Sign the certificate? :ġ out of 1 certificate requests certified, commit? You may leave the two following questions blank: A challenge password :Īnswer the two last questions with “Y”. You will be asked for information again you can accept your default values again. Run the command below in the current directory. build-ca Step 2- Generating a server key and certificate. Now move to the following directory: cd /etc/openvpn/easy-rsa/Īnd run the command below to create the “ca” files. you can hit “Enter” to accept your default values. Now you have to generate a “Certificate Authority (ca)” file. It’s recommended to run “./clean-all” right away to ensure that we have a clean certificate setup. clean-all, I will be doing a rm -rf on /etc/openvpn/easy-rsa/keys Run the above command and you will get the following message:
Now it’s time to generate the new keys and certificates: source. You may edit the values to your information here is the example: Then go to the easy-rsa directory and edit the “vars” file: cd /etc/openvpn/easy-rsa/ nano vars Now that you have installed OpenVPN successfully, you have to create keys and certificates, follow this section step by step: Step 1- Copy easy-rsa script generation to OpenVPN folder: cp -R /usr/share/easy-rsa/ /etc/openvpn/ Installing OpenVPN 2.3įirst, you have to install the OpenVPN app: apt-get install openvpn easy-rsa Configuring easy-rsa We are assuming that you have root permission, otherwise, you may start commands with “sudo”.
In this tutorial, we are going to show you how to make your own Linux OpenVPN server by installing the latest version:”openvpn-2.3″ If you want to access the internet safely and securely but you are connected to an untrusted network such as a hotel WiFi, a Virtual Private Network (VPN) allows you to use untrusted networks privately.