![]() ![]() ![]() Certificate is ready! Now it's time to do the Stunnel configuration. openvpn tunnel, ssh websocket ssl, v2ray vmess premium, trojan go server, shadowsocks ssr libev, wireguard, trojan gfw, Openssh, SSH SSHL, Stunnel SSL.You can store private key using different name too. That's totally fine and Stunnel can recognize it. I have openvpn runging on centos, I also installed stunnel on it. But our clients in china are having truble. Note that we are using same file name( stunnel.pem) to store Public and Private keys in the above command. The config files are as follows: server stunnel: foregroundyes chroot /var/lib/stunnel4 pid /stunnel4. I can connect the openvpn without stunnel. Openssl req -new -x509 -days 3650 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem Now you can generate certificate using below command:.stunnel - to obfuscate the OpenVPN connection. SubjectAltName = sans ] DNS.0 = localhostÄNS.1 = *.It's just a sample configuration file, If you wish, you can replace any of the part you want(such as countryName, commonName, sans etc.) and save the file as stunnel.cnf You will need the following software: openvpn - for the VPN connection. basicConstraints = CA: extendedKeyUsage = clientAuth Distinguished_name = req_distinguished_name Providing network security with the best server in the features of VPN, Shadowsock, Wireguard, PPTP, L2TP, openvpn, vmess, vless, trojan and websocket. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |