OpenVPN Access Server 1.8.5 is now available. The biggest change in this release is the support for RHEL/CentOS 6, Ubuntu 12, Debian 6 and OpenSUSE 11 and 12. All releases are supported on both x86 and x64. The new version is available from the OpenVPN website.
Access Server release notes for 1.8.5 (changes made since 1.8.4)
* Fixed cross-site request forgery vulnerability (CSRF) in Admin web interface. This could potentially be exploited to modify Admin web interface settings if an administrative user visits a maliciously crafted web page while logged into the Admin web interface (Credit: Charlie Eriksen).
* Fixed DNS issue on Mac OS X 10.8 computers where, if DNS was pushed by the Access Server, it would not release upon disconnect on the client side.
* Adjustments to licensing system made to accommodate easier reactivation for environments where alterations to hardware parameters are expected – cloud computing, Amazon EC2, HA clusters, etc.
In this (video)-tutorial I’ll show you how to setup your own OpenVPN access server in just a few minutes! OpenVPN is an open source software application that implements VPN techniques for creating secure point-to-point connections.
In order to proceed, you’ll need the following:
A basic installation of CentOS 5.8 (32- or 64-bit)
A dedicated or virtual machine
After the installation of CentOS, head over to the OpenVPN website at http://www.openvpn.net and go to “VPN Solution”. Now click on “Access Server Software Packages”. Select the appropriate operating system. In my case it’s CentOS. Copy the URL of your OS version and make a choice between 32- or 64-bit. In my case it’s CentOS 5, 64-bit.
Head over to your terminal and execute the following command: