Skip to content

Instantly share code, notes, and snippets.

@zfwf
Last active December 29, 2022 03:58
Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 2 You must be signed in to fork a gist
  • Save zfwf/64695924cb0941089f8163e73cfad209 to your computer and use it in GitHub Desktop.
Save zfwf/64695924cb0941089f8163e73cfad209 to your computer and use it in GitHub Desktop.
ubuntu openvpn configs
# Client configs, 16.04,
script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf
# network manager, 16.04, install below package to enable import openvpn client configs
sudo apt install network-manager-openvpn-gnome
# Client configs, 18.04/18.10
# nm-connection-editor can help with adding option below
script-security 2
up /etc/openvpn/update-systemd-resolved
down /etc/openvpn/update-systemd-resolved
## if you have the error: cert too weak (OpenSSL: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak)
## add to client config
tls-cipher "DEFAULT:@SECLEVEL=0"
# network manager, 18.04, install below package to enable import openvpn client configs
sudo apt install network-manager-openvpn-gnome
# to work around the cert too weak issue in network manager imported openvpn configs
# under the [vpn] section in `/etc/NetworkManager/system-connections/<connection name>` add the line:
tls-cipher=DEFAULT:@SECLEVEL=0
# if need additonal domains not specified by the dhcp push
domain-search=<domain1>;<domain2>;
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment