Book Image

OpenVPN 2 Cookbook

Book Image

OpenVPN 2 Cookbook

Overview of this book

Table of Contents (19 chapters)
OpenVPN 2 Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Plaintext tunnel


In the very first recipe, we created a tunnel in which the data traffic was not encrypted. To create a completely plain text tunnel, we also disable the HMAC authentication. This can be useful when debugging a bad connection, as all traffic over the tunnel can now easily be monitored. In this recipe, we will look at how to do this. This type of tunnel is also useful when doing performance measurements, as it is the least CPU-intensive tunnel that can be established.

Getting ready

Install OpenVPN 2.0 or higher on two computers. Make sure the computers are connected over a network. For this recipe, the server computer was running CentOS 5 Linux and OpenVPN 2.1.1 and the client was running Fedora 13 Linux and OpenVPN 2.1.1.

As we are not using any encryption, no secret keys are needed.

How to do it...

  1. Launch the server (listening)-side OpenVPN process:

       [root@server]# openvpn \
                --ifconfig 10.200.0.1 10.200.0.2 \
                --dev tun -–auth none
    
  2. Then launch the client-side OpenVPN process:

       [root@client]# openvpn \
                --ifconfig 10.200.0.2 10.200.0.1 \
                --dev tun –-auth none\
                --remote openvpnserver.example.com
    
  3. The connection is established with two warning messages in the output:

    … ******* WARNING *******: null cipher specified, no encryption will be used

    … ******* WARNING *******: null MAC specified, no authentication will be used

How it works...

With this setup, absolutely no encryption is performed. All the traffic that is sent over the tunnel is encapsulated in an OpenVPN packet and then sent "as-is".

There's more...

To actually view the traffic, we can use tcpdump:

  • Set up the connection as outlined.

  • Start tcpdump and listen on the network interface, not the tunnel interface itself:

    [root]@client]# tcpdump -w -I eth0 -s 0 host openvpnserver \
               | strings
    
  • Now, send some text across the tunnel, using something like nc (Netcat). First, launch nc on the server side:

     [server]$ nc -l 31000
    
  • On the client side, launch nc in client mode and type the words hello and goodbye.

     [client]$ nc 10.200.0.1 3100
             hello
             goodbye
    
  • In the tcpdump window, you should now see: