I got my (linux-based) laptop to punch through one layer of NAT just fine and resolved the routing problem below.<br><br>Is there a willing victim^H^H^H^H^H^H tester out there that could test how well mac support would work?<br>
<br>I'd need to generate a cert and script that worked with this:<br><br><a href="http://code.google.com/p/tunnelblick/" target="_blank">http://code.google.com/p/tunnelblick/</a><br><br>After running overnight, the <span class="il">openvpn</span> server grew to about 8MB in size, and seems to have stabilized there.<br>
<br><br><br><div class="gmail_quote">On Sun, May 29, 2011 at 3:01 PM, Dave Taht <span dir="ltr"><<a href="mailto:dave.taht@gmail.com">dave.taht@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
Using 1024 bit keys, openvpn over udp, an easy-rsa cert authority, using certificates and a setup as per <a href="http://openvpn.net/index.php/open-source/documentation/howto.html" target="_blank">http://openvpn.net/index.php/open-source/documentation/howto.html</a><br>
<br>(all the howtos on the web are obsolete, this one worked, I created a dir, did a make install, <br> and followed those instructions)<br><br>I hooked up 3 wndr3700 boxes in series for this test. I had to manually set it up to<br>
tunnel appropriately (it set up a tunnel to the wrong place, by default, it's just a config<br>option I haven't figured out, or so I hope)<br><br>connected via jupiter (acting as an openvpn server)<br> |<br>
leda (acting as a router)<br> |<br> aitne (acting as a client)<br clear="all"><br>I get 19Mbits/second, using iperf. Obviously, using openvpn as a server on these routers will not scale to a lot of users. However, 19Mbits is not bad, for the clients, for a first try, and is<br>
probably adversely effected by using a weak box as a server. <br><br>I'd be very interested to know if the clients can be made to work well through NAT.<br><br>A ping<br><br>20:46:46.674942 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>
20:46:46.681440 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br>20:46:47.675078 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>20:46:47.681193 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br>
20:46:48.675203 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>20:46:48.675818 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br><br>I'd like to give strongswan a shot at some point as the basic ipsec-tools, but I was<br>
pleased this turned out so easy once I found a piece of doc that was up to date.<br><font color="#888888"><br>-- <br>Dave Täht<br>SKYPE: davetaht<br>US Tel: <a href="tel:1-239-829-5608" value="+12398295608" target="_blank">1-239-829-5608</a><br>
<a href="http://the-edge.blogspot.com" target="_blank">http://the-edge.blogspot.com</a> <br>
</font></blockquote></div><br><br clear="all"><br>-- <br>Dave Täht<br>SKYPE: davetaht<br>US Tel: 1-239-829-5608<br><a href="http://the-edge.blogspot.com" target="_blank">http://the-edge.blogspot.com</a> <br>