 GMT + Not After : Oct 9 12:47:17 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp01/name=ban-coloradiotp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d0:6a:05:1e:04:e4:65:32:34:6b:c6:07:4a:df: + bb:6a:7d:c9:3b:f3:06:10:8c:44:9e:f7:10:59:02: + 2e:71:4e:28:48:f8:41:4a:e0:ed:f1:69:91:20:1e: + 3a:59:bc:c0:f4:46:99:b8:48:58:0a:5e:43:a0:0f: + 66:21:c4:9d:bb:2d:2b:f5:f5:3f:31:bd:a4:97:56: + fa:c7:52:56:28:a9:a2:3e:3c:38:24:c4:6f:04:e5: + 81:f9:84:28:6d:20:ae:bb:16:01:e6:b4:73:e8:b1: + b1:72:37:86:64:ec:db:72:0e:2d:3c:3c:b4:bd:c4: + c5:d8:0d:78:0b:b0:a7:50:e5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E8:39:32:15:C6:01:07:40:E0:11:E2:1D:CD:CE:5B:8E:61:5F:C9:B7 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 93:f9:31:e7:53:ac:f6:b2:a7:d2:5c:2e:37:bc:4e:bc:94:be: + 0f:5f:ba:d4:c7:e7:e1:a8:1a:1f:d3:72:44:f8:7f:79:96:3e: + 9a:9a:f4:95:0b:01:10:dc:6b:ad:2c:fd:c0:b4:a9:ca:dd:54: + a1:60:16:cf:93:4a:ad:dc:e3:61:e0:01:08:7b:59:a4:ca:65: + 02:df:01:a6:de:51:80:52:2d:5b:91:a0:7f:be:b5:ea:69:2b: + 25:e7:9c:50:61:50:6d:df:c3:cc:7d:b4:ce:5d:60:c4:6d:e7: + 2c:94:b9:f6:78:29:e0:c5:4f:21:82:b9:ac:f4:6e:1e:d7:5b: + c1:e3 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ3MTdaFw0yNTEwMDkxMjQ3MTdaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDExGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAxMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDQagUeBORlMjRrxgdK37tqfck78wYQjESe9xBZAi5x +TihI+EFK4O3xaZEgHjpZvMD0Rpm4SFgKXkOgD2YhxJ27LSv19T8xvaSXVvrHUlYo +qaI+PDgkxG8E5YH5hChtIK67FgHmtHPosbFyN4Zk7NtyDi08PLS9xMXYDXgLsKdQ +5QIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBToOTIVxgEHQOAR4h3N +zluOYV/JtzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCT+THn +U6z2sqfSXC43vE68lL4PX7rUx+fhqBof03JE+H95lj6amvSVCwEQ3GutLP3AtKnK +3VShYBbPk0qt3ONh4AEIe1mkymUC3wGm3lGAUi1bkaB/vrXqaSsl55xQYVBt38PM +fbTOXWDEbecslLn2eCngxU8hgrms9G4e11vB4w== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/05.pem b/vpn/coloradio02/keys/05.pem new file mode 100644 index 0000000..80d8ad9 --- /dev/null +++ b/vpn/coloradio02/keys/05.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 13 07:14:55 2015 GMT + Not After : Oct 10 07:14:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:a6:e8:74:63:47:c5:71:ca:00:20:7a:9b:d9: + 70:a1:df:90:ce:77:d0:be:6b:34:ee:24:c3:89:be: + 86:86:93:3a:f8:c1:5f:a8:96:c9:51:12:ec:af:05: + 70:ed:61:2d:bf:37:8e:a5:38:f0:1b:c5:ea:98:9a: + b7:f0:46:b0:b6:b7:95:aa:fb:e5:76:5e:9a:d7:eb: + 48:e2:c0:18:3f:a4:67:50:60:9a:d3:07:a8:89:da: + 75:f7:fb:19:31:37:62:1b:4a:1c:99:5e:ae:87:46: + 0f:9b:64:46:88:89:f9:64:07:db:4c:3c:25:44:b6: + c2:ff:10:d8:11:cb:8d:1e:f1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0A:16:B0:54:73:46:D6:27:12:C8:A1:2E:87:61:6A:E4:5B:08:5E:B4 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a0:cb:10:73:c3:36:b6:0f:d5:a0:8e:56:1e:21:7d:18:3b:de: + b0:57:71:1d:9a:c4:da:5b:fe:07:b7:d4:6d:e0:52:bc:77:5a: + 32:be:09:a9:cc:a3:4f:9a:fe:22:66:1f:f2:5a:88:ad:fe:b1: + 48:63:95:d0:11:f0:1b:0e:8c:cc:59:8f:81:b2:eb:69:d3:35: + 5a:56:6a:72:ac:da:92:4a:26:b6:79:b0:78:17:8d:cf:3e:db: + ec:ae:42:20:c3:98:e9:86:ca:28:01:f1:46:ff:b3:83:00:86: + 97:e7:8a:22:82:ff:73:c2:0c:a3:a6:20:0f:5c:d3:0c:98:2b: + b3:11 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTMwNzE0NTVaFw0yNTEwMTAwNzE0NTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAw6bodGNHxXHKACB6m9lwod+QznfQvms07iTDib6GhpM6+MFfqJbJURLsrwVw +7WEtvzeOpTjwG8XqmJq38EawtreVqvvldl6a1+tI4sAYP6RnUGCa0weoidp19/sZ +MTdiG0ocmV6uh0YPm2RGiIn5ZAfbTDwlRLbC/xDYEcuNHvECAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUChawVHNG1icSyKEuh2Fq5FsIXrQwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAoMsQc8M2tg/VoI5WHiF9GDve +sFdxHZrE2lv+B7fUbeBSvHdaMr4JqcyjT5r+ImYf8lqIrf6xSGOV0BHwGw6MzFmP +gbLradM1WlZqcqzakkomtnmweBeNzz7b7K5CIMOY6YbKKAHxRv+zgwCGl+eKIoL/ +c8IMo6YgD1zTDJgrsxE= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/06.pem b/vpn/coloradio02/keys/06.pem new file mode 100644 index 0000000..8abbd6c --- /dev/null +++ b/vpn/coloradio02/keys/06.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Dec 15 11:18:48 2015 GMT + Not After : Dec 12 11:18:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-findel/name=aral-findel/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:11:e0:1e:39:4e:73:48:6b:f1:bb:ad:22:15: + ca:87:13:c1:4b:51:bc:2b:17:39:14:50:29:2b:e1: + 98:22:b2:86:b3:f2:6a:72:67:13:8b:0a:5f:30:af: + 32:0e:80:61:1c:7a:54:54:1b:fd:36:67:e8:b4:08: + 95:e3:18:6a:3a:14:e9:12:46:e2:0f:92:ad:3b:8b: + 6a:e6:9a:f6:9f:62:98:a7:f5:87:c7:ac:01:2a:8f: + f7:e6:94:e9:e8:92:19:78:04:58:a2:07:25:85:a8: + 3b:ac:d0:30:8c:b7:c9:2f:61:74:79:f9:b1:9b:0a: + 0f:cd:54:dc:3e:c8:d9:ba:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E4:9A:75:64:C6:4C:ED:F7:85:C6:85:A1:1A:48:C3:0B:EA:B1:69:CA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 87:6b:83:ce:a7:fb:eb:67:2b:96:4c:9c:bc:40:f0:82:f6:b0: + a8:27:0b:f6:0d:71:3b:4e:11:37:e2:ef:6d:bc:f5:03:c8:bf: + 9a:dc:2b:48:13:14:68:98:f7:0c:15:d0:4a:58:3e:e3:0b:64: + ed:e3:9b:77:79:56:38:7a:69:a4:82:65:3d:81:93:0a:f0:29: + af:06:16:ad:16:aa:75:f7:0f:19:c9:be:2d:7c:76:d4:50:5d: + fb:39:85:f3:3b:4d:75:d5:d9:3c:6c:41:49:87:39:a7:91:6f: + 6a:a9:07:c1:df:f5:09:ee:10:4c:a8:62:1e:89:8f:6b:35:c2: + 93:f6 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEyMTUxMTE4NDhaFw0yNTEyMTIxMTE4NDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1maW5kZWwxFDASBgNVBCkTC2FyYWwtZmluZGVsMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDKEeAeOU5zSGvxu60iFcqHE8FLUbwrFzkUUCkr4Zgisoaz8mpyZxOLCl8w +rzIOgGEcelRUG/02Z+i0CJXjGGo6FOkSRuIPkq07i2rmmvafYpin9YfHrAEqj/fm +lOnokhl4BFiiByWFqDus0DCMt8kvYXR5+bGbCg/NVNw+yNm6EQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBTkmnVkxkzt94XGhaEaSMML6rFpyjCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCHa4POp/vrZyuWTJy8QPCC +9rCoJwv2DXE7ThE34u9tvPUDyL+a3CtIExRomPcMFdBKWD7jC2Tt45t3eVY4emmk +gmU9gZMK8CmvBhatFqp19w8Zyb4tfHbUUF37OYXzO0111dk8bEFJhzmnkW9qqQfB +3/UJ7hBMqGIeiY9rNcKT9g== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/07.pem b/vpn/coloradio02/keys/07.pem new file mode 100644 index 0000000..6073a0f --- /dev/null +++ b/vpn/coloradio02/keys/07.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:05 2016 GMT + Not After : Mar 27 07:47:05 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-berchem/name=aral-berchem/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a4:a7:6f:87:d5:80:f9:97:57:d1:00:77:8c:bc: + aa:ef:fc:7b:1c:ff:fc:3c:74:73:50:2f:77:a3:87: + 8f:6d:2a:64:c0:5c:bb:c4:08:ea:9a:a7:8b:f8:be: + 22:50:28:9d:c3:18:3e:cd:19:24:c6:6a:44:93:b4: + 2a:bf:54:16:df:d2:6f:dd:99:38:f7:a6:78:20:11: + 4d:43:e8:69:ac:ce:4f:5c:d9:d7:d9:f9:c6:09:be: + cd:0b:e5:09:7b:69:c0:8c:e2:6d:4b:c0:66:70:98: + 46:22:4a:80:e2:61:bd:75:b8:db:51:19:95:b7:35: + 01:1e:62:8c:30:8d:ad:f8:47 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E9:2D:0F:9B:FE:30:B0:89:79:22:3A:60:B8:60:13:4C:BF:56:12:4E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1e:a2:4d:fd:47:85:04:02:a2:be:31:82:be:5f:91:6a:63:5d: + e0:ce:02:3f:63:a7:09:5b:6b:aa:c5:75:e4:1d:26:74:f5:ee: + 9a:ad:52:26:36:f0:3a:20:94:a5:4c:63:15:4c:57:74:d8:44: + e1:c7:af:07:5d:cc:4e:7a:f2:11:62:3d:2a:19:58:83:f3:b4: + 94:30:10:15:fb:dc:77:ef:a9:d1:24:46:bb:d8:11:ca:ad:3c: + 66:37:68:4b:d5:a7:02:78:7e:59:7a:ad:23:f2:37:ff:f5:a7: + 4a:2a:fc:e7:e4:00:81:c3:86:5c:ec:a2:90:40:fd:82:10:31: + 8b:6f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MDVaFw0yNjAzMjcwNzQ3MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1iZXJjaGVtMRUwEwYDVQQpEwxhcmFsLWJlcmNoZW0xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAKSnb4fVgPmXV9EAd4y8qu/8exz//Dx0c1Avd6OHj20qZMBcu8QI6pqn +i/i+IlAoncMYPs0ZJMZqRJO0Kr9UFt/Sb92ZOPemeCARTUPoaazOT1zZ19n5xgm+ +zQvlCXtpwIzibUvAZnCYRiJKgOJhvXW421EZlbc1AR5ijDCNrfhHAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOktD5v+MLCJeSI6YLhgE0y/VhJOMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB6iTf1HhQQCor4xgr5f +kWpjXeDOAj9jpwlba6rFdeQdJnT17pqtUiY28DoglKVMYxVMV3TYROHHrwddzE56 +8hFiPSoZWIPztJQwEBX73HfvqdEkRrvYEcqtPGY3aEvVpwJ4fll6rSPyN//1p0oq +/OfkAIHDhlzsopBA/YIQMYtv +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/08.pem b/vpn/coloradio02/keys/08.pem new file mode 100644 index 0000000..714f32f --- /dev/null +++ b/vpn/coloradio02/keys/08.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:20 2016 GMT + Not After : Mar 27 07:47:20 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lallange/name=aral-lallange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b0:8e:29:dc:e0:d3:a5:0c:10:0f:02:74:24:50: + aa:60:4a:9b:45:36:df:b4:4e:07:d4:ae:90:09:c1: + f6:97:7f:93:ee:26:43:42:d6:6c:b4:32:49:46:ce: + 27:c0:95:8c:63:20:19:44:49:cf:cd:28:a2:24:47: + 9b:4e:b4:52:a6:26:92:f2:fb:5d:bf:76:25:06:18: + 8d:51:dd:b8:94:78:2b:ff:16:1d:f3:7a:03:42:6e: + 76:08:c0:01:ec:c8:74:f1:95:64:19:a6:3a:d1:27: + 20:77:f8:d3:7e:4f:22:45:54:73:e3:84:76:a8:09: + fd:a5:86:71:94:8f:0e:74:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:AA:B1:1E:C3:32:5C:14:A9:9D:3E:B3:89:FF:ED:EE:1D:1C:44:C9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a3:42:e2:36:0b:e7:88:b4:21:23:01:1d:ad:6d:3d:2c:7d:03: + 2f:fe:44:e9:9b:1d:e5:a5:fd:a8:b0:c0:3c:b2:a0:ef:0f:7a: + 92:1a:a5:90:5d:a7:d6:e8:8e:50:3c:59:e6:d6:ff:65:86:f5: + 51:7a:e8:e5:9d:6c:f2:72:83:cc:95:29:7e:a8:eb:03:a6:c3: + d9:f0:f9:c1:61:f1:cc:35:d4:42:50:cd:48:fa:6f:47:66:e5: + 1c:4b:fe:33:5a:ad:8c:e6:dc:d6:51:2e:e6:40:1e:ac:63:77: + 73:4a:6c:3e:78:38:9b:8b:28:b3:01:c3:f3:67:a3:18:78:f9: + 1a:b2 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MjBaFw0yNjAzMjcwNzQ3MjBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1sYWxsYW5nZTEWMBQGA1UEKRMNYXJhbC1sYWxsYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAsI4p3ODTpQwQDwJ0JFCqYEqbRTbftE4H1K6QCcH2l3+T7iZDQtZs +tDJJRs4nwJWMYyAZREnPzSiiJEebTrRSpiaS8vtdv3YlBhiNUd24lHgr/xYd83oD +Qm52CMAB7Mh08ZVkGaY60Scgd/jTfk8iRVRz44R2qAn9pYZxlI8OdM0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUwqqxHsMyXBSpnT6zif/t7h0cRMkw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAo0LiNgvniLQhIwEd +rW09LH0DL/5E6Zsd5aX9qLDAPLKg7w96khqlkF2n1uiOUDxZ5tb/ZYb1UXro5Z1s +8nKDzJUpfqjrA6bD2fD5wWHxzDXUQlDNSPpvR2blHEv+M1qtjObc1lEu5kAerGN3 +c0psPng4m4soswHD82ejGHj5GrI= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/09.pem b/vpn/coloradio02/keys/09.pem new file mode 100644 index 0000000..cae11b3 --- /dev/null +++ b/vpn/coloradio02/keys/09.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:34 2016 GMT + Not After : Mar 27 07:47:34 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-echternach/name=aral-echternach/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:4f:ce:e5:90:a0:32:18:b0:75:60:8a:75:97: + 4d:4b:5a:58:72:4e:2f:05:fc:2c:cc:a8:6b:23:18: + 6c:23:2f:a9:6f:d9:65:cf:76:5e:8f:8d:2d:21:fe: + d8:cb:0c:1d:c8:d2:a6:ae:12:a5:2b:1e:95:d2:ae: + af:2d:7d:69:48:b9:ef:ef:d1:d9:7e:ea:a7:b8:3a: + 80:35:6d:4d:94:30:59:b4:26:27:b0:4b:fb:9b:71: + e9:da:fc:ee:f1:e8:9d:2a:5e:31:2c:3a:fd:00:4b: + 47:41:41:73:0b:4d:ec:45:af:40:10:22:9d:38:96: + 58:39:0e:d7:41:fd:ca:6c:21 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 27:55:DE:04:C1:6B:AC:11:8D:4E:61:BF:45:69:11:45:10:84:5E:3E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + da:9a:3a:80:37:e6:24:19:5c:1c:0c:a0:f6:44:fc:26:8c:63: + 0e:c0:82:89:b6:e9:29:cd:49:b1:6e:5f:c9:52:06:90:38:bf: + 37:0f:bf:e0:ab:49:6a:8f:47:09:fc:50:0c:12:9e:92:bf:fd: + 52:c4:28:7a:b6:84:69:25:3b:2a:34:fd:e6:aa:f5:77:e3:29: + d8:92:30:58:60:65:4c:4e:46:5f:82:a8:06:c8:b0:41:a3:84: + e4:b4:7d:f8:b8:16:a7:99:2b:86:53:d0:5d:bc:e4:09:4b:48: + 2e:6a:7d:f5:aa:8b:eb:07:66:0b:a6:2f:04:53:f3:87:a4:34: + cd:3f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MzRaFw0yNjAzMjcwNzQ3MzRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1lY2h0ZXJuYWNoMRgwFgYDVQQpEw9hcmFsLWVjaHRlcm5h +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANNPzuWQoDIYsHVginWXTUtaWHJOLwX8LMyoayMYbCMvqW/Z +Zc92Xo+NLSH+2MsMHcjSpq4SpSseldKury19aUi57+/R2X7qp7g6gDVtTZQwWbQm +J7BL+5tx6dr87vHonSpeMSw6/QBLR0FBcwtN7EWvQBAinTiWWDkO10H9ymwhAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFCdV3gTBa6wRjU5hv0VpEUUQ +hF4+MIHdBgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBANqaOoA35iQZ +XBwMoPZE/CaMYw7Agom26SnNSbFuX8lSBpA4vzcPv+CrSWqPRwn8UAwSnpK//VLE +KHq2hGklOyo0/eaq9XfjKdiSMFhgZUxORl+CqAbIsEGjhOS0ffi4FqeZK4ZT0F28 +5AlLSC5qffWqi+sHZgumLwRT84ekNM0/ +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0A.pem b/vpn/coloradio02/keys/0A.pem new file mode 100644 index 0000000..e679ebf --- /dev/null +++ b/vpn/coloradio02/keys/0A.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:49 2016 GMT + Not After : Mar 27 07:47:49 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich1/name=aral-remich1/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b4:cc:c3:56:fa:32:b1:fc:5a:70:16:37:e4:c2: + 57:5a:d7:a7:fd:3d:f7:1f:fb:da:b2:10:a2:2a:a8: + 18:74:fe:27:40:3a:fd:c8:23:2d:b9:af:f0:39:a5: + 2d:04:df:74:dc:73:79:e9:a4:b4:01:88:ab:51:4a: + fd:f3:a0:56:6b:e3:91:a4:4b:60:79:8a:6b:11:2e: + 89:08:a0:be:c8:60:40:26:7a:a0:49:cf:86:6e:69: + 93:65:9b:75:e8:62:59:79:61:68:c1:e0:c4:b4:ef: + a9:02:81:4f:c9:0a:29:ca:5d:12:13:00:8b:57:20: + d7:05:15:02:fe:1f:7e:57:73 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C9:01:C1:B8:7D:5B:60:3C:B6:85:C7:A1:E8:1A:80:62:C5:34:1B:B9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + af:21:44:09:ee:90:81:1e:08:8f:5b:65:9a:30:3a:5d:9a:a4: + 9b:db:75:02:78:1c:a6:f0:c2:d0:fb:be:40:57:aa:34:f4:03: + 59:0a:d9:36:49:05:e5:99:48:e0:9b:13:e6:ed:81:83:45:0e: + 80:ec:6d:91:74:91:92:2b:cd:37:9b:14:16:23:41:f0:c9:36: + 43:af:2a:25:d5:4e:3c:b0:47:1a:d4:c7:7b:cc:8c:70:9a:9a: + 3c:5e:53:82:97:d9:78:82:b1:7f:59:6c:4a:ba:21:01:13:d3: + cd:85:aa:88:0b:33:91:c2:17:34:34:37:aa:4e:4c:42:26:11: + 1c:8a +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NDlaFw0yNjAzMjcwNzQ3NDlaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gxMRUwEwYDVQQpEwxhcmFsLXJlbWljaDExHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALTMw1b6MrH8WnAWN+TCV1rXp/099x/72rIQoiqoGHT+J0A6/cgjLbmv +8DmlLQTfdNxzeemktAGIq1FK/fOgVmvjkaRLYHmKaxEuiQigvshgQCZ6oEnPhm5p +k2WbdehiWXlhaMHgxLTvqQKBT8kKKcpdEhMAi1cg1wUVAv4ffldzAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFMkBwbh9W2A8toXHoegagGLFNBu5MIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAK8hRAnukIEeCI9bZZow +Ol2apJvbdQJ4HKbwwtD7vkBXqjT0A1kK2TZJBeWZSOCbE+btgYNFDoDsbZF0kZIr +zTebFBYjQfDJNkOvKiXVTjywRxrUx3vMjHCamjxeU4KX2XiCsX9ZbEq6IQET082F +qogLM5HCFzQ0N6pOTEImERyK +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0B.pem b/vpn/coloradio02/keys/0B.pem new file mode 100644 index 0000000..e76c617 --- /dev/null +++ b/vpn/coloradio02/keys/0B.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:52 2016 GMT + Not After : Mar 27 07:47:52 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2/name=aral-remich2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e5:f8:b5:a2:f2:48:9e:4b:a7:3f:ee:d7:9f:2e: + fc:2e:ed:d1:b4:97:89:c2:d9:c1:64:2a:26:13:c2: + ff:20:30:f2:44:28:8a:de:4e:60:35:40:83:98:e1: + 7f:3b:f6:81:a6:87:49:6b:b0:c9:2a:d0:00:6c:8a: + 96:14:65:0f:63:19:83:c0:d3:e4:b8:c4:ee:6e:6b: + 10:a1:89:07:52:92:af:7d:ea:f9:32:a5:a0:3a:bc: + d5:ed:95:df:55:91:e4:92:2c:36:57:35:c5:d3:d8: + 21:d0:05:08:85:b5:dd:96:84:de:f6:7d:10:b2:a4: + 6b:a1:42:42:f4:82:25:a7:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3F:FE:05:D7:07:95:D8:FA:A0:1A:5F:22:D8:54:79:19:50:AE:BD:8E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:f2:c9:ea:59:a4:74:70:31:02:33:08:61:91:5f:8a:6b:21: + d0:9e:2a:24:84:b6:ef:d9:89:42:6c:aa:66:9f:c7:fb:f2:93: + 2e:48:7f:17:09:75:34:99:84:eb:08:41:f4:a7:14:35:9b:cd: + 7c:8c:50:02:0d:a9:c2:56:e8:22:fa:9c:0e:40:9a:c2:37:65: + 95:39:37:79:8c:61:32:8a:93:c7:32:33:0f:a3:ac:ed:99:63: + ee:78:f2:bb:fc:db:8d:83:fa:f6:af:39:79:81:58:4c:95:24: + 33:55:10:2c:41:05:3d:ca:b6:fc:0f:bb:17:05:84:6c:c3:bb: + 84:13 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NTJaFw0yNjAzMjcwNzQ3NTJaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gyMRUwEwYDVQQpEwxhcmFsLXJlbWljaDIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOX4taLySJ5Lpz/u158u/C7t0bSXicLZwWQqJhPC/yAw8kQoit5OYDVA +g5jhfzv2gaaHSWuwySrQAGyKlhRlD2MZg8DT5LjE7m5rEKGJB1KSr33q+TKloDq8 +1e2V31WR5JIsNlc1xdPYIdAFCIW13ZaE3vZ9ELKka6FCQvSCJaenAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFD/+BdcHldj6oBpfIthUeRlQrr2OMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAH/yyepZpHRwMQIzCGGR +X4prIdCeKiSEtu/ZiUJsqmafx/vyky5IfxcJdTSZhOsIQfSnFDWbzXyMUAINqcJW +6CL6nA5AmsI3ZZU5N3mMYTKKk8cyMw+jrO2ZY+548rv8242D+vavOXmBWEyVJDNV +ECxBBT3KtvwPuxcFhGzDu4QT +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0C.pem b/vpn/coloradio02/keys/0C.pem new file mode 100644 index 0000000..ad9ed13 --- /dev/null +++ b/vpn/coloradio02/keys/0C.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:23 2016 GMT + Not After : Mar 27 07:48:23 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schifflange/name=aral-schifflange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d5:4f:31:47:b7:c6:88:96:56:4c:11:06:fe:d2: + c6:4a:c0:b9:42:2d:18:a4:5d:6a:c5:b8:8f:46:6e: + 5e:a6:87:c6:a7:75:05:a1:3d:3e:0b:68:08:a0:ec: + 30:07:73:8b:b3:47:ee:6c:d1:80:08:f1:ae:ca:49: + 6b:7e:05:3d:5b:a5:47:c3:00:66:f9:b0:93:9f:0f: + 06:0b:45:91:31:05:68:af:23:b3:a5:21:5b:46:b4: + 38:b3:47:42:9f:a6:a7:10:3f:cf:60:17:4a:a4:8d: + 84:c2:52:9b:a7:f8:be:13:93:6a:82:af:2e:9a:a4: + ad:34:32:46:3e:1c:14:2d:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0E:BB:A6:45:1D:76:F7:77:D6:D7:DF:8A:BA:84:F4:32:75:2C:ED:8C + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a9:11:e7:44:26:1b:eb:75:d6:25:0f:52:4d:f5:9d:78:6a:a6: + 67:56:be:21:66:62:2b:98:c4:79:07:70:63:41:2c:6e:56:e0: + 23:20:c5:6d:66:9e:c2:70:55:ac:62:f2:9b:c4:49:94:13:3b: + 9f:aa:dd:3e:01:24:c9:0c:61:ba:9d:1e:03:be:04:8f:df:ce: + 2b:71:e8:f7:fe:c5:4e:c2:60:60:2c:10:02:06:3a:6e:35:97: + 72:56:07:77:28:b7:68:8c:ed:a0:03:aa:65:98:66:f6:fe:3e: + 96:08:f7:bf:08:35:de:18:05:eb:c4:97:7c:37:8d:7a:7f:72: + f1:da +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MjNaFw0yNjAzMjcwNzQ4MjNaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1zY2hpZmZsYW5nZTEZMBcGA1UEKRMQYXJhbC1zY2hpZmZs +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA1U8xR7fGiJZWTBEG/tLGSsC5Qi0YpF1qxbiPRm5epofG +p3UFoT0+C2gIoOwwB3OLs0fubNGACPGuyklrfgU9W6VHwwBm+bCTnw8GC0WRMQVo +ryOzpSFbRrQ4s0dCn6anED/PYBdKpI2EwlKbp/i+E5Nqgq8umqStNDJGPhwULWUC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUDrumRR1293fW19+KuoT0 +MnUs7Ywwgd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAqRHnRCYb +63XWJQ9STfWdeGqmZ1a+IWZiK5jEeQdwY0EsblbgIyDFbWaewnBVrGLym8RJlBM7 +n6rdPgEkyQxhup0eA74Ej9/OK3Ho9/7FTsJgYCwQAgY6bjWXclYHdyi3aIztoAOq +ZZhm9v4+lgj3vwg13hgF68SXfDeNen9y8do= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0D.pem b/vpn/coloradio02/keys/0D.pem new file mode 100644 index 0000000..3547333 --- /dev/null +++ b/vpn/coloradio02/keys/0D.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:30 2016 GMT + Not After : Mar 27 07:48:30 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange2/name=aral-rodange2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:12:62:8a:30:47:15:0e:08:6a:46:e6:3d:b4: + 1f:34:52:eb:15:e8:98:3d:e8:1e:e0:7e:a5:11:b3: + ec:3e:1a:07:18:5e:88:57:2b:41:6c:c0:5a:88:ba: + 92:40:6f:e4:a1:59:ab:40:a2:91:ab:3e:bb:49:52: + e1:03:aa:f6:cf:91:77:41:b2:8e:e2:30:85:d7:92: + bd:26:3c:d4:d2:da:68:13:36:8c:70:70:a6:57:8f: + 46:c8:ac:16:c7:d3:4e:64:e9:68:b4:db:84:05:d0: + f5:49:76:f3:44:8e:e4:4c:84:15:a0:43:71:d1:05: + bd:94:84:13:4e:fd:0a:58:05 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2A:AE:E1:B7:0C:64:97:35:D5:68:40:B7:83:14:36:83:FE:53:2C:16 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 9a:f8:a2:78:a8:8e:44:22:cf:5f:09:2e:0b:fb:7b:60:6a:9f: + 3f:3d:89:25:bf:03:92:b4:49:c1:24:e0:ed:e7:98:80:dc:81: + 8d:2c:86:e7:08:4d:94:5b:d4:78:ce:4f:4a:58:e7:05:4a:0f: + 28:51:b3:cd:fb:c7:d3:3e:ae:98:f2:a6:8f:09:49:07:67:ba: + 84:c4:4f:c6:70:58:67:2c:fa:e9:6b:c1:1e:70:18:6e:fd:95: + f0:fa:34:77:d0:9c:d8:16:b2:44:60:f8:1b:15:97:32:53:1b: + 73:f3:91:5c:88:cc:9a:68:85:18:86:0b:5a:38:b3:2c:f1:33: + 7c:39 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MzBaFw0yNjAzMjcwNzQ4MzBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1yb2RhbmdlMjEWMBQGA1UEKRMNYXJhbC1yb2RhbmdlMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA4RJiijBHFQ4IakbmPbQfNFLrFeiYPege4H6lEbPsPhoHGF6IVytB +bMBaiLqSQG/koVmrQKKRqz67SVLhA6r2z5F3QbKO4jCF15K9JjzU0tpoEzaMcHCm +V49GyKwWx9NOZOlotNuEBdD1SXbzRI7kTIQVoENx0QW9lIQTTv0KWAUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUKq7htwxklzXVaEC3gxQ2g/5TLBYw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAmviieKiORCLPXwku +C/t7YGqfPz2JJb8DkrRJwSTg7eeYgNyBjSyG5whNlFvUeM5PSljnBUoPKFGzzfvH +0z6umPKmjwlJB2e6hMRPxnBYZyz66WvBHnAYbv2V8Po0d9Cc2BayRGD4GxWXMlMb +c/ORXIjMmmiFGIYLWjizLPEzfDk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0E.pem b/vpn/coloradio02/keys/0E.pem new file mode 100644 index 0000000..03b42fb --- /dev/null +++ b/vpn/coloradio02/keys/0E.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:50:41 2016 GMT + Not After : Mar 27 07:50:41 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile/name=maroq-belleetoile/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cf:22:e2:62:66:d8:9b:e9:fe:cf:c1:c8:35:89: + 1a:9d:26:f2:fa:0f:8c:f4:fc:9c:e5:bb:21:4b:63: + b9:bb:48:0d:b4:56:ff:94:85:8e:31:ca:c5:52:80: + 93:6c:33:dc:e9:1c:e5:7f:a6:73:f6:ca:4d:6a:1f: + d7:ff:9a:68:26:ef:69:5e:b3:f3:b1:e7:30:64:ca: + f0:6b:aa:3e:c4:d1:e8:35:85:53:33:9e:7e:50:ce: + 65:07:73:cb:5d:d7:8c:91:56:34:94:da:a1:e7:44: + 8a:2a:42:42:9d:b1:33:b7:71:5d:75:5c:f2:e3:5c: + 6b:97:8c:3c:0c:4a:14:62:e3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 32:78:DB:57:01:85:47:51:D7:89:B5:0D:A4:B8:C8:A0:DB:36:DA:EA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 67:2e:a2:74:8e:b7:5b:48:99:fc:c5:38:68:f3:fc:4d:85:44: + 50:3f:e9:f3:6b:3a:6b:26:9a:7c:c3:5b:3e:56:a0:10:e9:91: + 46:00:1e:23:3a:23:da:00:8a:85:5e:50:8c:ea:af:43:f3:c8: + 04:01:43:b9:88:29:ea:d6:8e:3b:3f:52:84:9d:48:3d:51:97: + 63:5e:48:46:50:52:5d:ef:06:d4:88:95:bf:7f:d4:10:6e:65: + 9c:5a:e5:27:07:86:f3:97:39:7b:68:34:73:3c:44:0e:5d:ea: + 84:95:89:68:d1:17:47:5f:81:bc:11:46:58:c6:34:ab:f8:0b: + 66:7b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUwNDFaFw0yNjAzMjcwNzUwNDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRbWFyb3EtYmVsbGVldG9pbGUxGjAYBgNVBCkTEW1hcm9xLWJlbGxl +ZXRvaWxlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDPIuJiZtib6f7Pwcg1iRqdJvL6D4z0/JzluyFLY7m7 +SA20Vv+UhY4xysVSgJNsM9zpHOV/pnP2yk1qH9f/mmgm72les/Ox5zBkyvBrqj7E +0eg1hVMznn5QzmUHc8td14yRVjSU2qHnRIoqQkKdsTO3cV11XPLjXGuXjDwMShRi +4wIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQyeNtXAYVHUdeJtQ2k +uMig2zba6jCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBnLqJ0 +jrdbSJn8xTho8/xNhURQP+nzazprJpp8w1s+VqAQ6ZFGAB4jOiPaAIqFXlCM6q9D +88gEAUO5iCnq1o47P1KEnUg9UZdjXkhGUFJd7wbUiJW/f9QQbmWcWuUnB4bzlzl7 +aDRzPEQOXeqElYlo0RdHX4G8EUZYxjSr+Atmew== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/0F.pem b/vpn/coloradio02/keys/0F.pem new file mode 100644 index 0000000..3376cc2 --- /dev/null +++ b/vpn/coloradio02/keys/0F.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:52:33 2016 GMT + Not After : Mar 27 07:52:33 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=bp-capellen/name=bp-capellen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:8b:28:f1:66:1c:65:dd:c8:de:bd:ef:a4:6c: + 12:7c:0b:a6:7d:6b:06:66:8e:b7:56:e7:e5:f3:ea: + 70:16:61:7b:b2:f4:2c:89:8f:5b:be:a5:ac:ab:91: + 4e:9b:d5:f8:ae:d1:92:8a:cb:0b:e5:e0:6e:76:ae: + 3d:9c:69:7b:4b:1e:05:2a:40:9b:0b:02:81:4d:78: + 01:ce:cc:f5:4d:a3:0a:51:68:6a:91:46:6c:5d:4d: + 15:a2:86:f4:2d:76:39:7d:59:4f:5b:4a:8b:cb:e4: + 84:ca:df:29:e5:21:63:85:eb:34:2c:8d:7d:f8:49: + bc:be:1a:42:c9:96:52:6d:2d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B7:AD:4C:4D:CC:11:99:97:B8:F9:21:C6:A3:EA:D7:5D:68:C7:3F:DD + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + bc:a7:77:5c:ff:b2:d0:39:c0:19:62:1a:61:c7:8e:40:1d:d1: + d5:6d:cf:79:3b:37:29:54:c3:4f:2e:09:c4:c4:48:da:f8:c8: + cd:6b:f1:01:41:0b:bf:ea:9e:a6:50:30:e9:3d:79:ba:1c:0b: + c2:cc:66:9a:1f:f0:32:a0:cd:8c:27:c6:ff:2f:04:fa:26:8d: + 3d:0b:6a:39:41:d0:94:41:68:c2:50:55:6c:37:31:65:4a:68: + a5:f9:49:1d:34:3e:00:82:5d:17:39:d1:3c:d8:f5:26:f0:ff: + 6c:df:0a:f1:8c:a1:49:d2:50:10:44:9f:b8:8d:51:93:45:3b: + 30:8c +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUyMzNaFw0yNjAzMjcwNzUyMzNaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYnAtY2FwZWxsZW4xFDASBgNVBCkTC2JwLWNhcGVsbGVuMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDDiyjxZhxl3cjeve+kbBJ8C6Z9awZmjrdW5+Xz6nAWYXuy9CyJj1u+payr +kU6b1fiu0ZKKywvl4G52rj2caXtLHgUqQJsLAoFNeAHOzPVNowpRaGqRRmxdTRWi +hvQtdjl9WU9bSovL5ITK3ynlIWOF6zQsjX34Sby+GkLJllJtLQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS3rUxNzBGZl7j5Icaj6tddaMc/3TCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQC8p3dc/7LQOcAZYhphx45A +HdHVbc95OzcpVMNPLgnExEja+MjNa/EBQQu/6p6mUDDpPXm6HAvCzGaaH/AyoM2M +J8b/LwT6Jo09C2o5QdCUQWjCUFVsNzFlSmil+UkdND4Agl0XOdE82PUm8P9s3wrx +jKFJ0lAQRJ+4jVGTRTswjA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/10.pem b/vpn/coloradio02/keys/10.pem new file mode 100644 index 0000000..9ce664c --- /dev/null +++ b/vpn/coloradio02/keys/10.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 13 07:26:40 2016 GMT + Not After : Apr 11 07:26:40 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station01/name=dks-station01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c8:e3:88:d0:e4:54:91:f1:bf:a3:f5:ed:44:cf: + c9:9b:e8:9c:0f:f9:f5:74:10:fc:66:3e:6e:2c:20: + 5d:5b:8a:79:03:55:65:50:f4:56:b9:ca:09:38:8c: + c4:7d:45:75:b4:d6:e2:1d:49:73:a8:93:e5:a7:e1: + fc:4b:3c:63:1f:7c:26:1c:ec:0d:3f:f2:38:fc:68: + 0d:d4:02:2f:53:3c:15:c0:d0:29:10:7b:fe:0b:05: + 4b:42:3f:ed:d8:90:e6:11:fc:f0:3e:79:00:5e:57: + e6:bc:4b:3c:9d:81:86:d0:8b:ba:62:33:b6:90:12: + 6d:fa:46:fb:59:cc:09:8f:d3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 1B:A4:F7:11:00:41:ED:E5:FF:00:B9:8E:96:DD:D5:9B:DA:F8:43:88 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 00:41:c2:f9:8a:f7:a6:a5:7f:c7:5e:e3:35:2d:b8:a4:8b:91: + 8f:8f:ac:69:bf:06:b9:1e:cc:58:06:52:56:b6:a5:8c:ad:5c: + 43:8a:08:27:ed:99:7f:0e:0e:77:1c:de:97:56:8b:87:af:6a: + d0:b4:20:93:96:18:af:ce:66:04:e5:63:87:bf:7d:d8:38:37: + e8:91:4a:f6:dc:bb:f1:5e:8e:f5:07:5b:71:c4:84:2f:a5:23: + 5f:cf:db:b6:a9:c7:e0:73:e3:3c:17:44:d0:cc:33:4d:d0:28: + 6a:0a:fa:e7:20:c1:46:90:cc:bf:99:8e:b9:46:80:34:d3:f9: + 71:7f +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA0MTMwNzI2NDBaFw0yNjA0MTEwNzI2NDBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMTEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAyOOI0ORUkfG/o/XtRM/Jm+icD/n1dBD8Zj5uLCBdW4p5A1VlUPRW +ucoJOIzEfUV1tNbiHUlzqJPlp+H8SzxjH3wmHOwNP/I4/GgN1AIvUzwVwNApEHv+ +CwVLQj/t2JDmEfzwPnkAXlfmvEs8nYGG0Iu6YjO2kBJt+kb7WcwJj9MCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUG6T3EQBB7eX/ALmOlt3Vm9r4Q4gw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAAEHC+Yr3pqV/x17j +NS24pIuRj4+sab8GuR7MWAZSVraljK1cQ4oIJ+2Zfw4Odxzel1aLh69q0LQgk5YY +r85mBOVjh7992Dg36JFK9ty78V6O9QdbccSEL6UjX8/btqnH4HPjPBdE0MwzTdAo +agr65yDBRpDMv5mOuUaANNP5cX8= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/11.pem b/vpn/coloradio02/keys/11.pem new file mode 100644 index 0000000..3301582 --- /dev/null +++ b/vpn/coloradio02/keys/11.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:32 2016 GMT + Not After : Apr 29 10:01:32 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station02/name=dks-station02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:44:12:af:2f:69:33:22:36:8f:3a:bc:9d:21: + bf:85:92:3d:8f:5f:3e:5d:0a:cf:83:fd:7c:a1:4a: + d6:5c:60:00:e5:c9:2a:bd:10:d8:00:4c:68:20:b9: + dd:80:0f:37:e7:1d:fa:84:57:05:a4:cc:0a:36:44: + 43:62:48:be:a5:1e:b0:c9:37:9f:09:8a:8e:f6:d8: + 59:ff:2d:4e:52:40:e1:e4:5c:16:d5:77:a8:9e:c7: + 7d:64:44:80:83:ec:b2:82:5c:5f:67:0b:21:6c:b7: + a4:63:2d:cb:75:50:ec:49:36:0f:f7:6c:10:83:07: + 50:a8:fc:e1:61:cd:be:51:e1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 01:F7:3F:18:AE:3A:49:A9:45:80:EF:7A:C9:9B:92:13:F9:1C:CF:15 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 24:26:bc:f9:d7:91:2d:1a:6d:9e:cd:75:fa:da:e3:cf:07:6d: + c2:9c:58:f6:9a:7f:70:f6:c6:2a:88:02:0a:51:75:f4:bd:0b: + 4b:fb:5b:33:ca:a5:0a:30:52:58:8c:f9:d5:ba:f0:d0:76:7a: + 3e:cd:63:ee:dd:da:f3:ea:f1:b5:90:1a:6a:54:ed:cb:c1:52: + ff:32:a4:ff:5d:24:c5:07:1b:10:07:1b:64:5a:f0:ba:76:51: + a7:28:73:53:df:f6:98:a7:84:23:81:d9:23:d4:e3:8e:ee:11: + 60:75:a4:e1:25:4c:b0:92:ed:ff:1f:ef:08:01:d9:54:24:bd: + a9:04 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxMzJaFw0yNjA0MjkxMDAxMzJaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMjEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA70QSry9pMyI2jzq8nSG/hZI9j18+XQrPg/18oUrWXGAA5ckqvRDY +AExoILndgA835x36hFcFpMwKNkRDYki+pR6wyTefCYqO9thZ/y1OUkDh5FwW1Xeo +nsd9ZESAg+yyglxfZwshbLekYy3LdVDsSTYP92wQgwdQqPzhYc2+UeECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAfc/GK46SalFgO96yZuSE/kczxUw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAJCa8+deRLRptns11 ++trjzwdtwpxY9pp/cPbGKogCClF19L0LS/tbM8qlCjBSWIz51brw0HZ6Ps1j7t3a +8+rxtZAaalTty8FS/zKk/10kxQcbEAcbZFrwunZRpyhzU9/2mKeEI4HZI9Tjju4R +YHWk4SVMsJLt/x/vCAHZVCS9qQQ= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/12.pem b/vpn/coloradio02/keys/12.pem new file mode 100644 index 0000000..04dac5e --- /dev/null +++ b/vpn/coloradio02/keys/12.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:46 2016 GMT + Not After : Apr 29 10:01:46 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station03/name=dks-station03/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ba:bb:18:67:40:ab:b0:57:c2:03:bf:21:74:9f: + f4:a8:5c:3c:90:78:45:27:90:e7:29:88:19:0b:3b: + 71:e9:4e:83:39:38:64:45:29:80:83:4b:32:98:73: + 87:00:f3:33:c9:45:d7:70:c5:c8:3f:22:42:1a:f8: + 63:02:2c:8e:60:fc:be:7b:bd:8b:20:ef:7b:15:0d: + dc:f7:9c:e0:1b:24:80:26:71:3b:6c:78:90:f3:f8: + f3:02:ae:08:4e:0e:e1:43:90:dd:68:7f:83:e2:d3: + 75:e3:2f:ae:dc:17:94:ca:16:b4:0b:6a:16:01:82: + 62:4c:fc:86:94:4b:5c:c1:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 21:93:A7:4C:1E:CF:5B:84:4B:57:F0:5B:F6:77:A1:67:2A:38:ED:FE + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 84:53:36:bf:26:60:e1:d9:e9:07:cb:84:49:a6:92:23:62:ae: + 4a:e0:8d:6a:76:ae:ee:c2:5a:b5:ec:aa:8f:4a:f0:dd:4a:30: + 4a:73:f0:bb:b2:ee:1d:57:e2:c2:22:7a:71:b7:52:10:cc:32: + 46:f7:e8:71:63:d6:68:de:75:ad:b1:08:05:3f:31:c3:c7:64: + 80:69:b8:3e:c2:3b:3f:7a:07:a1:b1:9d:eb:3d:18:6c:43:df: + ac:48:ab:41:41:f9:e8:2b:5b:4c:b7:64:73:17:01:4a:45:41: + 20:17:8c:63:4a:fb:85:5a:4f:f9:24:0d:10:ff:4d:e8:bc:cd: + 52:c9 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxNDZaFw0yNjA0MjkxMDAxNDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMzEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMzEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAursYZ0CrsFfCA78hdJ/0qFw8kHhFJ5DnKYgZCztx6U6DOThkRSmA +g0symHOHAPMzyUXXcMXIPyJCGvhjAiyOYPy+e72LIO97FQ3c95zgGySAJnE7bHiQ +8/jzAq4ITg7hQ5DdaH+D4tN14y+u3BeUyha0C2oWAYJiTPyGlEtcwXsCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIZOnTB7PW4RLV/Bb9nehZyo47f4w +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAhFM2vyZg4dnpB8uE +SaaSI2KuSuCNanau7sJateyqj0rw3UowSnPwu7LuHVfiwiJ6cbdSEMwyRvfocWPW +aN51rbEIBT8xw8dkgGm4PsI7P3oHobGd6z0YbEPfrEirQUH56CtbTLdkcxcBSkVB +IBeMY0r7hVpP+SQNEP9N6LzNUsk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/13.pem b/vpn/coloradio02/keys/13.pem new file mode 100644 index 0000000..411fc11 --- /dev/null +++ b/vpn/coloradio02/keys/13.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 23 08:01:13 2016 GMT + Not After : May 21 08:01:13 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl2/name=aral-merl2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:28:b9:b9:3b:1f:d8:9e:fb:48:0b:39:69:22: + a9:a8:fa:07:cb:62:dc:47:3e:a3:9f:22:09:91:13: + 58:e8:3d:c3:e3:dd:e4:52:ac:4c:82:b7:89:41:84: + e2:cf:dd:f1:18:fd:ab:7b:e0:b2:ee:3e:81:2f:7c: + c5:53:56:7a:e3:6e:e7:13:04:14:cd:95:15:f7:31: + ae:c6:50:de:f1:56:cd:7b:bf:3d:fc:dd:00:4e:1f: + 48:b2:b4:de:a5:e2:26:0e:97:27:2a:34:8a:6f:93: + 9e:72:bc:02:e3:d8:38:b7:1c:b2:6a:0f:93:62:57: + 03:ce:69:f6:f9:2e:07:ca:4d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:B5:5B:8D:A5:2C:46:9B:A9:86:9A:BE:38:66:51:F5:CE:19:A0:28 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + cd:5b:18:07:76:31:78:d1:a3:10:21:13:7d:2a:40:63:5c:ca: + 30:6d:d3:0f:81:7e:cc:48:7a:f6:48:00:ae:7a:25:26:00:1c: + 60:ef:15:c3:c4:a4:1c:54:8b:80:a0:d2:02:79:82:62:ee:11: + 1a:39:71:cf:70:fb:79:6f:bb:76:89:dc:96:e0:4e:f9:72:22: + f0:2e:be:ec:2d:af:34:ac:05:96:e3:74:09:a5:4b:5b:f5:07: + 92:56:4c:05:fa:c6:f0:72:90:44:75:f3:3e:68:21:5e:0e:89: + 76:0b:06:83:f1:e9:3a:2c:0c:2f:fc:00:9e:35:92:a2:65:39: + 51:d3 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MjMwODAxMTNaFw0yNjA1MjEwODAxMTNaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1tZXJsMjETMBEGA1UEKRMKYXJhbC1tZXJsMjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA0yi5uTsf2J77SAs5aSKpqPoHy2LcRz6jnyIJkRNY6D3D493kUqxMgreJQYTi +z93xGP2re+Cy7j6BL3zFU1Z6427nEwQUzZUV9zGuxlDe8VbNe789/N0ATh9IsrTe +peImDpcnKjSKb5OecrwC49g4txyyag+TYlcDzmn2+S4Hyk0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUdrVbjaUsRpuphpq+OGZR9c4ZoCgwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAzVsYB3YxeNGjECETfSpAY1zK +MG3TD4F+zEh69kgArnolJgAcYO8Vw8SkHFSLgKDSAnmCYu4RGjlxz3D7eW+7donc +luBO+XIi8C6+7C2vNKwFluN0CaVLW/UHklZMBfrG8HKQRHXzPmghXg6JdgsGg/Hp +OiwML/wAnjWSomU5UdM= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/14.pem b/vpn/coloradio02/keys/14.pem new file mode 100644 index 0000000..9e3b580 --- /dev/null +++ b/vpn/coloradio02/keys/14.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:46:49 2017 GMT + Not After : Nov 20 14:46:49 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup/name=dks-backup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cb:9c:82:7b:ad:96:c6:51:56:ee:a0:0f:56:82: + de:6a:93:d5:ab:9f:42:b8:a7:27:5b:de:1e:2b:10: + 34:49:7a:a9:b0:e4:64:24:98:a1:2d:58:33:fb:c6: + 8a:5d:2a:64:a3:4d:35:88:04:34:89:68:ea:8a:07: + ff:a6:1e:f6:56:3d:7e:67:b9:ae:e1:72:1e:71:28: + bd:61:ef:8d:d1:89:09:e3:06:c3:a4:bf:aa:36:6c: + ff:7b:f8:d6:16:23:22:d4:ce:15:98:73:36:98:9e: + da:97:07:1a:ab:5f:6c:17:6b:c9:ed:9e:18:4f:fc: + 0a:9c:8f:47:8c:8a:d9:21:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 04:7F:8A:31:2E:C2:3B:E9:DA:7F:EF:C5:85:3A:FB:7B:36:43:6D:0B + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c8:48:ee:77:fd:6b:5e:1b:83:28:79:8a:ce:52:8c:86:97:91: + da:15:64:32:87:b2:87:ab:72:19:9f:ef:49:eb:1d:4a:01:82: + e5:d7:32:bb:aa:c1:82:7d:09:a4:97:7c:16:42:ce:d4:02:2e: + 9c:4a:31:47:71:33:69:8c:69:af:7c:01:d7:09:fe:82:22:2a: + 71:4f:c6:6b:0d:cd:01:e6:1a:03:c8:db:a3:dd:76:67:e7:f4: + bd:92:f5:33:8e:4f:83:51:5b:a3:2c:06:b6:41:c3:ea:cd:0a: + 58:af:a6:3d:ba:90:68:f0:a5:cf:82:16:71:dd:cf:53:51:98: + ba:25 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ2NDlaFw0yNzExMjAxNDQ2NDlaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWJhY2t1cDETMBEGA1UEKRMKZGtzLWJhY2t1cDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAy5yCe62WxlFW7qAPVoLeapPVq59CuKcnW94eKxA0SXqpsORkJJihLVgz+8aK +XSpko001iAQ0iWjqigf/ph72Vj1+Z7mu4XIecSi9Ye+N0YkJ4wbDpL+qNmz/e/jW +FiMi1M4VmHM2mJ7alwcaq19sF2vJ7Z4YT/wKnI9HjIrZId8CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUBH+KMS7CO+naf+/FhTr7ezZDbQswgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAyEjud/1rXhuDKHmKzlKMhpeR +2hVkMoeyh6tyGZ/vSesdSgGC5dcyu6rBgn0JpJd8FkLO1AIunEoxR3EzaYxpr3wB +1wn+giIqcU/Gaw3NAeYaA8jbo912Z+f0vZL1M45Pg1FboywGtkHD6s0KWK+mPbqQ +aPClz4IWcd3PU1GYuiU= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/15.pem b/vpn/coloradio02/keys/15.pem new file mode 100644 index 0000000..763160b --- /dev/null +++ b/vpn/coloradio02/keys/15.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:16 2017 GMT + Not After : Nov 20 14:47:16 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup/name=dks-homebackup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:7f:f1:3f:78:d1:20:83:c6:65:6c:b0:7c:3d: + 51:b1:ff:3b:c1:e5:7b:3a:eb:94:da:38:26:d9:77: + f4:b2:fc:d9:08:a7:88:cd:ef:2d:21:2a:13:72:65: + 54:6a:6d:d9:ae:21:49:37:ab:4b:40:78:fe:95:42: + 30:7f:e9:7f:39:58:d3:78:c2:25:21:8e:0a:dd:18: + ea:e2:bc:21:e4:a1:ee:78:a8:cd:f2:bb:b6:4b:61: + 93:52:48:c3:18:60:88:4d:e5:35:c3:55:fe:48:ff: + 73:4d:29:03:0e:d5:f9:ae:17:35:ea:63:f0:58:f8: + 69:32:e8:d5:4a:20:7a:b4:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + D6:DF:0D:3E:14:BA:DD:69:04:67:76:69:CF:71:22:F1:1D:04:CA:07 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c2:39:26:33:7b:75:fb:fd:37:b5:4c:41:34:a1:8e:b1:fb:82: + bc:75:74:c8:38:62:40:a6:72:c2:38:73:16:90:e3:e3:b6:49: + 3f:f4:9d:9e:81:0b:bd:d0:1b:88:cb:81:45:42:c6:2d:58:d3: + 41:70:30:3d:38:b7:c6:88:d9:08:b4:2f:09:7e:11:5e:2d:11: + d8:47:be:41:41:33:f5:cf:c4:1d:48:ea:fb:a6:d2:e0:b1:e6: + 52:57:65:88:8c:aa:5b:19:11:a7:a5:12:1a:0d:12:a9:bd:db: + 9a:ac:ed:63:c7:8c:f8:5c:e0:b9:6d:9f:c5:40:0f:5e:71:6e: + e9:7a +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MTZaFw0yNzExMjAxNDQ3MTZaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOZGtzLWhvbWViYWNrdXAxFzAVBgNVBCkTDmRrcy1ob21lYmFja3Vw +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDaf/E/eNEgg8ZlbLB8PVGx/zvB5Xs665TaOCbZd/Sy/NkIp4jN +7y0hKhNyZVRqbdmuIUk3q0tAeP6VQjB/6X85WNN4wiUhjgrdGOrivCHkoe54qM3y +u7ZLYZNSSMMYYIhN5TXDVf5I/3NNKQMO1fmuFzXqY/BY+Gky6NVKIHq0gQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTW3w0+FLrdaQRndmnPcSLxHQTK +BzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDCOSYze3X7/Te1 +TEE0oY6x+4K8dXTIOGJApnLCOHMWkOPjtkk/9J2egQu90BuIy4FFQsYtWNNBcDA9 +OLfGiNkItC8JfhFeLRHYR75BQTP1z8QdSOr7ptLgseZSV2WIjKpbGRGnpRIaDRKp +vduarO1jx4z4XOC5bZ/FQA9ecW7peg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/16.pem b/vpn/coloradio02/keys/16.pem new file mode 100644 index 0000000..59a39e8 --- /dev/null +++ b/vpn/coloradio02/keys/16.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:30 2017 GMT + Not After : Nov 20 14:47:30 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac/name=dks-ksmac/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:f2:8c:4e:ad:af:34:75:42:0f:a7:81:58:f7:f7: + ea:e3:ba:db:0f:12:2d:c9:87:7d:86:4d:47:f2:f1: + 86:b1:a7:de:42:07:73:54:89:6d:03:37:62:28:d9: + c0:f5:5c:a8:77:7e:c9:55:81:51:52:94:63:16:c8: + 4a:8a:ed:83:86:5c:35:2d:70:6b:5c:15:76:2a:65: + 97:3a:a9:ce:ac:c0:c3:4b:a3:b1:69:8f:d4:14:b8: + 32:fb:25:8a:b6:4e:cd:03:6b:ef:14:1f:32:16:84: + 0b:bb:7a:1a:96:42:1c:77:51:fd:1e:9e:91:ae:44: + d9:53:02:1d:de:ac:91:13:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FD:1D:CA:F1:A2:E5:CB:E3:A6:61:AB:64:0F:7F:0F:9E:48:B1:A6:95 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:87:45:1d:f2:d5:1e:b4:05:52:32:16:1b:80:e8:b4:f3:91: + 76:50:66:9e:b5:bf:b2:88:f5:42:ac:fa:63:27:3a:6c:f0:9f: + 42:33:68:d7:69:bb:91:fa:e5:56:8a:61:f6:e3:91:fd:55:4a: + 4e:96:9d:c7:1c:95:44:71:a8:92:94:ac:24:36:05:c6:79:95: + 57:49:bd:f6:81:85:52:c7:27:9c:84:26:e5:ab:75:69:5b:af: + 57:38:49:b6:f7:a1:13:24:30:4f:a7:14:9a:33:46:8a:92:56: + 8b:b3:25:de:4c:34:85:44:70:ab:90:24:59:44:b0:bc:d7:b9: + 52:4c +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MzBaFw0yNzExMjAxNDQ3MzBaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJZGtzLWtzbWFjMRIwEAYDVQQpEwlka3Mta3NtYWMxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +APKMTq2vNHVCD6eBWPf36uO62w8SLcmHfYZNR/LxhrGn3kIHc1SJbQM3YijZwPVc +qHd+yVWBUVKUYxbISortg4ZcNS1wa1wVdipllzqpzqzAw0ujsWmP1BS4MvslirZO +zQNr7xQfMhaEC7t6GpZCHHdR/R6eka5E2VMCHd6skRMdAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFP0dyvGi5cvjpmGrZA9/D55IsaaVMIHdBgNVHSME +gdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADKHRR3y1R60BVIyFhuA6LTzkXZQ +Zp61v7KI9UKs+mMnOmzwn0IzaNdpu5H65VaKYfbjkf1VSk6WnccclURxqJKUrCQ2 +BcZ5lVdJvfaBhVLHJ5yEJuWrdWlbr1c4Sbb3oRMkME+nFJozRoqSVouzJd5MNIVE +cKuQJFlEsLzXuVJM +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/17.pem b/vpn/coloradio02/keys/17.pem new file mode 100644 index 0000000..0de5244 --- /dev/null +++ b/vpn/coloradio02/keys/17.pem @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:46 2017 GMT + Not After : Nov 20 14:47:46 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmachome/name=dks-ksmachome/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a0:c4:8c:eb:a8:d0:25:f0:09:a7:26:74:0d:d2: + b4:a9:2d:c4:dc:2d:80:56:5a:e3:20:1c:cf:a4:8a: + 2e:e7:d1:2b:0b:85:c4:8e:d8:2a:0a:e6:95:51:42: + b7:29:74:2d:62:49:96:6f:cc:fd:47:da:92:e2:3d: + 75:f0:87:1f:b0:31:3a:56:79:89:e6:9e:db:18:eb: + 49:ae:ad:ce:c0:83:6e:8e:82:8d:6d:ff:1b:6a:03: + 91:69:c7:a5:7a:68:30:15:e9:56:72:da:59:9f:5d: + 9b:a9:79:69:aa:28:5a:b6:cb:e0:7c:90:2f:b1:0e: + 80:8e:8e:01:05:e6:89:49:15 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 4A:4D:42:15:D0:32:86:4B:74:7F:9F:A1:AD:8B:07:C1:C8:5F:C7:E2 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:17:ef:f8:82:05:ee:c2:b8:8a:85:15:a7:15:05:64:b4:4d: + 4a:22:af:c3:a5:0e:96:c7:6e:b9:c5:15:08:b1:ed:57:aa:d0: + 7f:f2:66:b5:ab:62:47:4e:95:6d:96:be:38:55:e6:ac:c3:29: + b8:cb:88:60:5f:3a:25:05:4c:ba:af:09:de:5a:f3:bd:20:de: + 16:62:8a:d9:65:0a:4c:ef:64:41:64:f6:0d:4b:4c:7e:3e:17: + 72:d9:15:c2:31:8b:14:ea:d0:41:41:2b:ca:04:6f:0a:66:d5: + 68:f4:3a:e0:6a:6c:28:7e:ca:8e:3e:1e:97:35:23:a0:d7:d7: + e5:46 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3NDZaFw0yNzExMjAxNDQ3NDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLWtzbWFjaG9tZTEWMBQGA1UEKRMNZGtzLWtzbWFjaG9tZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAoMSM66jQJfAJpyZ0DdK0qS3E3C2AVlrjIBzPpIou59ErC4XEjtgq +CuaVUUK3KXQtYkmWb8z9R9qS4j118IcfsDE6VnmJ5p7bGOtJrq3OwINujoKNbf8b +agORacelemgwFelWctpZn12bqXlpqihatsvgfJAvsQ6Ajo4BBeaJSRUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUSk1CFdAyhkt0f5+hrYsHwchfx+Iw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAaRfv+IIF7sK4ioUV +pxUFZLRNSiKvw6UOlsduucUVCLHtV6rQf/JmtatiR06VbZa+OFXmrMMpuMuIYF86 +JQVMuq8J3lrzvSDeFmKK2WUKTO9kQWT2DUtMfj4XctkVwjGLFOrQQUErygRvCmbV +aPQ64GpsKH7Kjj4elzUjoNfX5UY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-berchem.crt b/vpn/coloradio02/keys/aral-berchem.crt new file mode 100644 index 0000000..6073a0f --- /dev/null +++ b/vpn/coloradio02/keys/aral-berchem.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 7 (0x7) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:05 2016 GMT + Not After : Mar 27 07:47:05 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-berchem/name=aral-berchem/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a4:a7:6f:87:d5:80:f9:97:57:d1:00:77:8c:bc: + aa:ef:fc:7b:1c:ff:fc:3c:74:73:50:2f:77:a3:87: + 8f:6d:2a:64:c0:5c:bb:c4:08:ea:9a:a7:8b:f8:be: + 22:50:28:9d:c3:18:3e:cd:19:24:c6:6a:44:93:b4: + 2a:bf:54:16:df:d2:6f:dd:99:38:f7:a6:78:20:11: + 4d:43:e8:69:ac:ce:4f:5c:d9:d7:d9:f9:c6:09:be: + cd:0b:e5:09:7b:69:c0:8c:e2:6d:4b:c0:66:70:98: + 46:22:4a:80:e2:61:bd:75:b8:db:51:19:95:b7:35: + 01:1e:62:8c:30:8d:ad:f8:47 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E9:2D:0F:9B:FE:30:B0:89:79:22:3A:60:B8:60:13:4C:BF:56:12:4E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 1e:a2:4d:fd:47:85:04:02:a2:be:31:82:be:5f:91:6a:63:5d: + e0:ce:02:3f:63:a7:09:5b:6b:aa:c5:75:e4:1d:26:74:f5:ee: + 9a:ad:52:26:36:f0:3a:20:94:a5:4c:63:15:4c:57:74:d8:44: + e1:c7:af:07:5d:cc:4e:7a:f2:11:62:3d:2a:19:58:83:f3:b4: + 94:30:10:15:fb:dc:77:ef:a9:d1:24:46:bb:d8:11:ca:ad:3c: + 66:37:68:4b:d5:a7:02:78:7e:59:7a:ad:23:f2:37:ff:f5:a7: + 4a:2a:fc:e7:e4:00:81:c3:86:5c:ec:a2:90:40:fd:82:10:31: + 8b:6f +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBBzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MDVaFw0yNjAzMjcwNzQ3MDVaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1iZXJjaGVtMRUwEwYDVQQpEwxhcmFsLWJlcmNoZW0xHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAKSnb4fVgPmXV9EAd4y8qu/8exz//Dx0c1Avd6OHj20qZMBcu8QI6pqn +i/i+IlAoncMYPs0ZJMZqRJO0Kr9UFt/Sb92ZOPemeCARTUPoaazOT1zZ19n5xgm+ +zQvlCXtpwIzibUvAZnCYRiJKgOJhvXW421EZlbc1AR5ijDCNrfhHAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOktD5v+MLCJeSI6YLhgE0y/VhJOMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAB6iTf1HhQQCor4xgr5f +kWpjXeDOAj9jpwlba6rFdeQdJnT17pqtUiY28DoglKVMYxVMV3TYROHHrwddzE56 +8hFiPSoZWIPztJQwEBX73HfvqdEkRrvYEcqtPGY3aEvVpwJ4fll6rSPyN//1p0oq +/OfkAIHDhlzsopBA/YIQMYtv +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-berchem.csr b/vpn/coloradio02/keys/aral-berchem.csr new file mode 100644 index 0000000..c718e89 --- /dev/null +++ b/vpn/coloradio02/keys/aral-berchem.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLWJlcmNoZW0xFTATBgNVBCkT +DGFyYWwtYmVyY2hlbTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEApKdvh9WA+ZdX0QB3jLyq7/x7HP/8PHRz +UC93o4ePbSpkwFy7xAjqmqeL+L4iUCidwxg+zRkkxmpEk7Qqv1QW39Jv3Zk496Z4 +IBFNQ+hprM5PXNnX2fnGCb7NC+UJe2nAjOJtS8BmcJhGIkqA4mG9dbjbURmVtzUB +HmKMMI2t+EcCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAFfcrLWc4h6y2SSZnCdd +PDdiXzOGehByLexIgJPVtZvUm+yzYpOr5nd9alxtcOos+uib0rq10w0HUZyXcsAM +0P3tgFesTrx1ulqJE+v10F/U1bMiuz7bLyy0currYEgx4oPOvJ/lm+fT032qKgGu +c4DBjQkytEeKABqfMk5FHgzI +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-berchem.key b/vpn/coloradio02/keys/aral-berchem.key new file mode 100644 index 0000000..17a2538 --- /dev/null +++ b/vpn/coloradio02/keys/aral-berchem.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAKSnb4fVgPmXV9EA +d4y8qu/8exz//Dx0c1Avd6OHj20qZMBcu8QI6pqni/i+IlAoncMYPs0ZJMZqRJO0 +Kr9UFt/Sb92ZOPemeCARTUPoaazOT1zZ19n5xgm+zQvlCXtpwIzibUvAZnCYRiJK +gOJhvXW421EZlbc1AR5ijDCNrfhHAgMBAAECgYAsZhnk/uVwaCb97KpQAO/3FpX8 +E+roQl512Nbh+cPrI+tXE6puChl46oUL5flKtCkWWotUstr/xdgIHCUKwpoIAdXs +rpVaXMQgukNy5z23Byu6hXBgPyh3/raXlQAZUUDWw+XYNZUFPwY3XGsIfaXvoX9H +PN2uDjltJu2S+fQFwQJBANc1V3YaMO5OrjWieyKzqtOWKEB2kXyj36P76fEZjyVi +0fFPYotkcxEONn0aU0e/p1kwqfE7wum5CM7t/E9YtpMCQQDD3QXIO7wkil1ecifD +RLFdiYzj2uKDQ+aNkWsG8pzc9h/tzh6VHs5NdI4CcX9Up4ICvS9EjqRGEvU9Ak4X +/PP9AkBhpkGGREIZj7f6fDxVNaL4mPSws1w2awEqHj87d/Z850cNsJCtYSnY/lL5 +Fv3c23iqvqsN26kIdj4p7tCCjGVjAkBVCxr/njBLDWkNITPyrVj17Euog9nmdQ0e +Ww3FroI9zwB+GQleZkndh8ZBeVZ4Q2NIHSzw756UbpbdLqsJ72NhAkEA1y4v/xPW +/2bHWDAY1qeAU6gO8myS8eZh+pQzso4Ss8fdZ7oDVoINwJXiBXfq5ccX9X8LrKdY +84idRAsxil7xkg== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-echternach.crt b/vpn/coloradio02/keys/aral-echternach.crt new file mode 100644 index 0000000..cae11b3 --- /dev/null +++ b/vpn/coloradio02/keys/aral-echternach.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 9 (0x9) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:34 2016 GMT + Not After : Mar 27 07:47:34 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-echternach/name=aral-echternach/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:4f:ce:e5:90:a0:32:18:b0:75:60:8a:75:97: + 4d:4b:5a:58:72:4e:2f:05:fc:2c:cc:a8:6b:23:18: + 6c:23:2f:a9:6f:d9:65:cf:76:5e:8f:8d:2d:21:fe: + d8:cb:0c:1d:c8:d2:a6:ae:12:a5:2b:1e:95:d2:ae: + af:2d:7d:69:48:b9:ef:ef:d1:d9:7e:ea:a7:b8:3a: + 80:35:6d:4d:94:30:59:b4:26:27:b0:4b:fb:9b:71: + e9:da:fc:ee:f1:e8:9d:2a:5e:31:2c:3a:fd:00:4b: + 47:41:41:73:0b:4d:ec:45:af:40:10:22:9d:38:96: + 58:39:0e:d7:41:fd:ca:6c:21 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 27:55:DE:04:C1:6B:AC:11:8D:4E:61:BF:45:69:11:45:10:84:5E:3E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + da:9a:3a:80:37:e6:24:19:5c:1c:0c:a0:f6:44:fc:26:8c:63: + 0e:c0:82:89:b6:e9:29:cd:49:b1:6e:5f:c9:52:06:90:38:bf: + 37:0f:bf:e0:ab:49:6a:8f:47:09:fc:50:0c:12:9e:92:bf:fd: + 52:c4:28:7a:b6:84:69:25:3b:2a:34:fd:e6:aa:f5:77:e3:29: + d8:92:30:58:60:65:4c:4e:46:5f:82:a8:06:c8:b0:41:a3:84: + e4:b4:7d:f8:b8:16:a7:99:2b:86:53:d0:5d:bc:e4:09:4b:48: + 2e:6a:7d:f5:aa:8b:eb:07:66:0b:a6:2f:04:53:f3:87:a4:34: + cd:3f +-----BEGIN CERTIFICATE----- +MIIENDCCA52gAwIBAgIBCTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MzRaFw0yNjAzMjcwNzQ3MzRaMIGzMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEY +MBYGA1UEAxMPYXJhbC1lY2h0ZXJuYWNoMRgwFgYDVQQpEw9hcmFsLWVjaHRlcm5h +Y2gxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEB +BQADgY0AMIGJAoGBANNPzuWQoDIYsHVginWXTUtaWHJOLwX8LMyoayMYbCMvqW/Z +Zc92Xo+NLSH+2MsMHcjSpq4SpSseldKury19aUi57+/R2X7qp7g6gDVtTZQwWbQm +J7BL+5tx6dr87vHonSpeMSw6/QBLR0FBcwtN7EWvQBAinTiWWDkO10H9ymwhAgMB +AAGjggFfMIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBH +ZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFCdV3gTBa6wRjU5hv0VpEUUQ +hF4+MIHdBgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGo +MQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5S +b29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RB +QjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYI +KwYBBQUHAwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBANqaOoA35iQZ +XBwMoPZE/CaMYw7Agom26SnNSbFuX8lSBpA4vzcPv+CrSWqPRwn8UAwSnpK//VLE +KHq2hGklOyo0/eaq9XfjKdiSMFhgZUxORl+CqAbIsEGjhOS0ffi4FqeZK4ZT0F28 +5AlLSC5qffWqi+sHZgumLwRT84ekNM0/ +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-echternach.csr b/vpn/coloradio02/keys/aral-echternach.csr new file mode 100644 index 0000000..1f16b5a --- /dev/null +++ b/vpn/coloradio02/keys/aral-echternach.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9DCCAV0CAQAwgbMxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRgwFgYDVQQDEw9hcmFsLWVjaHRlcm5hY2gxGDAWBgNV +BCkTD2FyYWwtZWNodGVybmFjaDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2Fy +bDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA00/O5ZCgMhiwdWCKdZdNS1pY +ck4vBfwszKhrIxhsIy+pb9llz3Zej40tIf7YywwdyNKmrhKlKx6V0q6vLX1pSLnv +79HZfuqnuDqANW1NlDBZtCYnsEv7m3Hp2vzu8eidKl4xLDr9AEtHQUFzC03sRa9A +ECKdOJZYOQ7XQf3KbCECAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAINM2WSsmuF2 +LWqlJ2h/Z0EGgAoRvBm7pN973jmDCWDr+JT3coY9mUcvxC9i/1B/uOOg78Tuo7cS +xBxfgq7idXqSjLXy0RmhCJg1BdMubVtjH1jQiormpL+NYoAQGFQs+5D1lWlUMEpa +GzSDUYyn1Ye4rQ4U2WalkRePuN9HpIvD +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-echternach.key b/vpn/coloradio02/keys/aral-echternach.key new file mode 100644 index 0000000..4478690 --- /dev/null +++ b/vpn/coloradio02/keys/aral-echternach.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANNPzuWQoDIYsHVg +inWXTUtaWHJOLwX8LMyoayMYbCMvqW/ZZc92Xo+NLSH+2MsMHcjSpq4SpSseldKu +ry19aUi57+/R2X7qp7g6gDVtTZQwWbQmJ7BL+5tx6dr87vHonSpeMSw6/QBLR0FB +cwtN7EWvQBAinTiWWDkO10H9ymwhAgMBAAECgYAb7P8lvYA+Pp8LVA/YTH+NhsoL +iSOTwejVvygxgifAWqskufFHgpgqlnixdnGGG/rPsG8QsCwdz7PzHNzPwTQph9cH +c+5RzXcy0HOGc8CCO0Tuo1xK5EpikqcgkYfhbT+hXpe+XoRKb4KG+hUVIyW5R1m9 +0ZFu6SOTcc9np/rucQJBAOpNNgNAVjc5h7/X8tvi8H/En9ZpsiNxI78xJncNl/6A +yhVyuC5/7VdQ1kWDhvJEeuZ25Wkuws0kX/77QlQ0reUCQQDm4Y6YP4wy4jIGx9wz +gztjDCQOoN71KUkdKv+jsNkgnRyPiBFvsc55Nc4SyDLcQ/Z/gu6+EIp1oNb7QxUc +KcGNAkEAikY46yBMAVl1cNWsIPLEhlLvFaXZGKuLsij6j2Y5Xlx5ZsEGS4L5+f7e +BbZCrLWXZm2ipDmRg2nFMYDtOy6/tQI/Z7brV3k0gaca0fD1+i35f4T0rZ2WiosB +TRkDvYS0BPKO4es96e710X1aFRXZwxjEooMuvDKyACVAbZ603PHlAkEAmdn0aQOR +IstoHtpMKgNnQyb+TF5PI5dD7N/UbQWDbi2i13AtukgLrvtLxnaGIN//oc7W0RKX +3WQx3C6t5YnObw== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-findel.crt b/vpn/coloradio02/keys/aral-findel.crt new file mode 100644 index 0000000..8abbd6c --- /dev/null +++ b/vpn/coloradio02/keys/aral-findel.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 6 (0x6) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Dec 15 11:18:48 2015 GMT + Not After : Dec 12 11:18:48 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-findel/name=aral-findel/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ca:11:e0:1e:39:4e:73:48:6b:f1:bb:ad:22:15: + ca:87:13:c1:4b:51:bc:2b:17:39:14:50:29:2b:e1: + 98:22:b2:86:b3:f2:6a:72:67:13:8b:0a:5f:30:af: + 32:0e:80:61:1c:7a:54:54:1b:fd:36:67:e8:b4:08: + 95:e3:18:6a:3a:14:e9:12:46:e2:0f:92:ad:3b:8b: + 6a:e6:9a:f6:9f:62:98:a7:f5:87:c7:ac:01:2a:8f: + f7:e6:94:e9:e8:92:19:78:04:58:a2:07:25:85:a8: + 3b:ac:d0:30:8c:b7:c9:2f:61:74:79:f9:b1:9b:0a: + 0f:cd:54:dc:3e:c8:d9:ba:11 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E4:9A:75:64:C6:4C:ED:F7:85:C6:85:A1:1A:48:C3:0B:EA:B1:69:CA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 87:6b:83:ce:a7:fb:eb:67:2b:96:4c:9c:bc:40:f0:82:f6:b0: + a8:27:0b:f6:0d:71:3b:4e:11:37:e2:ef:6d:bc:f5:03:c8:bf: + 9a:dc:2b:48:13:14:68:98:f7:0c:15:d0:4a:58:3e:e3:0b:64: + ed:e3:9b:77:79:56:38:7a:69:a4:82:65:3d:81:93:0a:f0:29: + af:06:16:ad:16:aa:75:f7:0f:19:c9:be:2d:7c:76:d4:50:5d: + fb:39:85:f3:3b:4d:75:d5:d9:3c:6c:41:49:87:39:a7:91:6f: + 6a:a9:07:c1:df:f5:09:ee:10:4c:a8:62:1e:89:8f:6b:35:c2: + 93:f6 +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBBjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEyMTUxMTE4NDhaFw0yNTEyMTIxMTE4NDhaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYXJhbC1maW5kZWwxFDASBgNVBCkTC2FyYWwtZmluZGVsMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDKEeAeOU5zSGvxu60iFcqHE8FLUbwrFzkUUCkr4Zgisoaz8mpyZxOLCl8w +rzIOgGEcelRUG/02Z+i0CJXjGGo6FOkSRuIPkq07i2rmmvafYpin9YfHrAEqj/fm +lOnokhl4BFiiByWFqDus0DCMt8kvYXR5+bGbCg/NVNw+yNm6EQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBTkmnVkxkzt94XGhaEaSMML6rFpyjCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCHa4POp/vrZyuWTJy8QPCC +9rCoJwv2DXE7ThE34u9tvPUDyL+a3CtIExRomPcMFdBKWD7jC2Tt45t3eVY4emmk +gmU9gZMK8CmvBhatFqp19w8Zyb4tfHbUUF37OYXzO0111dk8bEFJhzmnkW9qqQfB +3/UJ7hBMqGIeiY9rNcKT9g== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-findel.csr b/vpn/coloradio02/keys/aral-findel.csr new file mode 100644 index 0000000..86c7364 --- /dev/null +++ b/vpn/coloradio02/keys/aral-findel.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7DCCAVUCAQAwgasxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRQwEgYDVQQDEwthcmFsLWZpbmRlbDEUMBIGA1UEKRML +YXJhbC1maW5kZWwxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJ +KoZIhvcNAQEBBQADgY0AMIGJAoGBAMoR4B45TnNIa/G7rSIVyocTwUtRvCsXORRQ +KSvhmCKyhrPyanJnE4sKXzCvMg6AYRx6VFQb/TZn6LQIleMYajoU6RJG4g+SrTuL +auaa9p9imKf1h8esASqP9+aU6eiSGXgEWKIHJYWoO6zQMIy3yS9hdHn5sZsKD81U +3D7I2boRAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQCeA94MBx2O/sDPE8/EgNto +KsScehwqpr13POZGgiRkhQWZc0mM0XD+VWeaZG3GESTcfDQfcJsavaS73/BdMJXW +X2WDQdCju+zLtQAApmDQsMuiMZxKY/6iK3E7HV25Tc98jZeO8aapq0mpardk4GjU +ZeZsZ04mBLAES0/NA50upQ== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-findel.key b/vpn/coloradio02/keys/aral-findel.key new file mode 100644 index 0000000..7aa81a8 --- /dev/null +++ b/vpn/coloradio02/keys/aral-findel.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMoR4B45TnNIa/G7 +rSIVyocTwUtRvCsXORRQKSvhmCKyhrPyanJnE4sKXzCvMg6AYRx6VFQb/TZn6LQI +leMYajoU6RJG4g+SrTuLauaa9p9imKf1h8esASqP9+aU6eiSGXgEWKIHJYWoO6zQ +MIy3yS9hdHn5sZsKD81U3D7I2boRAgMBAAECgYBd65MM2Tvyb13kvIOLTS+WOwNj +u7jHGoMoQt3wDGoG7o2Xg/wf8nLt9EMsQLH2dYstjlo1wdCeggtx6m+oXwe35Gr7 ++aTatqvZuATj6xES6GzdEemsyizv1ZxWQFLvf9lqc4w+Iv/GnofsIjSpSMM6Z7n1 +15AsP6Qhbf5NEAWbZQJBAP/uZ7qTLDf2U6bzfcSmTPs4i/DQyvdN1C/n01TDpZZm +mju1jauCIvN7DEnT7xty223wwO4oiMAj7Zpsq7fFUBMCQQDKH8Rz8iLvn6GgSVrn +Q9vTLYmLLxgJnEBCXGc4PVMA3jRHqz4dyLyrmqjk8+DoaoFGgLnl2/0ewz9bxfgV +FTnLAkEA01Klb9dJ8cOBex8ewBuZAO7GDkg4707iX9QKGbmapr99psPYgL9p4KW/ +lc5bZszGBtd+Vqg9knmYHaSRfaJ85QJBAJQX5obVeMd9fJzGYnZj/+Kg0NBL9x7D +f0mgDnjkZbaTGFcSnvaPp71MGkd2cOmZb5LKqmpCXxl1ES0axgQcgzUCQEofn54E +QObqbcVHu+vygbUoHRHrnXQIpJbTjeCM5pfYeK8VFOjgOJ4DS4bbTI6YVFYB3bXI +NnqIEcbmLJ3zwdY= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-lallange.crt b/vpn/coloradio02/keys/aral-lallange.crt new file mode 100644 index 0000000..714f32f --- /dev/null +++ b/vpn/coloradio02/keys/aral-lallange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 8 (0x8) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:20 2016 GMT + Not After : Mar 27 07:47:20 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lallange/name=aral-lallange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b0:8e:29:dc:e0:d3:a5:0c:10:0f:02:74:24:50: + aa:60:4a:9b:45:36:df:b4:4e:07:d4:ae:90:09:c1: + f6:97:7f:93:ee:26:43:42:d6:6c:b4:32:49:46:ce: + 27:c0:95:8c:63:20:19:44:49:cf:cd:28:a2:24:47: + 9b:4e:b4:52:a6:26:92:f2:fb:5d:bf:76:25:06:18: + 8d:51:dd:b8:94:78:2b:ff:16:1d:f3:7a:03:42:6e: + 76:08:c0:01:ec:c8:74:f1:95:64:19:a6:3a:d1:27: + 20:77:f8:d3:7e:4f:22:45:54:73:e3:84:76:a8:09: + fd:a5:86:71:94:8f:0e:74:cd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C2:AA:B1:1E:C3:32:5C:14:A9:9D:3E:B3:89:FF:ED:EE:1D:1C:44:C9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a3:42:e2:36:0b:e7:88:b4:21:23:01:1d:ad:6d:3d:2c:7d:03: + 2f:fe:44:e9:9b:1d:e5:a5:fd:a8:b0:c0:3c:b2:a0:ef:0f:7a: + 92:1a:a5:90:5d:a7:d6:e8:8e:50:3c:59:e6:d6:ff:65:86:f5: + 51:7a:e8:e5:9d:6c:f2:72:83:cc:95:29:7e:a8:eb:03:a6:c3: + d9:f0:f9:c1:61:f1:cc:35:d4:42:50:cd:48:fa:6f:47:66:e5: + 1c:4b:fe:33:5a:ad:8c:e6:dc:d6:51:2e:e6:40:1e:ac:63:77: + 73:4a:6c:3e:78:38:9b:8b:28:b3:01:c3:f3:67:a3:18:78:f9: + 1a:b2 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBCDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3MjBaFw0yNjAzMjcwNzQ3MjBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1sYWxsYW5nZTEWMBQGA1UEKRMNYXJhbC1sYWxsYW5nZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAsI4p3ODTpQwQDwJ0JFCqYEqbRTbftE4H1K6QCcH2l3+T7iZDQtZs +tDJJRs4nwJWMYyAZREnPzSiiJEebTrRSpiaS8vtdv3YlBhiNUd24lHgr/xYd83oD +Qm52CMAB7Mh08ZVkGaY60Scgd/jTfk8iRVRz44R2qAn9pYZxlI8OdM0CAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUwqqxHsMyXBSpnT6zif/t7h0cRMkw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAo0LiNgvniLQhIwEd +rW09LH0DL/5E6Zsd5aX9qLDAPLKg7w96khqlkF2n1uiOUDxZ5tb/ZYb1UXro5Z1s +8nKDzJUpfqjrA6bD2fD5wWHxzDXUQlDNSPpvR2blHEv+M1qtjObc1lEu5kAerGN3 +c0psPng4m4soswHD82ejGHj5GrI= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-lallange.csr b/vpn/coloradio02/keys/aral-lallange.csr new file mode 100644 index 0000000..627b9d8 --- /dev/null +++ b/vpn/coloradio02/keys/aral-lallange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1hcmFsLWxhbGxhbmdlMRYwFAYDVQQp +Ew1hcmFsLWxhbGxhbmdlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCwjinc4NOlDBAPAnQkUKpgSptFNt+0 +TgfUrpAJwfaXf5PuJkNC1my0MklGzifAlYxjIBlESc/NKKIkR5tOtFKmJpLy+12/ +diUGGI1R3biUeCv/Fh3zegNCbnYIwAHsyHTxlWQZpjrRJyB3+NN+TyJFVHPjhHao +Cf2lhnGUjw50zQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAEDcF1I97b0eQQEPd +otYosY9Q+knGohQs66bFEM+QcfoUqLk/tlCSxn8iCj4xypArWsPb6Rq/8zFY9b6R +ZPmZSYlEGbMInXEbOg6OinqSwv99evlGYYUrSak6LC0L7p4uXNMe1PsRmbwF27YB +pxJ4Q0kcteJfoFJWHJzjjPDE/Fw= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-lallange.key b/vpn/coloradio02/keys/aral-lallange.key new file mode 100644 index 0000000..8abb982 --- /dev/null +++ b/vpn/coloradio02/keys/aral-lallange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALCOKdzg06UMEA8C +dCRQqmBKm0U237ROB9SukAnB9pd/k+4mQ0LWbLQySUbOJ8CVjGMgGURJz80ooiRH +m060UqYmkvL7Xb92JQYYjVHduJR4K/8WHfN6A0JudgjAAezIdPGVZBmmOtEnIHf4 +035PIkVUc+OEdqgJ/aWGcZSPDnTNAgMBAAECgYAvcZRoSXY2NN6f2e3x0EdoZsQA +vnUw04MhMON968RjA6Jx7ZBHhq1hYt30C/P8uXMnM/n2MsuHevLPQvrGFIjcsKhA +lFBFLeJ/oV5/eA7M5OIPkeQuJtyNPsQbV+EwIZyJzl/JBsJLqvqRtK1+nFtsRwL9 +ah9LWZ+iv4ORf+agQQJBAOIuEWmJkVc3L8dbtkXn7jpKiOtBnwqjxfWqMEPOP0AQ +6YELoRmr++WYNHwIbrE3ci8ONPnZhmJDvub/fEs8wT0CQQDH1S+I1T+p+V8e8I9U +rqKN2I8KM3mIAH1PcyDrivCE75bT8N1HNvvJtJ5hOrXt+62BToihBMEezu353zCm +bprRAkEAvv3hzDnTlk9OtEy4nU1deLGp7ubJ0yU6q9kbypYmCQZ+926HinMVUep2 +H2rLdjB45k1b5MOP2/iTAuMo5SuXjQJAVXoiMBSPe+RYRMK/fIiKrcQBQ2rLRFp5 +P3/OiBJRWXumd5fi/vBM+XWR/aMAaQCrsdDm7oE7HjODZcuLYtWS0QJAXozAGint +U1Oqu2isPWHLCR540UdZhmTEajqPqi9akeEIcvPDOi2qT/izEa7KNWNExt0WNEtr +83x1wBONuGaiFQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-merl2.crt b/vpn/coloradio02/keys/aral-merl2.crt new file mode 100644 index 0000000..411fc11 --- /dev/null +++ b/vpn/coloradio02/keys/aral-merl2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 19 (0x13) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 23 08:01:13 2016 GMT + Not After : May 21 08:01:13 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl2/name=aral-merl2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d3:28:b9:b9:3b:1f:d8:9e:fb:48:0b:39:69:22: + a9:a8:fa:07:cb:62:dc:47:3e:a3:9f:22:09:91:13: + 58:e8:3d:c3:e3:dd:e4:52:ac:4c:82:b7:89:41:84: + e2:cf:dd:f1:18:fd:ab:7b:e0:b2:ee:3e:81:2f:7c: + c5:53:56:7a:e3:6e:e7:13:04:14:cd:95:15:f7:31: + ae:c6:50:de:f1:56:cd:7b:bf:3d:fc:dd:00:4e:1f: + 48:b2:b4:de:a5:e2:26:0e:97:27:2a:34:8a:6f:93: + 9e:72:bc:02:e3:d8:38:b7:1c:b2:6a:0f:93:62:57: + 03:ce:69:f6:f9:2e:07:ca:4d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 76:B5:5B:8D:A5:2C:46:9B:A9:86:9A:BE:38:66:51:F5:CE:19:A0:28 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + cd:5b:18:07:76:31:78:d1:a3:10:21:13:7d:2a:40:63:5c:ca: + 30:6d:d3:0f:81:7e:cc:48:7a:f6:48:00:ae:7a:25:26:00:1c: + 60:ef:15:c3:c4:a4:1c:54:8b:80:a0:d2:02:79:82:62:ee:11: + 1a:39:71:cf:70:fb:79:6f:bb:76:89:dc:96:e0:4e:f9:72:22: + f0:2e:be:ec:2d:af:34:ac:05:96:e3:74:09:a5:4b:5b:f5:07: + 92:56:4c:05:fa:c6:f0:72:90:44:75:f3:3e:68:21:5e:0e:89: + 76:0b:06:83:f1:e9:3a:2c:0c:2f:fc:00:9e:35:92:a2:65:39: + 51:d3 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBEzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MjMwODAxMTNaFw0yNjA1MjEwODAxMTNaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKYXJhbC1tZXJsMjETMBEGA1UEKRMKYXJhbC1tZXJsMjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEA0yi5uTsf2J77SAs5aSKpqPoHy2LcRz6jnyIJkRNY6D3D493kUqxMgreJQYTi +z93xGP2re+Cy7j6BL3zFU1Z6427nEwQUzZUV9zGuxlDe8VbNe789/N0ATh9IsrTe +peImDpcnKjSKb5OecrwC49g4txyyag+TYlcDzmn2+S4Hyk0CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUdrVbjaUsRpuphpq+OGZR9c4ZoCgwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAzVsYB3YxeNGjECETfSpAY1zK +MG3TD4F+zEh69kgArnolJgAcYO8Vw8SkHFSLgKDSAnmCYu4RGjlxz3D7eW+7donc +luBO+XIi8C6+7C2vNKwFluN0CaVLW/UHklZMBfrG8HKQRHXzPmghXg6JdgsGg/Hp +OiwML/wAnjWSomU5UdM= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-merl2.csr b/vpn/coloradio02/keys/aral-merl2.csr new file mode 100644 index 0000000..3ea28b5 --- /dev/null +++ b/vpn/coloradio02/keys/aral-merl2.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6jCCAVMCAQAwgakxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRMwEQYDVQQDEwphcmFsLW1lcmwyMRMwEQYDVQQpEwph +cmFsLW1lcmwyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqG +SIb3DQEBAQUAA4GNADCBiQKBgQDTKLm5Ox/YnvtICzlpIqmo+gfLYtxHPqOfIgmR +E1joPcPj3eRSrEyCt4lBhOLP3fEY/at74LLuPoEvfMVTVnrjbucTBBTNlRX3Ma7G +UN7xVs17vz383QBOH0iytN6l4iYOlycqNIpvk55yvALj2Di3HLJqD5NiVwPOafb5 +LgfKTQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAbRJF8Xvg/IZk3NGWjnyjPnch +MGhR4K6i70pjmyov+POBdwemxfFwEQlb+DFr1WIvlDLU22u/drHY1m/Ptx0OSs5X +RZrw2AZF68GLmk2EUQJUYEPgGKFmjxLE1XX8XnSFyINM8PUY4ZT/DL+tzh9eUTgJ +M0yauf5B/4InAcBbwFo= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-merl2.key b/vpn/coloradio02/keys/aral-merl2.key new file mode 100644 index 0000000..7d9ff7e --- /dev/null +++ b/vpn/coloradio02/keys/aral-merl2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANMoubk7H9ie+0gL +OWkiqaj6B8ti3Ec+o58iCZETWOg9w+Pd5FKsTIK3iUGE4s/d8Rj9q3vgsu4+gS98 +xVNWeuNu5xMEFM2VFfcxrsZQ3vFWzXu/PfzdAE4fSLK03qXiJg6XJyo0im+TnnK8 +AuPYOLccsmoPk2JXA85p9vkuB8pNAgMBAAECgYAjMMRS9GGITmZ+STCWLuqreI/X ++2/Oh8fo+1kwzlKg0bpVvWMRzBksJ74+JxFNpyVJDu2HRZlMTypkaZzRGLZ95y1U +Yv72Z0zPmvVq34QYwDLCphs+NY25pX7nm7sii4jUJ+DZZKOBbYFq/dDGORTv2l25 +lcbg/IfIjbNN8BZ0mQJBAPHb68jIFSrXACobTuwJEegXb2MzxATHd8HZQmKPxCpJ +XVKw9eZHy492FxyYKA1nlNArl7/CJdbxcWbxUDh1wV8CQQDfgUux6np7s/Ns5um1 +BU6SrYsk0gISliSfVSlJYkhdcwl5mQE4iOi3KhSq6FGGBRmAkirIMFVoAV4+I2+Y +UjfTAkEAmkzXIXJc5sbiCPsBH98teGezHZQCA5aKVbbY/m6AFQZXLpFNYAv/11fc +qNZ9/wdNTn3xQ1qGr5m74pQjvNGLewJBANawc+1qtkytBl7NUCC6AEeUu9uafrMr +1fHW89mxtqFNJwTOnAWaPS/0E/Y3Qlfh/iUqQj4Zb3CAH+7ASymdkFECQGA8YUN1 +obTYVZzhETdFfha7IbujStY6M2i66Sk06oPcGUvDIA1dLXQfkn0LnkdweZvLuXPD +RyE10aV1WY8qpbM= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-remich1.crt b/vpn/coloradio02/keys/aral-remich1.crt new file mode 100644 index 0000000..e679ebf --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich1.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 10 (0xa) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:49 2016 GMT + Not After : Mar 27 07:47:49 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich1/name=aral-remich1/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:b4:cc:c3:56:fa:32:b1:fc:5a:70:16:37:e4:c2: + 57:5a:d7:a7:fd:3d:f7:1f:fb:da:b2:10:a2:2a:a8: + 18:74:fe:27:40:3a:fd:c8:23:2d:b9:af:f0:39:a5: + 2d:04:df:74:dc:73:79:e9:a4:b4:01:88:ab:51:4a: + fd:f3:a0:56:6b:e3:91:a4:4b:60:79:8a:6b:11:2e: + 89:08:a0:be:c8:60:40:26:7a:a0:49:cf:86:6e:69: + 93:65:9b:75:e8:62:59:79:61:68:c1:e0:c4:b4:ef: + a9:02:81:4f:c9:0a:29:ca:5d:12:13:00:8b:57:20: + d7:05:15:02:fe:1f:7e:57:73 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + C9:01:C1:B8:7D:5B:60:3C:B6:85:C7:A1:E8:1A:80:62:C5:34:1B:B9 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + af:21:44:09:ee:90:81:1e:08:8f:5b:65:9a:30:3a:5d:9a:a4: + 9b:db:75:02:78:1c:a6:f0:c2:d0:fb:be:40:57:aa:34:f4:03: + 59:0a:d9:36:49:05:e5:99:48:e0:9b:13:e6:ed:81:83:45:0e: + 80:ec:6d:91:74:91:92:2b:cd:37:9b:14:16:23:41:f0:c9:36: + 43:af:2a:25:d5:4e:3c:b0:47:1a:d4:c7:7b:cc:8c:70:9a:9a: + 3c:5e:53:82:97:d9:78:82:b1:7f:59:6c:4a:ba:21:01:13:d3: + cd:85:aa:88:0b:33:91:c2:17:34:34:37:aa:4e:4c:42:26:11: + 1c:8a +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NDlaFw0yNjAzMjcwNzQ3NDlaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gxMRUwEwYDVQQpEwxhcmFsLXJlbWljaDExHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBALTMw1b6MrH8WnAWN+TCV1rXp/099x/72rIQoiqoGHT+J0A6/cgjLbmv +8DmlLQTfdNxzeemktAGIq1FK/fOgVmvjkaRLYHmKaxEuiQigvshgQCZ6oEnPhm5p +k2WbdehiWXlhaMHgxLTvqQKBT8kKKcpdEhMAi1cg1wUVAv4ffldzAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFMkBwbh9W2A8toXHoegagGLFNBu5MIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAK8hRAnukIEeCI9bZZow +Ol2apJvbdQJ4HKbwwtD7vkBXqjT0A1kK2TZJBeWZSOCbE+btgYNFDoDsbZF0kZIr +zTebFBYjQfDJNkOvKiXVTjywRxrUx3vMjHCamjxeU4KX2XiCsX9ZbEq6IQET082F +qogLM5HCFzQ0N6pOTEImERyK +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-remich1.csr b/vpn/coloradio02/keys/aral-remich1.csr new file mode 100644 index 0000000..cdda57a --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich1.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXJlbWljaDExFTATBgNVBCkT +DGFyYWwtcmVtaWNoMTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtMzDVvoysfxacBY35MJXWten/T33H/va +shCiKqgYdP4nQDr9yCMtua/wOaUtBN903HN56aS0AYirUUr986BWa+ORpEtgeYpr +ES6JCKC+yGBAJnqgSc+GbmmTZZt16GJZeWFoweDEtO+pAoFPyQopyl0SEwCLVyDX +BRUC/h9+V3MCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAFZbsweS0O8BRnwrUo0p +lyvj/n61X2vA/05lK0WyygJVNdirjB3bLhWAB/SI+EdSZF4chLhZTH0AsLFln5P7 +v0PKLxh+ONFntJl37FhC/Sjm17Gwdg+lEEMZ3W2kHdSJzwbrlMsKgjXYQRsiCpNm +XIZ+bH8yuXZnhC7Yu5U+Fsys +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-remich1.key b/vpn/coloradio02/keys/aral-remich1.key new file mode 100644 index 0000000..8dff230 --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich1.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBALTMw1b6MrH8WnAW +N+TCV1rXp/099x/72rIQoiqoGHT+J0A6/cgjLbmv8DmlLQTfdNxzeemktAGIq1FK +/fOgVmvjkaRLYHmKaxEuiQigvshgQCZ6oEnPhm5pk2WbdehiWXlhaMHgxLTvqQKB +T8kKKcpdEhMAi1cg1wUVAv4ffldzAgMBAAECgYEAnIf7Rz5uzbISCqDx21h2kOvN +QW94mXRPr4K/I/dM1V2FVhK8zZ3HZNByRzY+d82PO52umx5BymItEMDAhUD4EBGp +LU/xUn6zyq7iWdSPDlVYqHzYVE8cXgh+loXRtGQtu4GJJ2yOqcRcZ9ux3/nqk2JF +pDUmE/WYiV+RSAgDeoECQQDwiHgdG+5DkhLcZwtkcfxIqzk3CL0N6T5/x3cUXyfy +7G+iPoOfRPLCM7m7M4ard5iI5Mhn3MyJHqGfSWQtmWLRAkEAwGz/F/xO2sCfmM0S +4QyXFehsT00Lr11+Sdv2TeDMbZyTbrB+Ak5oKZF0e9szUcfhrV7o/ADiynwiKhz4 +ogT/AwJBALsKQ+zO1V5x7ny5HGDFSlrv2pPzFaAFqfYPE4gh3pzGQqC1YACvyt48 +/saVcLlRTKnWzggF6H8P9Lo6hc33oqECQE+fSla0cjSWK/PgN4Wj3giUqeyOZt1j +hFQvjlVfRXe9qEvO//UYWIWKyHZPl4apfLpuYV2VSEKc5s4iOsdf5d0CQBfJaF/R +7Trc2zktzDp0LTwoMCmj3brEj9QVm9YM0DQPV9cY8Bx2r3BBQYeyHlB/N4GsGZxL +0Ckj/pWvtmsyVmQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-remich2.crt b/vpn/coloradio02/keys/aral-remich2.crt new file mode 100644 index 0000000..e76c617 --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 11 (0xb) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:47:52 2016 GMT + Not After : Mar 27 07:47:52 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2/name=aral-remich2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e5:f8:b5:a2:f2:48:9e:4b:a7:3f:ee:d7:9f:2e: + fc:2e:ed:d1:b4:97:89:c2:d9:c1:64:2a:26:13:c2: + ff:20:30:f2:44:28:8a:de:4e:60:35:40:83:98:e1: + 7f:3b:f6:81:a6:87:49:6b:b0:c9:2a:d0:00:6c:8a: + 96:14:65:0f:63:19:83:c0:d3:e4:b8:c4:ee:6e:6b: + 10:a1:89:07:52:92:af:7d:ea:f9:32:a5:a0:3a:bc: + d5:ed:95:df:55:91:e4:92:2c:36:57:35:c5:d3:d8: + 21:d0:05:08:85:b5:dd:96:84:de:f6:7d:10:b2:a4: + 6b:a1:42:42:f4:82:25:a7:a7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 3F:FE:05:D7:07:95:D8:FA:A0:1A:5F:22:D8:54:79:19:50:AE:BD:8E + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 7f:f2:c9:ea:59:a4:74:70:31:02:33:08:61:91:5f:8a:6b:21: + d0:9e:2a:24:84:b6:ef:d9:89:42:6c:aa:66:9f:c7:fb:f2:93: + 2e:48:7f:17:09:75:34:99:84:eb:08:41:f4:a7:14:35:9b:cd: + 7c:8c:50:02:0d:a9:c2:56:e8:22:fa:9c:0e:40:9a:c2:37:65: + 95:39:37:79:8c:61:32:8a:93:c7:32:33:0f:a3:ac:ed:99:63: + ee:78:f2:bb:fc:db:8d:83:fa:f6:af:39:79:81:58:4c:95:24: + 33:55:10:2c:41:05:3d:ca:b6:fc:0f:bb:17:05:84:6c:c3:bb: + 84:13 +-----BEGIN CERTIFICATE----- +MIIELjCCA5egAwIBAgIBCzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ3NTJaFw0yNjAzMjcwNzQ3NTJaMIGtMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEV +MBMGA1UEAxMMYXJhbC1yZW1pY2gyMRUwEwYDVQQpEwxhcmFsLXJlbWljaDIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0A +MIGJAoGBAOX4taLySJ5Lpz/u158u/C7t0bSXicLZwWQqJhPC/yAw8kQoit5OYDVA +g5jhfzv2gaaHSWuwySrQAGyKlhRlD2MZg8DT5LjE7m5rEKGJB1KSr33q+TKloDq8 +1e2V31WR5JIsNlc1xdPYIdAFCIW13ZaE3vZ9ELKka6FCQvSCJaenAgMBAAGjggFf +MIIBWzAJBgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0 +ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFD/+BdcHldj6oBpfIthUeRlQrr2OMIHd +BgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUH +AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBAH/yyepZpHRwMQIzCGGR +X4prIdCeKiSEtu/ZiUJsqmafx/vyky5IfxcJdTSZhOsIQfSnFDWbzXyMUAINqcJW +6CL6nA5AmsI3ZZU5N3mMYTKKk8cyMw+jrO2ZY+548rv8242D+vavOXmBWEyVJDNV +ECxBBT3KtvwPuxcFhGzDu4QT +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-remich2.csr b/vpn/coloradio02/keys/aral-remich2.csr new file mode 100644 index 0000000..1cf82e2 --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich2.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7jCCAVcCAQAwga0xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRUwEwYDVQQDEwxhcmFsLXJlbWljaDIxFTATBgNVBCkT +DGFyYWwtcmVtaWNoMjEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzAN +BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5fi1ovJInkunP+7Xny78Lu3RtJeJwtnB +ZComE8L/IDDyRCiK3k5gNUCDmOF/O/aBpodJa7DJKtAAbIqWFGUPYxmDwNPkuMTu +bmsQoYkHUpKvfer5MqWgOrzV7ZXfVZHkkiw2VzXF09gh0AUIhbXdloTe9n0QsqRr +oUJC9IIlp6cCAwEAAaAAMA0GCSqGSIb3DQEBBQUAA4GBAE0/IcS9u0wQ7BjMqyGs +/wFTAn9aLWBMWZMRe8wHFef9jFBIq7xMjNAZwoDKgatXwojq3cjC+HSuAhncgHGY +UffWtooGF0Dcb5St1MsNoN5vV8b7q/pPCzUXXg8KXP0aeMhJv0gs+kcyUuPVI3tt +5/yusU1jM3b3JJ98YRTgVtZz +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-remich2.key b/vpn/coloradio02/keys/aral-remich2.key new file mode 100644 index 0000000..74fbc2d --- /dev/null +++ b/vpn/coloradio02/keys/aral-remich2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOX4taLySJ5Lpz/u +158u/C7t0bSXicLZwWQqJhPC/yAw8kQoit5OYDVAg5jhfzv2gaaHSWuwySrQAGyK +lhRlD2MZg8DT5LjE7m5rEKGJB1KSr33q+TKloDq81e2V31WR5JIsNlc1xdPYIdAF +CIW13ZaE3vZ9ELKka6FCQvSCJaenAgMBAAECgYBvRJe1gF6MYHRKpagj99rCZgSp +yQw5f5xnd1E3DIjeLXB6c9dE2k0IVu+VH72s6IcwaJKojT+3/C3IVoFo2sDHOjs9 +RxMKJp6M9fW+A3iUS3fvwSAaDNre1o8rd/5sSOhmW2J4nUzcqTkOEQ5WqEy1pfcf +l6/OoU0z7GQx4hRG0QJBAPQyiNGk4PEy8gkvBi9oPiGp23mre6/ZBUno595blkXp +nfajxffGqLSKggRzwF7YG/cZrZHyb9Uq8e5BLESCh58CQQDxFihaFep+3fRlzJ28 +87MAxoG2Y5N6Tc+wJ5QfXziKbDKYJGv2AqPw3jghZ4WL9LHLdBHgGlOgKWpcN3fc +D4L5AkA028N17cSrMSXnCwDBvkTEsKnLWm05kTZt2zZlkVmj5H/G5Yhyq9PU0K54 +HD4lyY20HSDPGLVQZS1dL0pPwhltAkEAxe3IETW/AIte9BjKQ+/bvT48Di6wTJAH +e/rye9MkS1jLLOdyD1ZZnA4FDT+9f4rUUVGov1E96Nc3sCAF8pB1mQJBAMKlaIgO +A3mCe7qFMOXvHW9cDoZHrD9JbaNBP3FgBhu7Q2kD0q/8lSplnnWzEfXO8hxBkTTc +DLsGwgJvV2Jt1Zw= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-rodange2.crt b/vpn/coloradio02/keys/aral-rodange2.crt new file mode 100644 index 0000000..3547333 --- /dev/null +++ b/vpn/coloradio02/keys/aral-rodange2.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 13 (0xd) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:30 2016 GMT + Not After : Mar 27 07:48:30 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange2/name=aral-rodange2/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:e1:12:62:8a:30:47:15:0e:08:6a:46:e6:3d:b4: + 1f:34:52:eb:15:e8:98:3d:e8:1e:e0:7e:a5:11:b3: + ec:3e:1a:07:18:5e:88:57:2b:41:6c:c0:5a:88:ba: + 92:40:6f:e4:a1:59:ab:40:a2:91:ab:3e:bb:49:52: + e1:03:aa:f6:cf:91:77:41:b2:8e:e2:30:85:d7:92: + bd:26:3c:d4:d2:da:68:13:36:8c:70:70:a6:57:8f: + 46:c8:ac:16:c7:d3:4e:64:e9:68:b4:db:84:05:d0: + f5:49:76:f3:44:8e:e4:4c:84:15:a0:43:71:d1:05: + bd:94:84:13:4e:fd:0a:58:05 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 2A:AE:E1:B7:0C:64:97:35:D5:68:40:B7:83:14:36:83:FE:53:2C:16 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 9a:f8:a2:78:a8:8e:44:22:cf:5f:09:2e:0b:fb:7b:60:6a:9f: + 3f:3d:89:25:bf:03:92:b4:49:c1:24:e0:ed:e7:98:80:dc:81: + 8d:2c:86:e7:08:4d:94:5b:d4:78:ce:4f:4a:58:e7:05:4a:0f: + 28:51:b3:cd:fb:c7:d3:3e:ae:98:f2:a6:8f:09:49:07:67:ba: + 84:c4:4f:c6:70:58:67:2c:fa:e9:6b:c1:1e:70:18:6e:fd:95: + f0:fa:34:77:d0:9c:d8:16:b2:44:60:f8:1b:15:97:32:53:1b: + 73:f3:91:5c:88:cc:9a:68:85:18:86:0b:5a:38:b3:2c:f1:33: + 7c:39 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBDTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MzBaFw0yNjAzMjcwNzQ4MzBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNYXJhbC1yb2RhbmdlMjEWMBQGA1UEKRMNYXJhbC1yb2RhbmdlMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA4RJiijBHFQ4IakbmPbQfNFLrFeiYPege4H6lEbPsPhoHGF6IVytB +bMBaiLqSQG/koVmrQKKRqz67SVLhA6r2z5F3QbKO4jCF15K9JjzU0tpoEzaMcHCm +V49GyKwWx9NOZOlotNuEBdD1SXbzRI7kTIQVoENx0QW9lIQTTv0KWAUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUKq7htwxklzXVaEC3gxQ2g/5TLBYw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAmviieKiORCLPXwku +C/t7YGqfPz2JJb8DkrRJwSTg7eeYgNyBjSyG5whNlFvUeM5PSljnBUoPKFGzzfvH +0z6umPKmjwlJB2e6hMRPxnBYZyz66WvBHnAYbv2V8Po0d9Cc2BayRGD4GxWXMlMb +c/ORXIjMmmiFGIYLWjizLPEzfDk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-rodange2.csr b/vpn/coloradio02/keys/aral-rodange2.csr new file mode 100644 index 0000000..9c83e10 --- /dev/null +++ b/vpn/coloradio02/keys/aral-rodange2.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1hcmFsLXJvZGFuZ2UyMRYwFAYDVQQp +Ew1hcmFsLXJvZGFuZ2UyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDhEmKKMEcVDghqRuY9tB80UusV6Jg9 +6B7gfqURs+w+GgcYXohXK0FswFqIupJAb+ShWatAopGrPrtJUuEDqvbPkXdBso7i +MIXXkr0mPNTS2mgTNoxwcKZXj0bIrBbH005k6Wi024QF0PVJdvNEjuRMhBWgQ3HR +Bb2UhBNO/QpYBQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAc+imk4sIiw/zruLu +WZoEGfl7SV8mkWvbdYsYL8uDLj0/2ju01z5irSaO2MmGQL1Wm27iKjQhspvwKYYp +1LOb0kxBgIYk7mqIV2FN4BkAcal5jAtHqz7z2dnYzdyDEURUNBP/VzqQM4wO9Jw4 +tOPIHsHxqmS/4/BRkGAeR7o+2E8= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-rodange2.key b/vpn/coloradio02/keys/aral-rodange2.key new file mode 100644 index 0000000..e70d7f2 --- /dev/null +++ b/vpn/coloradio02/keys/aral-rodange2.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAOESYoowRxUOCGpG +5j20HzRS6xXomD3oHuB+pRGz7D4aBxheiFcrQWzAWoi6kkBv5KFZq0Cikas+u0lS +4QOq9s+Rd0GyjuIwhdeSvSY81NLaaBM2jHBwplePRsisFsfTTmTpaLTbhAXQ9Ul2 +80SO5EyEFaBDcdEFvZSEE079ClgFAgMBAAECgYEAtXoogDobJovxFxhhz4Dr5Dmz +mi+4ibofI26aVKLZqt07uVeH4ZlcIH8cwMCG6nQOSldN8Ujj4cssIhw0mMuCQynZ +MhLiFeI3sDkiGgrbJV8D7XLwdFwgVZmAcQ4cHxqcYVR8u8T5dgsW71q6decPt6XX +Y1ofhr0DuaBhVcTgaAUCQQD919jLN1v6NfE14pTWvDk5UJrRXH0/BTuWQ6qMJFpA +q4YvwRwPtRjqgJz5ir6DUKsxdxLG8A6txmY1oRd0aKq7AkEA4vv0lMBceZhbhOH0 +fT4NWZlv9ikeI0z4e36rjHuybzNube8ovku3PojQsxisQGdD6ZbtKxrLQoHAQKTt +yMW8PwJAciRFspMxA6CP1vgMj0ZRwOjyxKN/GgBjW90PajbKcnvuObjuwk1fZ8rv +SvJNWkTCxdpSEixNnWwx93l5T3nlEwJBAIRYa+8ficvMLfB43tj3iUko0cMxjkT+ +6BL5dITgytVTo5utyo/KDfoEQ8tpI2YZz9svCPINGV6Z0MLgZ1SdFnkCQCGZr9dE +IunvT/111TiPCUVyJ4feKSObHeUOD9GOF12n9Ebz6DE+HgWGg89Gwebc3u76zH49 +TLbPNtSumJk/9Xg= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/aral-schifflange.crt b/vpn/coloradio02/keys/aral-schifflange.crt new file mode 100644 index 0000000..ad9ed13 --- /dev/null +++ b/vpn/coloradio02/keys/aral-schifflange.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 12 (0xc) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:48:23 2016 GMT + Not After : Mar 27 07:48:23 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schifflange/name=aral-schifflange/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d5:4f:31:47:b7:c6:88:96:56:4c:11:06:fe:d2: + c6:4a:c0:b9:42:2d:18:a4:5d:6a:c5:b8:8f:46:6e: + 5e:a6:87:c6:a7:75:05:a1:3d:3e:0b:68:08:a0:ec: + 30:07:73:8b:b3:47:ee:6c:d1:80:08:f1:ae:ca:49: + 6b:7e:05:3d:5b:a5:47:c3:00:66:f9:b0:93:9f:0f: + 06:0b:45:91:31:05:68:af:23:b3:a5:21:5b:46:b4: + 38:b3:47:42:9f:a6:a7:10:3f:cf:60:17:4a:a4:8d: + 84:c2:52:9b:a7:f8:be:13:93:6a:82:af:2e:9a:a4: + ad:34:32:46:3e:1c:14:2d:65 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0E:BB:A6:45:1D:76:F7:77:D6:D7:DF:8A:BA:84:F4:32:75:2C:ED:8C + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a9:11:e7:44:26:1b:eb:75:d6:25:0f:52:4d:f5:9d:78:6a:a6: + 67:56:be:21:66:62:2b:98:c4:79:07:70:63:41:2c:6e:56:e0: + 23:20:c5:6d:66:9e:c2:70:55:ac:62:f2:9b:c4:49:94:13:3b: + 9f:aa:dd:3e:01:24:c9:0c:61:ba:9d:1e:03:be:04:8f:df:ce: + 2b:71:e8:f7:fe:c5:4e:c2:60:60:2c:10:02:06:3a:6e:35:97: + 72:56:07:77:28:b7:68:8c:ed:a0:03:aa:65:98:66:f6:fe:3e: + 96:08:f7:bf:08:35:de:18:05:eb:c4:97:7c:37:8d:7a:7f:72: + f1:da +-----BEGIN CERTIFICATE----- +MIIENjCCA5+gAwIBAgIBDDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzQ4MjNaFw0yNjAzMjcwNzQ4MjNaMIG1MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEZ +MBcGA1UEAxMQYXJhbC1zY2hpZmZsYW5nZTEZMBcGA1UEKRMQYXJhbC1zY2hpZmZs +YW5nZTEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEA1U8xR7fGiJZWTBEG/tLGSsC5Qi0YpF1qxbiPRm5epofG +p3UFoT0+C2gIoOwwB3OLs0fubNGACPGuyklrfgU9W6VHwwBm+bCTnw8GC0WRMQVo +ryOzpSFbRrQ4s0dCn6anED/PYBdKpI2EwlKbp/i+E5Nqgq8umqStNDJGPhwULWUC +AwEAAaOCAV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNB +IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUDrumRR1293fW19+KuoT0 +MnUs7Ywwgd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgasw +gagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcT +DlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9T +REFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAa +BgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAK +BggrBgEFBQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAqRHnRCYb +63XWJQ9STfWdeGqmZ1a+IWZiK5jEeQdwY0EsblbgIyDFbWaewnBVrGLym8RJlBM7 +n6rdPgEkyQxhup0eA74Ej9/OK3Ho9/7FTsJgYCwQAgY6bjWXclYHdyi3aIztoAOq +ZZhm9v4+lgj3vwg13hgF68SXfDeNen9y8do= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/aral-schifflange.csr b/vpn/coloradio02/keys/aral-schifflange.csr new file mode 100644 index 0000000..9a65ad2 --- /dev/null +++ b/vpn/coloradio02/keys/aral-schifflange.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB9jCCAV8CAQAwgbUxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRkwFwYDVQQDExBhcmFsLXNjaGlmZmxhbmdlMRkwFwYD +VQQpExBhcmFsLXNjaGlmZmxhbmdlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5z +YXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDVTzFHt8aIllZMEQb+0sZK +wLlCLRikXWrFuI9Gbl6mh8andQWhPT4LaAig7DAHc4uzR+5s0YAI8a7KSWt+BT1b +pUfDAGb5sJOfDwYLRZExBWivI7OlIVtGtDizR0KfpqcQP89gF0qkjYTCUpun+L4T +k2qCry6apK00MkY+HBQtZQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAR+XBhOvl +7jX//Iqn16D7WLk7VKLNTZ/+MY57bX/zcL3qTrhqq/ZFIItkxFqJazNc2mI72BhM +u+dIMoC9OquKiLLcgIF1h9yjUXWbinrEJbHelQFMnmHpzc0fgJ75vxst9+fEH9nG +4PPlmHqye40KCth3opfviYWXUQ9ybi0u1zs= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/aral-schifflange.key b/vpn/coloradio02/keys/aral-schifflange.key new file mode 100644 index 0000000..c5b66b2 --- /dev/null +++ b/vpn/coloradio02/keys/aral-schifflange.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANVPMUe3xoiWVkwR +Bv7SxkrAuUItGKRdasW4j0ZuXqaHxqd1BaE9PgtoCKDsMAdzi7NH7mzRgAjxrspJ +a34FPVulR8MAZvmwk58PBgtFkTEFaK8js6UhW0a0OLNHQp+mpxA/z2AXSqSNhMJS +m6f4vhOTaoKvLpqkrTQyRj4cFC1lAgMBAAECgYBykmu0ysgPWziU+NxaCNpLEoMv +QUuoFSkhdEU4nlWmeu0/ysIwXdWyiLmBvfr6NZzGug8dUdXEeBPbQV5EPQo78URb +chAW9zV0PZxfzVukYiy57Bu5UxrIH8qdRMBEgEv720guOA7skC3pSGQ87cvKL1Df +t/01jttoZ55gZfn8AQJBAPBM0u9j/BjtOH9gf49cg5tUtpypnTRmXYGwuoFZyTgb +8jwWvV09hHKckDVGeiH6EUYfEfAJUK8LXMZbQrhummUCQQDjPu4+yc56lCSxhIDx +bhEV6Y6IHjsahKwlzl6MonATAglQpHVB2Zoz5FaExBji9Nn0BimBjEVmLpWtgqZ5 +BJcBAkEA296fPnUwzKn5gOsNrGIM9Up80DmN4s0rD6hh7kr2B0XizcJMwAyyrJ++ +f1CeHYqO1adGJWiQj6mI2OHV2aUx1QJBALf/FFiyfgSyPqOdbeoN/LeJTGbaU3C9 +S8Wwus2UGLrLQ0+QWYDf+ANcNtF5Fc1uA6uZ8bF7KhX6UicTSkdieAECQEOU2e9x +vd23zg3FvnOemoFyh/8oWXk3jQHuvGs2e8T9ehD9UIWE6IuDuCm1POc8qfQKyW0/ +MoBy/GElNP2FBtQ= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp01.crt b/vpn/coloradio02/keys/ban-coloradiotp01.crt new file mode 100644 index 0000000..9929397 --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 4 (0x4) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:47:17 2015 GMT + Not After : Oct 9 12:47:17 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp01/name=ban-coloradiotp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:d0:6a:05:1e:04:e4:65:32:34:6b:c6:07:4a:df: + bb:6a:7d:c9:3b:f3:06:10:8c:44:9e:f7:10:59:02: + 2e:71:4e:28:48:f8:41:4a:e0:ed:f1:69:91:20:1e: + 3a:59:bc:c0:f4:46:99:b8:48:58:0a:5e:43:a0:0f: + 66:21:c4:9d:bb:2d:2b:f5:f5:3f:31:bd:a4:97:56: + fa:c7:52:56:28:a9:a2:3e:3c:38:24:c4:6f:04:e5: + 81:f9:84:28:6d:20:ae:bb:16:01:e6:b4:73:e8:b1: + b1:72:37:86:64:ec:db:72:0e:2d:3c:3c:b4:bd:c4: + c5:d8:0d:78:0b:b0:a7:50:e5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + E8:39:32:15:C6:01:07:40:E0:11:E2:1D:CD:CE:5B:8E:61:5F:C9:B7 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 93:f9:31:e7:53:ac:f6:b2:a7:d2:5c:2e:37:bc:4e:bc:94:be: + 0f:5f:ba:d4:c7:e7:e1:a8:1a:1f:d3:72:44:f8:7f:79:96:3e: + 9a:9a:f4:95:0b:01:10:dc:6b:ad:2c:fd:c0:b4:a9:ca:dd:54: + a1:60:16:cf:93:4a:ad:dc:e3:61:e0:01:08:7b:59:a4:ca:65: + 02:df:01:a6:de:51:80:52:2d:5b:91:a0:7f:be:b5:ea:69:2b: + 25:e7:9c:50:61:50:6d:df:c3:cc:7d:b4:ce:5d:60:c4:6d:e7: + 2c:94:b9:f6:78:29:e0:c5:4f:21:82:b9:ac:f4:6e:1e:d7:5b: + c1:e3 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBBDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ3MTdaFw0yNTEwMDkxMjQ3MTdaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDExGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAxMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDQagUeBORlMjRrxgdK37tqfck78wYQjESe9xBZAi5x +TihI+EFK4O3xaZEgHjpZvMD0Rpm4SFgKXkOgD2YhxJ27LSv19T8xvaSXVvrHUlYo +qaI+PDgkxG8E5YH5hChtIK67FgHmtHPosbFyN4Zk7NtyDi08PLS9xMXYDXgLsKdQ +5QIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBToOTIVxgEHQOAR4h3N +zluOYV/JtzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQCT+THn +U6z2sqfSXC43vE68lL4PX7rUx+fhqBof03JE+H95lj6amvSVCwEQ3GutLP3AtKnK +3VShYBbPk0qt3ONh4AEIe1mkymUC3wGm3lGAUi1bkaB/vrXqaSsl55xQYVBt38PM +fbTOXWDEbecslLn2eCngxU8hgrms9G4e11vB4w== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp01.csr b/vpn/coloradio02/keys/ban-coloradiotp01.csr new file mode 100644 index 0000000..b201663 --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp01.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFiYW4tY29sb3JhZGlvdHAwMTEaMBgG +A1UEKRMRYmFuLWNvbG9yYWRpb3RwMDExHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANBqBR4E5GUyNGvGB0rf +u2p9yTvzBhCMRJ73EFkCLnFOKEj4QUrg7fFpkSAeOlm8wPRGmbhIWApeQ6APZiHE +nbstK/X1PzG9pJdW+sdSViipoj48OCTEbwTlgfmEKG0grrsWAea0c+ixsXI3hmTs +23IOLTw8tL3ExdgNeAuwp1DlAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQBvDM6L +JHUGLLNcA2NF9L4joHHKz3wf3F9ugS7trkUfP7lSZGSG8HJbo1UHmL03N0naanRS +K8Ntirl8UMTB2aArSoF+STvGGExtI+eFfvaT4nmKudqq1b9N2FenZ2ZG0t9TNcvH ++fyzmplE+ps3yNFspCCjNvuWXSBbgG1WIcJa+Q== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp01.key b/vpn/coloradio02/keys/ban-coloradiotp01.key new file mode 100644 index 0000000..cccaf36 --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANBqBR4E5GUyNGvG +B0rfu2p9yTvzBhCMRJ73EFkCLnFOKEj4QUrg7fFpkSAeOlm8wPRGmbhIWApeQ6AP +ZiHEnbstK/X1PzG9pJdW+sdSViipoj48OCTEbwTlgfmEKG0grrsWAea0c+ixsXI3 +hmTs23IOLTw8tL3ExdgNeAuwp1DlAgMBAAECgYBQIdNh3WOrfQgmv/ch1LAMm9x5 +jlEwn53quPeyIWKV8gUPOVRxY9ZY0cwY20Z4JljSEysbbcVcBy5dJk6QgTZbhbo9 +jI6hvO3cWcZu4BSbs1EH1UTItXJiF3eSX/bKxQ8EKHnAHnTKXf1mfLcUbqyInuu5 +Aa3YqkAKYXRSFMs0KQJBAOmfu6VU7t3XrCm3EHSm4EnY/4hjBIXuNcTTnnEqkWGq +HELUPqZxVlXdZFf4duynlebCHRH/BKjBbVgRzcVBKe8CQQDkYCm+eCV05+jia+Dm +oV3Kji+fZ9RzoF6Ki/9wnC1ZXSiX6JX9LTaMmLKEfR05jbKgmRBcPTUI1DF5kqoB +c9ZrAkBqIjvwH0apF8rJ5LWgGRO52NA12K38XjylH3JSfQEw+kP+hEe1+7U6Kurk +ICd+2Z97BuKIA2/NbppLMUNnAnSXAkBJERtJ/Va+mJRCHRHPuEEx1VwXPDkU5XJa +EYCgntdDiDK8p4WVgym4wgIbsYvwJg3IpDA/0rVtJbbOlsYdwNoRAkEAqrTWInCe +qnt+b6Z/JCVYazSPId74FBXiwXkEmDlcm778fSQmb3PmmnGTUdwJAd+LKnwCBRsz +0NdlHVR/V3wBBQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp02.crt b/vpn/coloradio02/keys/ban-coloradiotp02.crt new file mode 100644 index 0000000..c770fbe --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp02.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 2 (0x2) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 5 06:41:01 2015 GMT + Not After : Oct 2 06:41:01 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:97:c7:87:ea:97:30:86:d3:12:ce:51:18:da:d0: + bd:55:18:e7:52:2d:e8:04:78:f6:9c:a8:fc:95:ab: + 88:98:b4:bd:b8:03:a5:5b:8b:70:86:11:e8:33:6f: + cb:23:f3:a3:b4:fe:cc:ec:3d:57:73:33:d1:26:94: + ef:de:a6:5b:2b:54:e2:3d:3b:c3:05:1a:97:da:22: + 2c:29:ca:ce:49:dc:43:eb:f5:d6:3f:f7:70:f6:3b: + 79:d4:ef:2a:8b:8c:aa:67:a8:2c:fa:81:e4:6c:34: + 1a:ca:26:94:4e:20:fc:45:da:c6:24:94:9a:bd:21: + de:b3:84:35:ce:ac:d4:89:0f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 13:2D:AB:DC:C9:A0:7F:CF:4F:88:65:76:F6:3B:CE:3D:85:8E:9E:83 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 57:1a:71:a5:b6:02:f8:2f:25:57:b3:c9:58:e7:a0:63:7f:e2: + aa:27:16:f4:1b:eb:02:a1:d5:b4:60:b3:cc:d7:6f:59:6b:ff: + 9e:8d:76:d3:ec:71:95:aa:98:6d:7e:7f:14:b2:19:c7:4a:05: + 3d:2f:88:02:e1:97:38:73:99:50:ff:a4:71:ed:46:a7:6f:a8: + 27:e3:13:4e:6c:35:7a:53:ef:95:53:f0:4a:f7:e4:11:17:10: + 4f:f5:ec:4e:31:97:0b:0e:12:93:f9:bd:54:c1:2b:9a:5e:cb: + fb:b3:39:7b:ad:a8:a0:e0:ca:a1:d7:12:b7:ac:66:2f:41:4b: + f8:38 +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMDUwNjQxMDFaFw0yNTEwMDIwNjQxMDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRYmFuLWNvbG9yYWRpb3RwMDIxGjAYBgNVBCkTEWJhbi1jb2xvcmFk +aW90cDAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQCXx4fqlzCG0xLOURja0L1VGOdSLegEePacqPyVq4iY +tL24A6Vbi3CGEegzb8sj86O0/szsPVdzM9EmlO/eplsrVOI9O8MFGpfaIiwpys5J +3EPr9dY/93D2O3nU7yqLjKpnqCz6geRsNBrKJpROIPxF2sYklJq9Id6zhDXOrNSJ +DwIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQTLavcyaB/z0+IZXb2 +O849hY6egzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBXGnGl +tgL4LyVXs8lY56Bjf+KqJxb0G+sCodW0YLPM129Za/+ejXbT7HGVqphtfn8UshnH +SgU9L4gC4Zc4c5lQ/6Rx7Uanb6gn4xNObDV6U++VU/BK9+QRFxBP9exOMZcLDhKT ++b1UwSuaXsv7szl7raig4Mqh1xK3rGYvQUv4OA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp02.csr b/vpn/coloradio02/keys/ban-coloradiotp02.csr new file mode 100644 index 0000000..7ab2941 --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp02.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFiYW4tY29sb3JhZGlvdHAwMjEaMBgG +A1UEKRMRYmFuLWNvbG9yYWRpb3RwMDIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJfHh+qXMIbTEs5RGNrQ +vVUY51It6AR49pyo/JWriJi0vbgDpVuLcIYR6DNvyyPzo7T+zOw9V3Mz0SaU796m +WytU4j07wwUal9oiLCnKzkncQ+v11j/3cPY7edTvKouMqmeoLPqB5Gw0GsomlE4g +/EXaxiSUmr0h3rOENc6s1IkPAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQAbApAK +Gl6aUnuu05IoKVAyDgzBWllLSgAh7rjGkgx4/PxCNC8kiB8LTtiSyJSFnJjch8bT +bkT3VfWS15hxH6ubYspKPUyXORLUy5mtOIKjbiz5KyWk/IVArstI8NmrUMLHPZx8 +/3fYsSMYxkqZSshrkaXEbaBYzf5YeZGdf2jVyw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/ban-coloradiotp02.key b/vpn/coloradio02/keys/ban-coloradiotp02.key new file mode 100644 index 0000000..1d6e000 --- /dev/null +++ b/vpn/coloradio02/keys/ban-coloradiotp02.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAJfHh+qXMIbTEs5R +GNrQvVUY51It6AR49pyo/JWriJi0vbgDpVuLcIYR6DNvyyPzo7T+zOw9V3Mz0SaU +796mWytU4j07wwUal9oiLCnKzkncQ+v11j/3cPY7edTvKouMqmeoLPqB5Gw0Gsom +lE4g/EXaxiSUmr0h3rOENc6s1IkPAgMBAAECgYASaDRnkuZjs314YAVvpBkSFO8Y +3FBjGnhuD2Byllb+jgzkIC0RqRuAZvOOKWSte4LDFJOtotLUOdiHoVBl5C7yJosP +FfHOj7ZM5FgogjqDMtu1obRW7+Lfxr5j3aXLuEvkuPLRLhRTdZ7Qr9WkP9jj1pq8 +EOAtmOi6beme8GJyoQJBAMkIMqvT5Iqu/R+i7V9nOV6FMxnG8fG1qocI2yk/huXy +NEqN3vVjvDCd0wBzXRTp84OCgQt4OGGzXWXSOTUg9ysCQQDBR8IfjyCDYndmm+PU +0rn/QwW64pPYUo/OyIBHN6Hk9eGG3UR9glAYi1Im06LseD4AN1AwvpcCtA3ielxT ++AOtAkBOnz0qBGnqbzuhxtetKzK9q7xrhWoUTSdPPoBwJl88yTf4PHoJYKM2JFNk +Zrnttv283ipX8QGj/EE31Dr5c1YXAkBC6rc4+fLFyjeQnPRaYMLor6myNHP/d0Y2 +z5AqGAbDIKX+bWkjExTsCoBc1PUZbd/5by0iUzoxQ2lzOe3xXHLZAkBMl7K2jRAh +jJujs46JglYc0CVHwVBWsmclm9MKpxWqSteWmdC8RFnMGuXIA40fL97F91T9GM9H +ZFgIMtqSd3y9 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/bp-capellen.crt b/vpn/coloradio02/keys/bp-capellen.crt new file mode 100644 index 0000000..3376cc2 --- /dev/null +++ b/vpn/coloradio02/keys/bp-capellen.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 15 (0xf) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:52:33 2016 GMT + Not After : Mar 27 07:52:33 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=bp-capellen/name=bp-capellen/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:8b:28:f1:66:1c:65:dd:c8:de:bd:ef:a4:6c: + 12:7c:0b:a6:7d:6b:06:66:8e:b7:56:e7:e5:f3:ea: + 70:16:61:7b:b2:f4:2c:89:8f:5b:be:a5:ac:ab:91: + 4e:9b:d5:f8:ae:d1:92:8a:cb:0b:e5:e0:6e:76:ae: + 3d:9c:69:7b:4b:1e:05:2a:40:9b:0b:02:81:4d:78: + 01:ce:cc:f5:4d:a3:0a:51:68:6a:91:46:6c:5d:4d: + 15:a2:86:f4:2d:76:39:7d:59:4f:5b:4a:8b:cb:e4: + 84:ca:df:29:e5:21:63:85:eb:34:2c:8d:7d:f8:49: + bc:be:1a:42:c9:96:52:6d:2d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + B7:AD:4C:4D:CC:11:99:97:B8:F9:21:C6:A3:EA:D7:5D:68:C7:3F:DD + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + bc:a7:77:5c:ff:b2:d0:39:c0:19:62:1a:61:c7:8e:40:1d:d1: + d5:6d:cf:79:3b:37:29:54:c3:4f:2e:09:c4:c4:48:da:f8:c8: + cd:6b:f1:01:41:0b:bf:ea:9e:a6:50:30:e9:3d:79:ba:1c:0b: + c2:cc:66:9a:1f:f0:32:a0:cd:8c:27:c6:ff:2f:04:fa:26:8d: + 3d:0b:6a:39:41:d0:94:41:68:c2:50:55:6c:37:31:65:4a:68: + a5:f9:49:1d:34:3e:00:82:5d:17:39:d1:3c:d8:f5:26:f0:ff: + 6c:df:0a:f1:8c:a1:49:d2:50:10:44:9f:b8:8d:51:93:45:3b: + 30:8c +-----BEGIN CERTIFICATE----- +MIIELDCCA5WgAwIBAgIBDzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUyMzNaFw0yNjAzMjcwNzUyMzNaMIGrMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEU +MBIGA1UEAxMLYnAtY2FwZWxsZW4xFDASBgNVBCkTC2JwLWNhcGVsbGVuMRwwGgYJ +KoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB +iQKBgQDDiyjxZhxl3cjeve+kbBJ8C6Z9awZmjrdW5+Xz6nAWYXuy9CyJj1u+payr +kU6b1fiu0ZKKywvl4G52rj2caXtLHgUqQJsLAoFNeAHOzPVNowpRaGqRRmxdTRWi +hvQtdjl9WU9bSovL5ITK3ynlIWOF6zQsjX34Sby+GkLJllJtLQIDAQABo4IBXzCC +AVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2VuZXJhdGVk +IENlcnRpZmljYXRlMB0GA1UdDgQWBBS3rUxNzBGZl7j5Icaj6tddaMc/3TCB3QYD +VR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDELMAkGA1UE +BhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3Vy +LVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNV +BAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJ +ARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsGAQUFBwMC +MAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQC8p3dc/7LQOcAZYhphx45A +HdHVbc95OzcpVMNPLgnExEja+MjNa/EBQQu/6p6mUDDpPXm6HAvCzGaaH/AyoM2M +J8b/LwT6Jo09C2o5QdCUQWjCUFVsNzFlSmil+UkdND4Agl0XOdE82PUm8P9s3wrx +jKFJ0lAQRJ+4jVGTRTswjA== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/bp-capellen.csr b/vpn/coloradio02/keys/bp-capellen.csr new file mode 100644 index 0000000..e18d8d1 --- /dev/null +++ b/vpn/coloradio02/keys/bp-capellen.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB7DCCAVUCAQAwgasxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRQwEgYDVQQDEwticC1jYXBlbGxlbjEUMBIGA1UEKRML +YnAtY2FwZWxsZW4xHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJ +KoZIhvcNAQEBBQADgY0AMIGJAoGBAMOLKPFmHGXdyN6976RsEnwLpn1rBmaOt1bn +5fPqcBZhe7L0LImPW76lrKuRTpvV+K7RkorLC+XgbnauPZxpe0seBSpAmwsCgU14 +Ac7M9U2jClFoapFGbF1NFaKG9C12OX1ZT1tKi8vkhMrfKeUhY4XrNCyNffhJvL4a +QsmWUm0tAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQBpEwrW6tL2CYlJeQqbY+4M +dKv7CLvHu4I+qyoz+sIIbOb5ynCKkc5ZDSq4bU7VEgFxrVa9dlGf1AdufApVRmWG +hHTRGQLxr+x97RoGVKRcQehA52v0c9mZwSSXEwDDLjH06dHu5Fzt0R/adqMsWy7t +gsZeuaxvCJd8uF44a9NFaw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/bp-capellen.key b/vpn/coloradio02/keys/bp-capellen.key new file mode 100644 index 0000000..fb81ae7 --- /dev/null +++ b/vpn/coloradio02/keys/bp-capellen.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMOLKPFmHGXdyN69 +76RsEnwLpn1rBmaOt1bn5fPqcBZhe7L0LImPW76lrKuRTpvV+K7RkorLC+Xgbnau +PZxpe0seBSpAmwsCgU14Ac7M9U2jClFoapFGbF1NFaKG9C12OX1ZT1tKi8vkhMrf +KeUhY4XrNCyNffhJvL4aQsmWUm0tAgMBAAECgYAdx8rTgOagSPe3nJurod3q0Gdp +wGv4IJIhhS3LSRALCIurRG6oAJJLZbX3ZyjeqOa30SkNREEqoFSSdJTjhlkFYoKk +7pjuE3FhI2vbWcR+LNbAfAbeVPZX2R0DxW++dHNayw7E2DunSKKRkkgMiB93Euos +/zvqbj21FsEWKjLogQJBAOPuFTQfPWVdC6mDAN8GGMfbNsYq7u+9YTjDPCTgbi9R +nOsShfSUI1JgKDDc8E/WEXoYQ6+sC6p9QB8hj028Qc0CQQDboAj812c263Sy5b0W +fTMG0HpCB/eZbgwFbGkkQB9NA9prEYPgGUVNiVpN0d9y4hcy7hpvWmjpa60prYCu +lvjhAkBzxnZcwFWGTEnlM5bYshcaRT5AUISHoBFnLLw7Gwi83l6vhPwn7Ks4Z4Fi +uIcUdm7wLq0K6YAPfIl6hqhs2ugtAkBZz6fdPXjHzKF8RtZ8S9aCAt78AaYO6CGi +ViLo4A/svpajEhaLncnpWzHCgQCPSkWSXiwRPTeJvK6jTIBC5RoBAkEAo3v7rNPW +GZQMD2eJeCoXapICvm5tkhqNdXOzuaNrHstU08E6zs4S54Gw4co0HDkuUBTY5Qwn +v228fkSQcs1wQQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/ca.crt b/vpn/coloradio02/keys/ca.crt new file mode 100644 index 0000000..a848596 --- /dev/null +++ b/vpn/coloradio02/keys/ca.crt @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID4zCCA0ygAwIBAgIJALvrZegeKN4VMA0GCSqGSIb3DQEBBQUAMIGoMQswCQYD +VQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1z +dXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQG +A1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcN +AQkBFg1pbmZvQGRrcy5zYXJsMB4XDTE1MDIwODA4NTYxNFoXDTI1MDIwNTA4NTYx +NFowgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNV +BAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMG +UE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIx +HDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBAOll8sTKhW6J2FRJBmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5 +LFkQFZCzQDpXseyj6qs5JXJZliIQ0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ub +zl01DWj+/T4kY7xiIsPUmUXl/w6W/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAGj +ggERMIIBDTAdBgNVHQ4EFgQU7FCIXD6iwqwUI8a1Xj20zKlFUUwwgd0GA1UdIwSB +1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYTAkxV +MRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJl +MREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1w +b3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWlu +Zm9AZGtzLnNhcmyCCQC762XoHijeFTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEB +BQUAA4GBADhnM9ythy6OQ40et0WELaEZtrkqcifD590BfPr2UZD4aQSK4gW9A6RR +4E7JB5PaqGRftYgxgcNIYtM9n9QaoFAKzVqV0ZjFDLTX0T3ySXU5oKOMM/5lhwj2 +0oKu49H21DWFnAccFTJCa2Z2wyj8zXGZQRIoXEc2pbAZU3wP+Z7C +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/ca.key b/vpn/coloradio02/keys/ca.key new file mode 100644 index 0000000..dcd7e56 --- /dev/null +++ b/vpn/coloradio02/keys/ca.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeQIBADANBgkqhkiG9w0BAQEFAASCAmMwggJfAgEAAoGBAOll8sTKhW6J2FRJ +BmTU62cVHJCKVBYrBC801aB/BLWnJrH+vDd5LFkQFZCzQDpXseyj6qs5JXJZliIQ +0ma2U/AfWa7w+zdHwhgXF95D/7Ufq5i0O0Ubzl01DWj+/T4kY7xiIsPUmUXl/w6W +/5awZApeU/WgyXVj1KfOBRsJDEBDAgMBAAECgYEArlgsR5osoAyyHwvJjeqKyZ64 +jrP16fVKE+U4qsIXB4aL3iw19o46dXERWty7XpmBXA55zltKwKdxAZNlR7ps6aWe +mlWKQyifPqgBfb1xtlBt0GTC8MTHWiRrSNedqhKkXPrNcdUoKZQUo3/BB47wK5DJ +Zo+TohM0NIb9v3D4EFkCQQD2Xja1aUya0RyDJUE6cuWZ74EUSp0gTvKLQ25V8kBg +UW598uG4YCM+WPNdRBsHmG+S8o8g+BeDUegk617xQkc9AkEA8oXtBeCyk4kLOlZ5 +K4Bga40ORDzJY3tH27dN0SomJm6lJCeeHafyCXDScokPgd6xtZ3H/TXEBYhccbSH +rQ0dfwJBAJkqaYjPNjjp2HgQKUVVOTlClVUwLg9wBYpfGbGFMlCvT6ot3fbqjf6s +/l/1f3hxZKxO8HzmwHd77H9HdXc4ZWECQQDPZM/ostqDaDJ91O0R0lqiHqIQoJrn +w8kTj5GwSQcO3pfCb067tZ85i42r/KGSQcpesWsQkiXrRU0ov2U3C3wpAkEAtNnu +C/MyP+5904Yqpyu8V2ghbk4BDVLO+rZ337EWfye0fsPoWNGWzqLf7KPe9Mf9idXN +T7EmTAPLWTtXUl4+4Q== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/coloradio-tp01.crt b/vpn/coloradio02/keys/coloradio-tp01.crt new file mode 100644 index 0000000..a5e117f --- /dev/null +++ b/vpn/coloradio02/keys/coloradio-tp01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 3 (0x3) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 12 12:44:47 2015 GMT + Not After : Oct 9 12:44:47 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=coloradio-tp01/name=coloradio-tp01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:9c:92:64:5c:71:63:0a:68:0a:42:f0:bd:f2:2b: + c7:f4:1b:ca:44:75:86:de:9f:c4:d5:b8:18:f4:7b: + e8:87:b8:3d:27:e3:7a:1a:99:a3:df:f1:47:21:2b: + a1:f8:51:d0:90:c0:1d:d4:80:52:20:ca:1f:14:20: + e4:5e:69:79:31:66:1e:7c:1e:6f:de:63:0a:57:ca: + 9a:9f:dc:30:1b:3d:76:c5:e3:12:cd:2b:81:e6:d7: + 35:2e:67:f8:09:09:3e:10:d3:6c:c8:90:ef:bc:bf: + 90:23:af:9e:f6:e7:2e:a7:05:78:7d:84:f2:f3:ff: + c7:c4:ab:cc:99:1e:ff:6b:b1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 22:A7:0B:A9:7F:35:9B:18:D7:B9:C0:60:D2:B9:CC:BE:DE:54:F0:53 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + d9:26:5e:8b:e9:6d:e8:39:b6:f9:f0:5d:64:39:86:44:8b:62: + 47:5f:6b:89:ed:8a:fb:dc:db:34:64:f9:a1:46:c7:4b:3f:f0: + 5a:88:bb:76:33:19:cb:0c:c8:d3:66:57:ed:f4:34:88:95:6c: + e3:0f:af:c2:fe:d8:ca:7f:3a:44:63:a2:8a:83:a3:e5:3e:a7: + f4:20:6a:fa:f7:76:95:ee:e9:6c:96:d6:10:87:97:af:99:b0: + 3c:bd:00:21:a0:46:5f:28:e5:2d:d1:45:b1:15:a6:a3:8c:c4: + 23:3e:52:de:63:99:d8:43:5b:72:71:45:11:32:3b:18:31:75: + b7:37 +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTIxMjQ0NDdaFw0yNTEwMDkxMjQ0NDdaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOY29sb3JhZGlvLXRwMDExFzAVBgNVBCkTDmNvbG9yYWRpby10cDAx +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQCckmRccWMKaApC8L3yK8f0G8pEdYben8TVuBj0e+iHuD0n43oa +maPf8UchK6H4UdCQwB3UgFIgyh8UIOReaXkxZh58Hm/eYwpXypqf3DAbPXbF4xLN +K4Hm1zUuZ/gJCT4Q02zIkO+8v5Ajr5725y6nBXh9hPLz/8fEq8yZHv9rsQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQipwupfzWbGNe5wGDSucy+3lTw +UzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDZJl6L6W3oObb5 +8F1kOYZEi2JHX2uJ7Yr73Ns0ZPmhRsdLP/BaiLt2MxnLDMjTZlft9DSIlWzjD6/C +/tjKfzpEY6KKg6PlPqf0IGr693aV7ulsltYQh5evmbA8vQAhoEZfKOUt0UWxFaaj +jMQjPlLeY5nYQ1tycUURMjsYMXW3Nw== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/coloradio-tp01.csr b/vpn/coloradio02/keys/coloradio-tp01.csr new file mode 100644 index 0000000..837891e --- /dev/null +++ b/vpn/coloradio02/keys/coloradio-tp01.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8jCCAVsCAQAwgbExCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRcwFQYDVQQDEw5jb2xvcmFkaW8tdHAwMTEXMBUGA1UE +KRMOY29sb3JhZGlvLXRwMDExHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmww +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJySZFxxYwpoCkLwvfIrx/QbykR1 +ht6fxNW4GPR76Ie4PSfjehqZo9/xRyErofhR0JDAHdSAUiDKHxQg5F5peTFmHnwe +b95jClfKmp/cMBs9dsXjEs0rgebXNS5n+AkJPhDTbMiQ77y/kCOvnvbnLqcFeH2E +8vP/x8SrzJke/2uxAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQBMyQpkOtSQ1k4W +/Cl4q0o1ziCQKkb+rWH57II4rN3MDr/mj00wW4qfQ0GF1qrtODYCNFVeGRbrQ0F5 +6tnjV0bTmhW7QA2xK37eyCQj/RVvMtfJ69Qxl7UeM2Rd0tzVcApze+lp/Oti8Lql +KzB7ykNZWoGATLt8EHIkWOLmb6C5HQ== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/coloradio-tp01.key b/vpn/coloradio02/keys/coloradio-tp01.key new file mode 100644 index 0000000..18cb582 --- /dev/null +++ b/vpn/coloradio02/keys/coloradio-tp01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAJySZFxxYwpoCkLw +vfIrx/QbykR1ht6fxNW4GPR76Ie4PSfjehqZo9/xRyErofhR0JDAHdSAUiDKHxQg +5F5peTFmHnweb95jClfKmp/cMBs9dsXjEs0rgebXNS5n+AkJPhDTbMiQ77y/kCOv +nvbnLqcFeH2E8vP/x8SrzJke/2uxAgMBAAECgYBgUxPZZ4yV92Hwwuko1tSCEqLC +sUdTKRnQnh0ENELfVHKTWrhhKwqNmIO5HX3dJoBYvUjc1kEwmQi7umykxODgk9pY +0aoYHNSv0C70x5qrzNOEfzojs1BvQSryP855d5dPaUBnkLTmqywIoxTnusZJW8+Y +4vkRXHVVoNlzdZ6KnQJBAMzJq1APUYJDv+AFUH3AdtSVRtJXi09UTWm+XTzAokDY +aBIW3ZSSgqur2j4gUoW4/T13a8kCu9EmFJRUuXwTCI8CQQDDuftt6wzmljHJo0qk +MzZ3oN7XPYPSG2/AvblfetLa2yq3fso47YOG1G8JhTpEDJy1EhZltTtT/kEy6OJK +Pee/AkEApTTUNUQGV3ZcZlcjNi98Lcc3WR0yz46M3Q+rnAUzX+i1HFLB8se3DtMW +vyPILwSrl1it5X2FExcLZxZqhIO+VQJAWtWicVXHq/ACdTDaQDAgVA6NvNiop8bh +61JhiIVI/BcA0R3/ncHk65sFWSbCbrhntcUKLfOY8BcsjQL1mjz2owJAcvR2zq+F +nBX2851WrimXhAoOqy72yLHHjDP8PdtnpaoVWCU340Wdn5LFJHMrN0Xw6OcpKjCT +00HRKl3JPZ14ZQ== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dh1024.pem b/vpn/coloradio02/keys/dh1024.pem new file mode 100644 index 0000000..8afc9ee --- /dev/null +++ b/vpn/coloradio02/keys/dh1024.pem @@ -0,0 +1,5 @@ +-----BEGIN DH PARAMETERS----- +MIGHAoGBAJmF7b182WAXC6WWo5YDMnI0BW+Qf7Zfn+c6MdilNN8v37S+BBhBp29m +4EBhdQc2AvMbUy7Yx59vj1fG670xaHNHlR42UG9363s3OobsKA10K8oHSBDon5uT +XuDGAZuz5fra395MtzJqT8J9LMwUmWAWDBkzWloVvAW9ZtgWqmx7AgEC +-----END DH PARAMETERS----- diff --git a/vpn/coloradio02/keys/dks-backup.crt b/vpn/coloradio02/keys/dks-backup.crt new file mode 100644 index 0000000..9e3b580 --- /dev/null +++ b/vpn/coloradio02/keys/dks-backup.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 20 (0x14) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:46:49 2017 GMT + Not After : Nov 20 14:46:49 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup/name=dks-backup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cb:9c:82:7b:ad:96:c6:51:56:ee:a0:0f:56:82: + de:6a:93:d5:ab:9f:42:b8:a7:27:5b:de:1e:2b:10: + 34:49:7a:a9:b0:e4:64:24:98:a1:2d:58:33:fb:c6: + 8a:5d:2a:64:a3:4d:35:88:04:34:89:68:ea:8a:07: + ff:a6:1e:f6:56:3d:7e:67:b9:ae:e1:72:1e:71:28: + bd:61:ef:8d:d1:89:09:e3:06:c3:a4:bf:aa:36:6c: + ff:7b:f8:d6:16:23:22:d4:ce:15:98:73:36:98:9e: + da:97:07:1a:ab:5f:6c:17:6b:c9:ed:9e:18:4f:fc: + 0a:9c:8f:47:8c:8a:d9:21:df + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 04:7F:8A:31:2E:C2:3B:E9:DA:7F:EF:C5:85:3A:FB:7B:36:43:6D:0B + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c8:48:ee:77:fd:6b:5e:1b:83:28:79:8a:ce:52:8c:86:97:91: + da:15:64:32:87:b2:87:ab:72:19:9f:ef:49:eb:1d:4a:01:82: + e5:d7:32:bb:aa:c1:82:7d:09:a4:97:7c:16:42:ce:d4:02:2e: + 9c:4a:31:47:71:33:69:8c:69:af:7c:01:d7:09:fe:82:22:2a: + 71:4f:c6:6b:0d:cd:01:e6:1a:03:c8:db:a3:dd:76:67:e7:f4: + bd:92:f5:33:8e:4f:83:51:5b:a3:2c:06:b6:41:c3:ea:cd:0a: + 58:af:a6:3d:ba:90:68:f0:a5:cf:82:16:71:dd:cf:53:51:98: + ba:25 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBFDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ2NDlaFw0yNzExMjAxNDQ2NDlaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWJhY2t1cDETMBEGA1UEKRMKZGtzLWJhY2t1cDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAy5yCe62WxlFW7qAPVoLeapPVq59CuKcnW94eKxA0SXqpsORkJJihLVgz+8aK +XSpko001iAQ0iWjqigf/ph72Vj1+Z7mu4XIecSi9Ye+N0YkJ4wbDpL+qNmz/e/jW +FiMi1M4VmHM2mJ7alwcaq19sF2vJ7Z4YT/wKnI9HjIrZId8CAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUBH+KMS7CO+naf+/FhTr7ezZDbQswgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAyEjud/1rXhuDKHmKzlKMhpeR +2hVkMoeyh6tyGZ/vSesdSgGC5dcyu6rBgn0JpJd8FkLO1AIunEoxR3EzaYxpr3wB +1wn+giIqcU/Gaw3NAeYaA8jbo912Z+f0vZL1M45Pg1FboywGtkHD6s0KWK+mPbqQ +aPClz4IWcd3PU1GYuiU= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-backup.csr b/vpn/coloradio02/keys/dks-backup.csr new file mode 100644 index 0000000..aacab64 --- /dev/null +++ b/vpn/coloradio02/keys/dks-backup.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6jCCAVMCAQAwgakxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRMwEQYDVQQDEwpka3MtYmFja3VwMRMwEQYDVQQpEwpk +a3MtYmFja3VwMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqG +SIb3DQEBAQUAA4GNADCBiQKBgQDLnIJ7rZbGUVbuoA9Wgt5qk9Wrn0K4pydb3h4r +EDRJeqmw5GQkmKEtWDP7xopdKmSjTTWIBDSJaOqKB/+mHvZWPX5nua7hch5xKL1h +743RiQnjBsOkv6o2bP97+NYWIyLUzhWYczaYntqXBxqrX2wXa8ntnhhP/Aqcj0eM +itkh3wIDAQABoAAwDQYJKoZIhvcNAQELBQADgYEAgtb6Jl3ywdH+BTXi1Ktvdqnj +bmL9EfknxePDM/2hTQtfq8gKEZcVTfWuWgR7YHaF4mKjpS4UYWKnsJw8ZNNe9Qcr +EBW+/VEuh103021eunKn9LhGAM7g4dVRaAkjHJLkKdw9yzJOXYe8Czk7AsZL7PVb +LLiB08ip38VHqWLLAK4= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-backup.key b/vpn/coloradio02/keys/dks-backup.key new file mode 100644 index 0000000..d633f1f --- /dev/null +++ b/vpn/coloradio02/keys/dks-backup.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAMucgnutlsZRVu6g +D1aC3mqT1aufQrinJ1veHisQNEl6qbDkZCSYoS1YM/vGil0qZKNNNYgENIlo6ooH +/6Ye9lY9fme5ruFyHnEovWHvjdGJCeMGw6S/qjZs/3v41hYjItTOFZhzNpie2pcH +GqtfbBdrye2eGE/8CpyPR4yK2SHfAgMBAAECgYBaEdcK3QRooEzDbJy8WVIIdXM8 +40vBoXfgxMY1qIpowtFUBgRix/3ssCr2wqIsindQYfQ/QhT3gCjYfKdTljjDrVXP +Pnjx+Ydc6dJxQKYKGn9UpwbXm63Wi968ggPb5o2N8AKZNe94S2QAWHrY0MNNjOaD +WsLFQ6QK1ZR0emeAgQJBAPCLG3TgUSvbeCGlW+RYguC4KkHwRPZ7ccWtGocEXEil +Ol5Hs5h9n9EdiOOjsQuSEMTUrScQhFQmoT6Vjt+Crh8CQQDYseC0PnLdg2dcawux +w2XyePQdRA+p6RqOvpfMJnZpopJOzzdwkTK0kce2YczUDJ75OITcvK8+ujyOl+NP +35RBAkEAs6YRAX8u4GRvGiHXuXjpdk/VL530w2l6lTotX70/9vl/2D4QwcjA/Xrj +a7ArYArc/0Qfddd+HSMktgsYw5Fj3QJBAIgxVA806LC8c+wsA0+YhaydxJ/YNRgP +P/fTZkiTK/08hkQuDKQdPgcrUKAaW8gynn/4u9iYZnRATOs6H04GMYECQQCrAqmF +mV1iAprilWJIOXT84FkftLD2ZjqG2gwQ0vG1LU28MfY0C7Rfit7fNaholu1nZvvw +06QJlcgd3Yu8TTC8 +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-homebackup.crt b/vpn/coloradio02/keys/dks-homebackup.crt new file mode 100644 index 0000000..763160b --- /dev/null +++ b/vpn/coloradio02/keys/dks-homebackup.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 21 (0x15) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:16 2017 GMT + Not After : Nov 20 14:47:16 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup/name=dks-homebackup/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:da:7f:f1:3f:78:d1:20:83:c6:65:6c:b0:7c:3d: + 51:b1:ff:3b:c1:e5:7b:3a:eb:94:da:38:26:d9:77: + f4:b2:fc:d9:08:a7:88:cd:ef:2d:21:2a:13:72:65: + 54:6a:6d:d9:ae:21:49:37:ab:4b:40:78:fe:95:42: + 30:7f:e9:7f:39:58:d3:78:c2:25:21:8e:0a:dd:18: + ea:e2:bc:21:e4:a1:ee:78:a8:cd:f2:bb:b6:4b:61: + 93:52:48:c3:18:60:88:4d:e5:35:c3:55:fe:48:ff: + 73:4d:29:03:0e:d5:f9:ae:17:35:ea:63:f0:58:f8: + 69:32:e8:d5:4a:20:7a:b4:81 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + D6:DF:0D:3E:14:BA:DD:69:04:67:76:69:CF:71:22:F1:1D:04:CA:07 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + c2:39:26:33:7b:75:fb:fd:37:b5:4c:41:34:a1:8e:b1:fb:82: + bc:75:74:c8:38:62:40:a6:72:c2:38:73:16:90:e3:e3:b6:49: + 3f:f4:9d:9e:81:0b:bd:d0:1b:88:cb:81:45:42:c6:2d:58:d3: + 41:70:30:3d:38:b7:c6:88:d9:08:b4:2f:09:7e:11:5e:2d:11: + d8:47:be:41:41:33:f5:cf:c4:1d:48:ea:fb:a6:d2:e0:b1:e6: + 52:57:65:88:8c:aa:5b:19:11:a7:a5:12:1a:0d:12:a9:bd:db: + 9a:ac:ed:63:c7:8c:f8:5c:e0:b9:6d:9f:c5:40:0f:5e:71:6e: + e9:7a +-----BEGIN CERTIFICATE----- +MIIEMjCCA5ugAwIBAgIBFTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MTZaFw0yNzExMjAxNDQ3MTZaMIGxMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEX +MBUGA1UEAxMOZGtzLWhvbWViYWNrdXAxFzAVBgNVBCkTDmRrcy1ob21lYmFja3Vw +MRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUA +A4GNADCBiQKBgQDaf/E/eNEgg8ZlbLB8PVGx/zvB5Xs665TaOCbZd/Sy/NkIp4jN +7y0hKhNyZVRqbdmuIUk3q0tAeP6VQjB/6X85WNN4wiUhjgrdGOrivCHkoe54qM3y +u7ZLYZNSSMMYYIhN5TXDVf5I/3NNKQMO1fmuFzXqY/BY+Gky6NVKIHq0gQIDAQAB +o4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1SU0EgR2Vu +ZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTW3w0+FLrdaQRndmnPcSLxHQTK +BzCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSBqzCBqDEL +MAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9v +ZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIx +FjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQMMAoGCCsG +AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQDCOSYze3X7/Te1 +TEE0oY6x+4K8dXTIOGJApnLCOHMWkOPjtkk/9J2egQu90BuIy4FFQsYtWNNBcDA9 +OLfGiNkItC8JfhFeLRHYR75BQTP1z8QdSOr7ptLgseZSV2WIjKpbGRGnpRIaDRKp +vduarO1jx4z4XOC5bZ/FQA9ecW7peg== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-homebackup.csr b/vpn/coloradio02/keys/dks-homebackup.csr new file mode 100644 index 0000000..9aa0782 --- /dev/null +++ b/vpn/coloradio02/keys/dks-homebackup.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8jCCAVsCAQAwgbExCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRcwFQYDVQQDEw5ka3MtaG9tZWJhY2t1cDEXMBUGA1UE +KRMOZGtzLWhvbWViYWNrdXAxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmww +gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp/8T940SCDxmVssHw9UbH/O8Hl +ezrrlNo4Jtl39LL82QiniM3vLSEqE3JlVGpt2a4hSTerS0B4/pVCMH/pfzlY03jC +JSGOCt0Y6uK8IeSh7niozfK7tkthk1JIwxhgiE3lNcNV/kj/c00pAw7V+a4XNepj +8Fj4aTLo1UogerSBAgMBAAGgADANBgkqhkiG9w0BAQsFAAOBgQDAq5HbI5dyKI4H +OWCSV6UwBAiPRjhFL984m+6Xf4Q8Irn7UOboFHtgGHFVjJnlb/nC82lfYlOyj/9V +dbwOuBd2kvJ+aBHp1rlITp44VfUqnleDs4AIVtoxmRTyhz8UtuKUI4XWnEcZvJH1 +JxYt0mMa7GC0qq+8E0pfl1hsLZljqA== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-homebackup.key b/vpn/coloradio02/keys/dks-homebackup.key new file mode 100644 index 0000000..8d49645 --- /dev/null +++ b/vpn/coloradio02/keys/dks-homebackup.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBANp/8T940SCDxmVs +sHw9UbH/O8HlezrrlNo4Jtl39LL82QiniM3vLSEqE3JlVGpt2a4hSTerS0B4/pVC +MH/pfzlY03jCJSGOCt0Y6uK8IeSh7niozfK7tkthk1JIwxhgiE3lNcNV/kj/c00p +Aw7V+a4XNepj8Fj4aTLo1UogerSBAgMBAAECgYEArhkBpdxjbW/yFgCLgwLs5FIF +UFLEZMcvPM0/D0pIXJGhcQbkt4nawLEg+6aHo6HRr7BwAX5oIIAIAe/Saykmp5aB +HOBcZnIwzs1Pex9Gouo8CWokuBBaJq3nG5UgsBwztsK2uDo+7kYbWiNkrq/zJMkC +5q4f2p0EWy9rGN+17V0CQQD6Th0jaw8A798y7s3qTZofkIYrL2i4IFSLc5gYLLYw +9j5zuiyKXvBJyhpJlQy2d7uYFZO9Ftynenk8yGouLzDjAkEA33iUjfWMuMUnua9Y +q6P4xYuTbAETssruDk/NlSjSpyvM+93ALU639rGJW5gtuOGGvYusfkE7bF3eBlJ/ +Z2K2SwJBAN8HGSmE7CJ+mZdNd0btjIXRhesW3C0sCYkUH5JyzIgF8ZG2cpd8joiB +PzkPSPuQ5iNWHoTeyQ+lrj89qHasb9cCQBZVoNNHVVcqLTw7sCsHalekCYnj2aom +6f/4Ld3YhKU8lXIeyZQ9p9k6CTZkUT2HHMZY7VZ5Ao1kHEqZeC5HCV0CQQCT54DW +u46jtlozbWI6alo4EmYgIKCanRq1UoGwI3QzzV+pnlUE3YcH5S6E5D5tToM/avBM +GXVx5NCFJvuGMGwr +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-ksmac.crt b/vpn/coloradio02/keys/dks-ksmac.crt new file mode 100644 index 0000000..59a39e8 --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmac.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 22 (0x16) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:30 2017 GMT + Not After : Nov 20 14:47:30 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac/name=dks-ksmac/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:f2:8c:4e:ad:af:34:75:42:0f:a7:81:58:f7:f7: + ea:e3:ba:db:0f:12:2d:c9:87:7d:86:4d:47:f2:f1: + 86:b1:a7:de:42:07:73:54:89:6d:03:37:62:28:d9: + c0:f5:5c:a8:77:7e:c9:55:81:51:52:94:63:16:c8: + 4a:8a:ed:83:86:5c:35:2d:70:6b:5c:15:76:2a:65: + 97:3a:a9:ce:ac:c0:c3:4b:a3:b1:69:8f:d4:14:b8: + 32:fb:25:8a:b6:4e:cd:03:6b:ef:14:1f:32:16:84: + 0b:bb:7a:1a:96:42:1c:77:51:fd:1e:9e:91:ae:44: + d9:53:02:1d:de:ac:91:13:1d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + FD:1D:CA:F1:A2:E5:CB:E3:A6:61:AB:64:0F:7F:0F:9E:48:B1:A6:95 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 32:87:45:1d:f2:d5:1e:b4:05:52:32:16:1b:80:e8:b4:f3:91: + 76:50:66:9e:b5:bf:b2:88:f5:42:ac:fa:63:27:3a:6c:f0:9f: + 42:33:68:d7:69:bb:91:fa:e5:56:8a:61:f6:e3:91:fd:55:4a: + 4e:96:9d:c7:1c:95:44:71:a8:92:94:ac:24:36:05:c6:79:95: + 57:49:bd:f6:81:85:52:c7:27:9c:84:26:e5:ab:75:69:5b:af: + 57:38:49:b6:f7:a1:13:24:30:4f:a7:14:9a:33:46:8a:92:56: + 8b:b3:25:de:4c:34:85:44:70:ab:90:24:59:44:b0:bc:d7:b9: + 52:4c +-----BEGIN CERTIFICATE----- +MIIEKDCCA5GgAwIBAgIBFjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3MzBaFw0yNzExMjAxNDQ3MzBaMIGnMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjES +MBAGA1UEAxMJZGtzLWtzbWFjMRIwEAYDVQQpEwlka3Mta3NtYWMxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB +APKMTq2vNHVCD6eBWPf36uO62w8SLcmHfYZNR/LxhrGn3kIHc1SJbQM3YijZwPVc +qHd+yVWBUVKUYxbISortg4ZcNS1wa1wVdipllzqpzqzAw0ujsWmP1BS4MvslirZO +zQNr7xQfMhaEC7t6GpZCHHdR/R6eka5E2VMCHd6skRMdAgMBAAGjggFfMIIBWzAJ +BgNVHRMEAjAAMC0GCWCGSAGG+EIBDQQgFh5FYXN5LVJTQSBHZW5lcmF0ZWQgQ2Vy +dGlmaWNhdGUwHQYDVR0OBBYEFP0dyvGi5cvjpmGrZA9/D55IsaaVMIHdBgNVHSME +gdUwgdKAFOxQiFw+osKsFCPGtV49tMypRVFMoYGupIGrMIGoMQswCQYDVQQGEwJM +VTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3ly +ZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMN +cG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1p +bmZvQGRrcy5zYXJsggkAu+tl6B4o3hUwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYD +VR0PBAQDAgeAMA0GCSqGSIb3DQEBBQUAA4GBADKHRR3y1R60BVIyFhuA6LTzkXZQ +Zp61v7KI9UKs+mMnOmzwn0IzaNdpu5H65VaKYfbjkf1VSk6WnccclURxqJKUrCQ2 +BcZ5lVdJvfaBhVLHJ5yEJuWrdWlbr1c4Sbb3oRMkME+nFJozRoqSVouzJd5MNIVE +cKuQJFlEsLzXuVJM +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-ksmac.csr b/vpn/coloradio02/keys/dks-ksmac.csr new file mode 100644 index 0000000..7388f15 --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmac.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6DCCAVECAQAwgacxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRIwEAYDVQQDEwlka3Mta3NtYWMxEjAQBgNVBCkTCWRr +cy1rc21hYzEcMBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG +9w0BAQEFAAOBjQAwgYkCgYEA8oxOra80dUIPp4FY9/fq47rbDxItyYd9hk1H8vGG +safeQgdzVIltAzdiKNnA9Vyod37JVYFRUpRjFshKiu2Dhlw1LXBrXBV2KmWXOqnO +rMDDS6OxaY/UFLgy+yWKtk7NA2vvFB8yFoQLu3oalkIcd1H9Hp6RrkTZUwId3qyR +Ex0CAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4GBAJ9xHF3ez5bS2YsCi1eEgso2ZbpU +APl1iIpS6aGyBfKQytZO6DLAf5rbRkEUvOCjxaoS6a/HiC5cFK4bckFSNS6btGZ7 +jC4yYUYHl79hMBxb59nyT4rc9uMhUhCgxNTJbH9JxWcao3Wap+58c+rsJFgsYjf9 +nlpIK0HThCjO3ECR +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-ksmac.key b/vpn/coloradio02/keys/dks-ksmac.key new file mode 100644 index 0000000..96d9ea7 --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmac.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAPKMTq2vNHVCD6eB +WPf36uO62w8SLcmHfYZNR/LxhrGn3kIHc1SJbQM3YijZwPVcqHd+yVWBUVKUYxbI +Sortg4ZcNS1wa1wVdipllzqpzqzAw0ujsWmP1BS4MvslirZOzQNr7xQfMhaEC7t6 +GpZCHHdR/R6eka5E2VMCHd6skRMdAgMBAAECgYBZUnB7KAWylRR8xHbGQwe+vAaG +Q1SXXg1NE1LG1kmbTU3dlS7U2BNMVu4QSzjzYx8reoactZYESl8/eZ1yEkwXzHWj +1729YroTvLUTxflDBThNGeekqnj4uP2w15uMfq11xSpC9b0MNrXZPq5nAjdXIk4w +3OgjMubG6F2MjRJaoQJBAP4auTxsWG/+/i4DcC11FvLNpbtthPS//VdNP8GUxXwd +zf1CYoNnlhevjLiD5x47KH6/GfsZx3AP5WeGHQ+pPtkCQQD0W4OZtgwdzAuHUp3O ++mXjOSMUDbpC6ruIaimFElWml3G8swkS6w4XzOda16JUuL42iqQtbEvnqC1dyeLI +99PlAkEA+fiiFy3ihjKMLAnX1fAk5jCmBE7GB9vCxppIyQ+oguPzG1yt+uTxQ1XA +Elg4CYZa3Oz0CxAeIUCSBZhqiFiPaQJBAMmTgLFZkw81lsEQLyxiNZDHPp+5X1D6 +cK9s3ElxQYTG48WFb9PSYfLSTnwK7Fe1evxlTGBIOSml+56l/1ZH0t0CQQD15hQt +mox21nqGRShnIron6JXSw6npdKsYBjp2iHBU6DpH3ZtD2MRXI4taIAFA8031Vpgz +3jbJBuGwCelm478I +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-ksmachome.crt b/vpn/coloradio02/keys/dks-ksmachome.crt new file mode 100644 index 0000000..0de5244 --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmachome.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 23 (0x17) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Nov 22 14:47:46 2017 GMT + Not After : Nov 20 14:47:46 2027 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmachome/name=dks-ksmachome/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:a0:c4:8c:eb:a8:d0:25:f0:09:a7:26:74:0d:d2: + b4:a9:2d:c4:dc:2d:80:56:5a:e3:20:1c:cf:a4:8a: + 2e:e7:d1:2b:0b:85:c4:8e:d8:2a:0a:e6:95:51:42: + b7:29:74:2d:62:49:96:6f:cc:fd:47:da:92:e2:3d: + 75:f0:87:1f:b0:31:3a:56:79:89:e6:9e:db:18:eb: + 49:ae:ad:ce:c0:83:6e:8e:82:8d:6d:ff:1b:6a:03: + 91:69:c7:a5:7a:68:30:15:e9:56:72:da:59:9f:5d: + 9b:a9:79:69:aa:28:5a:b6:cb:e0:7c:90:2f:b1:0e: + 80:8e:8e:01:05:e6:89:49:15 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 4A:4D:42:15:D0:32:86:4B:74:7F:9F:A1:AD:8B:07:C1:C8:5F:C7:E2 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 69:17:ef:f8:82:05:ee:c2:b8:8a:85:15:a7:15:05:64:b4:4d: + 4a:22:af:c3:a5:0e:96:c7:6e:b9:c5:15:08:b1:ed:57:aa:d0: + 7f:f2:66:b5:ab:62:47:4e:95:6d:96:be:38:55:e6:ac:c3:29: + b8:cb:88:60:5f:3a:25:05:4c:ba:af:09:de:5a:f3:bd:20:de: + 16:62:8a:d9:65:0a:4c:ef:64:41:64:f6:0d:4b:4c:7e:3e:17: + 72:d9:15:c2:31:8b:14:ea:d0:41:41:2b:ca:04:6f:0a:66:d5: + 68:f4:3a:e0:6a:6c:28:7e:ca:8e:3e:1e:97:35:23:a0:d7:d7: + e5:46 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBFzANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNzExMjIxNDQ3NDZaFw0yNzExMjAxNDQ3NDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLWtzbWFjaG9tZTEWMBQGA1UEKRMNZGtzLWtzbWFjaG9tZTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAoMSM66jQJfAJpyZ0DdK0qS3E3C2AVlrjIBzPpIou59ErC4XEjtgq +CuaVUUK3KXQtYkmWb8z9R9qS4j118IcfsDE6VnmJ5p7bGOtJrq3OwINujoKNbf8b +agORacelemgwFelWctpZn12bqXlpqihatsvgfJAvsQ6Ajo4BBeaJSRUCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUSk1CFdAyhkt0f5+hrYsHwchfx+Iw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAaRfv+IIF7sK4ioUV +pxUFZLRNSiKvw6UOlsduucUVCLHtV6rQf/JmtatiR06VbZa+OFXmrMMpuMuIYF86 +JQVMuq8J3lrzvSDeFmKK2WUKTO9kQWT2DUtMfj4XctkVwjGLFOrQQUErygRvCmbV +aPQ64GpsKH7Kjj4elzUjoNfX5UY= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-ksmachome.csr b/vpn/coloradio02/keys/dks-ksmachome.csr new file mode 100644 index 0000000..4e4fc0c --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmachome.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1ka3Mta3NtYWNob21lMRYwFAYDVQQp +Ew1ka3Mta3NtYWNob21lMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCgxIzrqNAl8AmnJnQN0rSpLcTcLYBW +WuMgHM+kii7n0SsLhcSO2CoK5pVRQrcpdC1iSZZvzP1H2pLiPXXwhx+wMTpWeYnm +ntsY60murc7Ag26Ogo1t/xtqA5Fpx6V6aDAV6VZy2lmfXZupeWmqKFq2y+B8kC+x +DoCOjgEF5olJFQIDAQABoAAwDQYJKoZIhvcNAQELBQADgYEAMqa9NajWN8RyzoWs +tULCMYIhpZBacUNeiRxF+qSDPYRBXPz7Vi21CaNUUdwyojY4KEkpOUvvyW2O2bA0 +bnyjSS35ik6rY1BFGwMYay8jm3IMUn0ka/oARMhIZR40ajTiTYMO8NX0EfxKO+wE +rKYkwkNN+sH0xz7nfC42JMSWAbY= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-ksmachome.key b/vpn/coloradio02/keys/dks-ksmachome.key new file mode 100644 index 0000000..eb7c04b --- /dev/null +++ b/vpn/coloradio02/keys/dks-ksmachome.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAKDEjOuo0CXwCacm +dA3StKktxNwtgFZa4yAcz6SKLufRKwuFxI7YKgrmlVFCtyl0LWJJlm/M/UfakuI9 +dfCHH7AxOlZ5ieae2xjrSa6tzsCDbo6CjW3/G2oDkWnHpXpoMBXpVnLaWZ9dm6l5 +aaooWrbL4HyQL7EOgI6OAQXmiUkVAgMBAAECgYA0K3QbaR2aoglP34+biLuthrey +R2W1ICtCGXdcSqcr/Nl+FLuTKxyBiw/7Xa34WsX7divGPfwXHBu8JPunwQGL9KaQ +I5FAz6Sg2es3TkdlOAyUWCR1VwjS/aw+gIA36Q1hBRomfloAN/noQZ3VK+9z9IlZ +MOOlTDAjnIhAzKoIwQJBANWNe5kltKOiroH5LWGGHr+RQjLMKdXeNS6oTTiCVwXz +MFed6dYztDsD1bqpqWOBm4PdGEGO47LDAMwkgzO/OBECQQDAuSK9CGGXMjLKuHUl +cUnQdUD81/Bf6T64cHI+n0yh/A/yfNiyrD/UrFw1B1n1AJc07iYnsGNuVUB4CZYz +NOTFAkBXOG0F1NedieE6Zpo5Xb0LQvnFo4tmtVYFU2oOrXV7kaLp9i4+dWmkPOG7 +VnY/lPz+c3vnssOfDHQz7KnFpdDxAkAd+Ky+WR9UNCpR/H27ZPLlyFZi+/IV+GAY +ruQVeRCh4GFahK/umXsTx/pPBOWohH7/bEniwju0XO25vUPukrtBAkAQQwWBLcu9 +TByRZYXoksZBoL750yt4bxiEe6hTsUbUddWhHEJ/zh6fdazyS3+GZjzRqAv77Nt5 +gSzKhfw73foq +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-laptop.crt b/vpn/coloradio02/keys/dks-laptop.crt new file mode 100644 index 0000000..80d8ad9 --- /dev/null +++ b/vpn/coloradio02/keys/dks-laptop.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 5 (0x5) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Oct 13 07:14:55 2015 GMT + Not After : Oct 10 07:14:55 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c3:a6:e8:74:63:47:c5:71:ca:00:20:7a:9b:d9: + 70:a1:df:90:ce:77:d0:be:6b:34:ee:24:c3:89:be: + 86:86:93:3a:f8:c1:5f:a8:96:c9:51:12:ec:af:05: + 70:ed:61:2d:bf:37:8e:a5:38:f0:1b:c5:ea:98:9a: + b7:f0:46:b0:b6:b7:95:aa:fb:e5:76:5e:9a:d7:eb: + 48:e2:c0:18:3f:a4:67:50:60:9a:d3:07:a8:89:da: + 75:f7:fb:19:31:37:62:1b:4a:1c:99:5e:ae:87:46: + 0f:9b:64:46:88:89:f9:64:07:db:4c:3c:25:44:b6: + c2:ff:10:d8:11:cb:8d:1e:f1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 0A:16:B0:54:73:46:D6:27:12:C8:A1:2E:87:61:6A:E4:5B:08:5E:B4 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + a0:cb:10:73:c3:36:b6:0f:d5:a0:8e:56:1e:21:7d:18:3b:de: + b0:57:71:1d:9a:c4:da:5b:fe:07:b7:d4:6d:e0:52:bc:77:5a: + 32:be:09:a9:cc:a3:4f:9a:fe:22:66:1f:f2:5a:88:ad:fe:b1: + 48:63:95:d0:11:f0:1b:0e:8c:cc:59:8f:81:b2:eb:69:d3:35: + 5a:56:6a:72:ac:da:92:4a:26:b6:79:b0:78:17:8d:cf:3e:db: + ec:ae:42:20:c3:98:e9:86:ca:28:01:f1:46:ff:b3:83:00:86: + 97:e7:8a:22:82:ff:73:c2:0c:a3:a6:20:0f:5c:d3:0c:98:2b: + b3:11 +-----BEGIN CERTIFICATE----- +MIIEKjCCA5OgAwIBAgIBBTANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTEwMTMwNzE0NTVaFw0yNTEwMTAwNzE0NTVaMIGpMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjET +MBEGA1UEAxMKZGtzLWxhcHRvcDETMBEGA1UEKRMKZGtzLWxhcHRvcDEcMBoGCSqG +SIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC +gYEAw6bodGNHxXHKACB6m9lwod+QznfQvms07iTDib6GhpM6+MFfqJbJURLsrwVw +7WEtvzeOpTjwG8XqmJq38EawtreVqvvldl6a1+tI4sAYP6RnUGCa0weoidp19/sZ +MTdiG0ocmV6uh0YPm2RGiIn5ZAfbTDwlRLbC/xDYEcuNHvECAwEAAaOCAV8wggFb +MAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBD +ZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUChawVHNG1icSyKEuh2Fq5FsIXrQwgd0GA1Ud +IwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJBgNVBAYT +AkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1T +eXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYwFAYDVQQD +Ew1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEW +DWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEFBQcDAjAL +BgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAoMsQc8M2tg/VoI5WHiF9GDve +sFdxHZrE2lv+B7fUbeBSvHdaMr4JqcyjT5r+ImYf8lqIrf6xSGOV0BHwGw6MzFmP +gbLradM1WlZqcqzakkomtnmweBeNzz7b7K5CIMOY6YbKKAHxRv+zgwCGl+eKIoL/ +c8IMo6YgD1zTDJgrsxE= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-laptop.csr b/vpn/coloradio02/keys/dks-laptop.csr new file mode 100644 index 0000000..656946c --- /dev/null +++ b/vpn/coloradio02/keys/dks-laptop.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB6jCCAVMCAQAwgakxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRMwEQYDVQQDEwpka3MtbGFwdG9wMRMwEQYDVQQpEwpk +a3MtbGFwdG9wMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqG +SIb3DQEBAQUAA4GNADCBiQKBgQDDpuh0Y0fFccoAIHqb2XCh35DOd9C+azTuJMOJ +voaGkzr4wV+olslREuyvBXDtYS2/N46lOPAbxeqYmrfwRrC2t5Wq++V2XprX60ji +wBg/pGdQYJrTB6iJ2nX3+xkxN2IbShyZXq6HRg+bZEaIiflkB9tMPCVEtsL/ENgR +y40e8QIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAr76W9R2ebY41tQU9m09PbdXb +WRXl9zB9XIj+wkITlOHbvjzlDExFA0A4B6g/vxKtGZKnwZTJlmjORpTGAWTk/Zua +pKoemWz01/w5lhMHvJ01cm3DfTfWZ2rCMpbM7eKgGJqv8sSTcoOAYmnbTBD8YU6A +dRJqwodNYnyqCOisEPw= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-laptop.key b/vpn/coloradio02/keys/dks-laptop.key new file mode 100644 index 0000000..2384fae --- /dev/null +++ b/vpn/coloradio02/keys/dks-laptop.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMOm6HRjR8VxygAg +epvZcKHfkM530L5rNO4kw4m+hoaTOvjBX6iWyVES7K8FcO1hLb83jqU48BvF6pia +t/BGsLa3lar75XZemtfrSOLAGD+kZ1BgmtMHqInadff7GTE3YhtKHJlerodGD5tk +RoiJ+WQH20w8JUS2wv8Q2BHLjR7xAgMBAAECgYEAwdxbDh/lWJ10IwYLlusv8CTe +jcYontUJQEJLQev3zdaKozqv9xNZbKzMumswxvT4aDS7cbjmKQ7Fceo0Aa95ngSi +hOniZARUChA2WkI2hOV6kFJfajLcpzUcUrVoNxXvlc0P2DeRD7yqXR+OceLmM/5L +hnwSwB18Hty57Hf95vECQQD3vV4HvYwBw+sI1w4mz3Elw7/vwQWR4qGYc5jWrZww +ujYJD63Xf9Benxenm9IMc81eyuoVs8LnrIki3OtPSyj1AkEAyizvb/A+MkdIZE5E +64h6XctAgN+OWdSsvfzumFjo158sGy+tk9D/USXBBSO4LyQZqRXqUHKOEowRxMXx +zA9QjQJAdCn9T0/XuHQvXyPH5PbcLUMOWtN9UxybfSqm/fLGDCskbzdE4olyIQwk +QVlVMrWSFOK8xJRXzd4fJ5PDWpj5iQJAT70ZUpT2cu4aZzVXiW3ylTus3SdPBa8T +0nsHv56RdzmYM8DCPSKZEHBLiLNl2XHrjPzPxZro3ffQqkNH8qu3oQJBAKG16qhj +KTf++DXaVre0yh6rvaBuXdItLm8GHZhyVJlKsDSAgUDqzyXMYQKDbGZY3B6m5g+/ +hTFLdMRnUB3RJdM= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-station01.crt b/vpn/coloradio02/keys/dks-station01.crt new file mode 100644 index 0000000..9ce664c --- /dev/null +++ b/vpn/coloradio02/keys/dks-station01.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 16 (0x10) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Apr 13 07:26:40 2016 GMT + Not After : Apr 11 07:26:40 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station01/name=dks-station01/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c8:e3:88:d0:e4:54:91:f1:bf:a3:f5:ed:44:cf: + c9:9b:e8:9c:0f:f9:f5:74:10:fc:66:3e:6e:2c:20: + 5d:5b:8a:79:03:55:65:50:f4:56:b9:ca:09:38:8c: + c4:7d:45:75:b4:d6:e2:1d:49:73:a8:93:e5:a7:e1: + fc:4b:3c:63:1f:7c:26:1c:ec:0d:3f:f2:38:fc:68: + 0d:d4:02:2f:53:3c:15:c0:d0:29:10:7b:fe:0b:05: + 4b:42:3f:ed:d8:90:e6:11:fc:f0:3e:79:00:5e:57: + e6:bc:4b:3c:9d:81:86:d0:8b:ba:62:33:b6:90:12: + 6d:fa:46:fb:59:cc:09:8f:d3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 1B:A4:F7:11:00:41:ED:E5:FF:00:B9:8E:96:DD:D5:9B:DA:F8:43:88 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 00:41:c2:f9:8a:f7:a6:a5:7f:c7:5e:e3:35:2d:b8:a4:8b:91: + 8f:8f:ac:69:bf:06:b9:1e:cc:58:06:52:56:b6:a5:8c:ad:5c: + 43:8a:08:27:ed:99:7f:0e:0e:77:1c:de:97:56:8b:87:af:6a: + d0:b4:20:93:96:18:af:ce:66:04:e5:63:87:bf:7d:d8:38:37: + e8:91:4a:f6:dc:bb:f1:5e:8e:f5:07:5b:71:c4:84:2f:a5:23: + 5f:cf:db:b6:a9:c7:e0:73:e3:3c:17:44:d0:cc:33:4d:d0:28: + 6a:0a:fa:e7:20:c1:46:90:cc:bf:99:8e:b9:46:80:34:d3:f9: + 71:7f +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA0MTMwNzI2NDBaFw0yNjA0MTEwNzI2NDBaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMTEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMTEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAyOOI0ORUkfG/o/XtRM/Jm+icD/n1dBD8Zj5uLCBdW4p5A1VlUPRW +ucoJOIzEfUV1tNbiHUlzqJPlp+H8SzxjH3wmHOwNP/I4/GgN1AIvUzwVwNApEHv+ +CwVLQj/t2JDmEfzwPnkAXlfmvEs8nYGG0Iu6YjO2kBJt+kb7WcwJj9MCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUG6T3EQBB7eX/ALmOlt3Vm9r4Q4gw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAAEHC+Yr3pqV/x17j +NS24pIuRj4+sab8GuR7MWAZSVraljK1cQ4oIJ+2Zfw4Odxzel1aLh69q0LQgk5YY +r85mBOVjh7992Dg36JFK9ty78V6O9QdbccSEL6UjX8/btqnH4HPjPBdE0MwzTdAo +agr65yDBRpDMv5mOuUaANNP5cX8= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-station01.csr b/vpn/coloradio02/keys/dks-station01.csr new file mode 100644 index 0000000..6d0653d --- /dev/null +++ b/vpn/coloradio02/keys/dks-station01.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1ka3Mtc3RhdGlvbjAxMRYwFAYDVQQp +Ew1ka3Mtc3RhdGlvbjAxMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI44jQ5FSR8b+j9e1Ez8mb6JwP+fV0 +EPxmPm4sIF1binkDVWVQ9Fa5ygk4jMR9RXW01uIdSXOok+Wn4fxLPGMffCYc7A0/ +8jj8aA3UAi9TPBXA0CkQe/4LBUtCP+3YkOYR/PA+eQBeV+a8SzydgYbQi7piM7aQ +Em36RvtZzAmP0wIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAJxMmOLx9aM9FEtet +L36km6Bw5VN6PxQmTaUDqbs1z3J9QacJ8VV6W4EOTg77KygdSaTCzh55R2qgYbYL +ptMHMhARNvRwI0n7lu4i8XfFUB4mT85tAPc1jCARnUKiDV/R7+jFcvcwpbNJRHxa +lj5YuQwcluqqILmfA5q1hz/UO8o= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-station01.key b/vpn/coloradio02/keys/dks-station01.key new file mode 100644 index 0000000..f29a059 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station01.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMjjiNDkVJHxv6P1 +7UTPyZvonA/59XQQ/GY+biwgXVuKeQNVZVD0VrnKCTiMxH1FdbTW4h1Jc6iT5afh +/Es8Yx98JhzsDT/yOPxoDdQCL1M8FcDQKRB7/gsFS0I/7diQ5hH88D55AF5X5rxL +PJ2BhtCLumIztpASbfpG+1nMCY/TAgMBAAECgYEAk2ZYoiWXZArE+fJd6SqpnIs9 +z38xubso54CRaDFLLvrYtjh3gcH2zJXQ1Dx9hAluR4WQHbsicSQr01Y+v5mMhGW3 +E49sSitzHzFwK83rbSpFZdcHE2CCokEfGZ7v82zzOCfnFAQxmIq6qeufAcb78pXY +3KV9FdAXdaCqDJPVVXECQQDofJxho4jKYLOKNdxqrmI+Ilpg4TP8+WPearV9Tsci +PpGDqDQzeYa8Zi3mL4MLgSEsYjZ2vLmYMWITvTzf7VwpAkEA3TTPkW+JUfLFmPa/ +VgFSUjoejq+BhvoeXc4Ws7eijRNiwEAMuW+ghYOmsiIZDOAmaT58nR13tas6PecB +bRULmwJBAJVQavN+n30zDDyJCS5vH2O+loNAQC6KUazopfV74gNJYhXHsvcYZwOb +MIF1JFoALjkePtKVtTFdDhuVX4KGJLkCQHpidJDPd9caDU8C/Xs1AfmyZCOnYG9w +RIq7sf2+lLWeyxz4ktGpu9MCsqCNkvR3s2i5BLLckdW2JWQIQda7NQ8CQGgrJGPo +utAsofQCEAiewDuR5EtKuWSn2dqz91aiK3eE09uI4vw5ViH499lQCg6X5bFVIpxT +rnOEvN5m7GH31VA= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-station02.crt b/vpn/coloradio02/keys/dks-station02.crt new file mode 100644 index 0000000..3301582 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station02.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 17 (0x11) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:32 2016 GMT + Not After : Apr 29 10:01:32 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station02/name=dks-station02/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ef:44:12:af:2f:69:33:22:36:8f:3a:bc:9d:21: + bf:85:92:3d:8f:5f:3e:5d:0a:cf:83:fd:7c:a1:4a: + d6:5c:60:00:e5:c9:2a:bd:10:d8:00:4c:68:20:b9: + dd:80:0f:37:e7:1d:fa:84:57:05:a4:cc:0a:36:44: + 43:62:48:be:a5:1e:b0:c9:37:9f:09:8a:8e:f6:d8: + 59:ff:2d:4e:52:40:e1:e4:5c:16:d5:77:a8:9e:c7: + 7d:64:44:80:83:ec:b2:82:5c:5f:67:0b:21:6c:b7: + a4:63:2d:cb:75:50:ec:49:36:0f:f7:6c:10:83:07: + 50:a8:fc:e1:61:cd:be:51:e1 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 01:F7:3F:18:AE:3A:49:A9:45:80:EF:7A:C9:9B:92:13:F9:1C:CF:15 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 24:26:bc:f9:d7:91:2d:1a:6d:9e:cd:75:fa:da:e3:cf:07:6d: + c2:9c:58:f6:9a:7f:70:f6:c6:2a:88:02:0a:51:75:f4:bd:0b: + 4b:fb:5b:33:ca:a5:0a:30:52:58:8c:f9:d5:ba:f0:d0:76:7a: + 3e:cd:63:ee:dd:da:f3:ea:f1:b5:90:1a:6a:54:ed:cb:c1:52: + ff:32:a4:ff:5d:24:c5:07:1b:10:07:1b:64:5a:f0:ba:76:51: + a7:28:73:53:df:f6:98:a7:84:23:81:d9:23:d4:e3:8e:ee:11: + 60:75:a4:e1:25:4c:b0:92:ed:ff:1f:ef:08:01:d9:54:24:bd: + a9:04 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBETANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxMzJaFw0yNjA0MjkxMDAxMzJaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMjEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEA70QSry9pMyI2jzq8nSG/hZI9j18+XQrPg/18oUrWXGAA5ckqvRDY +AExoILndgA835x36hFcFpMwKNkRDYki+pR6wyTefCYqO9thZ/y1OUkDh5FwW1Xeo +nsd9ZESAg+yyglxfZwshbLekYy3LdVDsSTYP92wQgwdQqPzhYc2+UeECAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUAfc/GK46SalFgO96yZuSE/kczxUw +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAJCa8+deRLRptns11 ++trjzwdtwpxY9pp/cPbGKogCClF19L0LS/tbM8qlCjBSWIz51brw0HZ6Ps1j7t3a +8+rxtZAaalTty8FS/zKk/10kxQcbEAcbZFrwunZRpyhzU9/2mKeEI4HZI9Tjju4R +YHWk4SVMsJLt/x/vCAHZVCS9qQQ= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-station02.csr b/vpn/coloradio02/keys/dks-station02.csr new file mode 100644 index 0000000..248ed80 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station02.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1ka3Mtc3RhdGlvbjAyMRYwFAYDVQQp +Ew1ka3Mtc3RhdGlvbjAyMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDvRBKvL2kzIjaPOrydIb+Fkj2PXz5d +Cs+D/XyhStZcYADlySq9ENgATGggud2ADzfnHfqEVwWkzAo2RENiSL6lHrDJN58J +io722Fn/LU5SQOHkXBbVd6iex31kRICD7LKCXF9nCyFst6RjLct1UOxJNg/3bBCD +B1Co/OFhzb5R4QIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAyuzUbBBK5vWEA1nf +BskpljgG4UR8ZnWu+ztF4tJgIX/r3gJ/3Jv9Y0jbhgZwbIdctQuJ+mwjv98kVhsc +k8ggznZzB2T66Qrdq++KGU2ekaFgJyRoGhxtgfu96tx0uYJb7NRgOyfRiqCptV1E +NjiFxcRCy/iXufu5bNOJicjCoKQ= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-station02.key b/vpn/coloradio02/keys/dks-station02.key new file mode 100644 index 0000000..35192e6 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station02.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBAO9EEq8vaTMiNo86 +vJ0hv4WSPY9fPl0Kz4P9fKFK1lxgAOXJKr0Q2ABMaCC53YAPN+cd+oRXBaTMCjZE +Q2JIvqUesMk3nwmKjvbYWf8tTlJA4eRcFtV3qJ7HfWREgIPssoJcX2cLIWy3pGMt +y3VQ7Ek2D/dsEIMHUKj84WHNvlHhAgMBAAECgYBtCU6iey6r2MmYWCIgUYLgMhbP +wY3ABO8wrVIghuRNUIrYLObHJmfpKujBETK56zWEo4rIyIeP5FQ7CrzSi2glIdZG +jxR3ljV7wa+w92HSomgesLeq8qKI4ket8NyWkTu2PZlUUcDN8bpl5ylwGNR/zUDm +VH+CZd7GqA7SUhtd4QJBAPhWnFls0f4ffc/b7lTq6C7Atk4OZqHSevAQvr6xX9Q+ +8xIVRKcKkdy2kLgwvF0S1YVLrIVOKY+q/QYApbjGpD0CQQD2pc7O+zc79LXY7LhG +Kri0c9XPttWA6c6zgSXi+mX2HHE6E2WMhUKM0ksQ2/V3Q67jYn50zzdkVXQ5e9xS +BGp1AkAK/DHQVtr3Jcd38V+ajAWXQ9kMnOB3WgssIWF+p/P4PIyeCSjPRs1q+Pxv +2WALsfCWA+Hux6VZAJROtqqeANN1AkAsCGXnZcnyljlwxLIRNMdMz/E35/gtz4/r +U/8jinhxe5prN9NFRvUeltx34gzsgdTTG15gFC5bZzYcnRQ0QD2RAkBP10pVE4OI +gXLFMKx24T5j+1BbfR9kukcIjPC3a3GhplxWxMnAjwLKq995CO13cDQTMG5kKlFX +hdLBXTAg4dQt +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/dks-station03.crt b/vpn/coloradio02/keys/dks-station03.crt new file mode 100644 index 0000000..04dac5e --- /dev/null +++ b/vpn/coloradio02/keys/dks-station03.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 18 (0x12) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: May 1 10:01:46 2016 GMT + Not After : Apr 29 10:01:46 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-station03/name=dks-station03/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:ba:bb:18:67:40:ab:b0:57:c2:03:bf:21:74:9f: + f4:a8:5c:3c:90:78:45:27:90:e7:29:88:19:0b:3b: + 71:e9:4e:83:39:38:64:45:29:80:83:4b:32:98:73: + 87:00:f3:33:c9:45:d7:70:c5:c8:3f:22:42:1a:f8: + 63:02:2c:8e:60:fc:be:7b:bd:8b:20:ef:7b:15:0d: + dc:f7:9c:e0:1b:24:80:26:71:3b:6c:78:90:f3:f8: + f3:02:ae:08:4e:0e:e1:43:90:dd:68:7f:83:e2:d3: + 75:e3:2f:ae:dc:17:94:ca:16:b4:0b:6a:16:01:82: + 62:4c:fc:86:94:4b:5c:c1:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 21:93:A7:4C:1E:CF:5B:84:4B:57:F0:5B:F6:77:A1:67:2A:38:ED:FE + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 84:53:36:bf:26:60:e1:d9:e9:07:cb:84:49:a6:92:23:62:ae: + 4a:e0:8d:6a:76:ae:ee:c2:5a:b5:ec:aa:8f:4a:f0:dd:4a:30: + 4a:73:f0:bb:b2:ee:1d:57:e2:c2:22:7a:71:b7:52:10:cc:32: + 46:f7:e8:71:63:d6:68:de:75:ad:b1:08:05:3f:31:c3:c7:64: + 80:69:b8:3e:c2:3b:3f:7a:07:a1:b1:9d:eb:3d:18:6c:43:df: + ac:48:ab:41:41:f9:e8:2b:5b:4c:b7:64:73:17:01:4a:45:41: + 20:17:8c:63:4a:fb:85:5a:4f:f9:24:0d:10:ff:4d:e8:bc:cd: + 52:c9 +-----BEGIN CERTIFICATE----- +MIIEMDCCA5mgAwIBAgIBEjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjA1MDExMDAxNDZaFw0yNjA0MjkxMDAxNDZaMIGvMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNZGtzLXN0YXRpb24wMzEWMBQGA1UEKRMNZGtzLXN0YXRpb24wMzEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybDCBnzANBgkqhkiG9w0BAQEFAAOB +jQAwgYkCgYEAursYZ0CrsFfCA78hdJ/0qFw8kHhFJ5DnKYgZCztx6U6DOThkRSmA +g0symHOHAPMzyUXXcMXIPyJCGvhjAiyOYPy+e72LIO97FQ3c95zgGySAJnE7bHiQ +8/jzAq4ITg7hQ5DdaH+D4tN14y+u3BeUyha0C2oWAYJiTPyGlEtcwXsCAwEAAaOC +AV8wggFbMAkGA1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVy +YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUIZOnTB7PW4RLV/Bb9nehZyo47f4w +gd0GA1UdIwSB1TCB0oAU7FCIXD6iwqwUI8a1Xj20zKlFUUyhga6kgaswgagxCzAJ +BgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNoZXIxFzAVBgNVBAcTDlJvb2R0 +LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEPMA0GA1UECxMGUE9TREFCMRYw +FAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQpEwZQT1NEQUIxHDAaBgkqhkiG +9w0BCQEWDWluZm9AZGtzLnNhcmyCCQC762XoHijeFTATBgNVHSUEDDAKBggrBgEF +BQcDAjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQEFBQADgYEAhFM2vyZg4dnpB8uE +SaaSI2KuSuCNanau7sJateyqj0rw3UowSnPwu7LuHVfiwiJ6cbdSEMwyRvfocWPW +aN51rbEIBT8xw8dkgGm4PsI7P3oHobGd6z0YbEPfrEirQUH56CtbTLdkcxcBSkVB +IBeMY0r7hVpP+SQNEP9N6LzNUsk= +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/dks-station03.csr b/vpn/coloradio02/keys/dks-station03.csr new file mode 100644 index 0000000..c333a66 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station03.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB8DCCAVkCAQAwga8xCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1ka3Mtc3RhdGlvbjAzMRYwFAYDVQQp +Ew1ka3Mtc3RhdGlvbjAzMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGf +MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC6uxhnQKuwV8IDvyF0n/SoXDyQeEUn +kOcpiBkLO3HpToM5OGRFKYCDSzKYc4cA8zPJRddwxcg/IkIa+GMCLI5g/L57vYsg +73sVDdz3nOAbJIAmcTtseJDz+PMCrghODuFDkN1of4Pi03XjL67cF5TKFrQLahYB +gmJM/IaUS1zBewIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAk7xqidmeKq2S5w6H +hGgrSRbsh+1v5rNt0lc5/dD5giYguaJkXdj89hOE8KoBGxNjtI9RaRIZQEv1Qe4s +DgGAxGBvI0etzd9cIzqlNoRjdK6WoCCjnqXuS0HRgX3L4gOM1vG0OM6O9emKbYyr +rnM+1m+V70aadY/aYp/w0pCPlxc= +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/dks-station03.key b/vpn/coloradio02/keys/dks-station03.key new file mode 100644 index 0000000..33bddd3 --- /dev/null +++ b/vpn/coloradio02/keys/dks-station03.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALq7GGdAq7BXwgO/ +IXSf9KhcPJB4RSeQ5ymIGQs7celOgzk4ZEUpgINLMphzhwDzM8lF13DFyD8iQhr4 +YwIsjmD8vnu9iyDvexUN3Pec4BskgCZxO2x4kPP48wKuCE4O4UOQ3Wh/g+LTdeMv +rtwXlMoWtAtqFgGCYkz8hpRLXMF7AgMBAAECgYBjvlLPvJS5MndZRvwY7uRiFjrn +tMbD1rwTzDYMcOltBVpE82FkLEIQX9eb5YIEuOQ9rAfjnlJTnvoOrAU/AQvfydZx +ldGN1Drn4DwcKfs1aJzcvrKLSJFND0F1BKTJ0gWZJDisxx57BqYAiQOjcF2meU2Y +SQBhKNV2ssJUlbT1WQJBAPNcczoOWf+xWndYmqN8wKr3lEpJRhZAmgCdPhiT9Q4d +IZjpMMF7T2L349aBfdMuBu09zACuVJm67jsxs83gitcCQQDEbbsN5W0Zp+YigatN +GGMGVST/MPecQ4NKbqxii0UdDm/lNIqVX0/w7VV2yvpq+dTq90zTj3S8yXOJX6Vs +mm39AkEA2A2gws8Q+Z8zyLbh+vj7eA17GoR487KAxsDS6zEYI2KbfEyym2NlNGEN +ZlfqJD09qwvs/EHJG/5IGEdk8QdDWwJAKbWTLpQ04mnAeDtIgIpZHJMf1AA107yS +OE/f0tz3w/+4ytapRqaCdwouR5c6LVT3XR099v5TL3MnUVg57CGukQJAOJtn/hai +W5/u7R3k7MArL5l/qjWsGMRhtilrA11HR3QM6VnFcvxDWMdnaCfQFdk8SXZdxk8k +/OfuratrN4tEDA== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/index.txt b/vpn/coloradio02/keys/index.txt new file mode 100644 index 0000000..590ae8e --- /dev/null +++ b/vpn/coloradio02/keys/index.txt @@ -0,0 +1,23 @@ +V 250205085651Z 01 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl +V 251002064101Z 02 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl +V 251009124447Z 03 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=coloradio-tp01/name=coloradio-tp01/emailAddress=info@dks.sarl +V 251009124717Z 04 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=ban-coloradiotp01/name=ban-coloradiotp01/emailAddress=info@dks.sarl +V 251010071455Z 05 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl +V 251212111848Z 06 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-findel/name=aral-findel/emailAddress=info@dks.sarl +V 260327074705Z 07 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-berchem/name=aral-berchem/emailAddress=info@dks.sarl +V 260327074720Z 08 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-lallange/name=aral-lallange/emailAddress=info@dks.sarl +V 260327074734Z 09 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-echternach/name=aral-echternach/emailAddress=info@dks.sarl +V 260327074749Z 0A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-remich1/name=aral-remich1/emailAddress=info@dks.sarl +V 260327074752Z 0B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-remich2/name=aral-remich2/emailAddress=info@dks.sarl +V 260327074823Z 0C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-schifflange/name=aral-schifflange/emailAddress=info@dks.sarl +V 260327074830Z 0D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rodange2/name=aral-rodange2/emailAddress=info@dks.sarl +V 260327075041Z 0E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=maroq-belleetoile/name=maroq-belleetoile/emailAddress=info@dks.sarl +V 260327075233Z 0F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=bp-capellen/name=bp-capellen/emailAddress=info@dks.sarl +V 260411072640Z 10 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station01/name=dks-station01/emailAddress=info@dks.sarl +V 260429100132Z 11 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station02/name=dks-station02/emailAddress=info@dks.sarl +V 260429100146Z 12 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station03/name=dks-station03/emailAddress=info@dks.sarl +V 260521080113Z 13 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-merl2/name=aral-merl2/emailAddress=info@dks.sarl +V 271120144649Z 14 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-backup/name=dks-backup/emailAddress=info@dks.sarl +V 271120144716Z 15 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-homebackup/name=dks-homebackup/emailAddress=info@dks.sarl +V 271120144730Z 16 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-ksmac/name=dks-ksmac/emailAddress=info@dks.sarl +V 271120144746Z 17 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-ksmachome/name=dks-ksmachome/emailAddress=info@dks.sarl diff --git a/vpn/coloradio02/keys/index.txt.attr b/vpn/coloradio02/keys/index.txt.attr new file mode 100644 index 0000000..8f7e63a --- /dev/null +++ b/vpn/coloradio02/keys/index.txt.attr @@ -0,0 +1 @@ +unique_subject = yes diff --git a/vpn/coloradio02/keys/index.txt.attr.old b/vpn/coloradio02/keys/index.txt.attr.old new file mode 100644 index 0000000..8f7e63a --- /dev/null +++ b/vpn/coloradio02/keys/index.txt.attr.old @@ -0,0 +1 @@ +unique_subject = yes diff --git a/vpn/coloradio02/keys/index.txt.old b/vpn/coloradio02/keys/index.txt.old new file mode 100644 index 0000000..4afd3bf --- /dev/null +++ b/vpn/coloradio02/keys/index.txt.old @@ -0,0 +1,22 @@ +V 250205085651Z 01 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl +V 251002064101Z 02 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=ban-coloradiotp02/name=ban-coloradiotp02/emailAddress=info@dks.sarl +V 251009124447Z 03 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=coloradio-tp01/name=coloradio-tp01/emailAddress=info@dks.sarl +V 251009124717Z 04 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=ban-coloradiotp01/name=ban-coloradiotp01/emailAddress=info@dks.sarl +V 251010071455Z 05 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-laptop/name=dks-laptop/emailAddress=info@dks.sarl +V 251212111848Z 06 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-findel/name=aral-findel/emailAddress=info@dks.sarl +V 260327074705Z 07 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-berchem/name=aral-berchem/emailAddress=info@dks.sarl +V 260327074720Z 08 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-lallange/name=aral-lallange/emailAddress=info@dks.sarl +V 260327074734Z 09 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-echternach/name=aral-echternach/emailAddress=info@dks.sarl +V 260327074749Z 0A unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-remich1/name=aral-remich1/emailAddress=info@dks.sarl +V 260327074752Z 0B unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-remich2/name=aral-remich2/emailAddress=info@dks.sarl +V 260327074823Z 0C unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-schifflange/name=aral-schifflange/emailAddress=info@dks.sarl +V 260327074830Z 0D unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-rodange2/name=aral-rodange2/emailAddress=info@dks.sarl +V 260327075041Z 0E unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=maroq-belleetoile/name=maroq-belleetoile/emailAddress=info@dks.sarl +V 260327075233Z 0F unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=bp-capellen/name=bp-capellen/emailAddress=info@dks.sarl +V 260411072640Z 10 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station01/name=dks-station01/emailAddress=info@dks.sarl +V 260429100132Z 11 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station02/name=dks-station02/emailAddress=info@dks.sarl +V 260429100146Z 12 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-station03/name=dks-station03/emailAddress=info@dks.sarl +V 260521080113Z 13 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=aral-merl2/name=aral-merl2/emailAddress=info@dks.sarl +V 271120144649Z 14 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-backup/name=dks-backup/emailAddress=info@dks.sarl +V 271120144716Z 15 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-homebackup/name=dks-homebackup/emailAddress=info@dks.sarl +V 271120144730Z 16 unknown /C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=dks-ksmac/name=dks-ksmac/emailAddress=info@dks.sarl diff --git a/vpn/coloradio02/keys/maroq-belleetoile.crt b/vpn/coloradio02/keys/maroq-belleetoile.crt new file mode 100644 index 0000000..03b42fb --- /dev/null +++ b/vpn/coloradio02/keys/maroq-belleetoile.crt @@ -0,0 +1,74 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 14 (0xe) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Mar 29 07:50:41 2016 GMT + Not After : Mar 27 07:50:41 2026 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile/name=maroq-belleetoile/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:cf:22:e2:62:66:d8:9b:e9:fe:cf:c1:c8:35:89: + 1a:9d:26:f2:fa:0f:8c:f4:fc:9c:e5:bb:21:4b:63: + b9:bb:48:0d:b4:56:ff:94:85:8e:31:ca:c5:52:80: + 93:6c:33:dc:e9:1c:e5:7f:a6:73:f6:ca:4d:6a:1f: + d7:ff:9a:68:26:ef:69:5e:b3:f3:b1:e7:30:64:ca: + f0:6b:aa:3e:c4:d1:e8:35:85:53:33:9e:7e:50:ce: + 65:07:73:cb:5d:d7:8c:91:56:34:94:da:a1:e7:44: + 8a:2a:42:42:9d:b1:33:b7:71:5d:75:5c:f2:e3:5c: + 6b:97:8c:3c:0c:4a:14:62:e3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Comment: + Easy-RSA Generated Certificate + X509v3 Subject Key Identifier: + 32:78:DB:57:01:85:47:51:D7:89:B5:0D:A4:B8:C8:A0:DB:36:DA:EA + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Client Authentication + X509v3 Key Usage: + Digital Signature + Signature Algorithm: sha1WithRSAEncryption + 67:2e:a2:74:8e:b7:5b:48:99:fc:c5:38:68:f3:fc:4d:85:44: + 50:3f:e9:f3:6b:3a:6b:26:9a:7c:c3:5b:3e:56:a0:10:e9:91: + 46:00:1e:23:3a:23:da:00:8a:85:5e:50:8c:ea:af:43:f3:c8: + 04:01:43:b9:88:29:ea:d6:8e:3b:3f:52:84:9d:48:3d:51:97: + 63:5e:48:46:50:52:5d:ef:06:d4:88:95:bf:7f:d4:10:6e:65: + 9c:5a:e5:27:07:86:f3:97:39:7b:68:34:73:3c:44:0e:5d:ea: + 84:95:89:68:d1:17:47:5f:81:bc:11:46:58:c6:34:ab:f8:0b: + 66:7b +-----BEGIN CERTIFICATE----- +MIIEODCCA6GgAwIBAgIBDjANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNjAzMjkwNzUwNDFaFw0yNjAzMjcwNzUwNDFaMIG3MQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEa +MBgGA1UEAxMRbWFyb3EtYmVsbGVldG9pbGUxGjAYBgNVBCkTEW1hcm9xLWJlbGxl +ZXRvaWxlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3 +DQEBAQUAA4GNADCBiQKBgQDPIuJiZtib6f7Pwcg1iRqdJvL6D4z0/JzluyFLY7m7 +SA20Vv+UhY4xysVSgJNsM9zpHOV/pnP2yk1qH9f/mmgm72les/Ox5zBkyvBrqj7E +0eg1hVMznn5QzmUHc8td14yRVjSU2qHnRIoqQkKdsTO3cV11XPLjXGuXjDwMShRi +4wIDAQABo4IBXzCCAVswCQYDVR0TBAIwADAtBglghkgBhvhCAQ0EIBYeRWFzeS1S +U0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQyeNtXAYVHUdeJtQ2k +uMig2zba6jCB3QYDVR0jBIHVMIHSgBTsUIhcPqLCrBQjxrVePbTMqUVRTKGBrqSB +qzCBqDELMAkGA1UEBhMCTFUxFTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UE +BxMOUm9vZHQtc3VyLVN5cmUxETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQ +T1NEQUIxFjAUBgNVBAMTDXBvc2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEc +MBoGCSqGSIb3DQEJARYNaW5mb0Bka3Muc2FybIIJALvrZegeKN4VMBMGA1UdJQQM +MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQUFAAOBgQBnLqJ0 +jrdbSJn8xTho8/xNhURQP+nzazprJpp8w1s+VqAQ6ZFGAB4jOiPaAIqFXlCM6q9D +88gEAUO5iCnq1o47P1KEnUg9UZdjXkhGUFJd7wbUiJW/f9QQbmWcWuUnB4bzlzl7 +aDRzPEQOXeqElYlo0RdHX4G8EUZYxjSr+Atmew== +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/maroq-belleetoile.csr b/vpn/coloradio02/keys/maroq-belleetoile.csr new file mode 100644 index 0000000..bf1f978 --- /dev/null +++ b/vpn/coloradio02/keys/maroq-belleetoile.csr @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIIB+DCCAWECAQAwgbcxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRowGAYDVQQDExFtYXJvcS1iZWxsZWV0b2lsZTEaMBgG +A1UEKRMRbWFyb3EtYmVsbGVldG9pbGUxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtz +LnNhcmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM8i4mJm2Jvp/s/ByDWJ +Gp0m8voPjPT8nOW7IUtjubtIDbRW/5SFjjHKxVKAk2wz3Okc5X+mc/bKTWof1/+a +aCbvaV6z87HnMGTK8GuqPsTR6DWFUzOeflDOZQdzy13XjJFWNJTaoedEiipCQp2x +M7dxXXVc8uNca5eMPAxKFGLjAgMBAAGgADANBgkqhkiG9w0BAQUFAAOBgQCxpoOH +r/Cg8HcnDz9bExXzl4wMcWHCSNPRUMN3JhyKtrB8AaeTCo3dls97C/KMFqLP8Rdg +5srtGnWdrDgTJF8od50qWmL6cSklsfLEulJ/07jgANosjt8ITVwWsDZJ4D2NFHgz +1MYgL8XaKYBB5+ejohRQo2gQMzVdQ8t8lFbGnw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/maroq-belleetoile.key b/vpn/coloradio02/keys/maroq-belleetoile.key new file mode 100644 index 0000000..0598b45 --- /dev/null +++ b/vpn/coloradio02/keys/maroq-belleetoile.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdAIBADANBgkqhkiG9w0BAQEFAASCAl4wggJaAgEAAoGBAM8i4mJm2Jvp/s/B +yDWJGp0m8voPjPT8nOW7IUtjubtIDbRW/5SFjjHKxVKAk2wz3Okc5X+mc/bKTWof +1/+aaCbvaV6z87HnMGTK8GuqPsTR6DWFUzOeflDOZQdzy13XjJFWNJTaoedEiipC +Qp2xM7dxXXVc8uNca5eMPAxKFGLjAgMBAAECgYAS+rpNk+jjGGS9up7SsPZcUfZP +jV84D3F851Gcq82X6HlA/fu7KyWlUFQWRCu97V6fiYNJ2AGmKlE/mR1ckVRbmqzB +Wm41e58p/VzpSwsXauo4eeKseSeELNLgMic/V7nm+hzSlKqL46O3zNvBWYcD1G+m +hhJ1Ejm0/dMWgbbwQQJBAPQY+AnRj+tOI8OZ8MaPKJy2WtDWrTFBskQHTaX8oMs6 +F+MOX4DQdyfkc0FvvU0jrVFX/z7WETWzYvrczJ2qs6ECQQDZPIiiOPyah4JGQ/4n +EcUiJ2+Gm+LmppYVxI0gERgRFh8SNu7Rb4h9LlQzyXI4TrwXQu/tNyksyFpxvIL0 +L0gDAkA3btAtUqTvV/BxRC1UukALzrGzCX2NWREFt+7fSg6t+ERicOopU64rpgqy +ipCfywFaHrS9bVm9Kz7IH4psJ87hAj8DZO69miZYQ8XFU0qlUaHC5trXP5hMAk5W +CLwrxBicK7xQjIsuuo9nZVHrfTpLpu9JbcJR8oqyKG9BV7C0IAkCQEKuwi3nriEa +nQ2TkqHU9RQLJEUv/RdaZdcpVunNl+im61WBaIPtUPPLatWbiCwbTfQ52YqxPy/S +nPcog70/G48= +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/keys/serial b/vpn/coloradio02/keys/serial new file mode 100644 index 0000000..3c03207 --- /dev/null +++ b/vpn/coloradio02/keys/serial @@ -0,0 +1 @@ +18 diff --git a/vpn/coloradio02/keys/serial.old b/vpn/coloradio02/keys/serial.old new file mode 100644 index 0000000..98d9bcb --- /dev/null +++ b/vpn/coloradio02/keys/serial.old @@ -0,0 +1 @@ +17 diff --git a/vpn/coloradio02/keys/server.crt b/vpn/coloradio02/keys/server.crt new file mode 100644 index 0000000..3cc277e --- /dev/null +++ b/vpn/coloradio02/keys/server.crt @@ -0,0 +1,76 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: 1 (0x1) + Signature Algorithm: sha1WithRSAEncryption + Issuer: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Validity + Not Before: Feb 8 08:56:51 2015 GMT + Not After : Feb 5 08:56:51 2025 GMT + Subject: C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (1024 bit) + Modulus: + 00:c8:e7:05:de:d0:55:a8:84:66:1d:a6:98:51:4e: + 00:c0:36:66:28:8f:98:97:56:c6:69:2d:15:ab:cf: + 39:93:29:1d:a9:db:75:34:2a:3b:2c:2e:90:65:6d: + ac:f1:bd:7c:66:5f:67:a9:3d:fa:5d:e2:a5:ee:f3: + f7:48:0b:d3:28:d5:0e:4b:e8:d1:31:3d:80:d4:b8: + 0a:a4:77:a1:b3:c6:02:09:a8:e5:97:a1:24:85:f5: + 94:4f:ac:23:4d:71:84:44:bb:f0:be:67:3a:fb:27: + d1:f3:7c:9f:95:a7:b4:fd:c5:30:b9:e3:0c:b8:8a: + 1d:3b:48:ff:37:cf:d1:54:c3 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Basic Constraints: + CA:FALSE + Netscape Cert Type: + SSL Server + Netscape Comment: + Easy-RSA Generated Server Certificate + X509v3 Subject Key Identifier: + 3E:6D:DD:DB:F9:F6:DF:78:7C:B9:27:32:13:A5:7F:89:FC:76:93:B4 + X509v3 Authority Key Identifier: + keyid:EC:50:88:5C:3E:A2:C2:AC:14:23:C6:B5:5E:3D:B4:CC:A9:45:51:4C + DirName:/C=LU/ST=Grevenmacher/L=Roodt-sur-Syre/O=DKS sarl/OU=POSDAB/CN=posdab.dks.lu/name=POSDAB/emailAddress=info@dks.sarl + serial:BB:EB:65:E8:1E:28:DE:15 + + X509v3 Extended Key Usage: + TLS Web Server Authentication + X509v3 Key Usage: + Digital Signature, Key Encipherment + Signature Algorithm: sha1WithRSAEncryption + 50:18:d3:dd:76:97:de:7f:59:a6:de:45:0e:ed:b5:53:4b:4e: + dd:2f:c1:c5:72:00:54:2e:ca:b9:3a:2b:ca:5b:9f:c2:c9:2d: + cd:22:53:6b:fd:19:4a:45:9f:1d:35:8e:d4:c2:54:7b:f5:fc: + f2:9f:65:60:8e:84:fe:b6:9b:4d:bc:dc:a5:2d:04:34:e4:0e: + 4d:53:bc:34:b9:21:17:d7:47:12:52:cb:1b:3a:42:47:88:51: + 38:e5:10:82:df:22:e7:c4:2a:49:e4:98:52:c9:08:3b:71:37: + 63:b5:ca:a1:9f:12:90:04:e2:ce:f1:1a:74:f4:88:33:31:36: + c3:29 +-----BEGIN CERTIFICATE----- +MIIEQzCCA6ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCTFUx +FTATBgNVBAgTDEdyZXZlbm1hY2hlcjEXMBUGA1UEBxMOUm9vZHQtc3VyLVN5cmUx +ETAPBgNVBAoTCERLUyBzYXJsMQ8wDQYDVQQLEwZQT1NEQUIxFjAUBgNVBAMTDXBv +c2RhYi5ka3MubHUxDzANBgNVBCkTBlBPU0RBQjEcMBoGCSqGSIb3DQEJARYNaW5m +b0Bka3Muc2FybDAeFw0xNTAyMDgwODU2NTFaFw0yNTAyMDUwODU2NTFaMIGoMQsw +CQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFjaGVyMRcwFQYDVQQHEw5Sb29k +dC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwxDzANBgNVBAsTBlBPU0RBQjEW +MBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UEKRMGUE9TREFCMRwwGgYJKoZI +hvcNAQkBFg1pbmZvQGRrcy5zYXJsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB +gQDI5wXe0FWohGYdpphRTgDANmYoj5iXVsZpLRWrzzmTKR2p23U0KjssLpBlbazx +vXxmX2epPfpd4qXu8/dIC9Mo1Q5L6NExPYDUuAqkd6GzxgIJqOWXoSSF9ZRPrCNN +cYREu/C+Zzr7J9HzfJ+Vp7T9xTC54wy4ih07SP83z9FUwwIDAQABo4IBeTCCAXUw +CQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBkAwNAYJYIZIAYb4QgENBCcWJUVh +c3ktUlNBIEdlbmVyYXRlZCBTZXJ2ZXIgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFD5t +3dv59t94fLknMhOlf4n8dpO0MIHdBgNVHSMEgdUwgdKAFOxQiFw+osKsFCPGtV49 +tMypRVFMoYGupIGrMIGoMQswCQYDVQQGEwJMVTEVMBMGA1UECBMMR3JldmVubWFj +aGVyMRcwFQYDVQQHEw5Sb29kdC1zdXItU3lyZTERMA8GA1UEChMIREtTIHNhcmwx +DzANBgNVBAsTBlBPU0RBQjEWMBQGA1UEAxMNcG9zZGFiLmRrcy5sdTEPMA0GA1UE +KRMGUE9TREFCMRwwGgYJKoZIhvcNAQkBFg1pbmZvQGRrcy5zYXJsggkAu+tl6B4o +3hUwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgWgMA0GCSqGSIb3DQEB +BQUAA4GBAFAY0912l95/WabeRQ7ttVNLTt0vwcVyAFQuyrk6K8pbn8LJLc0iU2v9 +GUpFnx01jtTCVHv1/PKfZWCOhP62m0283KUtBDTkDk1TvDS5IRfXRxJSyxs6QkeI +UTjlEILfIufEKknkmFLJCDtxN2O1yqGfEpAE4s7xGnT0iDMxNsMp +-----END CERTIFICATE----- diff --git a/vpn/coloradio02/keys/server.csr b/vpn/coloradio02/keys/server.csr new file mode 100644 index 0000000..a72503b --- /dev/null +++ b/vpn/coloradio02/keys/server.csr @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIICHzCCAYgCAQAwgagxCzAJBgNVBAYTAkxVMRUwEwYDVQQIEwxHcmV2ZW5tYWNo +ZXIxFzAVBgNVBAcTDlJvb2R0LXN1ci1TeXJlMREwDwYDVQQKEwhES1Mgc2FybDEP +MA0GA1UECxMGUE9TREFCMRYwFAYDVQQDEw1wb3NkYWIuZGtzLmx1MQ8wDQYDVQQp +EwZQT1NEQUIxHDAaBgkqhkiG9w0BCQEWDWluZm9AZGtzLnNhcmwwgZ8wDQYJKoZI +hvcNAQEBBQADgY0AMIGJAoGBAMjnBd7QVaiEZh2mmFFOAMA2ZiiPmJdWxmktFavP +OZMpHanbdTQqOywukGVtrPG9fGZfZ6k9+l3ipe7z90gL0yjVDkvo0TE9gNS4CqR3 +obPGAgmo5ZehJIX1lE+sI01xhES78L5nOvsn0fN8n5WntP3FMLnjDLiKHTtI/zfP +0VTDAgMBAAGgNjAXBgkqhkiG9w0BCQIxChMIREtTIHNhcmwwGwYJKoZIhvcNAQkH +MQ4TDEVxdW9vOWJhaWNoZTANBgkqhkiG9w0BAQUFAAOBgQBZGgZ4+7F8XE8K/TEj +PlvZ21ntrU4wdrf9hjAa+3H6E0Iwm9UoFtFbCMxyHvc13a2FtF6UdJIrLFWBTg2e +B+YOq2eNtW9ZTxbIoXaHOdlb4CIoHuSa18le+zb/kMc6qbmBCON3IfDJIK8x0+2u +fDjcOr+H8r4uxoWZ/mw0qdJvPw== +-----END CERTIFICATE REQUEST----- diff --git a/vpn/coloradio02/keys/server.key b/vpn/coloradio02/keys/server.key new file mode 100644 index 0000000..a22027f --- /dev/null +++ b/vpn/coloradio02/keys/server.key @@ -0,0 +1,16 @@ +-----BEGIN PRIVATE KEY----- +MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMjnBd7QVaiEZh2m +mFFOAMA2ZiiPmJdWxmktFavPOZMpHanbdTQqOywukGVtrPG9fGZfZ6k9+l3ipe7z +90gL0yjVDkvo0TE9gNS4CqR3obPGAgmo5ZehJIX1lE+sI01xhES78L5nOvsn0fN8 +n5WntP3FMLnjDLiKHTtI/zfP0VTDAgMBAAECgYBmdex4hqgpGd06ogxs6utXHGdd +qF6aUJdAbM3woe8rLn0Cc/qCcEddcSITmKvrXkhjraSgnAtkdoNKKwKiq+U0tcOW +JyyUHwHb0sfwk3ypCx0dWJwyKcMQSeMBhfSFZhsfW1GBuOJj6sbwiVePj6rgukgE +Bd48YpUNIt5xIGKegQJBAPdH0IqgPBqF299P2ItlYxHzvyxe5Ny6pmyqtwl3hmkY +H+sCE4OdEEAiUGya5y3I0jy1LVWtQiW/ug/ssQAkl48CQQDP/I5nHcD3L3YtIrDA +oVH954Bc9WXihR/Fyv6l7vf4XWV4sSv5RrBZcuPD2tMvVY6iReL2vui4yfXzAnFA +gvWNAkBhiSgOpelPJOF3Ec1+Hj2XhScw3zUyg0TFtAiCaWzQ4z0juyvrS/Zu9Zn3 +XJo3CvEyFNyO4MoojZlcUqX2QnitAkAqQMKlTDQhg3DcpomF+L/xdxBq0ifKpwTX +Z+/nwe56dG7i4Atw7t1wrph693+jxBvf95auTgZ1VAI1Ri+/zVsZAkEA4FCNA3UG +h7xYeUN2efVNT1P3jq5McG6ON/2+/wWKYYzCNDhIvIR3u8oXrRe3+MAUFPqskyhy +PUM/g+RnxiPk7A== +-----END PRIVATE KEY----- diff --git a/vpn/coloradio02/log/openvpn-status2.log b/vpn/coloradio02/log/openvpn-status2.log new file mode 100644 index 0000000..24c9a83 --- /dev/null +++ b/vpn/coloradio02/log/openvpn-status2.log @@ -0,0 +1,8 @@ +OpenVPN CLIENT LIST +Updated,Sat Mar 21 09:53:27 2015 +Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since +ROUTING TABLE +Virtual Address,Common Name,Real Address,Last Ref +GLOBAL STATS +Max bcast/mcast queue length,0 +END diff --git a/vpn/coloradio02/log/openvpn2.log b/vpn/coloradio02/log/openvpn2.log new file mode 100644 index 0000000..e69de29 diff --git a/vpn/coloradio02/log/openvpn2.log.1 b/vpn/coloradio02/log/openvpn2.log.1 new file mode 100644 index 0000000..30e4cbb --- /dev/null +++ b/vpn/coloradio02/log/openvpn2.log.1 @@ -0,0 +1,559 @@ +Wed Nov 22 17:44:40 2017 OpenVPN 2.3.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Nov 12 2015 +Wed Nov 22 17:44:40 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.08 +Wed Nov 22 17:44:40 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7506 +Wed Nov 22 17:44:40 2017 Diffie-Hellman initialized with 1024 bit key +Wed Nov 22 17:44:40 2017 WARNING: file '/home/posdab/vpn/keys2/server.key' is group or others accessible +Wed Nov 22 17:44:40 2017 Socket Buffers: R=[212992->131072] S=[212992->131072] +Wed Nov 22 17:44:40 2017 ROUTE_GATEWAY 172.31.1.1/255.255.255.0 IFACE=eth0 HWADDR=52:54:a2:01:d0:f3 +Wed Nov 22 17:44:40 2017 TUN/TAP device tun1 opened +Wed Nov 22 17:44:40 2017 TUN/TAP TX queue length set to 100 +Wed Nov 22 17:44:40 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 +Wed Nov 22 17:44:40 2017 /sbin/ip link set dev tun1 up mtu 1500 +Wed Nov 22 17:44:40 2017 /sbin/ip addr add dev tun1 local 10.2.0.1 peer 10.2.0.2 +Wed Nov 22 17:44:40 2017 /sbin/ip route add 10.2.0.0/16 via 10.2.0.2 +Wed Nov 22 17:44:40 2017 UDPv4 link local (bound): [undef] +Wed Nov 22 17:44:40 2017 UDPv4 link remote: [undef] +Wed Nov 22 17:44:40 2017 MULTI: multi_init called, r=256 v=256 +Wed Nov 22 17:44:40 2017 IFCONFIG POOL: base=10.2.0.4 size=16382, ipv6=0 +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='ban-coloradiotp02,10.2.0.4', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-laptop,10.2.0.8', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='ban-coloradiotp01,10.2.0.12', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-schifflange,10.2.0.16', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-rodange2,10.2.0.20', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-echternach,10.2.0.24', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='maroq-belleetoile,10.2.0.28', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-findel,10.2.0.32', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-remich1,10.2.0.36', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-remich2,10.2.0.40', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-lallange,10.2.0.44', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-berchem,10.2.0.48', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='bp-capellen,10.2.0.52', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-findel,10.2.0.56', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-station01,10.2.0.60', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-remich2,10.2.0.64', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-station02,10.2.0.68', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-station03,10.2.0.72', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-merl2,10.2.0.76', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='maroq-belleetoile,10.2.0.80', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='aral-merl2,10.2.0.84', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-homebackup,10.2.0.88', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 ifconfig_pool_read(), in='dks-backup,10.2.0.92', TODO: IPv6 +Wed Nov 22 17:44:40 2017 succeeded -> ifconfig_pool_set() +Wed Nov 22 17:44:40 2017 IFCONFIG POOL LIST +Wed Nov 22 17:44:40 2017 ban-coloradiotp02,10.2.0.4 +Wed Nov 22 17:44:40 2017 dks-laptop,10.2.0.8 +Wed Nov 22 17:44:40 2017 ban-coloradiotp01,10.2.0.12 +Wed Nov 22 17:44:40 2017 aral-schifflange,10.2.0.16 +Wed Nov 22 17:44:40 2017 aral-rodange2,10.2.0.20 +Wed Nov 22 17:44:40 2017 aral-echternach,10.2.0.24 +Wed Nov 22 17:44:40 2017 maroq-belleetoile,10.2.0.28 +Wed Nov 22 17:44:40 2017 aral-findel,10.2.0.32 +Wed Nov 22 17:44:40 2017 aral-remich1,10.2.0.36 +Wed Nov 22 17:44:40 2017 aral-remich2,10.2.0.40 +Wed Nov 22 17:44:40 2017 aral-lallange,10.2.0.44 +Wed Nov 22 17:44:40 2017 aral-berchem,10.2.0.48 +Wed Nov 22 17:44:40 2017 bp-capellen,10.2.0.52 +Wed Nov 22 17:44:40 2017 aral-findel,10.2.0.56 +Wed Nov 22 17:44:40 2017 dks-station01,10.2.0.60 +Wed Nov 22 17:44:40 2017 aral-remich2,10.2.0.64 +Wed Nov 22 17:44:40 2017 dks-station02,10.2.0.68 +Wed Nov 22 17:44:40 2017 dks-station03,10.2.0.72 +Wed Nov 22 17:44:40 2017 aral-merl2,10.2.0.76 +Wed Nov 22 17:44:40 2017 NOTE: --mute triggered... +Wed Nov 22 17:44:40 2017 4 variation(s) on previous 20 message(s) suppressed by --mute +Wed Nov 22 17:44:40 2017 Initialization Sequence Completed +Wed Nov 22 17:46:33 2017 82.214.232.82:42723 TLS: Initial packet from [AF_INET]82.214.232.82:42723, sid=1106d390 39cf3aea +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl2, name=aral-merl2, emailAddress=info@dks.sarl +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:34 2017 82.214.232.82:42723 [aral-merl2] Peer Connection Initiated with [AF_INET]82.214.232.82:42723 +Wed Nov 22 17:46:34 2017 aral-merl2/82.214.232.82:42723 MULTI_sva: pool returned IPv4=10.2.0.78, IPv6=(Not enabled) +Wed Nov 22 17:46:34 2017 aral-merl2/82.214.232.82:42723 MULTI: Learn: 10.2.0.78 -> aral-merl2/82.214.232.82:42723 +Wed Nov 22 17:46:34 2017 aral-merl2/82.214.232.82:42723 MULTI: primary virtual IP for aral-merl2/82.214.232.82:42723: 10.2.0.78 +Wed Nov 22 17:46:35 2017 82.214.232.194:17921 TLS: Initial packet from [AF_INET]82.214.232.194:17921, sid=cc82098d fee63c37 +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2, name=aral-remich2, emailAddress=info@dks.sarl +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:36 2017 82.214.232.194:17921 [aral-remich2] Peer Connection Initiated with [AF_INET]82.214.232.194:17921 +Wed Nov 22 17:46:36 2017 aral-remich2/82.214.232.194:17921 MULTI_sva: pool returned IPv4=10.2.0.42, IPv6=(Not enabled) +Wed Nov 22 17:46:36 2017 aral-remich2/82.214.232.194:17921 MULTI: Learn: 10.2.0.42 -> aral-remich2/82.214.232.194:17921 +Wed Nov 22 17:46:36 2017 aral-remich2/82.214.232.194:17921 MULTI: primary virtual IP for aral-remich2/82.214.232.194:17921: 10.2.0.42 +Wed Nov 22 17:46:36 2017 82.214.232.122:23276 TLS: Initial packet from [AF_INET]82.214.232.122:23276, sid=ae4d7163 05143c97 +Wed Nov 22 17:46:37 2017 82.214.232.74:33859 TLS: Initial packet from [AF_INET]82.214.232.74:33859, sid=fa622398 9feb0001 +Wed Nov 22 17:46:37 2017 82.214.232.74:40561 TLS: Initial packet from [AF_INET]82.214.232.74:40561, sid=1b7e3e8d a79630ad +Wed Nov 22 17:46:38 2017 82.214.232.74:33859 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.74:33859 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich1, name=aral-remich1, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 TLS: Initial packet from [AF_INET]146.0.189.168:1176, sid=7cf3eb99 cccf7b08 +Wed Nov 22 17:46:38 2017 aral-remich2/82.214.232.194:17921 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:38 2017 aral-remich2/82.214.232.194:17921 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:38 2017 aral-remich2/82.214.232.194:17921 SENT CONTROL [aral-remich2]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.42 10.2.0.41' (status=1) +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:38 2017 146.0.189.168:1176 [dks-homebackup] Peer Connection Initiated with [AF_INET]146.0.189.168:1176 +Wed Nov 22 17:46:38 2017 dks-homebackup/146.0.189.168:1176 MULTI_sva: pool returned IPv4=10.2.0.90, IPv6=(Not enabled) +Wed Nov 22 17:46:38 2017 dks-homebackup/146.0.189.168:1176 MULTI: Learn: 10.2.0.90 -> dks-homebackup/146.0.189.168:1176 +Wed Nov 22 17:46:38 2017 dks-homebackup/146.0.189.168:1176 MULTI: primary virtual IP for dks-homebackup/146.0.189.168:1176: 10.2.0.90 +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-schifflange, name=aral-schifflange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:38 2017 82.214.232.74:40561 [aral-schifflange] Peer Connection Initiated with [AF_INET]82.214.232.74:40561 +Wed Nov 22 17:46:38 2017 aral-schifflange/82.214.232.74:40561 MULTI_sva: pool returned IPv4=10.2.0.18, IPv6=(Not enabled) +Wed Nov 22 17:46:38 2017 aral-schifflange/82.214.232.74:40561 MULTI: Learn: 10.2.0.18 -> aral-schifflange/82.214.232.74:40561 +Wed Nov 22 17:46:38 2017 aral-schifflange/82.214.232.74:40561 MULTI: primary virtual IP for aral-schifflange/82.214.232.74:40561: 10.2.0.18 +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 TLS: Initial packet from [AF_INET]146.0.189.168:63767, sid=10a19ce5 a4823023 +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop, name=dks-laptop, emailAddress=info@dks.sarl +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:38 2017 146.0.189.168:63767 [dks-laptop] Peer Connection Initiated with [AF_INET]146.0.189.168:63767 +Wed Nov 22 17:46:38 2017 dks-laptop/146.0.189.168:63767 MULTI_sva: pool returned IPv4=10.2.0.10, IPv6=(Not enabled) +Wed Nov 22 17:46:38 2017 dks-laptop/146.0.189.168:63767 MULTI: Learn: 10.2.0.10 -> dks-laptop/146.0.189.168:63767 +Wed Nov 22 17:46:38 2017 dks-laptop/146.0.189.168:63767 MULTI: primary virtual IP for dks-laptop/146.0.189.168:63767: 10.2.0.10 +Wed Nov 22 17:46:39 2017 aral-merl2/82.214.232.82:42723 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:39 2017 aral-merl2/82.214.232.82:42723 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:39 2017 aral-merl2/82.214.232.82:42723 SENT CONTROL [aral-merl2]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.78 10.2.0.77' (status=1) +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=bp-capellen, name=bp-capellen, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 82.214.232.122:23276 [bp-capellen] Peer Connection Initiated with [AF_INET]82.214.232.122:23276 +Wed Nov 22 17:46:39 2017 bp-capellen/82.214.232.122:23276 MULTI_sva: pool returned IPv4=10.2.0.54, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 bp-capellen/82.214.232.122:23276 MULTI: Learn: 10.2.0.54 -> bp-capellen/82.214.232.122:23276 +Wed Nov 22 17:46:39 2017 bp-capellen/82.214.232.122:23276 MULTI: primary virtual IP for bp-capellen/82.214.232.122:23276: 10.2.0.54 +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 TLS: Initial packet from [AF_INET]213.135.227.140:41183, sid=28def91b f7adf7a4 +Wed Nov 22 17:46:39 2017 82.214.232.210:33518 TLS: Initial packet from [AF_INET]82.214.232.210:33518, sid=a06cd95f ae5c0819 +Wed Nov 22 17:46:39 2017 82.214.232.202:34090 TLS: Initial packet from [AF_INET]82.214.232.202:34090, sid=97ab0331 39ed8309 +Wed Nov 22 17:46:39 2017 dks-homebackup/146.0.189.168:1176 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:39 2017 dks-homebackup/146.0.189.168:1176 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:39 2017 dks-homebackup/146.0.189.168:1176 SENT CONTROL [dks-homebackup]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.90 10.2.0.89' (status=1) +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile, name=maroq-belleetoile, emailAddress=info@dks.sarl +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:39 2017 213.135.227.140:41183 [maroq-belleetoile] Peer Connection Initiated with [AF_INET]213.135.227.140:41183 +Wed Nov 22 17:46:39 2017 maroq-belleetoile/213.135.227.140:41183 MULTI_sva: pool returned IPv4=10.2.0.30, IPv6=(Not enabled) +Wed Nov 22 17:46:39 2017 maroq-belleetoile/213.135.227.140:41183 MULTI: Learn: 10.2.0.30 -> maroq-belleetoile/213.135.227.140:41183 +Wed Nov 22 17:46:39 2017 maroq-belleetoile/213.135.227.140:41183 MULTI: primary virtual IP for maroq-belleetoile/213.135.227.140:41183: 10.2.0.30 +Wed Nov 22 17:46:40 2017 dks-laptop/146.0.189.168:63767 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:40 2017 dks-laptop/146.0.189.168:63767 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:40 2017 dks-laptop/146.0.189.168:63767 SENT CONTROL [dks-laptop]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.10 10.2.0.9' (status=1) +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-berchem, name=aral-berchem, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 TLS: Initial packet from [AF_INET]212.233.42.21:40572, sid=38eca51c c35c8cf1 +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-lallange, name=aral-lallange, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 82.214.232.202:34090 [aral-berchem] Peer Connection Initiated with [AF_INET]82.214.232.202:34090 +Wed Nov 22 17:46:40 2017 aral-berchem/82.214.232.202:34090 MULTI_sva: pool returned IPv4=10.2.0.50, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 aral-berchem/82.214.232.202:34090 MULTI: Learn: 10.2.0.50 -> aral-berchem/82.214.232.202:34090 +Wed Nov 22 17:46:40 2017 aral-berchem/82.214.232.202:34090 MULTI: primary virtual IP for aral-berchem/82.214.232.202:34090: 10.2.0.50 +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 82.214.232.210:33518 [aral-lallange] Peer Connection Initiated with [AF_INET]82.214.232.210:33518 +Wed Nov 22 17:46:40 2017 aral-lallange/82.214.232.210:33518 MULTI_sva: pool returned IPv4=10.2.0.46, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 aral-lallange/82.214.232.210:33518 MULTI: Learn: 10.2.0.46 -> aral-lallange/82.214.232.210:33518 +Wed Nov 22 17:46:40 2017 aral-lallange/82.214.232.210:33518 MULTI: primary virtual IP for aral-lallange/82.214.232.210:33518: 10.2.0.46 +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup, name=dks-backup, emailAddress=info@dks.sarl +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 82.214.232.74:33859 [aral-remich1] Peer Connection Initiated with [AF_INET]82.214.232.74:33859 +Wed Nov 22 17:46:40 2017 aral-remich1/82.214.232.74:33859 MULTI_sva: pool returned IPv4=10.2.0.38, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 aral-remich1/82.214.232.74:33859 MULTI: Learn: 10.2.0.38 -> aral-remich1/82.214.232.74:33859 +Wed Nov 22 17:46:40 2017 aral-remich1/82.214.232.74:33859 MULTI: primary virtual IP for aral-remich1/82.214.232.74:33859: 10.2.0.38 +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:40 2017 212.233.42.21:40572 [dks-backup] Peer Connection Initiated with [AF_INET]212.233.42.21:40572 +Wed Nov 22 17:46:40 2017 dks-backup/212.233.42.21:40572 MULTI_sva: pool returned IPv4=10.2.0.94, IPv6=(Not enabled) +Wed Nov 22 17:46:40 2017 dks-backup/212.233.42.21:40572 MULTI: Learn: 10.2.0.94 -> dks-backup/212.233.42.21:40572 +Wed Nov 22 17:46:40 2017 dks-backup/212.233.42.21:40572 MULTI: primary virtual IP for dks-backup/212.233.42.21:40572: 10.2.0.94 +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 TLS: Initial packet from [AF_INET]82.214.232.66:57168, sid=393920af 0432776e +Wed Nov 22 17:46:41 2017 aral-schifflange/82.214.232.74:40561 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 aral-schifflange/82.214.232.74:40561 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 aral-schifflange/82.214.232.74:40561 SENT CONTROL [aral-schifflange]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.18 10.2.0.17' (status=1) +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-echternach, name=aral-echternach, emailAddress=info@dks.sarl +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:41 2017 82.214.232.66:57168 [aral-echternach] Peer Connection Initiated with [AF_INET]82.214.232.66:57168 +Wed Nov 22 17:46:41 2017 aral-echternach/82.214.232.66:57168 MULTI_sva: pool returned IPv4=10.2.0.26, IPv6=(Not enabled) +Wed Nov 22 17:46:41 2017 aral-echternach/82.214.232.66:57168 MULTI: Learn: 10.2.0.26 -> aral-echternach/82.214.232.66:57168 +Wed Nov 22 17:46:41 2017 aral-echternach/82.214.232.66:57168 MULTI: primary virtual IP for aral-echternach/82.214.232.66:57168: 10.2.0.26 +Wed Nov 22 17:46:41 2017 bp-capellen/82.214.232.122:23276 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 bp-capellen/82.214.232.122:23276 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 bp-capellen/82.214.232.122:23276 SENT CONTROL [bp-capellen]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.54 10.2.0.53' (status=1) +Wed Nov 22 17:46:41 2017 dks-backup/212.233.42.21:40572 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:41 2017 dks-backup/212.233.42.21:40572 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:41 2017 dks-backup/212.233.42.21:40572 SENT CONTROL [dks-backup]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.94 10.2.0.93' (status=1) +Wed Nov 22 17:46:41 2017 82.214.232.210:51411 TLS: Initial packet from [AF_INET]82.214.232.210:51411, sid=304a36fd 33d8b9e2 +Wed Nov 22 17:46:42 2017 maroq-belleetoile/213.135.227.140:41183 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 maroq-belleetoile/213.135.227.140:41183 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 maroq-belleetoile/213.135.227.140:41183 SENT CONTROL [maroq-belleetoile]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.30 10.2.0.29' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-rodange2, name=aral-rodange2, emailAddress=info@dks.sarl +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:42 2017 82.214.232.210:51411 [aral-rodange2] Peer Connection Initiated with [AF_INET]82.214.232.210:51411 +Wed Nov 22 17:46:42 2017 aral-rodange2/82.214.232.210:51411 MULTI_sva: pool returned IPv4=10.2.0.22, IPv6=(Not enabled) +Wed Nov 22 17:46:42 2017 aral-rodange2/82.214.232.210:51411 MULTI: Learn: 10.2.0.22 -> aral-rodange2/82.214.232.210:51411 +Wed Nov 22 17:46:42 2017 aral-rodange2/82.214.232.210:51411 MULTI: primary virtual IP for aral-rodange2/82.214.232.210:51411: 10.2.0.22 +Wed Nov 22 17:46:42 2017 aral-berchem/82.214.232.202:34090 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 aral-berchem/82.214.232.202:34090 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 aral-berchem/82.214.232.202:34090 SENT CONTROL [aral-berchem]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.50 10.2.0.49' (status=1) +Wed Nov 22 17:46:42 2017 82.214.232.186:54019 TLS: Initial packet from [AF_INET]82.214.232.186:54019, sid=fa915f9c b7ddb0df +Wed Nov 22 17:46:42 2017 aral-remich1/82.214.232.74:33859 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:42 2017 aral-remich1/82.214.232.74:33859 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:42 2017 aral-remich1/82.214.232.74:33859 SENT CONTROL [aral-remich1]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.38 10.2.0.37' (status=1) +Wed Nov 22 17:46:43 2017 aral-lallange/82.214.232.210:33518 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:43 2017 aral-lallange/82.214.232.210:33518 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:43 2017 aral-lallange/82.214.232.210:33518 SENT CONTROL [aral-lallange]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.46 10.2.0.45' (status=1) +Wed Nov 22 17:46:43 2017 aral-echternach/82.214.232.66:57168 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:43 2017 aral-echternach/82.214.232.66:57168 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:43 2017 aral-echternach/82.214.232.66:57168 SENT CONTROL [aral-echternach]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.26 10.2.0.25' (status=1) +Wed Nov 22 17:46:45 2017 aral-rodange2/82.214.232.210:51411 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:45 2017 aral-rodange2/82.214.232.210:51411 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:45 2017 aral-rodange2/82.214.232.210:51411 SENT CONTROL [aral-rodange2]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.22 10.2.0.21' (status=1) +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-findel, name=aral-findel, emailAddress=info@dks.sarl +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 17:46:48 2017 82.214.232.186:54019 [aral-findel] Peer Connection Initiated with [AF_INET]82.214.232.186:54019 +Wed Nov 22 17:46:48 2017 aral-findel/82.214.232.186:54019 MULTI_sva: pool returned IPv4=10.2.0.34, IPv6=(Not enabled) +Wed Nov 22 17:46:48 2017 aral-findel/82.214.232.186:54019 MULTI: Learn: 10.2.0.34 -> aral-findel/82.214.232.186:54019 +Wed Nov 22 17:46:48 2017 aral-findel/82.214.232.186:54019 MULTI: primary virtual IP for aral-findel/82.214.232.186:54019: 10.2.0.34 +Wed Nov 22 17:46:51 2017 aral-findel/82.214.232.186:54019 PUSH: Received control message: 'PUSH_REQUEST' +Wed Nov 22 17:46:51 2017 aral-findel/82.214.232.186:54019 send_push_reply(): safe_cap=940 +Wed Nov 22 17:46:51 2017 aral-findel/82.214.232.186:54019 SENT CONTROL [aral-findel]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.34 10.2.0.33' (status=1) +Wed Nov 22 18:46:34 2017 aral-merl2/82.214.232.82:42723 TLS: soft reset sec=0 bytes=51235/0 pkts=806/0 +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-merl2, name=aral-merl2, emailAddress=info@dks.sarl +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:35 2017 aral-merl2/82.214.232.82:42723 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2, name=aral-remich2, emailAddress=info@dks.sarl +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:37 2017 aral-remich2/82.214.232.194:17921 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 18:46:38 2017 aral-schifflange/82.214.232.74:40561 TLS: soft reset sec=0 bytes=45132/0 pkts=761/0 +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop, name=dks-laptop, emailAddress=info@dks.sarl +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 18:46:38 2017 dks-laptop/146.0.189.168:63767 NOTE: --mute triggered... +Wed Nov 22 19:05:56 2017 dks-laptop/146.0.189.168:63767 85 variation(s) on previous 20 message(s) suppressed by --mute +Wed Nov 22 19:05:56 2017 dks-laptop/146.0.189.168:63767 [dks-laptop] Inactivity timeout (--ping-restart), restarting +Wed Nov 22 19:05:56 2017 dks-laptop/146.0.189.168:63767 SIGUSR1[soft,ping-restart] received, client-instance restarting +Wed Nov 22 19:46:34 2017 aral-merl2/82.214.232.82:42723 TLS: tls_process: killed expiring key +Wed Nov 22 19:46:36 2017 aral-remich2/82.214.232.194:17921 TLS: tls_process: killed expiring key +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=aral-remich2, name=aral-remich2, emailAddress=info@dks.sarl +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Wed Nov 22 19:46:38 2017 dks-homebackup/146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 19:46:38 2017 aral-remich2/82.214.232.194:17921 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Wed Nov 22 19:46:38 2017 aral-schifflange/82.214.232.74:40561 TLS: tls_process: killed expiring key +Wed Nov 22 19:46:39 2017 aral-merl2/82.214.232.82:42723 TLS: soft reset sec=0 bytes=37065/0 pkts=706/0 +Wed Nov 22 19:46:40 2017 bp-capellen/82.214.232.122:23276 TLS: soft reset sec=0 bytes=36961/0 pkts=704/0 +Wed Nov 22 19:46:40 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Wed Nov 22 19:46:40 2017 maroq-belleetoile/213.135.227.140:41183 NOTE: --mute triggered... +Thu Nov 23 07:38:06 2017 146.0.189.168:38190 1247 variation(s) on previous 20 message(s) suppressed by --mute +Thu Nov 23 07:38:06 2017 146.0.189.168:38190 [dks-laptop] Peer Connection Initiated with [AF_INET]146.0.189.168:38190 +Thu Nov 23 07:38:06 2017 dks-laptop/146.0.189.168:38190 MULTI_sva: pool returned IPv4=10.2.0.10, IPv6=(Not enabled) +Thu Nov 23 07:38:06 2017 dks-laptop/146.0.189.168:38190 MULTI: Learn: 10.2.0.10 -> dks-laptop/146.0.189.168:38190 +Thu Nov 23 07:38:06 2017 dks-laptop/146.0.189.168:38190 MULTI: primary virtual IP for dks-laptop/146.0.189.168:38190: 10.2.0.10 +Thu Nov 23 07:38:07 2017 dks-laptop/146.0.189.168:38190 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 07:38:07 2017 dks-laptop/146.0.189.168:38190 send_push_reply(): safe_cap=940 +Thu Nov 23 07:38:07 2017 dks-laptop/146.0.189.168:38190 SENT CONTROL [dks-laptop]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.10 10.2.0.9' (status=1) +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 TLS: soft reset sec=0 bytes=37254/0 pkts=709/0 +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 07:46:38 2017 dks-homebackup/146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 TLS: soft reset sec=0 bytes=36856/0 pkts=702/0 +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile, name=maroq-belleetoile, emailAddress=info@dks.sarl +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 07:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 07:46:45 2017 dks-backup/212.233.42.21:40572 TLS: soft reset sec=0 bytes=37097/0 pkts=706/0 +Thu Nov 23 07:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 07:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup, name=dks-backup, emailAddress=info@dks.sarl +Thu Nov 23 07:46:45 2017 dks-backup/212.233.42.21:40572 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 07:46:45 2017 dks-backup/212.233.42.21:40572 NOTE: --mute triggered... +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 91 variation(s) on previous 20 message(s) suppressed by --mute +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 WARNING: 'dev-type' is used inconsistently, local='dev-type tun', remote='dev-type tap' +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1574' +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532' +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:28:20 2017 146.0.189.168:5934 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:5934 +Thu Nov 23 08:28:20 2017 dks-ksmac/146.0.189.168:5934 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:28:20 2017 dks-ksmac/146.0.189.168:5934 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:5934 +Thu Nov 23 08:28:20 2017 dks-ksmac/146.0.189.168:5934 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:5934: 10.2.0.98 +Thu Nov 23 08:28:22 2017 dks-ksmac/146.0.189.168:5934 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:28:22 2017 dks-ksmac/146.0.189.168:5934 send_push_reply(): safe_cap=940 +Thu Nov 23 08:28:22 2017 dks-ksmac/146.0.189.168:5934 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=15 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=15 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=15 seen +Thu Nov 23 08:28:25 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:26 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:28:27 2017 dks-ksmac/146.0.189.168:5934 IP packet with unknown IP version=0 seen +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 TLS: Initial packet from [AF_INET]146.0.189.168:40125, sid=bae0e060 c821ee22 +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac, name=dks-ksmac, emailAddress=info@dks.sarl +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:29:57 2017 146.0.189.168:40125 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:40125 +Thu Nov 23 08:29:57 2017 MULTI: new connection by client 'dks-ksmac' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. +Thu Nov 23 08:29:57 2017 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:29:57 2017 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:40125 +Thu Nov 23 08:29:57 2017 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:40125: 10.2.0.98 +Thu Nov 23 08:30:00 2017 dks-ksmac/146.0.189.168:40125 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:30:00 2017 dks-ksmac/146.0.189.168:40125 send_push_reply(): safe_cap=940 +Thu Nov 23 08:30:00 2017 dks-ksmac/146.0.189.168:40125 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 TLS: Initial packet from [AF_INET]146.0.189.168:28897, sid=958cc89d 4208c33e +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac, name=dks-ksmac, emailAddress=info@dks.sarl +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:32:20 2017 146.0.189.168:28897 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:28897 +Thu Nov 23 08:32:20 2017 MULTI: new connection by client 'dks-ksmac' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. +Thu Nov 23 08:32:20 2017 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:32:20 2017 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:28897 +Thu Nov 23 08:32:20 2017 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:28897: 10.2.0.98 +Thu Nov 23 08:32:23 2017 dks-ksmac/146.0.189.168:28897 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:32:23 2017 dks-ksmac/146.0.189.168:28897 send_push_reply(): safe_cap=940 +Thu Nov 23 08:32:23 2017 dks-ksmac/146.0.189.168:28897 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:36:56 2017 dks-ksmac/146.0.189.168:28897 [dks-ksmac] Inactivity timeout (--ping-restart), restarting +Thu Nov 23 08:36:56 2017 dks-ksmac/146.0.189.168:28897 SIGUSR1[soft,ping-restart] received, client-instance restarting +Thu Nov 23 08:37:27 2017 146.0.189.168:22390 TLS: Initial packet from [AF_INET]146.0.189.168:22390, sid=cc5637de 57205f7a +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac, name=dks-ksmac, emailAddress=info@dks.sarl +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:37:28 2017 146.0.189.168:22390 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:22390 +Thu Nov 23 08:37:28 2017 dks-ksmac/146.0.189.168:22390 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:37:28 2017 dks-ksmac/146.0.189.168:22390 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:22390 +Thu Nov 23 08:37:28 2017 dks-ksmac/146.0.189.168:22390 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:22390: 10.2.0.98 +Thu Nov 23 08:37:30 2017 dks-ksmac/146.0.189.168:22390 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:37:30 2017 dks-ksmac/146.0.189.168:22390 send_push_reply(): safe_cap=940 +Thu Nov 23 08:37:30 2017 dks-ksmac/146.0.189.168:22390 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop, name=dks-laptop, emailAddress=info@dks.sarl +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:38:06 2017 dks-laptop/146.0.189.168:38190 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 TLS: Initial packet from [AF_INET]146.0.189.168:23550, sid=0ff7245e 7ba50eec +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac, name=dks-ksmac, emailAddress=info@dks.sarl +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:39:03 2017 146.0.189.168:23550 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:23550 +Thu Nov 23 08:39:03 2017 MULTI: new connection by client 'dks-ksmac' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. +Thu Nov 23 08:39:03 2017 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:39:03 2017 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:23550 +Thu Nov 23 08:39:03 2017 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:23550: 10.2.0.98 +Thu Nov 23 08:39:05 2017 dks-ksmac/146.0.189.168:23550 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:39:05 2017 dks-ksmac/146.0.189.168:23550 send_push_reply(): safe_cap=940 +Thu Nov 23 08:39:05 2017 dks-ksmac/146.0.189.168:23550 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 TLS: Initial packet from [AF_INET]146.0.189.168:62900, sid=a3dd7bd0 9c0098f4 +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-ksmac, name=dks-ksmac, emailAddress=info@dks.sarl +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:43:25 2017 146.0.189.168:62900 [dks-ksmac] Peer Connection Initiated with [AF_INET]146.0.189.168:62900 +Thu Nov 23 08:43:25 2017 MULTI: new connection by client 'dks-ksmac' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. +Thu Nov 23 08:43:25 2017 MULTI_sva: pool returned IPv4=10.2.0.98, IPv6=(Not enabled) +Thu Nov 23 08:43:25 2017 MULTI: Learn: 10.2.0.98 -> dks-ksmac/146.0.189.168:62900 +Thu Nov 23 08:43:25 2017 MULTI: primary virtual IP for dks-ksmac/146.0.189.168:62900: 10.2.0.98 +Thu Nov 23 08:43:27 2017 dks-ksmac/146.0.189.168:62900 PUSH: Received control message: 'PUSH_REQUEST' +Thu Nov 23 08:43:27 2017 dks-ksmac/146.0.189.168:62900 send_push_reply(): safe_cap=940 +Thu Nov 23 08:43:27 2017 dks-ksmac/146.0.189.168:62900 SENT CONTROL [dks-ksmac]: 'PUSH_REPLY,route 10.2.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.2.0.98 10.2.0.97' (status=1) +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 TLS: soft reset sec=0 bytes=27094884/0 pkts=65010/0 +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:46:38 2017 dks-homebackup/146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile, name=maroq-belleetoile, emailAddress=info@dks.sarl +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 TLS: soft reset sec=0 bytes=37254/0 pkts=709/0 +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup, name=dks-backup, emailAddress=info@dks.sarl +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 08:46:45 2017 dks-backup/212.233.42.21:40572 NOTE: --mute triggered... +Thu Nov 23 08:50:44 2017 dks-ksmac/146.0.189.168:62900 85 variation(s) on previous 20 message(s) suppressed by --mute +Thu Nov 23 08:50:44 2017 dks-ksmac/146.0.189.168:62900 [dks-ksmac] Inactivity timeout (--ping-restart), restarting +Thu Nov 23 08:50:44 2017 dks-ksmac/146.0.189.168:62900 SIGUSR1[soft,ping-restart] received, client-instance restarting +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-laptop, name=dks-laptop, emailAddress=info@dks.sarl +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 09:38:06 2017 dks-laptop/146.0.189.168:38190 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 09:46:38 2017 dks-homebackup/146.0.189.168:1176 TLS: soft reset sec=0 bytes=37202/0 pkts=708/0 +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 09:46:39 2017 dks-homebackup/146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 TLS: soft reset sec=0 bytes=36908/0 pkts=703/0 +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile, name=maroq-belleetoile, emailAddress=info@dks.sarl +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 09:46:41 2017 maroq-belleetoile/213.135.227.140:41183 NOTE: --mute triggered... +Thu Nov 23 10:10:26 2017 dks-laptop/146.0.189.168:38190 95 variation(s) on previous 20 message(s) suppressed by --mute +Thu Nov 23 10:10:26 2017 dks-laptop/146.0.189.168:38190 [dks-laptop] Inactivity timeout (--ping-restart), restarting +Thu Nov 23 10:10:26 2017 dks-laptop/146.0.189.168:38190 SIGUSR1[soft,ping-restart] received, client-instance restarting +Thu Nov 23 10:46:38 2017 dks-homebackup/146.0.189.168:1176 TLS: tls_process: killed expiring key +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-homebackup, name=dks-homebackup, emailAddress=info@dks.sarl +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 10:46:39 2017 dks-homebackup/146.0.189.168:1176 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 10:46:41 2017 maroq-belleetoile/213.135.227.140:41183 TLS: soft reset sec=0 bytes=36856/0 pkts=702/0 +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=maroq-belleetoile, name=maroq-belleetoile, emailAddress=info@dks.sarl +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 10:46:42 2017 maroq-belleetoile/213.135.227.140:41183 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA +Thu Nov 23 10:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=1, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=posdab.dks.lu, name=POSDAB, emailAddress=info@dks.sarl +Thu Nov 23 10:46:45 2017 dks-backup/212.233.42.21:40572 VERIFY OK: depth=0, C=LU, ST=Grevenmacher, L=Roodt-sur-Syre, O=DKS sarl, OU=POSDAB, CN=dks-backup, name=dks-backup, emailAddress=info@dks.sarl +Thu Nov 23 10:46:45 2017 dks-backup/212.233.42.21:40572 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key +Thu Nov 23 10:46:45 2017 dks-backup/212.233.42.21:40572 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication +Thu Nov 23 10:46:45 2017 dks-backup/212.233.42.21:40572 NOTE: --mute triggered... diff --git a/vpn/coloradio02/log/status-openvpn2.log b/vpn/coloradio02/log/status-openvpn2.log new file mode 100644 index 0000000..56545b6 --- /dev/null +++ b/vpn/coloradio02/log/status-openvpn2.log @@ -0,0 +1,34 @@ +OpenVPN CLIENT LIST +Updated,Thu Nov 23 10:51:27 2017 +Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since +aral-findel,82.214.232.186:54019,403498,407285,Wed Nov 22 17:46:42 2017 +aral-berchem,82.214.232.202:34090,403367,407803,Wed Nov 22 17:46:39 2017 +dks-homebackup,146.0.189.168:1176,16111927,11762581,Wed Nov 22 17:46:38 2017 +aral-remich2,82.214.232.194:17921,400041,398821,Wed Nov 22 17:46:35 2017 +aral-echternach,82.214.232.66:57168,405105,408160,Wed Nov 22 17:46:41 2017 +aral-lallange,82.214.232.210:33518,404022,407606,Wed Nov 22 17:46:39 2017 +aral-remich1,82.214.232.74:33859,406318,408447,Wed Nov 22 17:46:37 2017 +aral-schifflange,82.214.232.74:40561,404605,407744,Wed Nov 22 17:46:37 2017 +aral-merl2,82.214.232.82:42723,411856,415077,Wed Nov 22 17:46:33 2017 +bp-capellen,82.214.232.122:23276,400369,398520,Wed Nov 22 17:46:36 2017 +dks-backup,212.233.42.21:40572,394097,390543,Wed Nov 22 17:46:40 2017 +aral-rodange2,82.214.232.210:51411,412817,415058,Wed Nov 22 17:46:41 2017 +maroq-belleetoile,213.135.227.140:41183,396940,400002,Wed Nov 22 17:46:39 2017 +ROUTING TABLE +Virtual Address,Common Name,Real Address,Last Ref +10.2.0.38,aral-remich1,82.214.232.74:33859,Thu Nov 23 04:15:06 2017 +10.2.0.94,dks-backup,212.233.42.21:40572,Wed Nov 22 17:46:40 2017 +10.2.0.34,aral-findel,82.214.232.186:54019,Thu Nov 23 06:15:32 2017 +10.2.0.26,aral-echternach,82.214.232.66:57168,Thu Nov 23 06:15:26 2017 +10.2.0.22,aral-rodange2,82.214.232.210:51411,Thu Nov 23 05:15:05 2017 +10.2.0.46,aral-lallange,82.214.232.210:33518,Thu Nov 23 06:15:22 2017 +10.2.0.18,aral-schifflange,82.214.232.74:40561,Thu Nov 23 07:15:02 2017 +10.2.0.42,aral-remich2,82.214.232.194:17921,Thu Nov 23 06:15:33 2017 +10.2.0.78,aral-merl2,82.214.232.82:42723,Thu Nov 23 06:15:21 2017 +10.2.0.50,aral-berchem,82.214.232.202:34090,Thu Nov 23 04:15:04 2017 +10.2.0.54,bp-capellen,82.214.232.122:23276,Thu Nov 23 04:15:03 2017 +10.2.0.90,dks-homebackup,146.0.189.168:1176,Thu Nov 23 07:58:16 2017 +10.2.0.30,maroq-belleetoile,213.135.227.140:41183,Wed Nov 22 17:46:39 2017 +GLOBAL STATS +Max bcast/mcast queue length,1 +END diff --git a/vpn/source/clients/servername-clientname.ovpn b/vpn/source/clients/servername-clientname.ovpn new file mode 100644 index 0000000..e69de29 diff --git a/vpn/source/easyrsa/COPYING.md b/vpn/source/easyrsa/COPYING.md new file mode 100644 index 0000000..39bce08 --- /dev/null +++ b/vpn/source/easyrsa/COPYING.md @@ -0,0 +1,33 @@ +Easy-RSA -- A Shell-based CA Utility +==================================== + +Copyright (C) 2013 by the Open-Source OpenVPN development community + +Easy-RSA 3 license: GPLv2 +------------------------- + +All the Easy-RSA code contained in this project falls under a GPLv2 license with +full text available in the Licensing/ directory. Additional components used by +this project fall under additional licenses: + +Additional licenses for external components +------------------------------------------- + +The following components are under different licenses; while not part of the +Easy-RSA source code, these components are used by Easy-RSA or provided in +platform distributions as described below: + +### OpenSSL + + OpenSSL is not linked by Easy-RSA, nor is it currently provided in any release + package by Easy-RSA. However, Easy-RSA is tightly coupled with OpenSSL, so + effective use of this code will require your acceptance and installation of + OpenSSL. + +### Additional Windows Components + + The Windows binary package includes mksh/Win32 and unxutils binary components, + with full licensing details available in the distro/windows/Licensing/ + subdirectory of this project. mksh/Win32 is under a MirOS license (with some + additional component licenses present there) and unxutils is under a GPLv2 + license. diff --git a/vpn/source/easyrsa/ChangeLog b/vpn/source/easyrsa/ChangeLog new file mode 100644 index 0000000..911950d --- /dev/null +++ b/vpn/source/easyrsa/ChangeLog @@ -0,0 +1,78 @@ +Easy-RSA 3 ChangeLog + +3.0.0 (2015-09-07) + + * cab4a07 Fix typo: Hellman + (ljani: Github) + + * 171834d Fix typo: Default + (allo-: Github) + + * 8b42eea Make aes256 default, replacing 3des + (keros: Github) + + * f2f4ac8 Make -utf8 default + (roubert: Github) + + +3.0.0-rc2 (2014/07/27) + + * 1551e5f docs: fix typo + (Josh Cepek ) + + * 7ae44b3 Add KNOWN_ISSUES to stage next -rc release + (Josh Cepek ) + + * a0d58b2 Update documentation + (Josh Cepek ) + + * 5758825 Fix vars.example with proper path to extensions.temp + (Josh Cepek ) + + * 89f369c Add support to change private key passphrases + (Josh Cepek ) + + * 49d7c10 Improve docs: add Upgrade-Notes; add online support refs + (Josh Cepek ) + + * fcc4547 Add build-dist packaging script; update Building docs + (Josh Cepek ) + + * f74d08e docs: update Hacking.md with layout & git conventions + (Josh Cepek ) + + * 0754f23 Offload temp file removal to a clean_temp() function + (Josh Cepek ) + + * 1c90df9 Fix incorrect handling of invalid --use-algo option + (Josh Cepek ) + + * c86289b Fix batch-mode handling with changes in e75ad75 + (Josh Cepek ) + + * e75ad75 refine how booleans are evaluated + (Eric F Crist ) + + * cc19823 Merge PKCS#7 feature from pull req #14 + (Author: Luiz Angelo Daros de Luca ) + (Modified-By: Josh Cepek ) + + * 8b1fe01 Support OpenSSL-0.9.8 with the EXTRA_EXTS feature + (Josh Cepek ) + + * d5516d5 Windows: make builds easier by using a matching dir structure + (Josh Cepek ) + + * dc2e6dc Windows: improve external checks and env-var help + (Josh Cepek ) + +3.0.0-rc1 (2013/12/01) + + * The 3.x release is a nearly complete re-write of the 2.x codebase + + * Initial 3.x series code by Josh Cepek -- continuing + maintenance by the OpenVPN community development team and associated + contributors + + * Add ECDSA (elliptic curve) support, thanks to Steffan Karger + diff --git a/vpn/source/easyrsa/README.quickstart.md b/vpn/source/easyrsa/README.quickstart.md new file mode 100644 index 0000000..8fb0a2e --- /dev/null +++ b/vpn/source/easyrsa/README.quickstart.md @@ -0,0 +1,100 @@ +Easy-RSA 3 Quickstart README +============================ + +This is a quickstart guide to using Easy-RSA version 3. Detailed help on usage +and specific commands by running easyrsa with the 'help' command. Additional +documentation can be found in the doc/ directory. + +If you're upgrading from the Easy-RSA 2.x series there are Upgrade-Notes +available, also under the doc/ path. + +Setup and signing the first request +----------------------------------- + +A quick run-though of what needs to happen to start a new PKI and sign your +first entity certificate. + +1. Choose a system to act as your CA and create a new PKI and CA: + + ./easyrsa init-pki + ./easyrsa build-ca + +2. On the system that is requesting a certificate, init its own PKI and generate + a keypair/request. Note that the init-pki is used _only_ when this is done on + a separate system (or at least a separate PKI dir.) This is the recommended + procedure. If you are not using this recommended procedure, skip the next + import-req step as well. + + ./easyrsa init-pki + ./easyrsa gen-req EntityName + +3. Transport the request (.req file) to the CA system and import it. The name + given here is arbitrary and only used to name the request file. + + ./easyrsa import-req /tmp/path/to/import.req EntityName + +4. Sign the request as the correct type. This example uses a client type: + + ./easyrsa sign-req client EntityName + +5. Transport the newly signed certificate to the requesting entity. This entity + may also need the CA cert (ca.crt) unless it had a prior copy. + +6. The entity now has its own keypair, and signed cert, and the CA. + +Signing subsequent requests +--------------------------- + +Follow steps 2-6 above to generate subsequent keypairs and have the CA returned +signed certificates. + +Revoking certs and creating CRLs +-------------------------------- + +This is a CA-specific task. + +To permanently revoke an issued certificate, provide the short name used during +import: + + ./easyrsa revoke EntityName + +To create an updated CRL that contains all revoked certs up to that point: + + ./easyrsa gen-crl + +After generation, the CRL will need to be sent to systems that reference it. + +Generating Diffie-Hellman (DH) params +------------------------------------- + +After initializing a PKI, any entity can create DH params that needs them. This +is normally only used by a TLS server. While the CA PKI can generate this, it +makes more sense to do it on the server itself to avoid the need to send the +files to another system after generation. + +DH params can be generated with: + + ./easyrsa gen-dh + +Showing details of requests or certs +------------------------------------ + +To show the details of a request or certificate by referencing the short +EntityName, use one of the following commands. It is an error to call these +without a matching file. + + ./easyrsa show-req EntityName + ./easyrsa show-cert EntityName + +Changing private key passphrases +-------------------------------- + +RSA and EC private keys can be re-encrypted so a new passphrase can be supplied +with one of the following commands depending on the key type: + + ./easyrsa set-rsa-pass EntityName + + ./easyrsa set-ec-pass EntityName + +Optionally, the passphrase can be removed completely with the 'nopass' flag. +Consult the command help for details. diff --git a/vpn/source/easyrsa/doc/EasyRSA-Advanced.md b/vpn/source/easyrsa/doc/EasyRSA-Advanced.md new file mode 100644 index 0000000..1bd8c29 --- /dev/null +++ b/vpn/source/easyrsa/doc/EasyRSA-Advanced.md @@ -0,0 +1,115 @@ +Easy-RSA Advanced Reference +============================= + +This is a technical reference for advanced users familiar with PKI processes. If +you need a more detailed description, see the `EasyRSA-Readme` or `Intro-To-PKI` +docs instead. + +Configuration Reference +----------------------- + +#### Configuration Sources + + There are 3 possible ways to perform external configuration of Easy-RSA, + selected in the following order where the first defined result wins: + + 1. Commmand-line option + 2. Environmental variable + 3. 'vars' file, if one is present (see `vars Autodetection` below) + 4. Built-in default + + Note that not every possible config option can be set everywhere, although any + env-var can be added to the 'vars' file even if it's not shown by default. + +#### vars Autodetection + + A 'vars' file is a file named simply `vars` (without an extension) that + Easy-RSA will source for configuration. This file is specifically designed + *not* to replace variables that have been set with a higher-priority method + such as CLI opts or env-vars. + + The following locations are checked, in this order, for a vars file. Only the + first one found is used: + + 1. File referenced by the --vars CLI option + 2. The file referenced by the env-var named `EASYRSA_VARS_FILE` + 3. The `EASYRSA_PKI` directory + 4. The default PKI directory at $PWD/pki (usually will be the same as above) + 4. The `EASYRSA` directory + 5. The location of the easyrsa program (usually will be the same as above) + + Defining the env-var `EASYRSA_NO_VARS` will override the sourcing of the vars + file in all cases, including defining it subsequently as a global option. + +#### OpenSSL Config + + Easy-RSA is tightly coupled to the OpenSSL config file (.cnf) for the + flexibility the script provides. It is required that this file be available, + yet it is possible to use a different OpenSSL config file for a particular + PKI, or even change it for a particular invocation. + + The OpenSSL config file is searched for in the following order: + + 1. The env-var `EASYRSA_SSL_CONF` + 2. The 'vars' file (see `vars Autodetection` above) + 3. The `EASYRSA_PKI` directory with a filename of `openssl-1.0.cnf` + 4. The `EASYRSA` directory with a filename of `openssl-1.0.cnf` + +Advanced extension handling +--------------------------- + +Normally the cert extensions are selected by the cert type given on the CLI +during signing; this causes the matching file in the x509-types subdirectory to +be processed for OpenSSL extensions to add. This can be overridden in a +particular PKI by placing another x509-types dir inside the `EASYRSA_PKI` dir +which will be used instead. + +The file named `COMMON` in the x509-types dir is appended to every cert type; +this is designed for CDP usage, but can be used for any extension that should +apply to every signed cert. + +Additionally, the contents of the env-var `EASYRSA_EXTRA_EXTS` is appended with +its raw text added to the OpenSSL extensions. The contents are appended as-is to +the cert extensions; invalid OpenSSL configs will usually result in failure. + +Environmental Variables Reference +--------------------------------- + +A list of env-vars, any matching global option (CLI) to set/override it, and a +possible terse description is shown below: + + * `EASYRSA` - should point to the Easy-RSA top-level dir, normally $PWD + * `EASYRSA_OPENSSL` - command to invoke openssl + * `EASYRSA_SSL_CONF` - the openssl config file to use + * `EASYRSA_PKI` (CLI: `--pki-dir`) - dir to use to hold all PKI-specific files, normally $PWD/pki. + * `EASYRSA_DN` (CLI: `--dn-mode`) - set to the string `cn_only` or `org` to + alter the fields to include in the req DN + * `EASYRSA_REQ_COUNTRY` (CLI: `--req-c`) - set the DN country with org mode + * `EASYRSA_REQ_PROVINCE` (CLI: `--req-st`) - set the DN state/province with + org mode + * `EASYRSA_REQ_CITY` (CLI: `--req-city`) - set the DN city/locality with org + mode + * `EASYRSA_REQ_ORG` (CLI: `--req-org`) - set the DN organization with org mode + * `EASYRSA_REQ_EMAIL` (CLI: `--req-email`) - set the DN email with org mode + * `EASYRSA_REQ_OU` (CLI: `--req-ou`) - set the DN organizational unit with org + mode + * `EASYRSA_KEY_SIZE` (CLI: `--key-size`) - set the keysize in bits to generate + * `EASYRSA_ALGO` (CLI: `--use-algo`) - set the crypto alg to use: rsa or ec + * `EASYRSA_CURVE` (CLI: `--curve`) - define the named EC curve to use + * `EASYRSA_EC_DIR` - dir to store generated ecparams + * `EASYRSA_CA_EXPIRE` (CLI: `--days`) - set the CA expiration time in days + * `EASYRSA_CERT_EXPIRE` (CLI: `--days`) - set the issued cert expiration time + in days + * `EASYRSA_CRL_DAYS` (CLI: `--days`) - set the CRL 'next publish' time in days + * `EASYRSA_NS_SUPPORT` (CLI: `--ns-cert`) - string 'yes' or 'no' fields to + include the deprecated Netscape extensions + * `EASYRSA_NS_COMMENT` (CLI: `--ns-comment`) - string comment to include when + using the deprecated Netscape extensions + * `EASYRSA_TEMP_FILE` - a temp file to use when dynamically creating req/cert + extensions + * `EASYRSA_REQ_CN` (CLI: `--req-cn`) - default CN, necessary to set in BATCH + mode + * `EASYRSA_DIGEST` (CLI: `--digest`) - set a hash digest to use for req/cert + signing + * `EASYRSA_BATCH` (CLI: `--batch`) - enable batch (no-prompt) mode; set + env-var to non-zero string to enable (CLI takes no options) diff --git a/vpn/source/easyrsa/doc/EasyRSA-Readme.md b/vpn/source/easyrsa/doc/EasyRSA-Readme.md new file mode 100644 index 0000000..bece589 --- /dev/null +++ b/vpn/source/easyrsa/doc/EasyRSA-Readme.md @@ -0,0 +1,235 @@ +Easy-RSA 3 Documentation Readme +=============================== + +This document explains how Easy-RSA 3 and each of its assorted features work. + +If you are looking for a quickstart with less background or detail, an +implementation-specific Howto or Readme may be available in this (the `doc/`) +directory. + +Easy-RSA Overview +----------------- + +Easy-RSA is a utility for managing X.509 PKI, or Public Key Infrastructure. A +PKI is based on the notion of trusting a particular authority to authenticate a +remote peer; for more background on how PKI works, see the `Intro-To-PKI` +document. + +The code is written in platform-neutral POSIX shell, allowing use on a wide +range of host systems. The official Windows release also comes bundled with the +programs necessary to use Easy-RSA. The shell code attempts to limit the number +of external programs it depends on. Crypto-related tasks use openssl as the +functional backend. + +Feature Highlights +------------------ + +Here's a non-exhaustive list of the more notable Easy-RSA features: + + * Easy-RSA is able to manage multiple PKIs, each with their own independent + configuration, storage directory, and X.509 extension handling. + * Multiple Subject Name (X.509 DN field) formatting options are supported. For + VPNs, this means a cleaner commonName only setup can be used. + * A single backend is used across all supported platforms, ensuring that no + platform is 'left out' of the rich features. Unix-alikes (BSD, Linux, etc) + and Windows are all supported. + * Easy-RSA's X.509 support includes CRL, CDP, keyUsage/eKu attributes, and + additional features. The included support can be changed or extended as an + advanced feature. + * Interactive and automated (batch) modes of operation + * Flexible configuration: features can be enabled through command-line + options, environment variables, a config file, or a combination of these. + * Built-in defaults allow Easy-RSA to be used without first editing a config + file. + +Obtaining and Using Easy-RSA +---------------------------- + +#### Download and extraction (installation) + + Easy-RSA's main program is a script, supported by a couple of config files. As + such, there is no formal "installation" required. Preparing to use Easy-RSA is + as simple as downloading the compressed package (.tar.gz for Linux/Unix or + .zip for Windows) and extract it to a location of your choosing. There is no + compiling or OS-dependent setup required. + + You should install and run Easy-RSA as a non-root (non-Administrator) account + as root access is not required. + +#### Running Easy-RSA + + Invoking Easy-RSA is done through your preferred shell. Under Windows, you + will use the `EasyRSA Start.bat` program to provide a POSIX-shell environment + suitable for using Easy-RSA. + + The basic format for running commands is: + + ./easyrsa command [ cmd-opts ] + + where `command` is the name of a command to run, and `cmd-opts` are any + options to supply to the command. Some commands have mandatory or optional + cmd-opts. Note the leading `./` component of the command: this is required in + Unix-like environments and may be a new concept to some Windows users. + + General usage and command help can be shown with: + + ./easyrsa help [ command ] + + When run without any command, general usage and a list of available commands + are shown; when a command is supplied, detailed help output for that command + is shown. + +Configuring Easy-RSA +-------------------- + +Easy-RSA 3 no longer needs any configuration file prior to operation, unlike +earlier versions. However, the `vars.example` file contains many commented +options that can be used to control non-default behavior as required. Reading +this file will provide an idea of the basic configuration available. Note that +a vars file must be named just `vars` (without an extension) to actively use it. + +Additionally, some options can be defined at runtime with options on the +command-line. A full list can be shown with: + + ./easyrsa help options + +Any of these options can appear before the command as required as shown below: + + ./easyrsa [options] command [ cmd-opts ] + +For experts, additional configuration flexibility is available by way of +env-vars and custom X.509 extensions. Consult the `EasyRSA-Advanced` +documentation for details + +Getting Started: The Basics +--------------------------- + +Some of the terms used here will be common to those familiar with how PKI works. +Instead of describing PKI basics, please consult the document `Intro-To-PKI` if +you need a more basic description of how a PKI works. + +#### Creating an Easy-RSA PKI + + In order to do something useful, Easy-RSA needs to first initialize a + directory for the PKI. Multiple PKIs can be managed with a single installation + of Easy-RSA, but the default directory is called simply "pki" unless otherwise + specified. + + To create or clear out (re-initialize) a new PKI, use the command: + + ./easyrsa init-pki + + which will create a new, blank PKI structure ready to be used. Once created, + this PKI can be used to make a new CA or generate keypairs. + +#### The PKI Directory Structure + + An Easy-RSA PKI contains the following directory structure: + + * private/ - dir with private keys generated on this host + * reqs/ - dir with locally generated certificate requests (for a CA imported + requests are stored here) + + In a clean PKI no files will exist until, just the bare directories. Commands + called later will create the necessary files depending on the operation. + + When building a CA, a number of new files are created by a combination of + Easy-RSA and (indirectly) openssl. The important CA files are: + + * `ca.crt` - This is the CA certificate + * `index.txt` - This is the "master database" of all issued certs + * `serial` - Stores the next serial number (serial numbers increment) + * `private/ca.key` - This is the CA private key (security-critical) + * `certs_by_serial/` - dir with all CA-signed certs by serial number + * `issued/` - dir with issued certs by commonName + +#### After Creating a PKI + + Once you have created a PKI, the next useful step will be to either create a + CA, or generate keypairs for a system that needs them. Continue with the + relevant section below. + +Using Easy-RSA as a CA +---------------------- + +#### Building the CA + + In order to sign requests to produce certificates, you need a CA. To create a + new CA in a PKI you have created, run: + + ./easyrsa build-ca + + Be sure to use a strong passphrase to protect the CA private key. Note that + you must supply this passphrase in the future when performing signing + operations with your CA, so be sure to remember it. + + During the creation process, you will also select a name for the CA called the + Common Name (CN.) This name is purely for display purposes and can be set as + you like. + +#### Importing requests to the CA + + Once a CA is built, the PKI is intended to be used to import requests from + external systems that are requesting a signed certificate from this CA. In + order to sign the request, it must first be imported so Easy-RSA knows about + it. This request file must be a standard CSR in PKCS#10 format. + + Regardless of the file name to import, Easy-RSA uses a "short name" defined + during import to refer to this request. Importing works like this: + + ./easyrsa import-req /path/to/request.req nameOfRequest + + The nameOfRequest should normally refer to the system or person making the + request. + +#### Signing a request + + Once Easy-RSA has imported a request, it can be reviewed and signed. Every + certificate needs a "type" which controls what extensions the certificate gets + Easy-RSA ships with 3 possible types: `client`, `server`, and `ca`, described + below: + + * client - A TLS client, suitable for a VPN user or web browser (web client) + * server - A TLS server, suitable for a VPN or web server + * ca - A subordinate CA, used when chaining multiple CAs together + + Additional types of certs may be defined by local sites as needed; see the + advanced documentation for details. + +#### Revoking and publishing CRLs + + If an issue certificate needs to be revoked, this can be done as follows: + + ./easyrsa revoke nameOfRequest + + To generate a CRL suitable for publishing to systems that use it, run: + + ./easyrsa gen-crl + + Note that this will need to be published or sent to systems that rely on an + up-to-date CRL as the certificate is still otherwise valid. + +Using Easy-RSA to generate keypairs & requests +---------------------------------------------- + +Easy-RSA can generate a keypair and certificate request in PKCS#10 format. This +request is what a CA needs in order to generate and return a signed certificate. + +Ideally you should never generate entity keypairs for a client or server in a +PKI you are using for your CA. It is best to separate this process and generate +keypairs only on the systems you plan to use them. + +Easy-RSA can generate a keypair and request with the following command: + + ./easyrsa gen-req nameOfRequest + +You will then be given a chance to modify the Subject details of your request. +Easy-RSA uses the short name supplied on the command-line by default, though you +are free to change it if necessary. After providing a passphrase and Subject +details, the keypair and request files will be shown. + +In order to obtain a signed certificate, the request file must be sent to the +CA for signing; this step is obviously not required if a single PKI is used as +both the CA and keypair/request generation as the generated request is already +"imported." + diff --git a/vpn/source/easyrsa/doc/EasyRSA-Upgrade-Notes.md b/vpn/source/easyrsa/doc/EasyRSA-Upgrade-Notes.md new file mode 100644 index 0000000..6cc6df2 --- /dev/null +++ b/vpn/source/easyrsa/doc/EasyRSA-Upgrade-Notes.md @@ -0,0 +1,58 @@ +Upgrading to Easy-RSA 3 from earlier versions +========= + +People upgrading to Easy-RSA 3 from a 2.x version should note some important +changes starting with version 3. For a better overview of version 3 in general, +see the Readme in the doc/ directory. + +List of important changes +---- + + * nsCertType extensions are no longer included by default. Use of such + "Netscape" attributes have been deprecated upstream and their use is + discouraged. Configure `EASYRSA_NS_SUPPORT` in vars if you want to enable + this legacy behavior. + + Notably, this is important for OpenVPN deployments relying on the + `--ns-cert-type` directive. Either have OpenVPN use the preferred + `--remote-cert-tls` option, or enable legacy NS extensions. + + * The default request Subject (or DN, Distinguished Name) includes just the + commonName. This is more suitable for VPNs and environments that don't wish + to include info about the Country/State/City/Org/OU in certs. Configure + `EASYRSA_DN` in vars if you want to enable the legacy behavior. + + * The 3.0 release lacks PKCS#11 (smartcard/token) support. This is anticipated + to be supported in a future point-release to target each platform's need. + + * The -utf8 option has been added for all supported commands. This should be + backwards compatible with ASCII strings. + + * The default private key encryption has been changed from 3des to aes256. + + +Some new concepts +---- + +Easy-RSA 3 has some new concepts compared to the prior v2 series. + +### Request-Import-Sign workflow + + v3 is now designed to support keypairs generated on the target system where + they will be used, thus improving security as no keys need to be transferred + between hosts. The old workflow of generating everything in a single PKI is + still supported as well. + + The recommended workflow when using Easy-RSA as a CA is to import requests, + sign them, and return the issued & CA certs. Each requesting system can use + Easy-RSA without a CA to generate keypairs & requests. + +### "Org"-style DN flexibility + + When using Easy-RSA in the "org" DN mode, it is no longer required to match + some of the field values. This improves flexibility, and enables easier remote + generation as the requester doesn't need to know the CA's values in advance. + + Previously in v2, the Country, State, and Org values all had to match or a + request couldn't be signed. If you want the old behavior you can change the + OpenSSL config to require it or simply look over the DN at signing time. diff --git a/vpn/source/easyrsa/doc/Hacking.md b/vpn/source/easyrsa/doc/Hacking.md new file mode 100644 index 0000000..d1b7f6a --- /dev/null +++ b/vpn/source/easyrsa/doc/Hacking.md @@ -0,0 +1,142 @@ +Easy-RSA 3 Hacking Guide +=== + +This document is aimed at programmers looking to improve on the existing +codebase. + +Compatibility +--- + +The `easyrsa` code is written in POSIX shell (and any cases where it is not is +considered a bug to be fixed.) The only exceptions are the `local` keyword and +the construct `export FOO=baz`, both well-supported. + +As such, modifications to the code should also be POSIX; platform-specific code +should be placed under the `distro/` dir and listed by target platform. + +Coding conventions +--- + +While there aren't strict syntax standards associated with the project, please +follow the existing format and flow when possible; however, specific exceptions +can be made if there is a significant reason or benefit. + +Do try to: + + * Keep variables locally-scoped when possible + * Comment sections of code for readability + * Use the conventions for prefixes on global variables + * Set editors for tab stops of 8 spaces + * Use tabs for code indents; use aligned spaces for console text + +Keeping code, docs, and examples in sync +--- + +Changes that adjust, add, or remove features should have relevant docs, help +output, and examples updated at the same time. + +Release versioning +--- + +A point-release bump (eg: 3.0 to 3.1) is required when the frontend interface +changes in a non-backwards compatible way. Always assume someone has an +automated process that relies on the current functionality for official +(non-beta, non-rc) releases. A possible exception exists for bugfixes that do +break backwards-compatibility; caution is to be used in such cases. + +The addition of a new command may or may not require a point-release depending +on the significance of the feature; the same holds true for additional optional +arguments to commands. + +Project layout +--- + +The project's files are structured as follows: + + * `easyrsa3/` is the primary project code. On Linux/Unix-alikes, all the core + code and supporting files are stored here. + * `Licensing/` is for license docs. + * `build/` is for build information and scripts. + * `contrib/` is for externally-contributed files, such as useful external + scripts or interfaces for other systems/languages. + * `distro/` is for distro-specific supporting files, such as the Windows + frontend wrappers. Code components that are not platform-neutral should go + here. + * `doc/` is for documentation. Much of this is in Markdown format which can be + easily converted to HTML for easy viewing under Windows. + * `release-keys/` list current and former KeyIDs used to sign release packages + (not necessarily git tags) available for download. + * The top-level dir includes files for basic project info and reference + appropriate locations for more detail. + +As a brief note, it is actually possible to take just the easyrsa3/ dir and end +up with a functional project; the remaining structure includes docs, build prep, +distro-specific wrappers, and contributed files. + +Git conventions +--- + +As of Easy-RSA 3, the following git conventions should be used. These are mostly +useful for people with repo access in order to keep a standard meaning to commit +messages and merge actions. + +### Signed-off-by: and related commit message lines + + Committers with push access should ensure a `Signed-off-by:` line exists at + the end of the commit message with their name on it. This indicates that the + committer has reviewed the changes to the commit in question and approve of + the feature and code in question. It also helps verify the code came from an + acceptable source that won't cause issues with the license. + + This can be automatically added by git using `git commit -s`. + + Additional references can be included as well. If multiple people reviewed the + change, the committer may add their names in additional `Signed-off-by:` + lines; do get permission from that person before using their name, however ;) + + The following references may be useful as well: + + * `Signed-off-by:` -- discussed above, indicates review of the commit + * `Author:` -- references an author of a particular feature, in full or + significant part + * `Changes-by:` -- indicates the listed party contributed changes or + modifications to a feature + * `Acked-by:` -- indicates review of the feature, code, and/or functional + correctness + +### Merging from external sources (forks, patches, etc) + + Contributions can come in many forms: GitHub "pull requests" from cloned + repos, references to external repos, patches to the ML, or others. Those won't + necessary have `Signed-off-by:` lines or may contain less info in the commit + message than is desirable to explain the changes. + + The committing author to this project should make a merge-commit in this case + with the appropriate details provided there. If additional code changes are + necessary, this can be done on a local branch prior to merging back into the + mainline branch. + + This merge-commit should list involved contributors with `Author:` or similar + lines as required. The individual commits involved in a merge also retain the + original committer; regardless, the merge-commit message should give a clear + indication of what the entire set of commits does as a whole. + +### Tagging + + Tags should follow the convention: + + vM.m.p + + where `M` is the major version, `m` is the minor "point-release" version, and + `p` is the patch-level. Suffixes of `-rc#`, `-beta#`, etc can be added for + pre-release versions as required. + + Currently tags are taken from the mainline development branch in question. The + ChangeLog should thus be updated prior to tagging. Tags should also be + annotated with an appropriate commit message and signed-off. This can be done + as shown below (don't use `-s` unless you intend to use GPG with git.) + + git tag -a v1.2.3 + + Corresponding release downloads can be uploaded to release distribution points + as required. diff --git a/vpn/source/easyrsa/doc/Intro-To-PKI.md b/vpn/source/easyrsa/doc/Intro-To-PKI.md new file mode 100644 index 0000000..ea56629 --- /dev/null +++ b/vpn/source/easyrsa/doc/Intro-To-PKI.md @@ -0,0 +1,97 @@ +Introduction to PKI +=================== + +This document is designed to give you a brief introduction into how a PKI, or +Public Key Infrastructure, works. + +Terminology Used +---------------- + +To avoid confusion, the following terms will be used throughout the Easy-RSA +documentation. Short forms may be substituted for longer forms as convenient. + + * **PKI**: Public Key Infrastructure. This describes the collection of files + and associations between the CA, keypairs, requests, and certificates. + * **CA**: Certificate Authority. This is the "master cert" at the root of a + PKI. + * **cert**: Certificate. A certificate is a request that has been signed by a + CA. The certificate contains the public key, some details describing the + cert itself, and a digital signature from the CA. + * **request**: Certificate Request (optionally 'req'.) This is a request for a + certificate that is then send to a CA for signing. A request contains the + desired cert information along with a digital signature from the private + key. + * **keypair**: A keypair is an asymmetric cryptographic pair of keys. These + keys are split into two parts: the public and private keys. The public key + is included in a request and certificate. + +The CA +------ + +The heart of a PKI is the CA, or Certificate Authority, and this is also the +most security-sensitive. The CA private key is used to sign all issued +certificates, so its security is critical in keeping the entire PKI safe. For +this reason, it is highly recommended that the CA PKI structure be kept on a +system dedicated for such secure usage; it is not a great idea to keep the CA +PKI mixed in with one used to generate end-entity certificates, such as clients +or servers (VPN or web servers.) + +To start a new PKI, the CA is first created on the secure environment. +Depending on security needs, this could be managed under a locked down account, +dedicated system, or even a completely offline system or using removable media +to improve security (after all, you can't suffer an online break-in if your +system or PKI is not online.) The exact steps to create a CA are described in a +separate section. When creating a new CA, the CA keypair (private and public +keys) are created, as well as the file structure necessary to support signing +issued certificates. + +Once a CA has been created, it can receive certificate requests from +end-entities. These entity certificates are issued to consumers of X509 +certificates, such as a client or server of a VPN, web, or email system. The +certificate requests and certificates are not security-sensitive, and can be +transferred in whatever means convenient, such as email, flash drive, etc. For +better security, it is a good idea to verify the received request matches the +sender's copy, such as by verifying the expected checksum against the sender's +original. + +Keypairs and requests +--------------------- + +Individual end-entities do not need a full CA set up and will only need to +create a keypair and associated certificate request. The private key is not used +anywhere except on this entity, and should never leave that system. It is wise +to secure this private key with a strong passphrase, because if lost or stolen +the holder of the private key can make connections appearing as the certificate +holder. + +Once a keypair is generated, the certificate request is created and digitally +signed using the private key. This request will be sent to a CA for signing, and +a signed certificate will be returned. + +How requests become certificates +-------------------------------- + +After a CA signs the certificate request, a signed certificate is produced. In +this step, the CA's private key is used to digitally sign the entity's public +key so that any system trusting the CA certificate can implicitly trust the +newly issued certificate. This signed certificate is then sent back to the +requesting entity. The issued certificate is not security-sensitive and can be +sent over plaintext transmission methods. + +Verifying an issued certificate +------------------------------- + +After 2 entities have created keypairs, sent their requests to the CA, and +received a copy of their signed certificates and the CA's own certificate, they +can mutually authenticate with one-another. This process does not require the 2 +entities to have previously exchanged any kind of security information directly. + +During a TLS handshake each side of the connection presents their own cert chain +to the remote end. Each side checks the validity of the cert received against +their own copy of the CA cert. By trusting the CA root cert, the peer they are +talking to can be authenticated. + +The remote end proves it "really is" the entity identified by the cert by +signing a bit of data using its own private key. Only the holder of the private +key is able to do this, allowing the remote end to verify the authenticity of +the system being connected to. diff --git a/vpn/source/easyrsa/easyrsa b/vpn/source/easyrsa/easyrsa new file mode 100644 index 0000000..e004e2b --- /dev/null +++ b/vpn/source/easyrsa/easyrsa @@ -0,0 +1,1256 @@ +#!/bin/sh + +# Easy-RSA 3 -- A Shell-based CA Utility +# +# Copyright (C) 2013 by the Open-Source OpenVPN development community. +# A full list of contributors can be found in the ChangeLog. +# +# This code released under version 2 of the GNU GPL; see COPYING and the +# Licensing/ directory of this project for full licensing details. + +# Help/usage output to stdout +usage() { + # command help: + print " +Easy-RSA 3 usage and overview + +USAGE: easyrsa [options] COMMAND [command-options] + +A list of commands is shown below. To get detailed usage and help for a +command, run: + ./easyrsa help COMMAND + +For a listing of options that can be supplied before the command, use: + ./easyrsa help options + +Here is the list of commands available with a short syntax reminder. Use the +'help' command above to get full usage details. + + init-pki + build-ca [ cmd-opts ] + gen-dh + gen-req [ cmd-opts ] + sign-req + build-client-full [ cmd-opts ] + build-server-full [ cmd-opts ] + revoke + gen-crl + update-db + show-req [ cmd-opts ] + show-cert [ cmd-opts ] + import-req + export-p7 [ cmd-opts ] + export-p12 [ cmd-opts ] + set-rsa-pass [ cmd-opts ] + set-ec-pass [ cmd-opts ] +" + + # collect/show dir status: + local err_source="Not defined: vars autodetect failed and no value provided" + local work_dir="${EASYRSA:-$err_source}" + local pki_dir="${EASYRSA_PKI:-$err_source}" + print "\ +DIRECTORY STATUS (commands would take effect on these locations) + EASYRSA: $work_dir + PKI: $pki_dir +" +} # => usage() + +# Detailed command help +# When called with no args, calls usage(), otherwise shows help for a command +cmd_help() { + local text opts + case "$1" in + init-pki|clean-all) text=" + init-pki [ cmd-opts ] + Removes & re-initializes the PKI dir for a clean PKI" ;; + build-ca) text=" + build-ca [ cmd-opts ] + Creates a new CA" + opts=" + nopass - do not encrypt the CA key (default is encrypted) + subca - create a sub-CA keypair and request (default is a root CA)" ;; + gen-dh) text=" + gen-dh + Generates DH (Diffie-Hellman) parameters" ;; + gen-req) text=" + gen-req [ cmd-opts ] + Generate a standalone keypair and request (CSR) + + This request is suitable for sending to a remote CA for signing." + opts=" + nopass - do not encrypt the private key (default is encrypted)" ;; + sign|sign-req) text=" + sign-req + Sign a certificate request of the defined type. must be a known + type such as 'client', 'server', or 'ca' (or a user-added type.) + + This request file must exist in the reqs/ dir and have a .req file + extension. See import-req below for importing reqs from other sources." ;; + build|build-client-full|build-server-full) text=" + build-client-full [ cmd-opts ] + build-server-full [ cmd-opts ] + Generate a keypair and sign locally for a client or server + + This mode uses the as the X509 CN." + opts=" + nopass - do not encrypt the private key (default is encrypted)" ;; + revoke) text=" + revoke + Revoke a certificate specified by the filename_base" ;; + gen-crl) text=" + gen-crl + Generate a CRL" ;; + update-db) text=" + update-db + Update the index.txt database + + This command will use the system time to update the status of issued + certificates." ;; + show-req|show-cert) text=" + show-req [ cmd-opts ] + show-cert [ cmd-opts ] + Shows details of the req or cert referenced by filename_base + + Human-readable output is shown, including any requested cert options when + showing a request." + opts=" + full - show full req/cert info, including pubkey/sig data" ;; + import-req) text=" + import-req + Import a certificate request from a file + + This will copy the specified file into the reqs/ dir in + preparation for signing. + The is the filename base to create. + + Example usage: + import-req /some/where/bob_request.req bob" ;; + export-p12) text=" + export-p12 [ cmd-opts ] + Export a PKCS#12 file with the keypair specified by " + opts=" + noca - do not include the ca.crt file in the PKCS12 output + nokey - do not include the private key in the PKCS12 output" ;; + export-p7) text=" + export-p7 [ cmd-opts ] + Export a PKCS#7 file with the pubkey specified by " + opts=" + noca - do not include the ca.crt file in the PKCS7 output" ;; + set-rsa-pass|set-ec-pass) text=" + set-rsa-pass [ cmd-opts ] + set-ec-pass [ cmd-opts ] + Set a new passphrase on an RSA or EC key for the listed ." + opts=" + nopass - use no password and leave the key unencrypted + file - (advanced) treat the file as a raw path, not a short-name" ;; + altname|subjectaltname|san) text=" + --subject-alt-name=SAN_FORMAT_STRING + This global option adds a subjectAltName to the request or issued + certificate. It MUST be in a valid format accepted by openssl or + req/cert generation will fail. Note that including multiple such names + requires them to be comma-separated; further invocations of this + option will REPLACE the value. + + Examples of the SAN_FORMAT_STRING shown below: + DNS:alternate.example.net + DNS:primary.example.net,DNS:alternate.example.net + IP:203.0.113.29 + email:alternate@example.net" ;; + options) + opt_usage ;; + "") + usage ;; + *) text=" + Unknown command: '$1' (try without commands for a list of commands)" ;; + esac + + # display the help text + print "$text" + [ -n "$opts" ] && print " + cmd-opts is an optional set of command options from this list: +$opts" +} # => cmd_help() + +# Options usage +opt_usage() { + print " +Easy-RSA Global Option Flags + +The following options may be provided before the command. Options specified +at runtime override env-vars and any 'vars' file in use. Unless noted, +non-empty values to options are mandatory. + +General options: + +--batch : set automatic (no-prompts when possible) mode +--pki-dir=DIR : declares the PKI directory +--vars=FILE : define a specific 'vars' file to use for Easy-RSA config + +Certificate & Request options: (these impact cert/req field values) + +--days=# : sets the signing validity to the specified number of days +--digest=ALG : digest to use in the requests & certificates +--dn-mode=MODE : DN mode to use (cn_only or org) +--keysize=# : size in bits of keypair to generate +--req-cn=NAME : default CN to use +--subca-len=# : path length of signed sub-CA certs; must be >= 0 if used +--subject-alt-name : Add a subjectAltName. For more info and syntax, see: + ./easyrsa help altname +--use-algo=ALG : crypto alg to use: choose rsa (default) or ec +--curve=NAME : for elliptic curve, sets the named curve to use + +Organizational DN options: (only used with the 'org' DN mode) + (values may be blank for org DN options) + +--req-c=CC : country code (2-letters) +--req-st=NAME : State/Province +--req-city=NAME : City/Locality +--req-org=NAME : Organization +--req-email=NAME : Email addresses +--req-ou=NAME : Organizational Unit + +Deprecated features: + +--ns-cert=YESNO : yes or no to including deprecated NS extensions +--ns-comment=COMMENT : NS comment to include (value may be blank) +" +} # => opt_usage() + +# Wrapper around printf - clobber print since it's not POSIX anyway +print() { printf "%s\n" "$*"; } + +# Exit fatally with a message to stderr +# present even with EASYRSA_BATCH as these are fatal problems +die() { + print " +Easy-RSA error: + +$1" 1>&2 + exit ${2:-1} +} # => die() + +# non-fatal warning output +warn() { + [ ! $EASYRSA_BATCH ] && \ + print " +$1" 1>&2 +} # => warn() + +# informational notices to stdout +notice() { + [ ! $EASYRSA_BATCH ] && \ + print " +$1" +} # => notice() + +# yes/no case-insensitive match (operates on stdin pipe) +# Returns 0 when input contains yes, 1 for no, 2 for no match +# If both strings are present, returns 1; first matching line returns. +awk_yesno() { + local awkscript=' +BEGIN {IGNORECASE=1; r=2} +{ if(match($0,"no")) {r=1; exit} + if(match($0,"yes")) {r=0; exit} +} END {exit r}' + awk "$awkscript" +} # => awk_yesno() + +# intent confirmation helper func +# returns without prompting in EASYRSA_BATCH +confirm() { + [ $EASYRSA_BATCH ] && return + local prompt="$1" value="$2" msg="$3" input + print " +$msg + +Type the word '$value' to continue, or any other input to abort." + printf %s " $prompt" + read input + [ "$input" = "$value" ] && return + notice "Aborting without confirmation." + exit 9 +} # => confirm() + +# remove temp files +clean_temp() { + for f in "$EASYRSA_TEMP_FILE" "$EASYRSA_TEMP_FILE_2" "$EASYRSA_TEMP_FILE_3" + do [ -f "$f" ] && rm "$f" 2>/dev/null + done +} # => clean_temp() + +vars_source_check() { + # Check for defined EASYRSA_PKI + [ -n "$EASYRSA_PKI" ] || die "\ +EASYRSA_PKI env-var undefined" + + # Verify EASYRSA_OPENSSL command gives expected output + if [ -z "$EASYRSA_SSL_OK" ]; then + local val="$("$EASYRSA_OPENSSL" version)" + case "${val%% *}" in + OpenSSL|LibreSSL) ;; + *) die "\ +Missing or invalid OpenSSL +Expected to find openssl command at: $EASYRSA_OPENSSL" + esac + fi + EASYRSA_SSL_OK=1 + + # Verify EASYRSA_SSL_CONF file exists + [ -f "$EASYRSA_SSL_CONF" ] || die "\ +The OpenSSL config file cannot be found. +Expected location: $EASYRSA_SSL_CONF" +} # => vars_source_check() + +# Verify supplied curve exists and generate curve file if needed +verify_curve() { + if ! "$EASYRSA_OPENSSL" ecparam -name "$EASYRSA_CURVE" > /dev/null; then + die "\ +Curve $EASYRSA_CURVE not found. Run openssl ecparam -list_curves to show a +list of supported curves." + fi + + # Check that the ecparams dir exists + [ -d "$EASYRSA_EC_DIR" ] || mkdir "$EASYRSA_EC_DIR" || die "\ +Failed creating ecparams dir (permissions?) at: +$EASYRSA_EC_DIR" + + # Check that the required ecparams file exists + local out="$EASYRSA_EC_DIR/${EASYRSA_CURVE}.pem" + [ -f "$out" ] && return 0 + "$EASYRSA_OPENSSL" ecparam -name "$EASYRSA_CURVE" -out "$out" || die "\ +Failed to generate ecparam file (permissions?) when writing to: +$out" + + # Explicitly return success for caller + return 0 +} + +# Basic sanity-check of PKI init and complain if missing +verify_pki_init() { + local help_note="Run easyrsa without commands for usage and command help." + + # check that the pki dir exists + vars_source_check + [ -d "$EASYRSA_PKI" ] || die "\ +EASYRSA_PKI does not exist (perhaps you need to run init-pki)? +Expected to find the EASYRSA_PKI at: $EASYRSA_PKI +$help_note" + + # verify expected dirs present: + for i in private reqs; do + [ -d "$EASYRSA_PKI/$i" ] || die "\ +Missing expected directory: $i (perhaps you need to run init-pki?) +$help_note" + done +} # => verify_pki_init() + +# Verify core CA files present +verify_ca_init() { + local help_note="Run without commands for usage and command help." + + # First check the PKI has been initialized + verify_pki_init + + # verify expected files present: + for i in serial index.txt ca.crt private/ca.key; do + if [ ! -f "$EASYRSA_PKI/$i" ]; then + [ "$1" = "test" ] && return 1 + die "\ +Missing expected CA file: $i (perhaps you need to run build-ca?) +$help_note" + fi + done + + # When operating in 'test' mode, return success. + # test callers don't care about CA-specific dir structure + [ "$1" = "test" ] && return 0 + + # verify expected CA-specific dirs: + for i in issued certs_by_serial; do + [ -d "$EASYRSA_PKI/$i" ] || die "\ +Missing expected CA dir: $i (perhaps you need to run build-ca?) +$help_note" + done + + # explicitly return success for callers + return 0 + +} # => verify_ca_init() + +# init-pki backend: +init_pki() { + vars_source_check + + # If EASYRSA_PKI exists, confirm before we rm -rf (skiped with EASYRSA_BATCH) + if [ -e "$EASYRSA_PKI" ]; then + confirm "Confirm removal: " "yes" " +WARNING!!! + +You are about to remove the EASYRSA_PKI at: $EASYRSA_PKI +and initialize a fresh PKI here." + # now remove it: + rm -rf "$EASYRSA_PKI" || die "Removal of PKI dir failed. Check/correct errors above" + fi + + # new dirs: + for i in private reqs; do + mkdir -p "$EASYRSA_PKI/$i" || die "Failed to create PKI file structure (permissions?)" + done + + notice "\ +init-pki complete; you may now create a CA or requests. +Your newly created PKI dir is: $EASYRSA_PKI +" + return 0 +} # => init_pki() + +# build-ca backend: +build_ca() { + local opts= sub_ca= + while [ -n "$1" ]; do + case "$1" in + nopass) opts="$opts -nodes" ;; + subca) sub_ca=1 ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + verify_pki_init + [ "$EASYRSA_ALGO" = "ec" ] && verify_curve + + # setup for the simpler sub-CA situation and overwrite with root-CA if needed: + local out_file="$EASYRSA_PKI/reqs/ca.req" + local out_key="$EASYRSA_PKI/private/ca.key" + if [ ! $sub_ca ]; then + out_file="$EASYRSA_PKI/ca.crt" + opts="$opts -x509 -days $EASYRSA_CA_EXPIRE" + fi + + # Test for existing CA, and complain if already present + if verify_ca_init test; then + die "\ +Unable to create a CA as you already seem to have one set up. +If you intended to start a new CA, run init-pki first." + fi + # If a private key exists here, a sub-ca was created but not signed. + # Notify the user and require a signed ca.crt or a init-pki: + [ -f "$out_key" ] && \ + die "\ +A CA private key exists but no ca.crt is found in your PKI dir of: +$EASYRSA_PKI +Refusing to create a new CA keypair as this operation would overwrite your +current CA keypair. If you intended to start a new CA, run init-pki first." + + # create necessary files and dirs: + local err_file="Unable to create necessary PKI files (permissions?)" + for i in issued certs_by_serial; do + mkdir -p "$EASYRSA_PKI/$i" || die "$err_file" + done + printf "" > "$EASYRSA_PKI/index.txt" || die "$err_file" + print "01" > "$EASYRSA_PKI/serial" || die "$err_file" + + # Default CN only when not in global EASYRSA_BATCH mode: + [ $EASYRSA_BATCH ] && opts="$opts -batch" || export EASYRSA_REQ_CN="Easy-RSA CA" + + out_key_tmp="$(mktemp -u "$out_key.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$out_key_tmp" + out_file_tmp="$(mktemp -u "$out_file.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_3="$out_file_tmp" + # create the CA keypair: + "$EASYRSA_OPENSSL" req -utf8 -new -newkey $EASYRSA_ALGO:"$EASYRSA_ALGO_PARAMS" \ + -config "$EASYRSA_SSL_CONF" -keyout "$out_key_tmp" -out "$out_file_tmp" $opts || \ + die "Failed to build the CA" + mv "$out_key_tmp" "$out_key"; EASYRSA_TEMP_FILE_2= + mv "$out_file_tmp" "$out_file"; EASYRSA_TEMP_FILE_3= + + # Success messages + if [ $sub_ca ]; then + notice "\ +NOTE: Your sub-CA request is at $out_file +and now must be sent to you parent CA for signing. Place your resulting cert +at $EASYRSA_PKI/ca.crt prior to signing operations. +" + else notice "\ +CA creation complete and you may now import and sign cert requests. +Your new CA certificate file for publishing is at: +$out_file +" + fi + return 0 +} # => build_ca() + +# gen-dh backend: +gen_dh() { + verify_pki_init + + local out_file="$EASYRSA_PKI/dh.pem" + "$EASYRSA_OPENSSL" dhparam -out "$out_file" $EASYRSA_KEY_SIZE || \ + die "Failed to build DH params" + notice "\ +DH parameters of size $EASYRSA_KEY_SIZE created at $out_file +" + return 0 +} # => gen_dh() + +# gen-req backend: +gen_req() { + # pull filename base and use as default interactive CommonName: + [ -n "$1" ] || die "\ +Error: gen-req must have a file base as the first argument. +Run easyrsa without commands for usage and commands." + local key_out="$EASYRSA_PKI/private/$1.key" + local req_out="$EASYRSA_PKI/reqs/$1.req" + [ ! $EASYRSA_BATCH ] && EASYRSA_REQ_CN="$1" + shift + + # function opts support + local opts= + while [ -n "$1" ]; do + case "$1" in + nopass) opts="$opts -nodes" ;; + # batch flag supports internal callers needing silent operation + batch) local EASYRSA_BATCH=1 ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + verify_pki_init + [ "$EASYRSA_ALGO" = "ec" ] && verify_curve + + # don't wipe out an existing private key without confirmation + [ -f "$key_out" ] && confirm "Confirm key overwrite: " "yes" "\ + +WARNING!!! + +An existing private key was found at $key_out +Continuing with key generation will replace this key." + + # When EASYRSA_EXTRA_EXTS is defined, append it to openssl's [req] section: + if [ -n "$EASYRSA_EXTRA_EXTS" ]; then + # Setup & insert the extra ext data keyed by a magic line + local extra_exts=" +req_extensions = req_extra +[ req_extra ] +$EASYRSA_EXTRA_EXTS" + local awkscript=' +{if ( match($0, "^#%EXTRA_EXTS%") ) + { while ( getline<"/dev/stdin" ) {print} next } + {print} +}' + print "$extra_exts" | \ + awk "$awkscript" "$EASYRSA_SSL_CONF" \ + > "$EASYRSA_TEMP_FILE" \ + || die "Copying SSL config to temp file failed" + # Use this new SSL config for the rest of this function + local EASYRSA_SSL_CONF="$EASYRSA_TEMP_FILE" + fi + + key_out_tmp="$(mktemp -u "$key_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$key_out_tmp" + req_out_tmp="$(mktemp -u "$req_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_3="$req_out_tmp" + # generate request + [ $EASYRSA_BATCH ] && opts="$opts -batch" + "$EASYRSA_OPENSSL" req -utf8 -new -newkey $EASYRSA_ALGO:"$EASYRSA_ALGO_PARAMS" \ + -config "$EASYRSA_SSL_CONF" -keyout "$key_out_tmp" -out "$req_out_tmp" $opts \ + || die "Failed to generate request" + mv "$key_out_tmp" "$key_out"; EASYRSA_TEMP_FILE_2= + mv "$req_out_tmp" "$req_out"; EASYRSA_TEMP_FILE_3= + notice "\ +Keypair and certificate request completed. Your files are: +req: $req_out +key: $key_out +" + return 0 +} # => gen_req() + +# common signing backend +sign_req() { + local crt_type="$1" opts= + local req_in="$EASYRSA_PKI/reqs/$2.req" + local crt_out="$EASYRSA_PKI/issued/$2.crt" + + # Randomize Serial number + local i= serial= check_serial= + for i in 1 2 3 4 5; do + "$EASYRSA_OPENSSL" rand -hex 16 -out "$EASYRSA_PKI/serial" + serial="$(cat "$EASYRSA_PKI/serial")" + check_serial="$("$EASYRSA_OPENSSL" ca -config "$EASYRSA_SSL_CONF" -status "$serial" 2>&1)" + case "$check_serial" in + *"not present in db"*) break ;; + *) continue ;; + esac + done + + # Support batch by internal caller: + [ "$3" = "batch" ] && local EASYRSA_BATCH=1 + + verify_ca_init + + # Check argument sanity: + [ -n "$2" ] || die "\ +Incorrect number of arguments provided to sign-req: +expected 2, got $# (see command help for usage)" + + # Cert type must exist under the EASYRSA_EXT_DIR + [ -r "$EASYRSA_EXT_DIR/$crt_type" ] || die "\ +Unknown cert type '$crt_type'" + + # Request file must exist + [ -f "$req_in" ] || die "\ +No request found for the input: '$2' +Expected to find the request at: $req_in" + + # Confirm input is a cert req + verify_file req "$req_in" || die "\ +The certificate request file is not in a valid X509 request format. +Offending file: $req_in" + + # Display the request subject in an easy-to-read format + # Confirm the user wishes to sign this request + confirm "Confirm request details: " "yes" " +You are about to sign the following certificate. +Please check over the details shown below for accuracy. Note that this request +has not been cryptographically verified. Please be sure it came from a trusted +source or that you have verified the request checksum with the sender. + +Request subject, to be signed as a $crt_type certificate for $EASYRSA_CERT_EXPIRE days: + +$(display_dn req "$req_in") +" # => confirm end + + # Generate the extensions file for this cert: + { + # Append first any COMMON file (if present) then the cert-type extensions + cat "$EASYRSA_EXT_DIR/COMMON" + cat "$EASYRSA_EXT_DIR/$crt_type" + + # Support a dynamic CA path length when present: + [ "$crt_type" = "ca" ] && [ -n "$EASYRSA_SUBCA_LEN" ] && \ + print "basicConstraints = CA:TRUE, pathlen:$EASYRSA_SUBCA_LEN" + + # Deprecated Netscape extension support, if enabled + if print "$EASYRSA_NS_SUPPORT" | awk_yesno; then + [ -n "$EASYRSA_NS_COMMENT" ] && \ + print "nsComment = \"$EASYRSA_NS_COMMENT\"" + case "$crt_type" in + server) print "nsCertType = server" ;; + client) print "nsCertType = client" ;; + ca) print "nsCertType = sslCA" ;; + esac + fi + + # If type is server and no subjectAltName was requested, + # add one to the extensions file + if [[ "$crt_type" == 'server' ]] + then + echo "$EASYRSA_EXTRA_EXTS" | + grep -q subjectAltName || + print $(default_server_san "$req_in") + fi + + # Add any advanced extensions supplied by env-var: + [ -n "$EASYRSA_EXTRA_EXTS" ] && print "$EASYRSA_EXTRA_EXTS" + + : # needed to keep die from inherting the above test + } > "$EASYRSA_TEMP_FILE" || die "\ +Failed to create temp extension file (bad permissions?) at: +$EASYRSA_TEMP_FILE" + + # sign request + crt_out_tmp="$(mktemp -u "$crt_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$crt_out_tmp" + "$EASYRSA_OPENSSL" ca -utf8 -in "$req_in" -out "$crt_out_tmp" -config "$EASYRSA_SSL_CONF" \ + -extfile "$EASYRSA_TEMP_FILE" -days $EASYRSA_CERT_EXPIRE -batch $opts \ + || die "signing failed (openssl output above may have more detail)" + mv "$crt_out_tmp" "$crt_out"; EASYRSA_TEMP_FILE_2= + notice "\ +Certificate created at: $crt_out +" + return 0 +} # => sign_req() + +# common build backend +# used to generate+sign in 1 step +build_full() { + verify_ca_init + + # pull filename base: + [ -n "$2" ] || die "\ +Error: didn't find a file base name as the first argument. +Run easyrsa without commands for usage and commands." + local crt_type="$1" name="$2" + local req_out="$EASYRSA_PKI/reqs/$2.req" + local key_out="$EASYRSA_PKI/private/$2.key" + local crt_out="$EASYRSA_PKI/issued/$2.crt" + shift 2 + + # function opts support + local req_opts= + while [ -n "$1" ]; do + case "$1" in + nopass) req_opts="$req_opts nopass" ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + # abort on existing req/key/crt files + local err_exists="\ +file already exists. Aborting build to avoid overwriting this file. +If you wish to continue, please use a different name or remove the file. +Matching file found at: " + [ -f "$req_out" ] && die "Request $err_exists $req_out" + [ -f "$key_out" ] && die "Key $err_exists $key_out" + [ -f "$crt_out" ] && die "Certificate $err_exists $crt_out" + + # create request + EASYRSA_REQ_CN="$name" + gen_req "$name" batch $req_opts + + # Sign it + sign_req "$crt_type" "$name" batch + +} # => build_full() + +# revoke backend +revoke() { + verify_ca_init + + # pull filename base: + [ -n "$1" ] || die "\ +Error: didn't find a file base name as the first argument. +Run easyrsa without commands for usage and command help." + local crt_in="$EASYRSA_PKI/issued/$1.crt" + + verify_file x509 "$crt_in" || die "\ +Unable to revoke as the input file is not a valid certificate. Unexpected +input in file: $crt_in" + + # confirm operation by displaying DN: + confirm "Continue with revocation: " "yes" " +Please confirm you wish to revoke the certificate with the following subject: + +$(display_dn x509 "$crt_in") +" # => confirm end + + # referenced cert must exist: + [ -f "$crt_in" ] || die "\ +Unable to revoke as no certificate was found. Certificate was expected +at: $crt_in" + + "$EASYRSA_OPENSSL" ca -utf8 -revoke "$crt_in" -config "$EASYRSA_SSL_CONF" || die "\ +Failed to revoke certificate: revocation command failed." + + notice "\ +IMPORTANT!!! + +Revocation was successful. You must run gen-crl and upload a CRL to your +infrastructure in order to prevent the revoked cert from being accepted. +" # => notice end + return 0 +} #= revoke() + +# gen-crl backend +gen_crl() { + verify_ca_init + + local out_file="$EASYRSA_PKI/crl.pem" + out_file_tmp="$(mktemp -u "$out_file.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$out_file_tmp" + "$EASYRSA_OPENSSL" ca -utf8 -gencrl -out "$out_file_tmp" -config "$EASYRSA_SSL_CONF" || die "\ +CRL Generation failed. +" + mv "$out_file_tmp" "$out_file"; EASYRSA_TEMP_FILE_2= + + notice "\ +An updated CRL has been created. +CRL file: $out_file +" + return 0 +} # => gen_crl() + +# import-req backend +import_req() { + verify_pki_init + + # pull passed paths + local in_req="$1" short_name="$2" + local out_req="$EASYRSA_PKI/reqs/$2.req" + + [ -n "$short_name" ] || die "\ +Unable to import: incorrect command syntax. +Run easyrsa without commands for usage and command help." + + verify_file req "$in_req" || die "\ +The input file does not appear to be a certificate request. Aborting import. +Offending file: $in_req" + + # destination must not exist + [ -f "$out_req" ] && die "\ +Unable to import the request as the destination file already exists. +Please choose a different name for your imported request file. +Existing file at: $out_req" + + # now import it + cp "$in_req" "$out_req" + + notice "\ +The request has been successfully imported with a short name of: $short_name +You may now use this name to perform signing operations on this request. +" + return 0 +} # => import_req() + +# export pkcs#12 or pkcs#7 +export_pkcs() { + local pkcs_type="$1" + shift + + [ -n "$1" ] || die "\ +Unable to export p12: incorrect command syntax. +Run easyrsa without commands for usage and command help." + + local short_name="$1" + local crt_in="$EASYRSA_PKI/issued/$1.crt" + local key_in="$EASYRSA_PKI/private/$1.key" + local crt_ca="$EASYRSA_PKI/ca.crt" + shift + + verify_pki_init + + # opts support + local want_ca=1 + local want_key=1 + while [ -n "$1" ]; do + case "$1" in + noca) want_ca= ;; + nokey) want_key= ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + local pkcs_opts= + if [ $want_ca ]; then + verify_file x509 "$crt_ca" || die "\ +Unable to include CA cert in the $pkcs_type output (missing file, or use noca option.) +Missing file expected at: $crt_ca" + pkcs_opts="$pkcs_opts -certfile $crt_ca" + fi + + # input files must exist + verify_file x509 "$crt_in" || die "\ +Unable to export $pkcs_type for short name '$short_name' without the certificate. +Missing cert expected at: $crt_in" + + case "$pkcs_type" in + p12) + local pkcs_out="$EASYRSA_PKI/private/$short_name.p12" + + if [ $want_key ]; then + [ -f "$key_in" ] || die "\ +Unable to export p12 for short name '$short_name' without the key +(if you want a p12 without the private key, use nokey option.) +Missing key expected at: $key_in" + else + pkcs_opts="$pkcs_opts -nokeys" + fi + + # export the p12: + "$EASYRSA_OPENSSL" pkcs12 -in "$crt_in" -inkey "$key_in" -export \ + -out "$pkcs_out" $pkcs_opts || die "\ +Export of p12 failed: see above for related openssl errors." + ;; + p7) + local pkcs_out="$EASYRSA_PKI/issued/$short_name.p7b" + + # export the p7: + "$EASYRSA_OPENSSL" crl2pkcs7 -nocrl -certfile "$crt_in" \ + -out "$pkcs_out" $pkcs_opts || die "\ +Export of p7 failed: see above for related openssl errors." + ;; +esac + + notice "\ +Successful export of $pkcs_type file. Your exported file is at the following +location: $pkcs_out +" + return 0 +} # => export_pkcs() + +# set-pass backend +set_pass() { + verify_pki_init + + # key type, supplied internally from frontend command call (rsa/ec) + local key_type="$1" + + # values supplied by the user: + local raw_file="$2" + local file="$EASYRSA_PKI/private/$raw_file.key" + [ -n "$raw_file" ] || die "\ +Missing argument to 'set-$key_type-pass' command: no name/file supplied. +See help output for usage details." + + # parse command options + shift 2 + local crypto="-aes256" + while [ -n "$1" ]; do + case "$1" in + nopass) crypto= ;; + file) file="$raw_file" ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + [ -f "$file" ] || die "\ +Missing private key: expected to find the private key component at: +$file" + + notice "\ +If the key is currently encrypted you must supply the decryption passphrase. +${crypto:+You will then enter a new PEM passphrase for this key.$NL}" + + "$EASYRSA_OPENSSL" $key_type -in "$file" -out "$file" $crypto || die "\ +Failed to change the private key passphrase. See above for possible openssl +error messages." + + notice "Key passphrase successfully changed" + +} # => set_pass() + +# update-db backend +update_db() { + verify_ca_init + + "$EASYRSA_OPENSSL" ca -utf8 -updatedb -config "$EASYRSA_SSL_CONF" || die "\ +Failed to perform update-db: see above for related openssl errors." + return 0 +} # => update_db() + +# display cert DN info on a req/X509, passed by full pathname +display_dn() { + local format="$1" path="$2" + print "$("$EASYRSA_OPENSSL" $format -in "$path" -noout -subject -nameopt multiline)" +} # => display_dn() + +# generate default SAN from req/X509, passed by full pathname +default_server_san() { + local path="$1" + local cn=$( + "$EASYRSA_OPENSSL" req -in "$path" -noout -subject -nameopt sep_multiline | + awk -F'=' '/^ *CN=/{print $2}' + ) + echo "$cn" | egrep -q '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$' + if [[ $? -eq 0 ]] + then + print "subjectAltName = IP:$cn" + else + print "subjectAltName = DNS:$cn" + fi +} # => default_server_san() + +# verify a file seems to be a valid req/X509 +verify_file() { + local format="$1" path="$2" + "$EASYRSA_OPENSSL" $format -in "$path" -noout 2>/dev/null || return 1 + return 0 +} # => verify_file() + +# show-* command backend +# Prints req/cert details in a readable format +show() { + local type="$1" name="$2" in_file format + [ -n "$name" ] || die "\ +Missing expected filename_base argument. +Run easyrsa without commands for usage help." + shift 2 + + # opts support + local opts="-${type}opt no_pubkey,no_sigdump" + while [ -n "$1" ]; do + case "$1" in + full) opts= ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + # Determine cert/req type + if [ "$type" = "cert" ]; then + verify_ca_init + in_file="$EASYRSA_PKI/issued/${name}.crt" + format="x509" + else + verify_pki_init + in_file="$EASYRSA_PKI/reqs/${name}.req" + format="req" + fi + + # Verify file exists and is of the correct type + [ -f "$in_file" ] || die "\ +No such $type file with a basename of '$name' is present. +Expected to find this file at: +$in_file" + verify_file $format "$in_file" || die "\ +This file is not a valid $type file: +$in_file" + + notice "\ +Showing $type details for '$name'. +This file is stored at: +$in_file +" + "$EASYRSA_OPENSSL" $format -in "$in_file" -noout -text\ + -nameopt multiline $opts || die "\ +OpenSSL failure to process the input" +} # => show() + +# vars setup +# Here sourcing of 'vars' if present occurs. If not present, defaults are used +# to support running without a sourced config format +vars_setup() { + # Try to locate a 'vars' file in order of location preference. + # If one is found, source it + local vars= + + # set up program path + local prog_vars="${0%/*}/vars" + # set up PKI path + local pki_vars="${EASYRSA_PKI:-$PWD/pki}/vars" + + # command-line path: + if [ -f "$EASYRSA_VARS_FILE" ]; then + vars="$EASYRSA_VARS_FILE" + # PKI location, if present: + elif [ -f "$pki_vars" ]; then + vars="$pki_vars" + # EASYRSA, if defined: + elif [ -n "$EASYRSA" ] && [ -f "$EASYRSA/vars" ]; then + vars="$EASYRSA/vars" + # program location: + elif [ -f "$prog_vars" ]; then + vars="$prog_vars" + fi + + # If a vars file was located, source it + # If $EASYRSA_NO_VARS is defined (not blank) this is skipped + if [ -z "$EASYRSA_NO_VARS" ] && [ -n "$vars" ]; then + EASYRSA_CALLER=1 . "$vars" + notice "\ +Note: using Easy-RSA configuration from: $vars" + fi + + # Set defaults, preferring existing env-vars if present + set_var EASYRSA "${0%/*}" + set_var EASYRSA_OPENSSL openssl + set_var EASYRSA_PKI "$PWD/pki" + set_var EASYRSA_DN cn_only + set_var EASYRSA_REQ_COUNTRY "US" + set_var EASYRSA_REQ_PROVINCE "California" + set_var EASYRSA_REQ_CITY "San Francisco" + set_var EASYRSA_REQ_ORG "Copyleft Certificate Co" + set_var EASYRSA_REQ_EMAIL me@example.net + set_var EASYRSA_REQ_OU "My Organizational Unit" + set_var EASYRSA_ALGO rsa + set_var EASYRSA_KEY_SIZE 2048 + set_var EASYRSA_CURVE secp384r1 + set_var EASYRSA_EC_DIR "$EASYRSA_PKI/ecparams" + set_var EASYRSA_CA_EXPIRE 3650 + set_var EASYRSA_CERT_EXPIRE 3650 + set_var EASYRSA_CRL_DAYS 180 + set_var EASYRSA_NS_SUPPORT no + set_var EASYRSA_NS_COMMENT "Easy-RSA Generated Certificate" + set_var EASYRSA_TEMP_FILE "$EASYRSA_PKI/extensions.temp" + set_var EASYRSA_TEMP_FILE_2 "" + set_var EASYRSA_TEMP_FILE_3 "" + set_var EASYRSA_REQ_CN ChangeMe + set_var EASYRSA_DIGEST sha256 + + # Detect openssl config, preferring EASYRSA_PKI over EASYRSA + if [ -f "$EASYRSA_PKI/openssl-1.0.cnf" ]; then + set_var EASYRSA_SSL_CONF "$EASYRSA_PKI/openssl-1.0.cnf" + else set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf" + fi + + # Same as above for the x509-types extensions dir + if [ -d "$EASYRSA_PKI/x509-types" ]; then + set_var EASYRSA_EXT_DIR "$EASYRSA_PKI/x509-types" + else set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types" + fi + + # EASYRSA_ALGO_PARAMS must be set depending on selected algo + if [ "ec" = "$EASYRSA_ALGO" ]; then + EASYRSA_ALGO_PARAMS="$EASYRSA_EC_DIR/${EASYRSA_CURVE}.pem" + elif [ "rsa" = "$EASYRSA_ALGO" ]; then + EASYRSA_ALGO_PARAMS="${EASYRSA_KEY_SIZE}" + else + die "Alg '$EASYRSA_ALGO' is invalid: must be 'rsa' or 'ec'" + fi + + # Setting OPENSSL_CONF prevents bogus warnings (especially useful on win32) + export OPENSSL_CONF="$EASYRSA_SSL_CONF" +} # vars_setup() + +# variable assignment by indirection when undefined; merely exports +# the variable when it is already defined (even if currently null) +# Sets $1 as the value contained in $2 and exports (may be blank) +set_var() { + local var=$1 + shift + local value="$*" + eval "export $var=\"\${$var-$value}\"" +} #=> set_var() + +######################################## +# Invocation entry point: + +NL=' +' + +# Be secure with a restrictive umask +[ -z "$EASYRSA_NO_UMASK" ] && umask 077 + +# Parse options +while :; do + # Separate option from value: + opt="${1%%=*}" + val="${1#*=}" + empty_ok= # Empty values are not allowed unless excepted + + case "$opt" in + --days) + export EASYRSA_CERT_EXPIRE="$val" + export EASYRSA_CA_EXPIRE="$val" + export EASYRSA_CRL_DAYS="$val" + ;; + --pki-dir) + export EASYRSA_PKI="$val" ;; + --use-algo) + export EASYRSA_ALGO="$val" ;; + --keysize) + export EASYRSA_KEY_SIZE="$val" ;; + --curve) + export EASYRSA_CURVE="$val" ;; + --dn-mode) + export EASYRSA_DN="$val" ;; + --req-cn) + export EASYRSA_REQ_CN="$val" ;; + --digest) + export EASYRSA_DIGEST="$val" ;; + --req-c) + empty_ok=1 + export EASYRSA_REQ_COUNTRY="$val" ;; + --req-st) + empty_ok=1 + export EASYRSA_REQ_PROVINCE="$val" ;; + --req-city) + empty_ok=1 + export EASYRSA_REQ_CITY="$val" ;; + --req-org) + empty_ok=1 + export EASYRSA_REQ_ORG="$val" ;; + --req-email) + empty_ok=1 + export EASYRSA_REQ_EMAIL="$val" ;; + --req-ou) + empty_ok=1 + export EASYRSA_REQ_OU="$val" ;; + --ns-cert) + export EASYRSA_NS_SUPPORT="$val" ;; + --ns-comment) + empty_ok=1 + export EASYRSA_NS_COMMENT="$val" ;; + --batch) + empty_ok=1 + export EASYRSA_BATCH=1 ;; + --subca-len) + export EASYRSA_SUBCA_LEN="$val" ;; + --vars) + export EASYRSA_VARS_FILE="$val" ;; + --subject-alt-name) + export EASYRSA_EXTRA_EXTS="\ +$EASYRSA_EXTRA_EXTS +subjectAltName = $val" ;; + *) + break ;; + esac + + # fatal error when no value was provided + if [ ! $empty_ok ] && { [ "$val" = "$1" ] || [ -z "$val" ]; }; then + die "Missing value to option: $opt" + fi + + shift +done + +# Intelligent env-var detection and auto-loading: +vars_setup + +# Register clean_temp on EXIT +trap "clean_temp" EXIT + +# determine how we were called, then hand off to the function responsible +cmd="$1" +[ -n "$1" ] && shift # scrape off command +case "$cmd" in + init-pki|clean-all) + init_pki "$@" + ;; + build-ca) + build_ca "$@" + ;; + gen-dh) + gen_dh + ;; + gen-req) + gen_req "$@" + ;; + sign|sign-req) + sign_req "$@" + ;; + build-client-full) + build_full client "$@" + ;; + build-server-full) + build_full server "$@" + ;; + gen-crl) + gen_crl + ;; + revoke) + revoke "$@" + ;; + import-req) + import_req "$@" + ;; + export-p12) + export_pkcs p12 "$@" + ;; + export-p7) + export_pkcs p7 "$@" + ;; + set-rsa-pass) + set_pass rsa "$@" + ;; + set-ec-pass) + set_pass ec "$@" + ;; + update-db) + update_db + ;; + show-req) + show req "$@" + ;; + show-cert) + show cert "$@" + ;; + ""|help|-h|--help|--usage) + cmd_help "$1" + exit 0 + ;; + *) + die "Unknown command '$cmd'. Run without commands for usage help." + ;; +esac + +# vim: ft=sh nu ai sw=8 ts=8 noet diff --git a/vpn/source/easyrsa/gpl-2.0.txt b/vpn/source/easyrsa/gpl-2.0.txt new file mode 100644 index 0000000..1f963da --- /dev/null +++ b/vpn/source/easyrsa/gpl-2.0.txt @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Lesser General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Lesser General +Public License instead of this License. + diff --git a/vpn/source/easyrsa/openssl-1.0.cnf b/vpn/source/easyrsa/openssl-1.0.cnf new file mode 100644 index 0000000..d9109b5 --- /dev/null +++ b/vpn/source/easyrsa/openssl-1.0.cnf @@ -0,0 +1,137 @@ +# For use with Easy-RSA 3.0 and OpenSSL 1.0.* + +RANDFILE = $ENV::EASYRSA_PKI/.rnd + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::EASYRSA_PKI # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir/certs_by_serial # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/private/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = basic_exts # The extentions to add to the cert + +# This allows a V2 CRL. Ancient browsers don't like it, but anything Easy-RSA +# is designed for will. In return, we get the Issuer attached to CRLs. +crl_extensions = crl_ext + +default_days = $ENV::EASYRSA_CERT_EXPIRE # how long to certify for +default_crl_days= $ENV::EASYRSA_CRL_DAYS # how long before next CRL +default_md = $ENV::EASYRSA_DIGEST # use public key default MD +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the 'anything' policy, which defines allowed DN fields +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +# Easy-RSA request handling +# We key off $DN_MODE to determine how to format the DN +[ req ] +default_bits = $ENV::EASYRSA_KEY_SIZE +default_keyfile = privkey.pem +default_md = $ENV::EASYRSA_DIGEST +distinguished_name = $ENV::EASYRSA_DN +x509_extensions = easyrsa_ca # The extentions to add to the self signed cert + +# A placeholder to handle the $EXTRA_EXTS feature: +#%EXTRA_EXTS% # Do NOT remove or change this line as $EXTRA_EXTS support requires it + +#################################################################### +# Easy-RSA DN (Subject) handling + +# Easy-RSA DN for cn_only support: +[ cn_only ] +commonName = Common Name (eg: your user, host, or server name) +commonName_max = 64 +commonName_default = $ENV::EASYRSA_REQ_CN + +# Easy-RSA DN for org support: +[ org ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::EASYRSA_REQ_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::EASYRSA_REQ_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::EASYRSA_REQ_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::EASYRSA_REQ_ORG + +organizationalUnitName = Organizational Unit Name (eg, section) +organizationalUnitName_default = $ENV::EASYRSA_REQ_OU + +commonName = Common Name (eg: your user, host, or server name) +commonName_max = 64 +commonName_default = $ENV::EASYRSA_REQ_CN + +emailAddress = Email Address +emailAddress_default = $ENV::EASYRSA_REQ_EMAIL +emailAddress_max = 64 + +#################################################################### +# Easy-RSA cert extension handling + +# This section is effectively unused as the main script sets extensions +# dynamically. This core section is left to support the odd usecase where +# a user calls openssl directly. +[ basic_exts ] +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always + +# The Easy-RSA CA extensions +[ easyrsa_ca ] + +# PKIX recommendations: + +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always + +# This could be marked critical, but it's nice to support reading by any +# broken clients who attempt to do so. +basicConstraints = CA:true + +# Limit key usage to CA tasks. If you really want to use the generated pair as +# a self-signed cert, comment this out. +keyUsage = cRLSign, keyCertSign + +# nsCertType omitted by default. Let's try to let the deprecated stuff die. +# nsCertType = sslCA + +# CRL extensions. +[ crl_ext ] + +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + diff --git a/vpn/source/easyrsa/vars.example b/vpn/source/easyrsa/vars.example new file mode 100644 index 0000000..6f0bc1f --- /dev/null +++ b/vpn/source/easyrsa/vars.example @@ -0,0 +1,209 @@ +# Easy-RSA 3 parameter settings + +# NOTE: If you installed Easy-RSA from your distro's package manager, don't edit +# this file in place -- instead, you should copy the entire easy-rsa directory +# to another location so future upgrades don't wipe out your changes. + +# HOW TO USE THIS FILE +# +# vars.example contains built-in examples to Easy-RSA settings. You MUST name +# this file 'vars' if you want it to be used as a configuration file. If you do +# not, it WILL NOT be automatically read when you call easyrsa commands. +# +# It is not necessary to use this config file unless you wish to change +# operational defaults. These defaults should be fine for many uses without the +# need to copy and edit the 'vars' file. +# +# All of the editable settings are shown commented and start with the command +# 'set_var' -- this means any set_var command that is uncommented has been +# modified by the user. If you're happy with a default, there is no need to +# define the value to its default. + +# NOTES FOR WINDOWS USERS +# +# Paths for Windows *MUST* use forward slashes, or optionally double-esscaped +# backslashes (single forward slashes are recommended.) This means your path to +# the openssl binary might look like this: +# "C:/Program Files/OpenSSL-Win32/bin/openssl.exe" + +# A little housekeeping: DON'T EDIT THIS SECTION +# +# Easy-RSA 3.x doesn't source into the environment directly. +# Complain if a user tries to do this: +if [ -z "$EASYRSA_CALLER" ]; then + echo "You appear to be sourcing an Easy-RSA 'vars' file." >&2 + echo "This is no longer necessary and is disallowed. See the section called" >&2 + echo "'How to use this file' near the top comments for more details." >&2 + return 1 +fi + +# DO YOUR EDITS BELOW THIS POINT + +# This variable should point to the top level of the easy-rsa tree. By default, +# this is taken to be the directory you are currently in. + +set_var EASYRSA "`pwd`" + +# If your OpenSSL command is not in the system PATH, you will need to define the +# path to it here. Normally this means a full path to the executable, otherwise +# you could have left it undefined here and the shown default would be used. +# +# Windows users, remember to use paths with forward-slashes (or escaped +# back-slashes.) Windows users should declare the full path to the openssl +# binary here if it is not in their system PATH. + +#set_var EASYRSA_OPENSSL "openssl" +# +# This sample is in Windows syntax -- edit it for your path if not using PATH: +#set_var EASYRSA_OPENSSL "C:/Program Files/OpenSSL-Win32/bin/openssl.exe" + +# Edit this variable to point to your soon-to-be-created key directory. +# +# WARNING: init-pki will do a rm -rf on this directory so make sure you define +# it correctly! (Interactive mode will prompt before acting.) + +#set_var EASYRSA_PKI "$EASYRSA/pki" + +# Define X509 DN mode. +# This is used to adjust what elements are included in the Subject field as the DN +# (this is the "Distinguished Name.") +# Note that in cn_only mode the Organizational fields further below aren't used. +# +# Choices are: +# cn_only - use just a CN value +# org - use the "traditional" Country/Province/City/Org/OU/email/CN format + +set_var EASYRSA_DN "org" + +# Organizational fields (used with 'org' mode and ignored in 'cn_only' mode.) +# These are the default values for fields which will be placed in the +# certificate. Don't leave any of these fields blank, although interactively +# you may omit any specific field by typing the "." symbol (not valid for +# email.) + +set_var EASYRSA_REQ_COUNTRY "%%RSA_COUNTRY%%" +set_var EASYRSA_REQ_PROVINCE "%%RSA_PROVINCE%%" +set_var EASYRSA_REQ_CITY "%%RSA_CITY%%" +set_var EASYRSA_REQ_ORG "%%RSA_COMPANY%%" +set_var EASYRSA_REQ_EMAIL "%%RSA_EMAIL%%" +set_var EASYRSA_REQ_OU "%%RSA_COMPANY_UNIT%%" + +#set_var EASYRSA_REQ_COUNTRY "US" +#set_var EASYRSA_REQ_PROVINCE "California" +#set_var EASYRSA_REQ_CITY "San Francisco" +#set_var EASYRSA_REQ_ORG "Copyleft Certificate Co" +#set_var EASYRSA_REQ_EMAIL "me@example.net" +#set_var EASYRSA_REQ_OU "My Organizational Unit" + + +# Choose a size in bits for your keypairs. The recommended value is 2048. Using +# 2048-bit keys is considered more than sufficient for many years into the +# future. Larger keysizes will slow down TLS negotiation and make key/DH param +# generation take much longer. Values up to 4096 should be accepted by most +# software. Only used when the crypto alg is rsa (see below.) + +set_var EASYRSA_KEY_SIZE 2048 + +# The default crypto mode is rsa; ec can enable elliptic curve support. +# Note that not all software supports ECC, so use care when enabling it. +# Choices for crypto alg are: (each in lower-case) +# * rsa +# * ec + +#set_var EASYRSA_ALGO rsa + +# Define the named curve, used in ec mode only: + +#set_var EASYRSA_CURVE secp384r1 + +# In how many days should the root CA key expire? + +#set_var EASYRSA_CA_EXPIRE 3650 +set_var EASYRSA_CA_EXPIRE %%CA_EXPIRE_DAYS%% + +# In how many days should certificates expire? + +#set_var EASYRSA_CERT_EXPIRE 3650 +set_var EASYRSA_CERT_EXPIRE %%CERT_EXPIRE_DAYS%% + +# How many days until the next CRL publish date? Note that the CRL can still be +# parsed after this timeframe passes. It is only used for an expected next +# publication date. + +#set_var EASYRSA_CRL_DAYS 180 + +# Support deprecated "Netscape" extensions? (choices "yes" or "no".) The default +# is "no" to discourage use of deprecated extensions. If you require this +# feature to use with --ns-cert-type, set this to "yes" here. This support +# should be replaced with the more modern --remote-cert-tls feature. If you do +# not use --ns-cert-type in your configs, it is safe (and recommended) to leave +# this defined to "no". When set to "yes", server-signed certs get the +# nsCertType=server attribute, and also get any NS_COMMENT defined below in the +# nsComment field. + +#set_var EASYRSA_NS_SUPPORT "no" + +# When NS_SUPPORT is set to "yes", this field is added as the nsComment field. +# Set this blank to omit it. With NS_SUPPORT set to "no" this field is ignored. + +#set_var EASYRSA_NS_COMMENT "Easy-RSA Generated Certificate" + +# A temp file used to stage cert extensions during signing. The default should +# be fine for most users; however, some users might want an alternative under a +# RAM-based FS, such as /dev/shm or /tmp on some systems. + +#set_var EASYRSA_TEMP_FILE "$EASYRSA_PKI/extensions.temp" + +# !! +# NOTE: ADVANCED OPTIONS BELOW THIS POINT +# PLAY WITH THEM AT YOUR OWN RISK +# !! + +# Broken shell command aliases: If you have a largely broken shell that is +# missing any of these POSIX-required commands used by Easy-RSA, you will need +# to define an alias to the proper path for the command. The symptom will be +# some form of a 'command not found' error from your shell. This means your +# shell is BROKEN, but you can hack around it here if you really need. These +# shown values are not defaults: it is up to you to know what you're doing if +# you touch these. +# +#alias awk="/alt/bin/awk" +#alias cat="/alt/bin/cat" + +# X509 extensions directory: +# If you want to customize the X509 extensions used, set the directory to look +# for extensions here. Each cert type you sign must have a matching filename, +# and an optional file named 'COMMON' is included first when present. Note that +# when undefined here, default behaviour is to look in $EASYRSA_PKI first, then +# fallback to $EASYRSA for the 'x509-types' dir. You may override this +# detection with an explicit dir here. +# +#set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types" + +# OpenSSL config file: +# If you need to use a specific openssl config file, you can reference it here. +# Normally this file is auto-detected from a file named openssl-1.0.cnf from the +# EASYRSA_PKI or EASYRSA dir (in that order.) NOTE that this file is Easy-RSA +# specific and you cannot just use a standard config file, so this is an +# advanced feature. + +#set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf" + +# Default CN: +# This is best left alone. Interactively you will set this manually, and BATCH +# callers are expected to set this themselves. + +#set_var EASYRSA_REQ_CN "ChangeMe" + +# Cryptographic digest to use. +# Do not change this default unless you understand the security implications. +# Valid choices include: md5, sha1, sha256, sha224, sha384, sha512 + +#set_var EASYRSA_DIGEST "sha256" + +# Batch mode. Leave this disabled unless you intend to call Easy-RSA explicitly +# in batch mode without any user input, confirmation on dangerous operations, +# or most output. Setting this to any non-blank string enables batch mode. + +#set_var EASYRSA_BATCH "" + diff --git a/vpn/source/easyrsa/x509-types/COMMON b/vpn/source/easyrsa/x509-types/COMMON new file mode 100644 index 0000000..3e9b633 --- /dev/null +++ b/vpn/source/easyrsa/x509-types/COMMON @@ -0,0 +1,7 @@ +# X509 extensions added to every signed cert + +# This file is included for every cert signed, and by default does nothing. +# It could be used to add values every cert should have, such as a CDP as +# demonstrated in the following example: + +#crlDistributionPoints = URI:http://example.net/pki/my_ca.crl diff --git a/vpn/source/easyrsa/x509-types/ca b/vpn/source/easyrsa/x509-types/ca new file mode 100644 index 0000000..ef525b6 --- /dev/null +++ b/vpn/source/easyrsa/x509-types/ca @@ -0,0 +1,13 @@ +# X509 extensions for a ca + +# Note that basicConstraints will be overridden by Easy-RSA when defining a +# CA_PATH_LEN for CA path length limits. You could also do this here +# manually as in the following example in place of the existing line: +# +# basicConstraints = CA:TRUE, pathlen:1 + +basicConstraints = CA:TRUE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid:always,issuer:always +keyUsage = cRLSign, keyCertSign + diff --git a/vpn/source/easyrsa/x509-types/client b/vpn/source/easyrsa/x509-types/client new file mode 100644 index 0000000..a7d81af --- /dev/null +++ b/vpn/source/easyrsa/x509-types/client @@ -0,0 +1,8 @@ +# X509 extensions for a client + +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always +extendedKeyUsage = clientAuth +keyUsage = digitalSignature + diff --git a/vpn/source/easyrsa/x509-types/san b/vpn/source/easyrsa/x509-types/san new file mode 100644 index 0000000..6c5bfc8 --- /dev/null +++ b/vpn/source/easyrsa/x509-types/san @@ -0,0 +1,2 @@ +[ san ] +subjectAltName=${ENV::SAN} diff --git a/vpn/source/easyrsa/x509-types/server b/vpn/source/easyrsa/x509-types/server new file mode 100644 index 0000000..bc024be --- /dev/null +++ b/vpn/source/easyrsa/x509-types/server @@ -0,0 +1,8 @@ +# X509 extensions for a server + +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always +extendedKeyUsage = serverAuth +keyUsage = digitalSignature,keyEncipherment + diff --git a/vpn/testserver/conf/dks-laptop-test.ovpn b/vpn/testserver/conf/dks-laptop-test.ovpn new file mode 100644 index 0000000..a06bf8d --- /dev/null +++ b/vpn/testserver/conf/dks-laptop-test.ovpn @@ -0,0 +1,17 @@ +client +dev tun +proto udp +remote VPN-TestServer 1196 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca ca.crt +cert dks-laptop-test.crt +key dks-laptop-test.key +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC + diff --git a/vpn/testserver/conf/dks-laptop-test2.ovpn b/vpn/testserver/conf/dks-laptop-test2.ovpn new file mode 100644 index 0000000..7c2a2f1 --- /dev/null +++ b/vpn/testserver/conf/dks-laptop-test2.ovpn @@ -0,0 +1,17 @@ +client +dev tun +proto udp +remote VPN-TestServer 1196 +resolv-retry infinite +nobind +persist-key +persist-tun +mute-replay-warnings +ca ca.crt +cert dks-laptop-test2.crt +key dks-laptop-test2.key +comp-lzo +verb 3 +mute 20 +cipher AES-256-CBC + diff --git a/vpn/testserver/conf/ipp.txt b/vpn/testserver/conf/ipp.txt new file mode 100644 index 0000000..e69de29 diff --git a/vpn/testserver/conf/testserver.conf b/vpn/testserver/conf/testserver.conf new file mode 100644 index 0000000..d7433f6 --- /dev/null +++ b/vpn/testserver/conf/testserver.conf @@ -0,0 +1,24 @@ +port 1196 +proto udp +dev tun +ca /home/dks/vpn/testserver/keys/ca.crt +cert /home/dks/vpn/testserver/keys/issued/testserver.crt +key /home/dks/vpn/testserver/keys/private/testserver.key +dh /home/dks/vpn/testserver/keys/dh.pem +user dks +group dks +server 10.10.1.0 255.255.255.0 +ifconfig-pool-persist /homme/dks/vpn/testserver/conf/ipp.txt +client-to-client +keepalive 10 120 +comp-lzo +max-clients 300 +persist-key +persist-tun +status /home/dks/vpn/testserver/log/status.log +log /home/dks/vpn/testserver/log/openvpn.log +verb 3 +mute 20 +management localhost 7507 +cipher AES-256-CBC + diff --git a/vpn/testserver/easyrsa/COPYING.md b/vpn/testserver/easyrsa/COPYING.md new file mode 100644 index 0000000..39bce08 --- /dev/null +++ b/vpn/testserver/easyrsa/COPYING.md @@ -0,0 +1,33 @@ +Easy-RSA -- A Shell-based CA Utility +==================================== + +Copyright (C) 2013 by the Open-Source OpenVPN development community + +Easy-RSA 3 license: GPLv2 +------------------------- + +All the Easy-RSA code contained in this project falls under a GPLv2 license with +full text available in the Licensing/ directory. Additional components used by +this project fall under additional licenses: + +Additional licenses for external components +------------------------------------------- + +The following components are under different licenses; while not part of the +Easy-RSA source code, these components are used by Easy-RSA or provided in +platform distributions as described below: + +### OpenSSL + + OpenSSL is not linked by Easy-RSA, nor is it currently provided in any release + package by Easy-RSA. However, Easy-RSA is tightly coupled with OpenSSL, so + effective use of this code will require your acceptance and installation of + OpenSSL. + +### Additional Windows Components + + The Windows binary package includes mksh/Win32 and unxutils binary components, + with full licensing details available in the distro/windows/Licensing/ + subdirectory of this project. mksh/Win32 is under a MirOS license (with some + additional component licenses present there) and unxutils is under a GPLv2 + license. diff --git a/vpn/testserver/easyrsa/ChangeLog b/vpn/testserver/easyrsa/ChangeLog new file mode 100644 index 0000000..911950d --- /dev/null +++ b/vpn/testserver/easyrsa/ChangeLog @@ -0,0 +1,78 @@ +Easy-RSA 3 ChangeLog + +3.0.0 (2015-09-07) + + * cab4a07 Fix typo: Hellman + (ljani: Github) + + * 171834d Fix typo: Default + (allo-: Github) + + * 8b42eea Make aes256 default, replacing 3des + (keros: Github) + + * f2f4ac8 Make -utf8 default + (roubert: Github) + + +3.0.0-rc2 (2014/07/27) + + * 1551e5f docs: fix typo + (Josh Cepek ) + + * 7ae44b3 Add KNOWN_ISSUES to stage next -rc release + (Josh Cepek ) + + * a0d58b2 Update documentation + (Josh Cepek ) + + * 5758825 Fix vars.example with proper path to extensions.temp + (Josh Cepek ) + + * 89f369c Add support to change private key passphrases + (Josh Cepek ) + + * 49d7c10 Improve docs: add Upgrade-Notes; add online support refs + (Josh Cepek ) + + * fcc4547 Add build-dist packaging script; update Building docs + (Josh Cepek ) + + * f74d08e docs: update Hacking.md with layout & git conventions + (Josh Cepek ) + + * 0754f23 Offload temp file removal to a clean_temp() function + (Josh Cepek ) + + * 1c90df9 Fix incorrect handling of invalid --use-algo option + (Josh Cepek ) + + * c86289b Fix batch-mode handling with changes in e75ad75 + (Josh Cepek ) + + * e75ad75 refine how booleans are evaluated + (Eric F Crist ) + + * cc19823 Merge PKCS#7 feature from pull req #14 + (Author: Luiz Angelo Daros de Luca ) + (Modified-By: Josh Cepek ) + + * 8b1fe01 Support OpenSSL-0.9.8 with the EXTRA_EXTS feature + (Josh Cepek ) + + * d5516d5 Windows: make builds easier by using a matching dir structure + (Josh Cepek ) + + * dc2e6dc Windows: improve external checks and env-var help + (Josh Cepek ) + +3.0.0-rc1 (2013/12/01) + + * The 3.x release is a nearly complete re-write of the 2.x codebase + + * Initial 3.x series code by Josh Cepek -- continuing + maintenance by the OpenVPN community development team and associated + contributors + + * Add ECDSA (elliptic curve) support, thanks to Steffan Karger + diff --git a/vpn/testserver/easyrsa/README.quickstart.md b/vpn/testserver/easyrsa/README.quickstart.md new file mode 100644 index 0000000..8fb0a2e --- /dev/null +++ b/vpn/testserver/easyrsa/README.quickstart.md @@ -0,0 +1,100 @@ +Easy-RSA 3 Quickstart README +============================ + +This is a quickstart guide to using Easy-RSA version 3. Detailed help on usage +and specific commands by running easyrsa with the 'help' command. Additional +documentation can be found in the doc/ directory. + +If you're upgrading from the Easy-RSA 2.x series there are Upgrade-Notes +available, also under the doc/ path. + +Setup and signing the first request +----------------------------------- + +A quick run-though of what needs to happen to start a new PKI and sign your +first entity certificate. + +1. Choose a system to act as your CA and create a new PKI and CA: + + ./easyrsa init-pki + ./easyrsa build-ca + +2. On the system that is requesting a certificate, init its own PKI and generate + a keypair/request. Note that the init-pki is used _only_ when this is done on + a separate system (or at least a separate PKI dir.) This is the recommended + procedure. If you are not using this recommended procedure, skip the next + import-req step as well. + + ./easyrsa init-pki + ./easyrsa gen-req EntityName + +3. Transport the request (.req file) to the CA system and import it. The name + given here is arbitrary and only used to name the request file. + + ./easyrsa import-req /tmp/path/to/import.req EntityName + +4. Sign the request as the correct type. This example uses a client type: + + ./easyrsa sign-req client EntityName + +5. Transport the newly signed certificate to the requesting entity. This entity + may also need the CA cert (ca.crt) unless it had a prior copy. + +6. The entity now has its own keypair, and signed cert, and the CA. + +Signing subsequent requests +--------------------------- + +Follow steps 2-6 above to generate subsequent keypairs and have the CA returned +signed certificates. + +Revoking certs and creating CRLs +-------------------------------- + +This is a CA-specific task. + +To permanently revoke an issued certificate, provide the short name used during +import: + + ./easyrsa revoke EntityName + +To create an updated CRL that contains all revoked certs up to that point: + + ./easyrsa gen-crl + +After generation, the CRL will need to be sent to systems that reference it. + +Generating Diffie-Hellman (DH) params +------------------------------------- + +After initializing a PKI, any entity can create DH params that needs them. This +is normally only used by a TLS server. While the CA PKI can generate this, it +makes more sense to do it on the server itself to avoid the need to send the +files to another system after generation. + +DH params can be generated with: + + ./easyrsa gen-dh + +Showing details of requests or certs +------------------------------------ + +To show the details of a request or certificate by referencing the short +EntityName, use one of the following commands. It is an error to call these +without a matching file. + + ./easyrsa show-req EntityName + ./easyrsa show-cert EntityName + +Changing private key passphrases +-------------------------------- + +RSA and EC private keys can be re-encrypted so a new passphrase can be supplied +with one of the following commands depending on the key type: + + ./easyrsa set-rsa-pass EntityName + + ./easyrsa set-ec-pass EntityName + +Optionally, the passphrase can be removed completely with the 'nopass' flag. +Consult the command help for details. diff --git a/vpn/testserver/easyrsa/doc/EasyRSA-Advanced.md b/vpn/testserver/easyrsa/doc/EasyRSA-Advanced.md new file mode 100644 index 0000000..1bd8c29 --- /dev/null +++ b/vpn/testserver/easyrsa/doc/EasyRSA-Advanced.md @@ -0,0 +1,115 @@ +Easy-RSA Advanced Reference +============================= + +This is a technical reference for advanced users familiar with PKI processes. If +you need a more detailed description, see the `EasyRSA-Readme` or `Intro-To-PKI` +docs instead. + +Configuration Reference +----------------------- + +#### Configuration Sources + + There are 3 possible ways to perform external configuration of Easy-RSA, + selected in the following order where the first defined result wins: + + 1. Commmand-line option + 2. Environmental variable + 3. 'vars' file, if one is present (see `vars Autodetection` below) + 4. Built-in default + + Note that not every possible config option can be set everywhere, although any + env-var can be added to the 'vars' file even if it's not shown by default. + +#### vars Autodetection + + A 'vars' file is a file named simply `vars` (without an extension) that + Easy-RSA will source for configuration. This file is specifically designed + *not* to replace variables that have been set with a higher-priority method + such as CLI opts or env-vars. + + The following locations are checked, in this order, for a vars file. Only the + first one found is used: + + 1. File referenced by the --vars CLI option + 2. The file referenced by the env-var named `EASYRSA_VARS_FILE` + 3. The `EASYRSA_PKI` directory + 4. The default PKI directory at $PWD/pki (usually will be the same as above) + 4. The `EASYRSA` directory + 5. The location of the easyrsa program (usually will be the same as above) + + Defining the env-var `EASYRSA_NO_VARS` will override the sourcing of the vars + file in all cases, including defining it subsequently as a global option. + +#### OpenSSL Config + + Easy-RSA is tightly coupled to the OpenSSL config file (.cnf) for the + flexibility the script provides. It is required that this file be available, + yet it is possible to use a different OpenSSL config file for a particular + PKI, or even change it for a particular invocation. + + The OpenSSL config file is searched for in the following order: + + 1. The env-var `EASYRSA_SSL_CONF` + 2. The 'vars' file (see `vars Autodetection` above) + 3. The `EASYRSA_PKI` directory with a filename of `openssl-1.0.cnf` + 4. The `EASYRSA` directory with a filename of `openssl-1.0.cnf` + +Advanced extension handling +--------------------------- + +Normally the cert extensions are selected by the cert type given on the CLI +during signing; this causes the matching file in the x509-types subdirectory to +be processed for OpenSSL extensions to add. This can be overridden in a +particular PKI by placing another x509-types dir inside the `EASYRSA_PKI` dir +which will be used instead. + +The file named `COMMON` in the x509-types dir is appended to every cert type; +this is designed for CDP usage, but can be used for any extension that should +apply to every signed cert. + +Additionally, the contents of the env-var `EASYRSA_EXTRA_EXTS` is appended with +its raw text added to the OpenSSL extensions. The contents are appended as-is to +the cert extensions; invalid OpenSSL configs will usually result in failure. + +Environmental Variables Reference +--------------------------------- + +A list of env-vars, any matching global option (CLI) to set/override it, and a +possible terse description is shown below: + + * `EASYRSA` - should point to the Easy-RSA top-level dir, normally $PWD + * `EASYRSA_OPENSSL` - command to invoke openssl + * `EASYRSA_SSL_CONF` - the openssl config file to use + * `EASYRSA_PKI` (CLI: `--pki-dir`) - dir to use to hold all PKI-specific files, normally $PWD/pki. + * `EASYRSA_DN` (CLI: `--dn-mode`) - set to the string `cn_only` or `org` to + alter the fields to include in the req DN + * `EASYRSA_REQ_COUNTRY` (CLI: `--req-c`) - set the DN country with org mode + * `EASYRSA_REQ_PROVINCE` (CLI: `--req-st`) - set the DN state/province with + org mode + * `EASYRSA_REQ_CITY` (CLI: `--req-city`) - set the DN city/locality with org + mode + * `EASYRSA_REQ_ORG` (CLI: `--req-org`) - set the DN organization with org mode + * `EASYRSA_REQ_EMAIL` (CLI: `--req-email`) - set the DN email with org mode + * `EASYRSA_REQ_OU` (CLI: `--req-ou`) - set the DN organizational unit with org + mode + * `EASYRSA_KEY_SIZE` (CLI: `--key-size`) - set the keysize in bits to generate + * `EASYRSA_ALGO` (CLI: `--use-algo`) - set the crypto alg to use: rsa or ec + * `EASYRSA_CURVE` (CLI: `--curve`) - define the named EC curve to use + * `EASYRSA_EC_DIR` - dir to store generated ecparams + * `EASYRSA_CA_EXPIRE` (CLI: `--days`) - set the CA expiration time in days + * `EASYRSA_CERT_EXPIRE` (CLI: `--days`) - set the issued cert expiration time + in days + * `EASYRSA_CRL_DAYS` (CLI: `--days`) - set the CRL 'next publish' time in days + * `EASYRSA_NS_SUPPORT` (CLI: `--ns-cert`) - string 'yes' or 'no' fields to + include the deprecated Netscape extensions + * `EASYRSA_NS_COMMENT` (CLI: `--ns-comment`) - string comment to include when + using the deprecated Netscape extensions + * `EASYRSA_TEMP_FILE` - a temp file to use when dynamically creating req/cert + extensions + * `EASYRSA_REQ_CN` (CLI: `--req-cn`) - default CN, necessary to set in BATCH + mode + * `EASYRSA_DIGEST` (CLI: `--digest`) - set a hash digest to use for req/cert + signing + * `EASYRSA_BATCH` (CLI: `--batch`) - enable batch (no-prompt) mode; set + env-var to non-zero string to enable (CLI takes no options) diff --git a/vpn/testserver/easyrsa/doc/EasyRSA-Readme.md b/vpn/testserver/easyrsa/doc/EasyRSA-Readme.md new file mode 100644 index 0000000..bece589 --- /dev/null +++ b/vpn/testserver/easyrsa/doc/EasyRSA-Readme.md @@ -0,0 +1,235 @@ +Easy-RSA 3 Documentation Readme +=============================== + +This document explains how Easy-RSA 3 and each of its assorted features work. + +If you are looking for a quickstart with less background or detail, an +implementation-specific Howto or Readme may be available in this (the `doc/`) +directory. + +Easy-RSA Overview +----------------- + +Easy-RSA is a utility for managing X.509 PKI, or Public Key Infrastructure. A +PKI is based on the notion of trusting a particular authority to authenticate a +remote peer; for more background on how PKI works, see the `Intro-To-PKI` +document. + +The code is written in platform-neutral POSIX shell, allowing use on a wide +range of host systems. The official Windows release also comes bundled with the +programs necessary to use Easy-RSA. The shell code attempts to limit the number +of external programs it depends on. Crypto-related tasks use openssl as the +functional backend. + +Feature Highlights +------------------ + +Here's a non-exhaustive list of the more notable Easy-RSA features: + + * Easy-RSA is able to manage multiple PKIs, each with their own independent + configuration, storage directory, and X.509 extension handling. + * Multiple Subject Name (X.509 DN field) formatting options are supported. For + VPNs, this means a cleaner commonName only setup can be used. + * A single backend is used across all supported platforms, ensuring that no + platform is 'left out' of the rich features. Unix-alikes (BSD, Linux, etc) + and Windows are all supported. + * Easy-RSA's X.509 support includes CRL, CDP, keyUsage/eKu attributes, and + additional features. The included support can be changed or extended as an + advanced feature. + * Interactive and automated (batch) modes of operation + * Flexible configuration: features can be enabled through command-line + options, environment variables, a config file, or a combination of these. + * Built-in defaults allow Easy-RSA to be used without first editing a config + file. + +Obtaining and Using Easy-RSA +---------------------------- + +#### Download and extraction (installation) + + Easy-RSA's main program is a script, supported by a couple of config files. As + such, there is no formal "installation" required. Preparing to use Easy-RSA is + as simple as downloading the compressed package (.tar.gz for Linux/Unix or + .zip for Windows) and extract it to a location of your choosing. There is no + compiling or OS-dependent setup required. + + You should install and run Easy-RSA as a non-root (non-Administrator) account + as root access is not required. + +#### Running Easy-RSA + + Invoking Easy-RSA is done through your preferred shell. Under Windows, you + will use the `EasyRSA Start.bat` program to provide a POSIX-shell environment + suitable for using Easy-RSA. + + The basic format for running commands is: + + ./easyrsa command [ cmd-opts ] + + where `command` is the name of a command to run, and `cmd-opts` are any + options to supply to the command. Some commands have mandatory or optional + cmd-opts. Note the leading `./` component of the command: this is required in + Unix-like environments and may be a new concept to some Windows users. + + General usage and command help can be shown with: + + ./easyrsa help [ command ] + + When run without any command, general usage and a list of available commands + are shown; when a command is supplied, detailed help output for that command + is shown. + +Configuring Easy-RSA +-------------------- + +Easy-RSA 3 no longer needs any configuration file prior to operation, unlike +earlier versions. However, the `vars.example` file contains many commented +options that can be used to control non-default behavior as required. Reading +this file will provide an idea of the basic configuration available. Note that +a vars file must be named just `vars` (without an extension) to actively use it. + +Additionally, some options can be defined at runtime with options on the +command-line. A full list can be shown with: + + ./easyrsa help options + +Any of these options can appear before the command as required as shown below: + + ./easyrsa [options] command [ cmd-opts ] + +For experts, additional configuration flexibility is available by way of +env-vars and custom X.509 extensions. Consult the `EasyRSA-Advanced` +documentation for details + +Getting Started: The Basics +--------------------------- + +Some of the terms used here will be common to those familiar with how PKI works. +Instead of describing PKI basics, please consult the document `Intro-To-PKI` if +you need a more basic description of how a PKI works. + +#### Creating an Easy-RSA PKI + + In order to do something useful, Easy-RSA needs to first initialize a + directory for the PKI. Multiple PKIs can be managed with a single installation + of Easy-RSA, but the default directory is called simply "pki" unless otherwise + specified. + + To create or clear out (re-initialize) a new PKI, use the command: + + ./easyrsa init-pki + + which will create a new, blank PKI structure ready to be used. Once created, + this PKI can be used to make a new CA or generate keypairs. + +#### The PKI Directory Structure + + An Easy-RSA PKI contains the following directory structure: + + * private/ - dir with private keys generated on this host + * reqs/ - dir with locally generated certificate requests (for a CA imported + requests are stored here) + + In a clean PKI no files will exist until, just the bare directories. Commands + called later will create the necessary files depending on the operation. + + When building a CA, a number of new files are created by a combination of + Easy-RSA and (indirectly) openssl. The important CA files are: + + * `ca.crt` - This is the CA certificate + * `index.txt` - This is the "master database" of all issued certs + * `serial` - Stores the next serial number (serial numbers increment) + * `private/ca.key` - This is the CA private key (security-critical) + * `certs_by_serial/` - dir with all CA-signed certs by serial number + * `issued/` - dir with issued certs by commonName + +#### After Creating a PKI + + Once you have created a PKI, the next useful step will be to either create a + CA, or generate keypairs for a system that needs them. Continue with the + relevant section below. + +Using Easy-RSA as a CA +---------------------- + +#### Building the CA + + In order to sign requests to produce certificates, you need a CA. To create a + new CA in a PKI you have created, run: + + ./easyrsa build-ca + + Be sure to use a strong passphrase to protect the CA private key. Note that + you must supply this passphrase in the future when performing signing + operations with your CA, so be sure to remember it. + + During the creation process, you will also select a name for the CA called the + Common Name (CN.) This name is purely for display purposes and can be set as + you like. + +#### Importing requests to the CA + + Once a CA is built, the PKI is intended to be used to import requests from + external systems that are requesting a signed certificate from this CA. In + order to sign the request, it must first be imported so Easy-RSA knows about + it. This request file must be a standard CSR in PKCS#10 format. + + Regardless of the file name to import, Easy-RSA uses a "short name" defined + during import to refer to this request. Importing works like this: + + ./easyrsa import-req /path/to/request.req nameOfRequest + + The nameOfRequest should normally refer to the system or person making the + request. + +#### Signing a request + + Once Easy-RSA has imported a request, it can be reviewed and signed. Every + certificate needs a "type" which controls what extensions the certificate gets + Easy-RSA ships with 3 possible types: `client`, `server`, and `ca`, described + below: + + * client - A TLS client, suitable for a VPN user or web browser (web client) + * server - A TLS server, suitable for a VPN or web server + * ca - A subordinate CA, used when chaining multiple CAs together + + Additional types of certs may be defined by local sites as needed; see the + advanced documentation for details. + +#### Revoking and publishing CRLs + + If an issue certificate needs to be revoked, this can be done as follows: + + ./easyrsa revoke nameOfRequest + + To generate a CRL suitable for publishing to systems that use it, run: + + ./easyrsa gen-crl + + Note that this will need to be published or sent to systems that rely on an + up-to-date CRL as the certificate is still otherwise valid. + +Using Easy-RSA to generate keypairs & requests +---------------------------------------------- + +Easy-RSA can generate a keypair and certificate request in PKCS#10 format. This +request is what a CA needs in order to generate and return a signed certificate. + +Ideally you should never generate entity keypairs for a client or server in a +PKI you are using for your CA. It is best to separate this process and generate +keypairs only on the systems you plan to use them. + +Easy-RSA can generate a keypair and request with the following command: + + ./easyrsa gen-req nameOfRequest + +You will then be given a chance to modify the Subject details of your request. +Easy-RSA uses the short name supplied on the command-line by default, though you +are free to change it if necessary. After providing a passphrase and Subject +details, the keypair and request files will be shown. + +In order to obtain a signed certificate, the request file must be sent to the +CA for signing; this step is obviously not required if a single PKI is used as +both the CA and keypair/request generation as the generated request is already +"imported." + diff --git a/vpn/testserver/easyrsa/doc/EasyRSA-Upgrade-Notes.md b/vpn/testserver/easyrsa/doc/EasyRSA-Upgrade-Notes.md new file mode 100644 index 0000000..6cc6df2 --- /dev/null +++ b/vpn/testserver/easyrsa/doc/EasyRSA-Upgrade-Notes.md @@ -0,0 +1,58 @@ +Upgrading to Easy-RSA 3 from earlier versions +========= + +People upgrading to Easy-RSA 3 from a 2.x version should note some important +changes starting with version 3. For a better overview of version 3 in general, +see the Readme in the doc/ directory. + +List of important changes +---- + + * nsCertType extensions are no longer included by default. Use of such + "Netscape" attributes have been deprecated upstream and their use is + discouraged. Configure `EASYRSA_NS_SUPPORT` in vars if you want to enable + this legacy behavior. + + Notably, this is important for OpenVPN deployments relying on the + `--ns-cert-type` directive. Either have OpenVPN use the preferred + `--remote-cert-tls` option, or enable legacy NS extensions. + + * The default request Subject (or DN, Distinguished Name) includes just the + commonName. This is more suitable for VPNs and environments that don't wish + to include info about the Country/State/City/Org/OU in certs. Configure + `EASYRSA_DN` in vars if you want to enable the legacy behavior. + + * The 3.0 release lacks PKCS#11 (smartcard/token) support. This is anticipated + to be supported in a future point-release to target each platform's need. + + * The -utf8 option has been added for all supported commands. This should be + backwards compatible with ASCII strings. + + * The default private key encryption has been changed from 3des to aes256. + + +Some new concepts +---- + +Easy-RSA 3 has some new concepts compared to the prior v2 series. + +### Request-Import-Sign workflow + + v3 is now designed to support keypairs generated on the target system where + they will be used, thus improving security as no keys need to be transferred + between hosts. The old workflow of generating everything in a single PKI is + still supported as well. + + The recommended workflow when using Easy-RSA as a CA is to import requests, + sign them, and return the issued & CA certs. Each requesting system can use + Easy-RSA without a CA to generate keypairs & requests. + +### "Org"-style DN flexibility + + When using Easy-RSA in the "org" DN mode, it is no longer required to match + some of the field values. This improves flexibility, and enables easier remote + generation as the requester doesn't need to know the CA's values in advance. + + Previously in v2, the Country, State, and Org values all had to match or a + request couldn't be signed. If you want the old behavior you can change the + OpenSSL config to require it or simply look over the DN at signing time. diff --git a/vpn/testserver/easyrsa/doc/Hacking.md b/vpn/testserver/easyrsa/doc/Hacking.md new file mode 100644 index 0000000..d1b7f6a --- /dev/null +++ b/vpn/testserver/easyrsa/doc/Hacking.md @@ -0,0 +1,142 @@ +Easy-RSA 3 Hacking Guide +=== + +This document is aimed at programmers looking to improve on the existing +codebase. + +Compatibility +--- + +The `easyrsa` code is written in POSIX shell (and any cases where it is not is +considered a bug to be fixed.) The only exceptions are the `local` keyword and +the construct `export FOO=baz`, both well-supported. + +As such, modifications to the code should also be POSIX; platform-specific code +should be placed under the `distro/` dir and listed by target platform. + +Coding conventions +--- + +While there aren't strict syntax standards associated with the project, please +follow the existing format and flow when possible; however, specific exceptions +can be made if there is a significant reason or benefit. + +Do try to: + + * Keep variables locally-scoped when possible + * Comment sections of code for readability + * Use the conventions for prefixes on global variables + * Set editors for tab stops of 8 spaces + * Use tabs for code indents; use aligned spaces for console text + +Keeping code, docs, and examples in sync +--- + +Changes that adjust, add, or remove features should have relevant docs, help +output, and examples updated at the same time. + +Release versioning +--- + +A point-release bump (eg: 3.0 to 3.1) is required when the frontend interface +changes in a non-backwards compatible way. Always assume someone has an +automated process that relies on the current functionality for official +(non-beta, non-rc) releases. A possible exception exists for bugfixes that do +break backwards-compatibility; caution is to be used in such cases. + +The addition of a new command may or may not require a point-release depending +on the significance of the feature; the same holds true for additional optional +arguments to commands. + +Project layout +--- + +The project's files are structured as follows: + + * `easyrsa3/` is the primary project code. On Linux/Unix-alikes, all the core + code and supporting files are stored here. + * `Licensing/` is for license docs. + * `build/` is for build information and scripts. + * `contrib/` is for externally-contributed files, such as useful external + scripts or interfaces for other systems/languages. + * `distro/` is for distro-specific supporting files, such as the Windows + frontend wrappers. Code components that are not platform-neutral should go + here. + * `doc/` is for documentation. Much of this is in Markdown format which can be + easily converted to HTML for easy viewing under Windows. + * `release-keys/` list current and former KeyIDs used to sign release packages + (not necessarily git tags) available for download. + * The top-level dir includes files for basic project info and reference + appropriate locations for more detail. + +As a brief note, it is actually possible to take just the easyrsa3/ dir and end +up with a functional project; the remaining structure includes docs, build prep, +distro-specific wrappers, and contributed files. + +Git conventions +--- + +As of Easy-RSA 3, the following git conventions should be used. These are mostly +useful for people with repo access in order to keep a standard meaning to commit +messages and merge actions. + +### Signed-off-by: and related commit message lines + + Committers with push access should ensure a `Signed-off-by:` line exists at + the end of the commit message with their name on it. This indicates that the + committer has reviewed the changes to the commit in question and approve of + the feature and code in question. It also helps verify the code came from an + acceptable source that won't cause issues with the license. + + This can be automatically added by git using `git commit -s`. + + Additional references can be included as well. If multiple people reviewed the + change, the committer may add their names in additional `Signed-off-by:` + lines; do get permission from that person before using their name, however ;) + + The following references may be useful as well: + + * `Signed-off-by:` -- discussed above, indicates review of the commit + * `Author:` -- references an author of a particular feature, in full or + significant part + * `Changes-by:` -- indicates the listed party contributed changes or + modifications to a feature + * `Acked-by:` -- indicates review of the feature, code, and/or functional + correctness + +### Merging from external sources (forks, patches, etc) + + Contributions can come in many forms: GitHub "pull requests" from cloned + repos, references to external repos, patches to the ML, or others. Those won't + necessary have `Signed-off-by:` lines or may contain less info in the commit + message than is desirable to explain the changes. + + The committing author to this project should make a merge-commit in this case + with the appropriate details provided there. If additional code changes are + necessary, this can be done on a local branch prior to merging back into the + mainline branch. + + This merge-commit should list involved contributors with `Author:` or similar + lines as required. The individual commits involved in a merge also retain the + original committer; regardless, the merge-commit message should give a clear + indication of what the entire set of commits does as a whole. + +### Tagging + + Tags should follow the convention: + + vM.m.p + + where `M` is the major version, `m` is the minor "point-release" version, and + `p` is the patch-level. Suffixes of `-rc#`, `-beta#`, etc can be added for + pre-release versions as required. + + Currently tags are taken from the mainline development branch in question. The + ChangeLog should thus be updated prior to tagging. Tags should also be + annotated with an appropriate commit message and signed-off. This can be done + as shown below (don't use `-s` unless you intend to use GPG with git.) + + git tag -a v1.2.3 + + Corresponding release downloads can be uploaded to release distribution points + as required. diff --git a/vpn/testserver/easyrsa/doc/Intro-To-PKI.md b/vpn/testserver/easyrsa/doc/Intro-To-PKI.md new file mode 100644 index 0000000..ea56629 --- /dev/null +++ b/vpn/testserver/easyrsa/doc/Intro-To-PKI.md @@ -0,0 +1,97 @@ +Introduction to PKI +=================== + +This document is designed to give you a brief introduction into how a PKI, or +Public Key Infrastructure, works. + +Terminology Used +---------------- + +To avoid confusion, the following terms will be used throughout the Easy-RSA +documentation. Short forms may be substituted for longer forms as convenient. + + * **PKI**: Public Key Infrastructure. This describes the collection of files + and associations between the CA, keypairs, requests, and certificates. + * **CA**: Certificate Authority. This is the "master cert" at the root of a + PKI. + * **cert**: Certificate. A certificate is a request that has been signed by a + CA. The certificate contains the public key, some details describing the + cert itself, and a digital signature from the CA. + * **request**: Certificate Request (optionally 'req'.) This is a request for a + certificate that is then send to a CA for signing. A request contains the + desired cert information along with a digital signature from the private + key. + * **keypair**: A keypair is an asymmetric cryptographic pair of keys. These + keys are split into two parts: the public and private keys. The public key + is included in a request and certificate. + +The CA +------ + +The heart of a PKI is the CA, or Certificate Authority, and this is also the +most security-sensitive. The CA private key is used to sign all issued +certificates, so its security is critical in keeping the entire PKI safe. For +this reason, it is highly recommended that the CA PKI structure be kept on a +system dedicated for such secure usage; it is not a great idea to keep the CA +PKI mixed in with one used to generate end-entity certificates, such as clients +or servers (VPN or web servers.) + +To start a new PKI, the CA is first created on the secure environment. +Depending on security needs, this could be managed under a locked down account, +dedicated system, or even a completely offline system or using removable media +to improve security (after all, you can't suffer an online break-in if your +system or PKI is not online.) The exact steps to create a CA are described in a +separate section. When creating a new CA, the CA keypair (private and public +keys) are created, as well as the file structure necessary to support signing +issued certificates. + +Once a CA has been created, it can receive certificate requests from +end-entities. These entity certificates are issued to consumers of X509 +certificates, such as a client or server of a VPN, web, or email system. The +certificate requests and certificates are not security-sensitive, and can be +transferred in whatever means convenient, such as email, flash drive, etc. For +better security, it is a good idea to verify the received request matches the +sender's copy, such as by verifying the expected checksum against the sender's +original. + +Keypairs and requests +--------------------- + +Individual end-entities do not need a full CA set up and will only need to +create a keypair and associated certificate request. The private key is not used +anywhere except on this entity, and should never leave that system. It is wise +to secure this private key with a strong passphrase, because if lost or stolen +the holder of the private key can make connections appearing as the certificate +holder. + +Once a keypair is generated, the certificate request is created and digitally +signed using the private key. This request will be sent to a CA for signing, and +a signed certificate will be returned. + +How requests become certificates +-------------------------------- + +After a CA signs the certificate request, a signed certificate is produced. In +this step, the CA's private key is used to digitally sign the entity's public +key so that any system trusting the CA certificate can implicitly trust the +newly issued certificate. This signed certificate is then sent back to the +requesting entity. The issued certificate is not security-sensitive and can be +sent over plaintext transmission methods. + +Verifying an issued certificate +------------------------------- + +After 2 entities have created keypairs, sent their requests to the CA, and +received a copy of their signed certificates and the CA's own certificate, they +can mutually authenticate with one-another. This process does not require the 2 +entities to have previously exchanged any kind of security information directly. + +During a TLS handshake each side of the connection presents their own cert chain +to the remote end. Each side checks the validity of the cert received against +their own copy of the CA cert. By trusting the CA root cert, the peer they are +talking to can be authenticated. + +The remote end proves it "really is" the entity identified by the cert by +signing a bit of data using its own private key. Only the holder of the private +key is able to do this, allowing the remote end to verify the authenticity of +the system being connected to. diff --git a/vpn/testserver/easyrsa/easyrsa b/vpn/testserver/easyrsa/easyrsa new file mode 100644 index 0000000..e004e2b --- /dev/null +++ b/vpn/testserver/easyrsa/easyrsa @@ -0,0 +1,1256 @@ +#!/bin/sh + +# Easy-RSA 3 -- A Shell-based CA Utility +# +# Copyright (C) 2013 by the Open-Source OpenVPN development community. +# A full list of contributors can be found in the ChangeLog. +# +# This code released under version 2 of the GNU GPL; see COPYING and the +# Licensing/ directory of this project for full licensing details. + +# Help/usage output to stdout +usage() { + # command help: + print " +Easy-RSA 3 usage and overview + +USAGE: easyrsa [options] COMMAND [command-options] + +A list of commands is shown below. To get detailed usage and help for a +command, run: + ./easyrsa help COMMAND + +For a listing of options that can be supplied before the command, use: + ./easyrsa help options + +Here is the list of commands available with a short syntax reminder. Use the +'help' command above to get full usage details. + + init-pki + build-ca [ cmd-opts ] + gen-dh + gen-req [ cmd-opts ] + sign-req + build-client-full [ cmd-opts ] + build-server-full [ cmd-opts ] + revoke + gen-crl + update-db + show-req [ cmd-opts ] + show-cert [ cmd-opts ] + import-req + export-p7 [ cmd-opts ] + export-p12 [ cmd-opts ] + set-rsa-pass [ cmd-opts ] + set-ec-pass [ cmd-opts ] +" + + # collect/show dir status: + local err_source="Not defined: vars autodetect failed and no value provided" + local work_dir="${EASYRSA:-$err_source}" + local pki_dir="${EASYRSA_PKI:-$err_source}" + print "\ +DIRECTORY STATUS (commands would take effect on these locations) + EASYRSA: $work_dir + PKI: $pki_dir +" +} # => usage() + +# Detailed command help +# When called with no args, calls usage(), otherwise shows help for a command +cmd_help() { + local text opts + case "$1" in + init-pki|clean-all) text=" + init-pki [ cmd-opts ] + Removes & re-initializes the PKI dir for a clean PKI" ;; + build-ca) text=" + build-ca [ cmd-opts ] + Creates a new CA" + opts=" + nopass - do not encrypt the CA key (default is encrypted) + subca - create a sub-CA keypair and request (default is a root CA)" ;; + gen-dh) text=" + gen-dh + Generates DH (Diffie-Hellman) parameters" ;; + gen-req) text=" + gen-req [ cmd-opts ] + Generate a standalone keypair and request (CSR) + + This request is suitable for sending to a remote CA for signing." + opts=" + nopass - do not encrypt the private key (default is encrypted)" ;; + sign|sign-req) text=" + sign-req + Sign a certificate request of the defined type. must be a known + type such as 'client', 'server', or 'ca' (or a user-added type.) + + This request file must exist in the reqs/ dir and have a .req file + extension. See import-req below for importing reqs from other sources." ;; + build|build-client-full|build-server-full) text=" + build-client-full [ cmd-opts ] + build-server-full [ cmd-opts ] + Generate a keypair and sign locally for a client or server + + This mode uses the as the X509 CN." + opts=" + nopass - do not encrypt the private key (default is encrypted)" ;; + revoke) text=" + revoke + Revoke a certificate specified by the filename_base" ;; + gen-crl) text=" + gen-crl + Generate a CRL" ;; + update-db) text=" + update-db + Update the index.txt database + + This command will use the system time to update the status of issued + certificates." ;; + show-req|show-cert) text=" + show-req [ cmd-opts ] + show-cert [ cmd-opts ] + Shows details of the req or cert referenced by filename_base + + Human-readable output is shown, including any requested cert options when + showing a request." + opts=" + full - show full req/cert info, including pubkey/sig data" ;; + import-req) text=" + import-req + Import a certificate request from a file + + This will copy the specified file into the reqs/ dir in + preparation for signing. + The is the filename base to create. + + Example usage: + import-req /some/where/bob_request.req bob" ;; + export-p12) text=" + export-p12 [ cmd-opts ] + Export a PKCS#12 file with the keypair specified by " + opts=" + noca - do not include the ca.crt file in the PKCS12 output + nokey - do not include the private key in the PKCS12 output" ;; + export-p7) text=" + export-p7 [ cmd-opts ] + Export a PKCS#7 file with the pubkey specified by " + opts=" + noca - do not include the ca.crt file in the PKCS7 output" ;; + set-rsa-pass|set-ec-pass) text=" + set-rsa-pass [ cmd-opts ] + set-ec-pass [ cmd-opts ] + Set a new passphrase on an RSA or EC key for the listed ." + opts=" + nopass - use no password and leave the key unencrypted + file - (advanced) treat the file as a raw path, not a short-name" ;; + altname|subjectaltname|san) text=" + --subject-alt-name=SAN_FORMAT_STRING + This global option adds a subjectAltName to the request or issued + certificate. It MUST be in a valid format accepted by openssl or + req/cert generation will fail. Note that including multiple such names + requires them to be comma-separated; further invocations of this + option will REPLACE the value. + + Examples of the SAN_FORMAT_STRING shown below: + DNS:alternate.example.net + DNS:primary.example.net,DNS:alternate.example.net + IP:203.0.113.29 + email:alternate@example.net" ;; + options) + opt_usage ;; + "") + usage ;; + *) text=" + Unknown command: '$1' (try without commands for a list of commands)" ;; + esac + + # display the help text + print "$text" + [ -n "$opts" ] && print " + cmd-opts is an optional set of command options from this list: +$opts" +} # => cmd_help() + +# Options usage +opt_usage() { + print " +Easy-RSA Global Option Flags + +The following options may be provided before the command. Options specified +at runtime override env-vars and any 'vars' file in use. Unless noted, +non-empty values to options are mandatory. + +General options: + +--batch : set automatic (no-prompts when possible) mode +--pki-dir=DIR : declares the PKI directory +--vars=FILE : define a specific 'vars' file to use for Easy-RSA config + +Certificate & Request options: (these impact cert/req field values) + +--days=# : sets the signing validity to the specified number of days +--digest=ALG : digest to use in the requests & certificates +--dn-mode=MODE : DN mode to use (cn_only or org) +--keysize=# : size in bits of keypair to generate +--req-cn=NAME : default CN to use +--subca-len=# : path length of signed sub-CA certs; must be >= 0 if used +--subject-alt-name : Add a subjectAltName. For more info and syntax, see: + ./easyrsa help altname +--use-algo=ALG : crypto alg to use: choose rsa (default) or ec +--curve=NAME : for elliptic curve, sets the named curve to use + +Organizational DN options: (only used with the 'org' DN mode) + (values may be blank for org DN options) + +--req-c=CC : country code (2-letters) +--req-st=NAME : State/Province +--req-city=NAME : City/Locality +--req-org=NAME : Organization +--req-email=NAME : Email addresses +--req-ou=NAME : Organizational Unit + +Deprecated features: + +--ns-cert=YESNO : yes or no to including deprecated NS extensions +--ns-comment=COMMENT : NS comment to include (value may be blank) +" +} # => opt_usage() + +# Wrapper around printf - clobber print since it's not POSIX anyway +print() { printf "%s\n" "$*"; } + +# Exit fatally with a message to stderr +# present even with EASYRSA_BATCH as these are fatal problems +die() { + print " +Easy-RSA error: + +$1" 1>&2 + exit ${2:-1} +} # => die() + +# non-fatal warning output +warn() { + [ ! $EASYRSA_BATCH ] && \ + print " +$1" 1>&2 +} # => warn() + +# informational notices to stdout +notice() { + [ ! $EASYRSA_BATCH ] && \ + print " +$1" +} # => notice() + +# yes/no case-insensitive match (operates on stdin pipe) +# Returns 0 when input contains yes, 1 for no, 2 for no match +# If both strings are present, returns 1; first matching line returns. +awk_yesno() { + local awkscript=' +BEGIN {IGNORECASE=1; r=2} +{ if(match($0,"no")) {r=1; exit} + if(match($0,"yes")) {r=0; exit} +} END {exit r}' + awk "$awkscript" +} # => awk_yesno() + +# intent confirmation helper func +# returns without prompting in EASYRSA_BATCH +confirm() { + [ $EASYRSA_BATCH ] && return + local prompt="$1" value="$2" msg="$3" input + print " +$msg + +Type the word '$value' to continue, or any other input to abort." + printf %s " $prompt" + read input + [ "$input" = "$value" ] && return + notice "Aborting without confirmation." + exit 9 +} # => confirm() + +# remove temp files +clean_temp() { + for f in "$EASYRSA_TEMP_FILE" "$EASYRSA_TEMP_FILE_2" "$EASYRSA_TEMP_FILE_3" + do [ -f "$f" ] && rm "$f" 2>/dev/null + done +} # => clean_temp() + +vars_source_check() { + # Check for defined EASYRSA_PKI + [ -n "$EASYRSA_PKI" ] || die "\ +EASYRSA_PKI env-var undefined" + + # Verify EASYRSA_OPENSSL command gives expected output + if [ -z "$EASYRSA_SSL_OK" ]; then + local val="$("$EASYRSA_OPENSSL" version)" + case "${val%% *}" in + OpenSSL|LibreSSL) ;; + *) die "\ +Missing or invalid OpenSSL +Expected to find openssl command at: $EASYRSA_OPENSSL" + esac + fi + EASYRSA_SSL_OK=1 + + # Verify EASYRSA_SSL_CONF file exists + [ -f "$EASYRSA_SSL_CONF" ] || die "\ +The OpenSSL config file cannot be found. +Expected location: $EASYRSA_SSL_CONF" +} # => vars_source_check() + +# Verify supplied curve exists and generate curve file if needed +verify_curve() { + if ! "$EASYRSA_OPENSSL" ecparam -name "$EASYRSA_CURVE" > /dev/null; then + die "\ +Curve $EASYRSA_CURVE not found. Run openssl ecparam -list_curves to show a +list of supported curves." + fi + + # Check that the ecparams dir exists + [ -d "$EASYRSA_EC_DIR" ] || mkdir "$EASYRSA_EC_DIR" || die "\ +Failed creating ecparams dir (permissions?) at: +$EASYRSA_EC_DIR" + + # Check that the required ecparams file exists + local out="$EASYRSA_EC_DIR/${EASYRSA_CURVE}.pem" + [ -f "$out" ] && return 0 + "$EASYRSA_OPENSSL" ecparam -name "$EASYRSA_CURVE" -out "$out" || die "\ +Failed to generate ecparam file (permissions?) when writing to: +$out" + + # Explicitly return success for caller + return 0 +} + +# Basic sanity-check of PKI init and complain if missing +verify_pki_init() { + local help_note="Run easyrsa without commands for usage and command help." + + # check that the pki dir exists + vars_source_check + [ -d "$EASYRSA_PKI" ] || die "\ +EASYRSA_PKI does not exist (perhaps you need to run init-pki)? +Expected to find the EASYRSA_PKI at: $EASYRSA_PKI +$help_note" + + # verify expected dirs present: + for i in private reqs; do + [ -d "$EASYRSA_PKI/$i" ] || die "\ +Missing expected directory: $i (perhaps you need to run init-pki?) +$help_note" + done +} # => verify_pki_init() + +# Verify core CA files present +verify_ca_init() { + local help_note="Run without commands for usage and command help." + + # First check the PKI has been initialized + verify_pki_init + + # verify expected files present: + for i in serial index.txt ca.crt private/ca.key; do + if [ ! -f "$EASYRSA_PKI/$i" ]; then + [ "$1" = "test" ] && return 1 + die "\ +Missing expected CA file: $i (perhaps you need to run build-ca?) +$help_note" + fi + done + + # When operating in 'test' mode, return success. + # test callers don't care about CA-specific dir structure + [ "$1" = "test" ] && return 0 + + # verify expected CA-specific dirs: + for i in issued certs_by_serial; do + [ -d "$EASYRSA_PKI/$i" ] || die "\ +Missing expected CA dir: $i (perhaps you need to run build-ca?) +$help_note" + done + + # explicitly return success for callers + return 0 + +} # => verify_ca_init() + +# init-pki backend: +init_pki() { + vars_source_check + + # If EASYRSA_PKI exists, confirm before we rm -rf (skiped with EASYRSA_BATCH) + if [ -e "$EASYRSA_PKI" ]; then + confirm "Confirm removal: " "yes" " +WARNING!!! + +You are about to remove the EASYRSA_PKI at: $EASYRSA_PKI +and initialize a fresh PKI here." + # now remove it: + rm -rf "$EASYRSA_PKI" || die "Removal of PKI dir failed. Check/correct errors above" + fi + + # new dirs: + for i in private reqs; do + mkdir -p "$EASYRSA_PKI/$i" || die "Failed to create PKI file structure (permissions?)" + done + + notice "\ +init-pki complete; you may now create a CA or requests. +Your newly created PKI dir is: $EASYRSA_PKI +" + return 0 +} # => init_pki() + +# build-ca backend: +build_ca() { + local opts= sub_ca= + while [ -n "$1" ]; do + case "$1" in + nopass) opts="$opts -nodes" ;; + subca) sub_ca=1 ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + verify_pki_init + [ "$EASYRSA_ALGO" = "ec" ] && verify_curve + + # setup for the simpler sub-CA situation and overwrite with root-CA if needed: + local out_file="$EASYRSA_PKI/reqs/ca.req" + local out_key="$EASYRSA_PKI/private/ca.key" + if [ ! $sub_ca ]; then + out_file="$EASYRSA_PKI/ca.crt" + opts="$opts -x509 -days $EASYRSA_CA_EXPIRE" + fi + + # Test for existing CA, and complain if already present + if verify_ca_init test; then + die "\ +Unable to create a CA as you already seem to have one set up. +If you intended to start a new CA, run init-pki first." + fi + # If a private key exists here, a sub-ca was created but not signed. + # Notify the user and require a signed ca.crt or a init-pki: + [ -f "$out_key" ] && \ + die "\ +A CA private key exists but no ca.crt is found in your PKI dir of: +$EASYRSA_PKI +Refusing to create a new CA keypair as this operation would overwrite your +current CA keypair. If you intended to start a new CA, run init-pki first." + + # create necessary files and dirs: + local err_file="Unable to create necessary PKI files (permissions?)" + for i in issued certs_by_serial; do + mkdir -p "$EASYRSA_PKI/$i" || die "$err_file" + done + printf "" > "$EASYRSA_PKI/index.txt" || die "$err_file" + print "01" > "$EASYRSA_PKI/serial" || die "$err_file" + + # Default CN only when not in global EASYRSA_BATCH mode: + [ $EASYRSA_BATCH ] && opts="$opts -batch" || export EASYRSA_REQ_CN="Easy-RSA CA" + + out_key_tmp="$(mktemp -u "$out_key.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$out_key_tmp" + out_file_tmp="$(mktemp -u "$out_file.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_3="$out_file_tmp" + # create the CA keypair: + "$EASYRSA_OPENSSL" req -utf8 -new -newkey $EASYRSA_ALGO:"$EASYRSA_ALGO_PARAMS" \ + -config "$EASYRSA_SSL_CONF" -keyout "$out_key_tmp" -out "$out_file_tmp" $opts || \ + die "Failed to build the CA" + mv "$out_key_tmp" "$out_key"; EASYRSA_TEMP_FILE_2= + mv "$out_file_tmp" "$out_file"; EASYRSA_TEMP_FILE_3= + + # Success messages + if [ $sub_ca ]; then + notice "\ +NOTE: Your sub-CA request is at $out_file +and now must be sent to you parent CA for signing. Place your resulting cert +at $EASYRSA_PKI/ca.crt prior to signing operations. +" + else notice "\ +CA creation complete and you may now import and sign cert requests. +Your new CA certificate file for publishing is at: +$out_file +" + fi + return 0 +} # => build_ca() + +# gen-dh backend: +gen_dh() { + verify_pki_init + + local out_file="$EASYRSA_PKI/dh.pem" + "$EASYRSA_OPENSSL" dhparam -out "$out_file" $EASYRSA_KEY_SIZE || \ + die "Failed to build DH params" + notice "\ +DH parameters of size $EASYRSA_KEY_SIZE created at $out_file +" + return 0 +} # => gen_dh() + +# gen-req backend: +gen_req() { + # pull filename base and use as default interactive CommonName: + [ -n "$1" ] || die "\ +Error: gen-req must have a file base as the first argument. +Run easyrsa without commands for usage and commands." + local key_out="$EASYRSA_PKI/private/$1.key" + local req_out="$EASYRSA_PKI/reqs/$1.req" + [ ! $EASYRSA_BATCH ] && EASYRSA_REQ_CN="$1" + shift + + # function opts support + local opts= + while [ -n "$1" ]; do + case "$1" in + nopass) opts="$opts -nodes" ;; + # batch flag supports internal callers needing silent operation + batch) local EASYRSA_BATCH=1 ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + verify_pki_init + [ "$EASYRSA_ALGO" = "ec" ] && verify_curve + + # don't wipe out an existing private key without confirmation + [ -f "$key_out" ] && confirm "Confirm key overwrite: " "yes" "\ + +WARNING!!! + +An existing private key was found at $key_out +Continuing with key generation will replace this key." + + # When EASYRSA_EXTRA_EXTS is defined, append it to openssl's [req] section: + if [ -n "$EASYRSA_EXTRA_EXTS" ]; then + # Setup & insert the extra ext data keyed by a magic line + local extra_exts=" +req_extensions = req_extra +[ req_extra ] +$EASYRSA_EXTRA_EXTS" + local awkscript=' +{if ( match($0, "^#%EXTRA_EXTS%") ) + { while ( getline<"/dev/stdin" ) {print} next } + {print} +}' + print "$extra_exts" | \ + awk "$awkscript" "$EASYRSA_SSL_CONF" \ + > "$EASYRSA_TEMP_FILE" \ + || die "Copying SSL config to temp file failed" + # Use this new SSL config for the rest of this function + local EASYRSA_SSL_CONF="$EASYRSA_TEMP_FILE" + fi + + key_out_tmp="$(mktemp -u "$key_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$key_out_tmp" + req_out_tmp="$(mktemp -u "$req_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_3="$req_out_tmp" + # generate request + [ $EASYRSA_BATCH ] && opts="$opts -batch" + "$EASYRSA_OPENSSL" req -utf8 -new -newkey $EASYRSA_ALGO:"$EASYRSA_ALGO_PARAMS" \ + -config "$EASYRSA_SSL_CONF" -keyout "$key_out_tmp" -out "$req_out_tmp" $opts \ + || die "Failed to generate request" + mv "$key_out_tmp" "$key_out"; EASYRSA_TEMP_FILE_2= + mv "$req_out_tmp" "$req_out"; EASYRSA_TEMP_FILE_3= + notice "\ +Keypair and certificate request completed. Your files are: +req: $req_out +key: $key_out +" + return 0 +} # => gen_req() + +# common signing backend +sign_req() { + local crt_type="$1" opts= + local req_in="$EASYRSA_PKI/reqs/$2.req" + local crt_out="$EASYRSA_PKI/issued/$2.crt" + + # Randomize Serial number + local i= serial= check_serial= + for i in 1 2 3 4 5; do + "$EASYRSA_OPENSSL" rand -hex 16 -out "$EASYRSA_PKI/serial" + serial="$(cat "$EASYRSA_PKI/serial")" + check_serial="$("$EASYRSA_OPENSSL" ca -config "$EASYRSA_SSL_CONF" -status "$serial" 2>&1)" + case "$check_serial" in + *"not present in db"*) break ;; + *) continue ;; + esac + done + + # Support batch by internal caller: + [ "$3" = "batch" ] && local EASYRSA_BATCH=1 + + verify_ca_init + + # Check argument sanity: + [ -n "$2" ] || die "\ +Incorrect number of arguments provided to sign-req: +expected 2, got $# (see command help for usage)" + + # Cert type must exist under the EASYRSA_EXT_DIR + [ -r "$EASYRSA_EXT_DIR/$crt_type" ] || die "\ +Unknown cert type '$crt_type'" + + # Request file must exist + [ -f "$req_in" ] || die "\ +No request found for the input: '$2' +Expected to find the request at: $req_in" + + # Confirm input is a cert req + verify_file req "$req_in" || die "\ +The certificate request file is not in a valid X509 request format. +Offending file: $req_in" + + # Display the request subject in an easy-to-read format + # Confirm the user wishes to sign this request + confirm "Confirm request details: " "yes" " +You are about to sign the following certificate. +Please check over the details shown below for accuracy. Note that this request +has not been cryptographically verified. Please be sure it came from a trusted +source or that you have verified the request checksum with the sender. + +Request subject, to be signed as a $crt_type certificate for $EASYRSA_CERT_EXPIRE days: + +$(display_dn req "$req_in") +" # => confirm end + + # Generate the extensions file for this cert: + { + # Append first any COMMON file (if present) then the cert-type extensions + cat "$EASYRSA_EXT_DIR/COMMON" + cat "$EASYRSA_EXT_DIR/$crt_type" + + # Support a dynamic CA path length when present: + [ "$crt_type" = "ca" ] && [ -n "$EASYRSA_SUBCA_LEN" ] && \ + print "basicConstraints = CA:TRUE, pathlen:$EASYRSA_SUBCA_LEN" + + # Deprecated Netscape extension support, if enabled + if print "$EASYRSA_NS_SUPPORT" | awk_yesno; then + [ -n "$EASYRSA_NS_COMMENT" ] && \ + print "nsComment = \"$EASYRSA_NS_COMMENT\"" + case "$crt_type" in + server) print "nsCertType = server" ;; + client) print "nsCertType = client" ;; + ca) print "nsCertType = sslCA" ;; + esac + fi + + # If type is server and no subjectAltName was requested, + # add one to the extensions file + if [[ "$crt_type" == 'server' ]] + then + echo "$EASYRSA_EXTRA_EXTS" | + grep -q subjectAltName || + print $(default_server_san "$req_in") + fi + + # Add any advanced extensions supplied by env-var: + [ -n "$EASYRSA_EXTRA_EXTS" ] && print "$EASYRSA_EXTRA_EXTS" + + : # needed to keep die from inherting the above test + } > "$EASYRSA_TEMP_FILE" || die "\ +Failed to create temp extension file (bad permissions?) at: +$EASYRSA_TEMP_FILE" + + # sign request + crt_out_tmp="$(mktemp -u "$crt_out.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$crt_out_tmp" + "$EASYRSA_OPENSSL" ca -utf8 -in "$req_in" -out "$crt_out_tmp" -config "$EASYRSA_SSL_CONF" \ + -extfile "$EASYRSA_TEMP_FILE" -days $EASYRSA_CERT_EXPIRE -batch $opts \ + || die "signing failed (openssl output above may have more detail)" + mv "$crt_out_tmp" "$crt_out"; EASYRSA_TEMP_FILE_2= + notice "\ +Certificate created at: $crt_out +" + return 0 +} # => sign_req() + +# common build backend +# used to generate+sign in 1 step +build_full() { + verify_ca_init + + # pull filename base: + [ -n "$2" ] || die "\ +Error: didn't find a file base name as the first argument. +Run easyrsa without commands for usage and commands." + local crt_type="$1" name="$2" + local req_out="$EASYRSA_PKI/reqs/$2.req" + local key_out="$EASYRSA_PKI/private/$2.key" + local crt_out="$EASYRSA_PKI/issued/$2.crt" + shift 2 + + # function opts support + local req_opts= + while [ -n "$1" ]; do + case "$1" in + nopass) req_opts="$req_opts nopass" ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + # abort on existing req/key/crt files + local err_exists="\ +file already exists. Aborting build to avoid overwriting this file. +If you wish to continue, please use a different name or remove the file. +Matching file found at: " + [ -f "$req_out" ] && die "Request $err_exists $req_out" + [ -f "$key_out" ] && die "Key $err_exists $key_out" + [ -f "$crt_out" ] && die "Certificate $err_exists $crt_out" + + # create request + EASYRSA_REQ_CN="$name" + gen_req "$name" batch $req_opts + + # Sign it + sign_req "$crt_type" "$name" batch + +} # => build_full() + +# revoke backend +revoke() { + verify_ca_init + + # pull filename base: + [ -n "$1" ] || die "\ +Error: didn't find a file base name as the first argument. +Run easyrsa without commands for usage and command help." + local crt_in="$EASYRSA_PKI/issued/$1.crt" + + verify_file x509 "$crt_in" || die "\ +Unable to revoke as the input file is not a valid certificate. Unexpected +input in file: $crt_in" + + # confirm operation by displaying DN: + confirm "Continue with revocation: " "yes" " +Please confirm you wish to revoke the certificate with the following subject: + +$(display_dn x509 "$crt_in") +" # => confirm end + + # referenced cert must exist: + [ -f "$crt_in" ] || die "\ +Unable to revoke as no certificate was found. Certificate was expected +at: $crt_in" + + "$EASYRSA_OPENSSL" ca -utf8 -revoke "$crt_in" -config "$EASYRSA_SSL_CONF" || die "\ +Failed to revoke certificate: revocation command failed." + + notice "\ +IMPORTANT!!! + +Revocation was successful. You must run gen-crl and upload a CRL to your +infrastructure in order to prevent the revoked cert from being accepted. +" # => notice end + return 0 +} #= revoke() + +# gen-crl backend +gen_crl() { + verify_ca_init + + local out_file="$EASYRSA_PKI/crl.pem" + out_file_tmp="$(mktemp -u "$out_file.XXXXXXXXXX")"; EASYRSA_TEMP_FILE_2="$out_file_tmp" + "$EASYRSA_OPENSSL" ca -utf8 -gencrl -out "$out_file_tmp" -config "$EASYRSA_SSL_CONF" || die "\ +CRL Generation failed. +" + mv "$out_file_tmp" "$out_file"; EASYRSA_TEMP_FILE_2= + + notice "\ +An updated CRL has been created. +CRL file: $out_file +" + return 0 +} # => gen_crl() + +# import-req backend +import_req() { + verify_pki_init + + # pull passed paths + local in_req="$1" short_name="$2" + local out_req="$EASYRSA_PKI/reqs/$2.req" + + [ -n "$short_name" ] || die "\ +Unable to import: incorrect command syntax. +Run easyrsa without commands for usage and command help." + + verify_file req "$in_req" || die "\ +The input file does not appear to be a certificate request. Aborting import. +Offending file: $in_req" + + # destination must not exist + [ -f "$out_req" ] && die "\ +Unable to import the request as the destination file already exists. +Please choose a different name for your imported request file. +Existing file at: $out_req" + + # now import it + cp "$in_req" "$out_req" + + notice "\ +The request has been successfully imported with a short name of: $short_name +You may now use this name to perform signing operations on this request. +" + return 0 +} # => import_req() + +# export pkcs#12 or pkcs#7 +export_pkcs() { + local pkcs_type="$1" + shift + + [ -n "$1" ] || die "\ +Unable to export p12: incorrect command syntax. +Run easyrsa without commands for usage and command help." + + local short_name="$1" + local crt_in="$EASYRSA_PKI/issued/$1.crt" + local key_in="$EASYRSA_PKI/private/$1.key" + local crt_ca="$EASYRSA_PKI/ca.crt" + shift + + verify_pki_init + + # opts support + local want_ca=1 + local want_key=1 + while [ -n "$1" ]; do + case "$1" in + noca) want_ca= ;; + nokey) want_key= ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + local pkcs_opts= + if [ $want_ca ]; then + verify_file x509 "$crt_ca" || die "\ +Unable to include CA cert in the $pkcs_type output (missing file, or use noca option.) +Missing file expected at: $crt_ca" + pkcs_opts="$pkcs_opts -certfile $crt_ca" + fi + + # input files must exist + verify_file x509 "$crt_in" || die "\ +Unable to export $pkcs_type for short name '$short_name' without the certificate. +Missing cert expected at: $crt_in" + + case "$pkcs_type" in + p12) + local pkcs_out="$EASYRSA_PKI/private/$short_name.p12" + + if [ $want_key ]; then + [ -f "$key_in" ] || die "\ +Unable to export p12 for short name '$short_name' without the key +(if you want a p12 without the private key, use nokey option.) +Missing key expected at: $key_in" + else + pkcs_opts="$pkcs_opts -nokeys" + fi + + # export the p12: + "$EASYRSA_OPENSSL" pkcs12 -in "$crt_in" -inkey "$key_in" -export \ + -out "$pkcs_out" $pkcs_opts || die "\ +Export of p12 failed: see above for related openssl errors." + ;; + p7) + local pkcs_out="$EASYRSA_PKI/issued/$short_name.p7b" + + # export the p7: + "$EASYRSA_OPENSSL" crl2pkcs7 -nocrl -certfile "$crt_in" \ + -out "$pkcs_out" $pkcs_opts || die "\ +Export of p7 failed: see above for related openssl errors." + ;; +esac + + notice "\ +Successful export of $pkcs_type file. Your exported file is at the following +location: $pkcs_out +" + return 0 +} # => export_pkcs() + +# set-pass backend +set_pass() { + verify_pki_init + + # key type, supplied internally from frontend command call (rsa/ec) + local key_type="$1" + + # values supplied by the user: + local raw_file="$2" + local file="$EASYRSA_PKI/private/$raw_file.key" + [ -n "$raw_file" ] || die "\ +Missing argument to 'set-$key_type-pass' command: no name/file supplied. +See help output for usage details." + + # parse command options + shift 2 + local crypto="-aes256" + while [ -n "$1" ]; do + case "$1" in + nopass) crypto= ;; + file) file="$raw_file" ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + [ -f "$file" ] || die "\ +Missing private key: expected to find the private key component at: +$file" + + notice "\ +If the key is currently encrypted you must supply the decryption passphrase. +${crypto:+You will then enter a new PEM passphrase for this key.$NL}" + + "$EASYRSA_OPENSSL" $key_type -in "$file" -out "$file" $crypto || die "\ +Failed to change the private key passphrase. See above for possible openssl +error messages." + + notice "Key passphrase successfully changed" + +} # => set_pass() + +# update-db backend +update_db() { + verify_ca_init + + "$EASYRSA_OPENSSL" ca -utf8 -updatedb -config "$EASYRSA_SSL_CONF" || die "\ +Failed to perform update-db: see above for related openssl errors." + return 0 +} # => update_db() + +# display cert DN info on a req/X509, passed by full pathname +display_dn() { + local format="$1" path="$2" + print "$("$EASYRSA_OPENSSL" $format -in "$path" -noout -subject -nameopt multiline)" +} # => display_dn() + +# generate default SAN from req/X509, passed by full pathname +default_server_san() { + local path="$1" + local cn=$( + "$EASYRSA_OPENSSL" req -in "$path" -noout -subject -nameopt sep_multiline | + awk -F'=' '/^ *CN=/{print $2}' + ) + echo "$cn" | egrep -q '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$' + if [[ $? -eq 0 ]] + then + print "subjectAltName = IP:$cn" + else + print "subjectAltName = DNS:$cn" + fi +} # => default_server_san() + +# verify a file seems to be a valid req/X509 +verify_file() { + local format="$1" path="$2" + "$EASYRSA_OPENSSL" $format -in "$path" -noout 2>/dev/null || return 1 + return 0 +} # => verify_file() + +# show-* command backend +# Prints req/cert details in a readable format +show() { + local type="$1" name="$2" in_file format + [ -n "$name" ] || die "\ +Missing expected filename_base argument. +Run easyrsa without commands for usage help." + shift 2 + + # opts support + local opts="-${type}opt no_pubkey,no_sigdump" + while [ -n "$1" ]; do + case "$1" in + full) opts= ;; + *) warn "Ignoring unknown command option: '$1'" ;; + esac + shift + done + + # Determine cert/req type + if [ "$type" = "cert" ]; then + verify_ca_init + in_file="$EASYRSA_PKI/issued/${name}.crt" + format="x509" + else + verify_pki_init + in_file="$EASYRSA_PKI/reqs/${name}.req" + format="req" + fi + + # Verify file exists and is of the correct type + [ -f "$in_file" ] || die "\ +No such $type file with a basename of '$name' is present. +Expected to find this file at: +$in_file" + verify_file $format "$in_file" || die "\ +This file is not a valid $type file: +$in_file" + + notice "\ +Showing $type details for '$name'. +This file is stored at: +$in_file +" + "$EASYRSA_OPENSSL" $format -in "$in_file" -noout -text\ + -nameopt multiline $opts || die "\ +OpenSSL failure to process the input" +} # => show() + +# vars setup +# Here sourcing of 'vars' if present occurs. If not present, defaults are used +# to support running without a sourced config format +vars_setup() { + # Try to locate a 'vars' file in order of location preference. + # If one is found, source it + local vars= + + # set up program path + local prog_vars="${0%/*}/vars" + # set up PKI path + local pki_vars="${EASYRSA_PKI:-$PWD/pki}/vars" + + # command-line path: + if [ -f "$EASYRSA_VARS_FILE" ]; then + vars="$EASYRSA_VARS_FILE" + # PKI location, if present: + elif [ -f "$pki_vars" ]; then + vars="$pki_vars" + # EASYRSA, if defined: + elif [ -n "$EASYRSA" ] && [ -f "$EASYRSA/vars" ]; then + vars="$EASYRSA/vars" + # program location: + elif [ -f "$prog_vars" ]; then + vars="$prog_vars" + fi + + # If a vars file was located, source it + # If $EASYRSA_NO_VARS is defined (not blank) this is skipped + if [ -z "$EASYRSA_NO_VARS" ] && [ -n "$vars" ]; then + EASYRSA_CALLER=1 . "$vars" + notice "\ +Note: using Easy-RSA configuration from: $vars" + fi + + # Set defaults, preferring existing env-vars if present + set_var EASYRSA "${0%/*}" + set_var EASYRSA_OPENSSL openssl + set_var EASYRSA_PKI "$PWD/pki" + set_var EASYRSA_DN cn_only + set_var EASYRSA_REQ_COUNTRY "US" + set_var EASYRSA_REQ_PROVINCE "California" + set_var EASYRSA_REQ_CITY "San Francisco" + set_var EASYRSA_REQ_ORG "Copyleft Certificate Co" + set_var EASYRSA_REQ_EMAIL me@example.net + set_var EASYRSA_REQ_OU "My Organizational Unit" + set_var EASYRSA_ALGO rsa + set_var EASYRSA_KEY_SIZE 2048 + set_var EASYRSA_CURVE secp384r1 + set_var EASYRSA_EC_DIR "$EASYRSA_PKI/ecparams" + set_var EASYRSA_CA_EXPIRE 3650 + set_var EASYRSA_CERT_EXPIRE 3650 + set_var EASYRSA_CRL_DAYS 180 + set_var EASYRSA_NS_SUPPORT no + set_var EASYRSA_NS_COMMENT "Easy-RSA Generated Certificate" + set_var EASYRSA_TEMP_FILE "$EASYRSA_PKI/extensions.temp" + set_var EASYRSA_TEMP_FILE_2 "" + set_var EASYRSA_TEMP_FILE_3 "" + set_var EASYRSA_REQ_CN ChangeMe + set_var EASYRSA_DIGEST sha256 + + # Detect openssl config, preferring EASYRSA_PKI over EASYRSA + if [ -f "$EASYRSA_PKI/openssl-1.0.cnf" ]; then + set_var EASYRSA_SSL_CONF "$EASYRSA_PKI/openssl-1.0.cnf" + else set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf" + fi + + # Same as above for the x509-types extensions dir + if [ -d "$EASYRSA_PKI/x509-types" ]; then + set_var EASYRSA_EXT_DIR "$EASYRSA_PKI/x509-types" + else set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types" + fi + + # EASYRSA_ALGO_PARAMS must be set depending on selected algo + if [ "ec" = "$EASYRSA_ALGO" ]; then + EASYRSA_ALGO_PARAMS="$EASYRSA_EC_DIR/${EASYRSA_CURVE}.pem" + elif [ "rsa" = "$EASYRSA_ALGO" ]; then + EASYRSA_ALGO_PARAMS="${EASYRSA_KEY_SIZE}" + else + die "Alg '$EASYRSA_ALGO' is invalid: must be 'rsa' or 'ec'" + fi + + # Setting OPENSSL_CONF prevents bogus warnings (especially useful on win32) + export OPENSSL_CONF="$EASYRSA_SSL_CONF" +} # vars_setup() + +# variable assignment by indirection when undefined; merely exports +# the variable when it is already defined (even if currently null) +# Sets $1 as the value contained in $2 and exports (may be blank) +set_var() { + local var=$1 + shift + local value="$*" + eval "export $var=\"\${$var-$value}\"" +} #=> set_var() + +######################################## +# Invocation entry point: + +NL=' +' + +# Be secure with a restrictive umask +[ -z "$EASYRSA_NO_UMASK" ] && umask 077 + +# Parse options +while :; do + # Separate option from value: + opt="${1%%=*}" + val="${1#*=}" + empty_ok= # Empty values are not allowed unless excepted + + case "$opt" in + --days) + export EASYRSA_CERT_EXPIRE="$val" + export EASYRSA_CA_EXPIRE="$val" + export EASYRSA_CRL_DAYS="$val" + ;; + --pki-dir) + export EASYRSA_PKI="$val" ;; + --use-algo) + export EASYRSA_ALGO="$val" ;; + --keysize) + export EASYRSA_KEY_SIZE="$val" ;; + --curve) + export EASYRSA_CURVE="$val" ;; + --dn-mode) + export EASYRSA_DN="$val" ;; + --req-cn) + export EASYRSA_REQ_CN="$val" ;; + --digest) + export EASYRSA_DIGEST="$val" ;; + --req-c) + empty_ok=1 + export EASYRSA_REQ_COUNTRY="$val" ;; + --req-st) + empty_ok=1 + export EASYRSA_REQ_PROVINCE="$val" ;; + --req-city) + empty_ok=1 + export EASYRSA_REQ_CITY="$val" ;; + --req-org) + empty_ok=1 + export EASYRSA_REQ_ORG="$val" ;; + --req-email) + empty_ok=1 + export EASYRSA_REQ_EMAIL="$val" ;; + --req-ou) + empty_ok=1 + export EASYRSA_REQ_OU="$val" ;; + --ns-cert) + export EASYRSA_NS_SUPPORT="$val" ;; + --ns-comment) + empty_ok=1 + export EASYRSA_NS_COMMENT="$val" ;; + --batch) + empty_ok=1 + export EASYRSA_BATCH=1 ;; + --subca-len) + export EASYRSA_SUBCA_LEN="$val" ;; + --vars) + export EASYRSA_VARS_FILE="$val" ;; + --subject-alt-name) + export EASYRSA_EXTRA_EXTS="\ +$EASYRSA_EXTRA_EXTS +subjectAltName = $val" ;; + *) + break ;; + esac + + # fatal error when no value was provided + if [ ! $empty_ok ] && { [ "$val" = "$1" ] || [ -z "$val" ]; }; then + die "Missing value to option: $opt" + fi + + shift +done + +# Intelligent env-var detection and auto-loading: +vars_setup + +# Register clean_temp on EXIT +trap "clean_temp" EXIT + +# determine how we were called, then hand off to the function responsible +cmd="$1" +[ -n "$1" ] && shift # scrape off command +case "$cmd" in + init-pki|clean-all) + init_pki "$@" + ;; + build-ca) + build_ca "$@" + ;; + gen-dh) + gen_dh + ;; + gen-req) + gen_req "$@" + ;; + sign|sign-req) + sign_req "$@" + ;; + build-client-full) + build_full client "$@" + ;; + build-server-full) + build_full server "$@" + ;; + gen-crl) + gen_crl + ;; + revoke) + revoke "$@" + ;; + import-req) + import_req "$@" + ;; + export-p12) + export_pkcs p12 "$@" + ;; + export-p7) + export_pkcs p7 "$@" + ;; + set-rsa-pass) + set_pass rsa "$@" + ;; + set-ec-pass) + set_pass ec "$@" + ;; + update-db) + update_db + ;; + show-req) + show req "$@" + ;; + show-cert) + show cert "$@" + ;; + ""|help|-h|--help|--usage) + cmd_help "$1" + exit 0 + ;; + *) + die "Unknown command '$cmd'. Run without commands for usage help." + ;; +esac + +# vim: ft=sh nu ai sw=8 ts=8 noet diff --git a/vpn/testserver/easyrsa/gpl-2.0.txt b/vpn/testserver/easyrsa/gpl-2.0.txt new file mode 100644 index 0000000..1f963da --- /dev/null +++ b/vpn/testserver/easyrsa/gpl-2.0.txt @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Lesser General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Lesser General +Public License instead of this License. + diff --git a/vpn/testserver/easyrsa/openssl-1.0.cnf b/vpn/testserver/easyrsa/openssl-1.0.cnf new file mode 100644 index 0000000..d9109b5 --- /dev/null +++ b/vpn/testserver/easyrsa/openssl-1.0.cnf @@ -0,0 +1,137 @@ +# For use with Easy-RSA 3.0 and OpenSSL 1.0.* + +RANDFILE = $ENV::EASYRSA_PKI/.rnd + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = $ENV::EASYRSA_PKI # Where everything is kept +certs = $dir # Where the issued certs are kept +crl_dir = $dir # Where the issued crl are kept +database = $dir/index.txt # database index file. +new_certs_dir = $dir/certs_by_serial # default place for new certs. + +certificate = $dir/ca.crt # The CA certificate +serial = $dir/serial # The current serial number +crl = $dir/crl.pem # The current CRL +private_key = $dir/private/ca.key # The private key +RANDFILE = $dir/.rand # private random number file + +x509_extensions = basic_exts # The extentions to add to the cert + +# This allows a V2 CRL. Ancient browsers don't like it, but anything Easy-RSA +# is designed for will. In return, we get the Issuer attached to CRLs. +crl_extensions = crl_ext + +default_days = $ENV::EASYRSA_CERT_EXPIRE # how long to certify for +default_crl_days= $ENV::EASYRSA_CRL_DAYS # how long before next CRL +default_md = $ENV::EASYRSA_DIGEST # use public key default MD +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_anything + +# For the 'anything' policy, which defines allowed DN fields +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +name = optional +emailAddress = optional + +#################################################################### +# Easy-RSA request handling +# We key off $DN_MODE to determine how to format the DN +[ req ] +default_bits = $ENV::EASYRSA_KEY_SIZE +default_keyfile = privkey.pem +default_md = $ENV::EASYRSA_DIGEST +distinguished_name = $ENV::EASYRSA_DN +x509_extensions = easyrsa_ca # The extentions to add to the self signed cert + +# A placeholder to handle the $EXTRA_EXTS feature: +#%EXTRA_EXTS% # Do NOT remove or change this line as $EXTRA_EXTS support requires it + +#################################################################### +# Easy-RSA DN (Subject) handling + +# Easy-RSA DN for cn_only support: +[ cn_only ] +commonName = Common Name (eg: your user, host, or server name) +commonName_max = 64 +commonName_default = $ENV::EASYRSA_REQ_CN + +# Easy-RSA DN for org support: +[ org ] +countryName = Country Name (2 letter code) +countryName_default = $ENV::EASYRSA_REQ_COUNTRY +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +stateOrProvinceName_default = $ENV::EASYRSA_REQ_PROVINCE + +localityName = Locality Name (eg, city) +localityName_default = $ENV::EASYRSA_REQ_CITY + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = $ENV::EASYRSA_REQ_ORG + +organizationalUnitName = Organizational Unit Name (eg, section) +organizationalUnitName_default = $ENV::EASYRSA_REQ_OU + +commonName = Common Name (eg: your user, host, or server name) +commonName_max = 64 +commonName_default = $ENV::EASYRSA_REQ_CN + +emailAddress = Email Address +emailAddress_default = $ENV::EASYRSA_REQ_EMAIL +emailAddress_max = 64 + +#################################################################### +# Easy-RSA cert extension handling + +# This section is effectively unused as the main script sets extensions +# dynamically. This core section is left to support the odd usecase where +# a user calls openssl directly. +[ basic_exts ] +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always + +# The Easy-RSA CA extensions +[ easyrsa_ca ] + +# PKIX recommendations: + +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always + +# This could be marked critical, but it's nice to support reading by any +# broken clients who attempt to do so. +basicConstraints = CA:true + +# Limit key usage to CA tasks. If you really want to use the generated pair as +# a self-signed cert, comment this out. +keyUsage = cRLSign, keyCertSign + +# nsCertType omitted by default. Let's try to let the deprecated stuff die. +# nsCertType = sslCA + +# CRL extensions. +[ crl_ext ] + +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always,issuer:always + diff --git a/vpn/testserver/easyrsa/pki/.rnd b/vpn/testserver/easyrsa/pki/.rnd new file mode 100644 index 0000000000000000000000000000000000000000..abe7360efde74e2fdb760c29b9a4e495f1e25b8f GIT binary patch literal 1024 zcmV+b1poUjV$?OU#DbgG-2P4ndtGVHZ1s#cDHoJ9$qu(1ZG!GNi@&=$UE`8BDT6V=d;$WPuVP~idn&M)#MLXc zfou-HOuS8yY1|gtM^t-IROXdq(Cz{y zm|wJT=dMy~5ONg`AePOvkUs(f6hUD+N(1>qZ)({^nnq1l;zIDe^YkWzYGpR0O7u(!G8zE;<t1FDK1VUeapJTZ|Hg}o)z3xa9Q&D;@^ zoYf(Oi6st}uq{KWoVLezPH3K|7+bmM07AD=ID~;g05h6rKdH-Ri8(dYAqBXP928u*sN)!D2+CBtIp2(G$*xv`m0>WOHyv>(_xgbu!X`KeUEMnth4mnLO2 z$$rn9MdT+-rzY-4Oc&1Y8jP7Zxv5o%*c){ZclWo)f^0JJ7~s?SV#g1=Tgvl9u;=4I z_H=QbiBA)j;|pD-Hl`k^ywp+X%MV)e25HJEHc)EW8pOMRDa%qKY0x@LBh#}pZ&P)Z z#Ngikeu|hbnFxFGQo}F%84LSfm-gU;KjJt_fsn(agi?O=DKq9&=ozmL8xcMLe literal 0 HcmV?d00001 diff --git a/vpn/testserver/easyrsa/vars b/vpn/testserver/easyrsa/vars new file mode 100644 index 0000000..8c3dd85 --- /dev/null +++ b/vpn/testserver/easyrsa/vars @@ -0,0 +1,199 @@ +# Easy-RSA 3 parameter settings + +# NOTE: If you installed Easy-RSA from your distro's package manager, don't edit +# this file in place -- instead, you should copy the entire easy-rsa directory +# to another location so future upgrades don't wipe out your changes. + +# HOW TO USE THIS FILE +# +# vars.example contains built-in examples to Easy-RSA settings. You MUST name +# this file 'vars' if you want it to be used as a configuration file. If you do +# not, it WILL NOT be automatically read when you call easyrsa commands. +# +# It is not necessary to use this config file unless you wish to change +# operational defaults. These defaults should be fine for many uses without the +# need to copy and edit the 'vars' file. +# +# All of the editable settings are shown commented and start with the command +# 'set_var' -- this means any set_var command that is uncommented has been +# modified by the user. If you're happy with a default, there is no need to +# define the value to its default. + +# NOTES FOR WINDOWS USERS +# +# Paths for Windows *MUST* use forward slashes, or optionally double-esscaped +# backslashes (single forward slashes are recommended.) This means your path to +# the openssl binary might look like this: +# "C:/Program Files/OpenSSL-Win32/bin/openssl.exe" + +# A little housekeeping: DON'T EDIT THIS SECTION +# +# Easy-RSA 3.x doesn't source into the environment directly. +# Complain if a user tries to do this: +if [ -z "$EASYRSA_CALLER" ]; then + echo "You appear to be sourcing an Easy-RSA 'vars' file." >&2 + echo "This is no longer necessary and is disallowed. See the section called" >&2 + echo "'How to use this file' near the top comments for more details." >&2 + return 1 +fi + +# DO YOUR EDITS BELOW THIS POINT + +# This variable should point to the top level of the easy-rsa tree. By default, +# this is taken to be the directory you are currently in. + +#set_var EASYRSA "$PWD" + +# If your OpenSSL command is not in the system PATH, you will need to define the +# path to it here. Normally this means a full path to the executable, otherwise +# you could have left it undefined here and the shown default would be used. +# +# Windows users, remember to use paths with forward-slashes (or escaped +# back-slashes.) Windows users should declare the full path to the openssl +# binary here if it is not in their system PATH. + +#set_var EASYRSA_OPENSSL "openssl" +# +# This sample is in Windows syntax -- edit it for your path if not using PATH: +#set_var EASYRSA_OPENSSL "C:/Program Files/OpenSSL-Win32/bin/openssl.exe" + +# Edit this variable to point to your soon-to-be-created key directory. +# +# WARNING: init-pki will do a rm -rf on this directory so make sure you define +# it correctly! (Interactive mode will prompt before acting.) + +set_var EASYRSA_PKI "/home/dks/keys" + +# Define X509 DN mode. +# This is used to adjust what elements are included in the Subject field as the DN +# (this is the "Distinguished Name.") +# Note that in cn_only mode the Organizational fields further below aren't used. +# +# Choices are: +# cn_only - use just a CN value +# org - use the "traditional" Country/Province/City/Org/OU/email/CN format + +#set_var EASYRSA_DN "cn_only" + +# Organizational fields (used with 'org' mode and ignored in 'cn_only' mode.) +# These are the default values for fields which will be placed in the +# certificate. Don't leave any of these fields blank, although interactively +# you may omit any specific field by typing the "." symbol (not valid for +# email.) + +set_var EASYRSA_REQ_COUNTRY "LU" +set_var EASYRSA_REQ_PROVINCE "Grevenmacher" +set_var EASYRSA_REQ_CITY "Roodt-sur-Syre" +set_var EASYRSA_REQ_ORG "DKS sarl" +set_var EASYRSA_REQ_EMAIL "info@dks.lu" +set_var EASYRSA_REQ_OU "TestServer" + +# Choose a size in bits for your keypairs. The recommended value is 2048. Using +# 2048-bit keys is considered more than sufficient for many years into the +# future. Larger keysizes will slow down TLS negotiation and make key/DH param +# generation take much longer. Values up to 4096 should be accepted by most +# software. Only used when the crypto alg is rsa (see below.) + +#set_var EASYRSA_KEY_SIZE 2048 + +# The default crypto mode is rsa; ec can enable elliptic curve support. +# Note that not all software supports ECC, so use care when enabling it. +# Choices for crypto alg are: (each in lower-case) +# * rsa +# * ec + +#set_var EASYRSA_ALGO rsa + +# Define the named curve, used in ec mode only: + +#set_var EASYRSA_CURVE secp384r1 + +# In how many days should the root CA key expire? + +#set_var EASYRSA_CA_EXPIRE 3650 + +# In how many days should certificates expire? + +#set_var EASYRSA_CERT_EXPIRE 3650 + +# How many days until the next CRL publish date? Note that the CRL can still be +# parsed after this timeframe passes. It is only used for an expected next +# publication date. + +#set_var EASYRSA_CRL_DAYS 180 + +# Support deprecated "Netscape" extensions? (choices "yes" or "no".) The default +# is "no" to discourage use of deprecated extensions. If you require this +# feature to use with --ns-cert-type, set this to "yes" here. This support +# should be replaced with the more modern --remote-cert-tls feature. If you do +# not use --ns-cert-type in your configs, it is safe (and recommended) to leave +# this defined to "no". When set to "yes", server-signed certs get the +# nsCertType=server attribute, and also get any NS_COMMENT defined below in the +# nsComment field. + +#set_var EASYRSA_NS_SUPPORT "no" + +# When NS_SUPPORT is set to "yes", this field is added as the nsComment field. +# Set this blank to omit it. With NS_SUPPORT set to "no" this field is ignored. + +#set_var EASYRSA_NS_COMMENT "Easy-RSA Generated Certificate" + +# A temp file used to stage cert extensions during signing. The default should +# be fine for most users; however, some users might want an alternative under a +# RAM-based FS, such as /dev/shm or /tmp on some systems. + +#set_var EASYRSA_TEMP_FILE "$EASYRSA_PKI/extensions.temp" + +# !! +# NOTE: ADVANCED OPTIONS BELOW THIS POINT +# PLAY WITH THEM AT YOUR OWN RISK +# !! + +# Broken shell command aliases: If you have a largely broken shell that is +# missing any of these POSIX-required commands used by Easy-RSA, you will need +# to define an alias to the proper path for the command. The symptom will be +# some form of a 'command not found' error from your shell. This means your +# shell is BROKEN, but you can hack around it here if you really need. These +# shown values are not defaults: it is up to you to know what you're doing if +# you touch these. +# +#alias awk="/alt/bin/awk" +#alias cat="/alt/bin/cat" + +# X509 extensions directory: +# If you want to customize the X509 extensions used, set the directory to look +# for extensions here. Each cert type you sign must have a matching filename, +# and an optional file named 'COMMON' is included first when present. Note that +# when undefined here, default behaviour is to look in $EASYRSA_PKI first, then +# fallback to $EASYRSA for the 'x509-types' dir. You may override this +# detection with an explicit dir here. +# +#set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types" + +# OpenSSL config file: +# If you need to use a specific openssl config file, you can reference it here. +# Normally this file is auto-detected from a file named openssl-1.0.cnf from the +# EASYRSA_PKI or EASYRSA dir (in that order.) NOTE that this file is Easy-RSA +# specific and you cannot just use a standard config file, so this is an +# advanced feature. + +#set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf" + +# Default CN: +# This is best left alone. Interactively you will set this manually, and BATCH +# callers are expected to set this themselves. + +set_var EASYRSA_REQ_CN "DKS VPN Server" + +# Cryptographic digest to use. +# Do not change this default unless you understand the security implications. +# Valid choices include: md5, sha1, sha256, sha224, sha384, sha512 + +#set_var EASYRSA_DIGEST "sha256" + +# Batch mode. Leave this disabled unless you intend to call Easy-RSA explicitly +# in batch mode without any user input, confirmation on dangerous operations, +# or most output. Setting this to any non-blank string enables batch mode. + +#set_var EASYRSA_BATCH " " + diff --git a/vpn/testserver/easyrsa/x509-types/COMMON b/vpn/testserver/easyrsa/x509-types/COMMON new file mode 100644 index 0000000..3e9b633 --- /dev/null +++ b/vpn/testserver/easyrsa/x509-types/COMMON @@ -0,0 +1,7 @@ +# X509 extensions added to every signed cert + +# This file is included for every cert signed, and by default does nothing. +# It could be used to add values every cert should have, such as a CDP as +# demonstrated in the following example: + +#crlDistributionPoints = URI:http://example.net/pki/my_ca.crl diff --git a/vpn/testserver/easyrsa/x509-types/ca b/vpn/testserver/easyrsa/x509-types/ca new file mode 100644 index 0000000..ef525b6 --- /dev/null +++ b/vpn/testserver/easyrsa/x509-types/ca @@ -0,0 +1,13 @@ +# X509 extensions for a ca + +# Note that basicConstraints will be overridden by Easy-RSA when defining a +# CA_PATH_LEN for CA path length limits. You could also do this here +# manually as in the following example in place of the existing line: +# +# basicConstraints = CA:TRUE, pathlen:1 + +basicConstraints = CA:TRUE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid:always,issuer:always +keyUsage = cRLSign, keyCertSign + diff --git a/vpn/testserver/easyrsa/x509-types/client b/vpn/testserver/easyrsa/x509-types/client new file mode 100644 index 0000000..a7d81af --- /dev/null +++ b/vpn/testserver/easyrsa/x509-types/client @@ -0,0 +1,8 @@ +# X509 extensions for a client + +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always +extendedKeyUsage = clientAuth +keyUsage = digitalSignature + diff --git a/vpn/testserver/easyrsa/x509-types/san b/vpn/testserver/easyrsa/x509-types/san new file mode 100644 index 0000000..6c5bfc8 --- /dev/null +++ b/vpn/testserver/easyrsa/x509-types/san @@ -0,0 +1,2 @@ +[ san ] +subjectAltName=${ENV::SAN} diff --git a/vpn/testserver/easyrsa/x509-types/server b/vpn/testserver/easyrsa/x509-types/server new file mode 100644 index 0000000..bc024be --- /dev/null +++ b/vpn/testserver/easyrsa/x509-types/server @@ -0,0 +1,8 @@ +# X509 extensions for a server + +basicConstraints = CA:FALSE +subjectKeyIdentifier = hash +authorityKeyIdentifier = keyid,issuer:always +extendedKeyUsage = serverAuth +keyUsage = digitalSignature,keyEncipherment + diff --git a/vpn/testserver/keys/.rnd b/vpn/testserver/keys/.rnd new file mode 100644 index 0000000000000000000000000000000000000000..a96aa5156aa0d45198a85c6cb96193d3d04f2789 GIT binary patch literal 1024 zcmV+b1poV4kGZz>&Cx!&DaWz}VaB|JT)blD00zek-sm(U(`Z+<)}wc5P^Ve=;EoSV z2OFSUw#+lW#@2L3cfRWq0jz%OGU1-RlolEv$zIb5jBAyIAF$EnG2#Y3^jeGFCxDzH zo0Mve3{3#pI;qna$CALirNj6V(HWVTODWSb+z!C_c|LE3jL`P3{1or%0=%!?QIvXR z4Pzn6q^F`E0a|CS(@bn@%Q5!V6H>Huc5T8NxnUnszIl1RUZ#P%#hNFq_K4y9pmN2j z{La%2W#n}G&^0+Nv{hSKjY}a*2bMhQW0|mp)*(LBqB+Auay2&5W7`heSm^bY8^8q& z9U$!v-1`jL#qQOia=Px~s?o_Ve*{i{Qq?>o5p)Aw-u#t4E*zm*ycg6m&Hw6uT^e$G zQF5n>nB{Pe9vv!F2gZYGO3Zj`+5bgx3DX{=mAr-FvWFW@ zV}Pp6*%dXbWe7?@eF-@Q*A$ZhXpStQSce4{z0PR&d)`OJvUeGJ&xk`8$tn%AUakT!)Hgtb(y0{XeM+e662&v zrmO#D$*B04KA#1{uo<_k;Qr?+Dzz50mBTPDrvFgJ#uz=Z^pN5B{&*7R!QOFT zv)VGY;@G1g?~f!X(gx(I5Iijo`QxsB(<*q&did_ifconfig_ipv6_setup=0 +Tue Dec 5 11:27:26 2017 /sbin/ip link set dev tun0 up mtu 1500 +Tue Dec 5 11:27:26 2017 /sbin/ip addr add dev tun0 local 10.10.1.1 peer 10.10.1.2 +Tue Dec 5 11:27:26 2017 /sbin/ip route add 10.10.1.0/24 via 10.10.1.2 +Tue Dec 5 11:27:26 2017 Could not determine IPv4/IPv6 protocol. Using AF_INET +Tue Dec 5 11:27:26 2017 Socket Buffers: R=[212992->212992] S=[212992->212992] +Tue Dec 5 11:27:26 2017 UDPv4 link local (bound): [AF_INET][undef]:1196 +Tue Dec 5 11:27:26 2017 UDPv4 link remote: [AF_UNSPEC] +Tue Dec 5 11:27:26 2017 GID set to dks +Tue Dec 5 11:27:26 2017 UID set to dks +Tue Dec 5 11:27:26 2017 MULTI: multi_init called, r=256 v=256 +Tue Dec 5 11:27:26 2017 IFCONFIG POOL: base=10.10.1.4 size=62, ipv6=0 +Tue Dec 5 11:27:26 2017 IFCONFIG POOL LIST +Tue Dec 5 11:27:26 2017 Initialization Sequence Completed diff --git a/vpn/testserver/log/status.log b/vpn/testserver/log/status.log new file mode 100644 index 0000000..46a3001 --- /dev/null +++ b/vpn/testserver/log/status.log @@ -0,0 +1,8 @@ +OpenVPN CLIENT LIST +Updated,Tue Dec 5 11:51:24 2017 +Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since +ROUTING TABLE +Virtual Address,Common Name,Real Address,Last Ref +GLOBAL STATS +Max bcast/mcast queue length,0 +END -- 2.39.5