Subscribe to Security and News announcements
In the works: new apps, multi-app installations, clustering, better backups...
Open Source VPN solution
OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and more. OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.
Run from browser:
This appliance includes all the standard features in TurnKey Core, and on top of that:
- OpenVPN configurations:
- Initialization hooks to configure common OpenVPN deployments such as server, gateway and client profiles.
- All profiles support SSL/TLS certificates for authentication and key exchange.
- Server and gateway deployments include a convenience script to add clients, generating all required keys and certificates, as well as a unified ovpn profile for clients to easily connect to the VPN.
- Expiring obfuscated HTTPS urls can be created for clients to download their profiles (especially useful with mobile devices using a QR code scanner).
- The server profile supports a private subnet configuration, enabling clients to reach servers behind the OpenVPN server.
- The gateway profile configures connecting clients to tunnel all their traffic through the VPN.
- When adding clients in a server or gateway deployment, an optional parameter can be given to enable computers on a subnet behind the client to connect to the VPN.
- For added security, OpenVPN is configured to drops privilages, run in a chroot jail dedicated to CRL, and uses tls-auth for HMAC signature verification protecting againsts DoS attacks, port flooding, port scanning and buffer overflow vulnerabilities in the SSL/TLS implementation.
See the Usage documentation for further details, including Amazon VPC notes and cloudformation template.
Usage details & Logging in for Administration
No default passwords: For security reasons there are no default passwords. All passwords are set at system initialization time.
Ignore SSL browser warning: browsers don't like self-signed SSL certificates, but this is the only kind that can be generated automatically without paying a commercial Certificate Authority.
Web - point your browser at either:
- http://126.96.36.1999/ - not encrypted so no browser warning
- https://188.8.131.529/ - encrypted with self-signed SSL certificate
Username for OS system administration:
Login as root except on AWS marketplace which uses username admin.
- Point your browser to:
- Login with SSH client:
Special case for AWS marketplace:
* Replace 184.108.40.2069 with a valid IP or hostname.