{"id":713,"date":"2022-10-05T20:31:15","date_gmt":"2022-10-05T20:31:15","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=713"},"modified":"2022-10-05T20:31:15","modified_gmt":"2022-10-05T20:31:15","slug":"introducere-in-openvpn","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/","title":{"rendered":"Introducere \u00een OpenVPN"},"content":{"rendered":"<p>Internetul este la fel de important ca orice alt serviciu public \u00een lumea de ast\u0103zi. Primul lucru la care se g\u00e2nde\u0219te toat\u0103 lumea c\u00e2nd cump\u0103r\u0103 o cas\u0103 nou\u0103 sau deschide o firm\u0103 \u00eentr-o loca\u021bie nou\u0103 este o conexiune de internet fiabil\u0103, urmat\u0103 de electricitate, \u00eenc\u0103lzire, colectarea gunoiului \u0219i (dar nu neap\u0103rat) un serviciu telefonic.<\/p>\n<p>Unii pot sus\u021bine c\u0103 expresia \u201clumea a treia\u201d este incorect\u0103 \u0219i jignitoare. Cu programe precum \u201cUn laptop pentru fiecare copil\u201d \u0219i ini\u021biative ale unor firme precum Facebook \u0219i Google, multe na\u021biuni a\u0219a-zise din lumea a treia au acum acces la internet f\u0103r\u0103 ap\u0103 curent\u0103 sau sisteme de canalizare.<\/p>\n<p>Dar cu binele vine \u0219i r\u0103ul. De\u0219i oricine poate crea un site web, un cont de Facebook sau un cont de Twitter, nu toat\u0103 lumea o face cu inten\u021bii bune, inclusiv hackeri \u0219i infractori. C\u00e2nd sunt mul\u021bi utilizatori, exist\u0103 un risc crescut ca cineva s\u0103 \u00eencerce s\u0103 exploateze sistemul pentru c\u00e2\u0219tig personal.<\/p>\n<p>OpenVPN este un proiect open-source care a \u00eenceput \u00een 2002 cu scopul de a crea o solu\u021bie complet\u0103 de VPN SSL. OpenVPN cripteaz\u0103 datele trimise prin re\u021bele, ceea ce este deosebit de important atunci c\u00e2nd mul\u021bi utilizatori sunt pe aceea\u0219i re\u021bea.<\/p>\n<h2 id=\"the-history-of-interceptions-and-how-theyve-progressed-over-time\"><strong>Istoria intercept\u0103rilor \u0219i cum au evoluat de-a lungul timpului<\/strong><\/h2>\n<p>Istoric, te puteai baza pe faptul c\u0103 un mesaj r\u0103m\u00e2nea nealterat dac\u0103 era livrat \u00eentr-o scrisoare sigilat\u0103 cu cear\u0103 de c\u0103tre cineva de \u00eencredere. Cu toate acestea, pe m\u0103sur\u0103 ce timpul a trecut, interceptarea coresponden\u021bei a devenit mai simpl\u0103: Expeditorul putea s\u0103 o citeasc\u0103 sau s\u0103 o modifice \u00eenainte de a o transmite mai departe.<\/p>\n<p>Progresele tehnologice din timpul celui de-al Doilea R\u0103zboi Mondial au permis ambelor p\u0103r\u021bi s\u0103-\u0219i protejeze datele mai sigur prin exemple precum ma\u0219ina Enigma \u0219i vorbitorii de cod Navajo. Dup\u0103 r\u0103zboi, guvernul SUA a folosit aceste \u0219i alte tehnici pentru a-\u0219i proteja informa\u021biile.<\/p>\n<p>Pe m\u0103sur\u0103 ce timpul a trecut \u0219i tehnologia a evoluat, au fost necesare noi modalit\u0103\u021bi de a p\u0103stra datele \u00een siguran\u021b\u0103, aici intervine OpenVPN. OpenVPN folose\u0219te o combina\u021bie de criptografie cu cheie public\u0103 \u0219i SSL\/TLS pentru schimbul de chei. OpenVPN poate rula peste User Datagram Protocol (UDP) sau Transmission Control Protocol (TCP). OpenVPN ofer\u0103 multe caracteristici, cum ar fi tunelarea traficului IPv4 sau IPv6, rularea pe un singur port \u0219i altele.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-765\" style=\"color: #222222; font-family: Verdana, BlinkMacSystemFont, -apple-system, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif; font-size: 15px;\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Open-VPN-banner-min.png\" alt=\"Banner Open VPN\" width=\"800\" height=\"450\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Open-VPN-banner-min.png 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Open-VPN-banner-min-300x169.png 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Open-VPN-banner-min-768x432.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2><strong>Edi\u021bia Comunitar\u0103 &amp; <\/strong><strong>Ope<\/strong><strong>nVPN Protocol de Tunelare<\/strong><\/h2>\n<p>OpenVPN este disponibil \u00een dou\u0103 versiuni:\u00a0<em>OpenVPN Edi\u021bia Comunitar\u0103<\/em>, care este gratuit\u0103 \u0219i open-source, \u0219i\u00a0<em>OpenVPN Protocol de Tunelare, care este un produs comercial.<\/em><\/p>\n<h3 id=\"openvpn-community-edition\"><strong>OpenVPN Edi\u021bia Comunitar\u0103<\/strong><\/h3>\n<p>OpenVPN este un proiect open-source la care oricine poate contribui \u0219i ruleaz\u0103 sub o licen\u021b\u0103 GPL. Configurarea CE este gratuit\u0103 dac\u0103 e\u0219ti familiarizat cu Linux \u0219i interfa\u021ba de linie de comand\u0103.<\/p>\n<p>OpenVPN Edi\u021bia Comunitar\u0103 este disponibil\u0103 pentru desc\u0103rcare pe site-ul OpenVPN.<\/p>\n<h3 id=\"openvpn-tunneling-protocol\"><strong>OpenVPN Protocol de Tunelare<\/strong><\/h3>\n<p>Protocolul de tunelare OpenVPN folose\u0219te criptarea SSL pentru a garanta c\u0103 datele sunt protejate. Acest lucru se datoreaz\u0103 faptului c\u0103 se utilizeaz\u0103 criptarea AES-256, care este un standard folosit de guvernul SUA. Codul pentru audituri este disponibil pentru toat\u0103 lumea. Aceasta \u00eenseamn\u0103 c\u0103 oamenii pot g\u0103si \u0219i remedia vulnerabilit\u0103\u021bile. \u00cen plus, protocolul ofer\u0103 conexiuni mai rapide \u0219i poate trece de majoritatea firewall-urilor.<\/p>\n<p>Alte beneficii ale Protocolului de Tunelare OpenVPN includ:<\/p>\n<ul>\n<li><strong>Suport\u0103:<\/strong>\u00a0Windows, macOS, Linux, iOS, Android<\/li>\n<li><strong>Conecteaz\u0103<\/strong>: P\u00e2n\u0103 la 5 dispozitive la viteze mai mari cu OpenVPN 2.4P<\/li>\n<li><strong>Tunelare:<\/strong>\u00a0Protocolul de tunelare OpenVPN poate tunela prin firewall-uri \u0219i NAT-uri<\/li>\n<li><strong>API<\/strong>: API u\u0219or de utilizat pentru dezvoltatori<\/li>\n<\/ul>\n<h2 id=\"what-is-a-vpn\"><strong>Ce este un VPN?<\/strong><\/h2>\n<p>Un administrator poate conecta c\u00e2teva PC-uri pe re\u021bele diferite pentru a crea iluzia c\u0103 \u00eemp\u0103rt\u0103\u0219esc aceea\u0219i re\u021bea local\u0103. Ma\u0219inile ar putea fi \u00een aceea\u0219i camer\u0103, pe p\u0103r\u021bi opuse ale lumii sau utiliz\u00e2nd diferite tipuri de conexiuni, cum ar fi uplink-uri wireless, satelit \u0219i conexiuni dial-up.<\/p>\n<p>Litera \u201cP\u201d din VPN reprezint\u0103 confiden\u021bialitate, a\u0219a c\u0103 re\u021beaua virtual\u0103 se nume\u0219te VPN. Tunelul (VPN) se refer\u0103 la traficul de re\u021bea care circul\u0103 printr-un VPN, \u00een timp ce tot traficul este considerat \u00een afara tunelului.<\/p>\n<p>Graficul urm\u0103tor arat\u0103 cum traficul de re\u021bea circul\u0103 prin mai multe sec\u021biuni ale unei re\u021bele \u0219i internetului. Deoarece HTTPS \u0219i SSH sunt protocoale de comunica\u021bie mai sigure, analizarea acestui tip de date este mult mai u\u0219oar\u0103. Cineva trebuie s\u0103 atace traficul de re\u021bea pentru a determina ce tip de conexiune se stabile\u0219te de la care computer la care server, chiar dac\u0103 pot fi v\u0103zute.<\/p>\n<p>C\u00e2nd se folose\u0219te un VPN, traficul din interiorul tunelului nu mai este identificabil.<\/p>\n<h2 id=\"which-traffic-can-be-routed-through-a-vpn\"><strong>Ce trafic poate fi direc\u021bionat printr-un VPN?<\/strong><\/h2>\n<p>Re\u021beaua virtual\u0103 privat\u0103 (VPN) poate cripta \u0219i tunela orice tip de trafic, inclusiv imagini, filme, navigare pe web, email \u0219i mesaje text. Unele programe populare care folosesc VPN-uri sunt:<\/p>\n<p><strong>Bancomate<\/strong>: Prin utilizarea unui VPN, bancomatele se pot conecta la sisteme bancare cu securitate sporit\u0103.<\/p>\n<p><strong>Wi-Fi Public<\/strong>: Re\u021belele Wi-Fi publice sunt poten\u021biale focare pentru atacuri de securitate. Prin utilizarea unui VPN, po\u021bi cripta traficul astfel \u00eenc\u00e2t nimeni s\u0103 nu poat\u0103 spiona datele tale.<\/p>\n<p><strong>Re\u021bele de acas\u0103<\/strong>: Po\u021bi folosi un VPN pentru a te conecta la re\u021beaua de acas\u0103 de oriunde. Acest lucru este deosebit de util dac\u0103 ai o cas\u0103 inteligent\u0103 cu dispozitive care trebuie conectate la re\u021belele tale de acas\u0103, cum ar fi o camer\u0103 de securitate sau un sistem de automatizare a casei.<\/p>\n<p><strong>Ocolirea cenzurii \u021b\u0103rii:<\/strong>\u00a0Pentru persoanele care tr\u0103iesc \u00een regimuri opresive, cum ar fi Coreea de Nord sau China, cenzura din partea blocadelor guvernamentale este o preocupare presant\u0103. \u201cMarele Firewall al Chinei\u201d opre\u0219te cet\u0103\u021benii s\u0103 acceseze lumea exterioar\u0103 \u0219i s\u0103 ob\u021bin\u0103 \u0219tiri \u0219i informa\u021bii care ar putea inspira rebeliune\u2014VPN-urile ofer\u0103 o modalitate de a ocoli aceste restric\u021bii.<\/p>\n<p><strong>Re\u021bele de afaceri<\/strong>: Corpora\u021biile \u0219i alte organiza\u021bii pot folosi un VPN pentru a conecta mai multe loca\u021bii de birouri sau chiar centre de date \u00eentregi. Proced\u00e2nd astfel, pot \u00eembun\u0103t\u0103\u021bi comunicarea \u0219i colaborarea \u00eentre angaja\u021bi, protej\u00e2nd \u00een acela\u0219i timp datele sensibile.<\/p>\n<p><strong>Servicii GeoIP<\/strong>: Mai multe site-uri web, inclusiv Hulu, YouTube \u0219i Netflix, folosesc baze de date GeoIP \u0219i alte \u00eenregistr\u0103ri pentru a livra con\u021binut pe baza loca\u021biei. Po\u021bi accesa materiale indisponibile \u00een zona ta prin \u201cs\u0103ritura\u201d conexiunii computerului t\u0103u printr-un server VPN mai aproape de regiunea geografic\u0103 dorit\u0103. \u00cen plus, un VPN te va proteja de orice penalit\u0103\u021bi legale asociate cu vizionarea de filme interzise sau programe TV protejate prin drepturi de autor.<\/p>\n<p>Tunelul privat este complet izolat de internetul public. De\u0219i VPN-ul \u00een sine c\u0103l\u0103tore\u0219te pe internet ca \u00een imaginea de mai sus, dispozitivele de-a lungul traseului s\u0103u vor putea vedea doar traficul VPN; nu vor \u0219ti ce se transmite \u00een interiorul tunelului securizat. Asta pentru c\u0103 un VPN nu doar cripteaz\u0103 traficul din interiorul s\u0103u, ci \u0219i fluxurile de date individuale de la al\u021bi utilizatori din afara acestuia. Cu alte cuvinte, chiar dac\u0103 cineva ar putea intercepta unul dintre aceste fluxuri de date, nu ar putea s\u0103-l decodeze pentru c\u0103 VPN-ul l-ar cripta \u00een continuare.<\/p>\n<p>Routerele \u0219i firewall-urile de pe ambele p\u0103r\u021bi creeaz\u0103 tunelul. Dac\u0103 nu iei m\u0103suri speciale pentru a controla traficul VPN, tot traficul de re\u021bea care trece prin tunelul VPN va omite orice m\u0103suri de securitate obi\u0219nuite.<\/p>\n<h2 id=\"data-encryption-and-authentication\"><strong>Criptarea \u0219i autentificarea datelor<\/strong><\/h2>\n<p>VPN-urile folosesc criptarea \u0219i autentificarea pentru a \u00eempiedica alte persoane s\u0103 vad\u0103 datele tale. Criptarea face datele greu de \u00een\u021beles, iar autentificarea asigur\u0103 c\u0103 doar persoanele potrivite le pot vedea.<\/p>\n<p>Primul strat de securitate este autentificarea, care verific\u0103 faptul c\u0103 doar utilizatorii autoriza\u021bi pot accesa serviciul. Acest lucru ar putea fi f\u0103cut cu certificate pentru fiecare utilizator sau un nume de utilizator \u0219i parol\u0103. Dup\u0103 aceea, utilizatorii pot stabili propriile restric\u021bii, cum ar fi anumite rute sau set\u0103ri de firewall. Acestea sunt \u00een general limitate la o singur\u0103 instalare; cu toate acestea, pot fi personalizate.<\/p>\n<p>\u00cen al doilea r\u00e2nd, trebuie s\u0103 protej\u0103m mai mult canalul de comunicare. Pentru a face acest lucru, vom semna fiecare pachet care este transmis. Aceasta \u00eenseamn\u0103 c\u0103 fiecare sistem va verifica dac\u0103 pachetele VPN pe care le prime\u0219te sunt corect semnate. Prin autentificarea pachetelor care au fost criptate, un sistem poate economisi timp de procesare prin a nu decripta pachetele care nu \u00eendeplinesc criteriile de autentificare. Dac\u0103 p\u0103str\u0103m cheile de semnare \u00een siguran\u021b\u0103, aceasta previne atacurile de tip denial-of-service!<\/p>\n<h2 id=\"pptp-vs-openvpn\"><strong>PPTP vs OpenVPN<\/strong><\/h2>\n<p>Dezvoltat de Microsoft, PPTP (Point-to-Point Tunneling Protocol) este unul dintre cele mai vechi \u0219i mai comune protocoale VPN. OpenVPN este pu\u021bin mai modern \u0219i poate fi mai sigur dac\u0103 este configurat corect.<\/p>\n<p>OpenVPN folose\u0219te SSL\/TLS pentru criptare, aceea\u0219i tehnologie pe care o folose\u0219te browserul t\u0103u web pentru a se conecta la site-uri web securizate. OpenVPN este mai flexibil \u0219i poate fi configurat pentru diferite cazuri de utilizare, \u00een timp ce PPTP este foarte u\u0219or de configurat, dar mai pu\u021bin flexibil.<\/p>\n<p>De\u0219i OpenVPN este mai sigur dec\u00e2t PPTP, poate fi mai dificil de configurat. Dac\u0103 nu te sim\u021bi confortabil s\u0103 configurezi un VPN, poate vrei s\u0103 folose\u0219ti PPTP.<\/p>\n<h2 id=\"how-to-use-openvpn\"><strong>Cum s\u0103 folose\u0219ti OpenVPN?<\/strong><\/h2>\n<h3 id=\"for-windows-platforms\"><strong>Pentru platformele Windows<\/strong><\/h3>\n<p>Mai \u00eent\u00e2i, trebuie s\u0103 descarci clientul OpenVPN. Utilizatorii de Windows \u0219i Mac pot g\u0103si cea mai recent\u0103 versiune, V3,\u00a0<a href=\"https:\/\/openvpn.net\/client-connect-vpn-for-windows\/\" target=\"_blank\" rel=\"noreferrer noopener\">aici<\/a>.<\/p>\n<p>Dup\u0103 ce ai instalat clientul OpenVPN, lanseaz\u0103-l \u0219i import\u0103 fi\u0219ierul .ovpn din<\/p>\n<p>Odat\u0103 ce ai instalat clientul OpenVPN, trebuie s\u0103 descarci un fi\u0219ier de configurare. Acest fi\u0219ier spune clientului OpenVPN cum s\u0103 se conecteze la serverul VPN. Po\u021bi ob\u021bine acest fi\u0219ier de la furnizorul t\u0103u de VPN.<\/p>\n<p>Odat\u0103 ce ai desc\u0103rcat fi\u0219ierul de configurare, deschide-l cu clientul OpenVPN. Clientul OpenVPN \u00ee\u021bi va cere numele de utilizator \u0219i parola. Dup\u0103 ce le-ai introdus, clientul OpenVPN se va conecta la serverul VPN.<\/p>\n<p>OpenVPN ruleaz\u0103 acum \u00een fundal. Po\u021bi verifica acest lucru verific\u00e2nd adresa ta IP. Pentru a face acest lucru, viziteaz\u0103\u00a0<a href=\"https:\/\/www.whatismyip.com\/ip-address-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">whatismyip.com<\/a>. Ar trebui s\u0103 vezi c\u0103 adresa ta IP s-a schimbat.<\/p>\n<h3 id=\"for-macos-platforms\"><strong>Pentru platformele macOS<\/strong><\/h3>\n<p>Dac\u0103 folose\u0219ti un Mac, po\u021bi folosi clientul OpenVPN pentru macOS. Cea mai recent\u0103 versiune poate fi desc\u0103rcat\u0103\u00a0<a href=\"https:\/\/openvpn.net\/client-connect-vpn-for-mac-os\/\" target=\"_blank\" rel=\"noreferrer noopener\">aici<\/a>.<\/p>\n<p>Odat\u0103 ce ai instalat clientul OpenVPN, trebuie s\u0103 descarci un fi\u0219ier de configurare. Acest fi\u0219ier spune clientului OpenVPN cum s\u0103 se conecteze la serverul VPN. Po\u021bi ob\u021bine acest fi\u0219ier de la furnizorul t\u0103u de VPN.<\/p>\n<p>Dup\u0103 desc\u0103rcarea fi\u0219ierului de configurare, deschide-l cu clientul OpenVPN. Clientul OpenVPN \u00ee\u021bi va cere numele de utilizator \u0219i parola. Dup\u0103 ce le-ai introdus, clientul OpenVPN se va conecta la serverul VPN.<\/p>\n<p>OpenVPN ruleaz\u0103 acum \u00een fundal. Po\u021bi verifica acest lucru verific\u00e2nd adresa ta IP. Pentru a face acest lucru, viziteaz\u0103 whatismyip.com. Ar trebui s\u0103 vezi c\u0103 adresa ta IP s-a schimbat.<\/p>\n<h3 id=\"for-linux-platforms\"><strong>Pentru platformele Linux<\/strong><\/h3>\n<p>Dac\u0103 folose\u0219ti Linux, po\u021bi folosi clientul OpenVPN pentru Linux. Cea mai recent\u0103 versiune poate fi desc\u0103rcat\u0103\u00a0<a href=\"https:\/\/openvpn.net\/cloud-docs\/openvpn-3-client-for-linux\/\" target=\"_blank\" rel=\"noreferrer noopener\">aici<\/a>.<\/p>\n<h4 id=\"installation-for-debian-and-ubuntu\"><strong>Instalare pentru Debian \u0219i Ubuntu<\/strong><\/h4>\n<p>Dac\u0103 folose\u0219ti Debian sau Ubuntu, po\u021bi instala OpenVPN cu urm\u0103toarea comand\u0103:<\/p>\n<ol>\n<li>Deschide Terminalul ap\u0103s\u00e2nd <strong>ctrl<\/strong> + <strong>alt<\/strong> + <strong>T<\/strong><\/li>\n<li>\u00a0Introdu urm\u0103toarea comand\u0103 \u00een Terminal:\u00a0<code>sudo apt install apt-transport-https<\/code>. Apoi introdu parola de root.<\/li>\n<li>Tasteaz\u0103 urm\u0103toarea comand\u0103: <code>sudo wget https:\/\/swupdate.openvpn.net\/repos\/openvpn-repo-pkg-key.pub<\/code>. Aceasta va desc\u0103rca cheia de depozit OpenVPN folosit\u0103 de pachetele OpenVPN 3 Linux.<\/li>\n<li>Introdu urm\u0103toarea comand\u0103 \u00een Terminal:\u00a0<code>sudo apt-key add openvpn-repo-pkg-key.pub<\/code><\/li>\n<li>Introdu urm\u0103toarea comand\u0103 \u00een Terminal: <code>sudo wget -O \/etc\/apt\/sources.list.d\/openvpn3.list https:\/\/swupdate.openvpn.net\/community\/openvpn3\/repos\/openvpn3-$DISTRO.list<\/code>. \u00cen func\u021bie de distribu\u021bia ta Debian\/Ubuntu, trebuie s\u0103 \u00eenlocuie\u0219ti\u00a0<em>$DISTRO<\/em>\u00a0cu numele corect al versiunii din tabelul de mai jos.<\/li>\n<li>Introdu urm\u0103toarea comand\u0103 \u00een Terminal:\u00a0<code>sudo apt update<\/code><\/li>\n<li>Introdu urm\u0103toarea comand\u0103 \u00een Terminal:\u00a0<code>sudo apt install openvpn3<\/code>. Acest cod va instala pachetul OpenVPN 3.<\/li>\n<\/ol>\n<h4 id=\"installation-using-ovpn-profile\"><strong>Instalare folosind profilul .ovpn<\/strong><\/h4>\n<p>Dac\u0103 ai un profil OpenVPN (fi\u0219ier .ovpn) de la furnizorul t\u0103u de VPN, po\u021bi folosi acest profil pentru a te conecta la serverul VPN.<\/p>\n<ol>\n<li>Pentru a crea un profil de configurare one-shot, tasteaz\u0103 urm\u0103toarea comand\u0103 \u00een Terminal:\u00a0<code>openvpn3 session-start --config ${MY_CONFIGURATION_FILE}.\u00a0<\/code><\/li>\n<li>Tasteaz\u0103 urm\u0103toarea comand\u0103 \u00een Terminal pentru a importa un fi\u0219ier de configurare \u0219i a \u00eencepe o sesiune VPN:\u00a0<code>openvpn3 config-import --config ${MY_CONFIGURATION_FILE}<\/code>.<\/li>\n<li>Pentru a stabili o nou\u0103 conexiune VPN dintr-un profil importat, folose\u0219te urm\u0103toarea comand\u0103:\u00a0<code>openvpn3 session-start --config ${CONFIGURATION_PROFILE_NAME}<\/code>.<\/li>\n<\/ol>\n<h3 id=\"installation-for-red-hat-enterprise-linux-or-scientific-linux\"><strong>Instalare pentru Red Hat Enterprise Linux sau Scientific Linux<\/strong><\/h3>\n<p>Dac\u0103 folose\u0219ti Red Hat Enterprise Linux sau Scientific Linux 7, po\u021bi instala OpenVPN cu urm\u0103toarea comand\u0103:<\/p>\n<ol>\n<li>Mergi la bara de c\u0103utare \u0219i tasteaz\u0103 \u201c<strong>terminal.<\/strong>\u201c<br \/>\nRHEL\/CentOS 6: <code>sudo yum install https:\/\/dl.fedoraproject.org\/pub\/epel\/epel-release-latest-6.noarch.rpm<\/code>&nbsp;<\/p>\n<p>RHEL\/CentOS 7:\u00a0<code>sudo yum install https:\/\/dl.fedoraproject.org\/pub\/epel\/epel-release-latest-7.noarch.rpm<\/code><br \/>\nPe RHEL 7, este de asemenea recomandat s\u0103 activezi depozitele op\u021bionale, extras \u0219i HA, deoarece pachetele EPEL pot depinde de pachete din aceste depozite:\u00a0<code>sudo subscription-manager repos --enable \"rhel-*-optional-rpms\" --enable \"rhel-*-extras-rpms\" --enable \"rhel-ha-for-rhel-*-server-rpms\"<\/code><\/p>\n<p>&nbsp;<\/p>\n<p>RHEL\/CentOS 8:\u00a0<code>sudo yum install https:\/\/dl.fedoraproject.org\/pub\/epel\/epel-release-latest-8.noarch.rpm<\/code>Activeaz\u0103 serviciile necesare pe Red Hat 8.\u00a0<code>codeready-builder-for-rhel-8-${ARCH}-rpms repository deoarece pachetele EPEL pot depinde de pachete din acesta: sudo ARCH=$( \/bin\/arch ) urmat de sudo subscription-manager repos --enable \"codeready-builder-for-rhel-8-${ARCH}-rpms\"<\/code><\/p>\n<p>&nbsp;<\/p>\n<p>\u00cen plus, pentru utilizatorii CentOS 8 este recomandat s\u0103 activeze depozitul PowerTools, deoarece unele pachete EPEL pot depinde de pachete suplimentare din acesta:<code>sudo dnf config-manager --set-enabled PowerTools<\/code><\/li>\n<li>Instaleaz\u0103 mai \u00eent\u00e2i modulul yum copr. Pentru a face acest lucru, ruleaz\u0103 urm\u0103toarea comand\u0103: <code>sudo yum install yum-plugin-copr<\/code>.<\/li>\n<li>Porne\u0219te depozitul OpenVPN 3 Copr cu modulul Copr activat. Pentru a face acest lucru, folose\u0219te urm\u0103toarea comand\u0103: <code>sudo yum copr enable dsommers\/openvpn3<\/code><\/li>\n<li>Dup\u0103 instalare, clientul OpenVPN 3 Linux poate fi lansat folosind urm\u0103toarea comand\u0103:\u00a0<code>sudo yum install openvpn3-client<\/code><\/li>\n<\/ol>\n<p>OpenVPN este un instrument puternic \u0219i flexibil care poate fi folosit pentru a securiza \u00eentreaga ta conexiune la internet. Este important s\u0103 \u00een\u021belegi elementele de baz\u0103 ale modului \u00een care func\u021bioneaz\u0103 VPN-urile \u00eenainte de a \u00eencepe s\u0103 folose\u0219ti unul, dar odat\u0103 ce o faci, OpenVPN poate fi o modalitate excelent\u0103 de a-\u021bi p\u0103stra datele \u00een siguran\u021b\u0103.<\/p>","protected":false},"excerpt":{"rendered":"<p>Internetul este la fel de important ca orice alt serviciu public \u00een lumea de ast\u0103zi. Primul lucru la care se g\u00e2nde\u0219te oricine atunci c\u00e2nd cump\u0103r\u0103 o cas\u0103 nou\u0103 sau deschide o firm\u0103... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/\">Continue reading <span class=\"screen-reader-text\">Introducere \u00een OpenVPN<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1000,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vpn","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Introduction to OpenVPN | Security Briefing<\/title>\n<meta name=\"description\" content=\"Want to learn more about how OpenVPN works? This guide provides an introduction to the basics of this open source VPN software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to OpenVPN | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Want to learn more about how OpenVPN works? This guide provides an introduction to the basics of this open source VPN software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:31:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Introduction to OpenVPN\",\"datePublished\":\"2022-10-05T20:31:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/\"},\"wordCount\":2045,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg\",\"articleSection\":[\"VPN\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/\",\"url\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/\",\"name\":\"Introduction to OpenVPN | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg\",\"datePublished\":\"2022-10-05T20:31:15+00:00\",\"description\":\"Want to learn more about how OpenVPN works? This guide provides an introduction to the basics of this open source VPN software.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"Introduction to OpenVPN\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to OpenVPN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducere \u00een OpenVPN | Informare de Securitate","description":"Vrei s\u0103 afli mai multe despre cum func\u021bioneaz\u0103 OpenVPN? Acest ghid ofer\u0103 o introducere \u00een elementele de baz\u0103 ale acestui software VPN open source.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/","og_locale":"ro_RO","og_type":"article","og_title":"Introduction to OpenVPN | Security Briefing","og_description":"Want to learn more about how OpenVPN works? This guide provides an introduction to the basics of this open source VPN software.","og_url":"https:\/\/securitybriefing.net\/ro\/vpn-102\/introducere-in-openvpn\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:31:15+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"11 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Introduction to OpenVPN","datePublished":"2022-10-05T20:31:15+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/"},"wordCount":2045,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg","articleSection":["VPN"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/","url":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/","name":"Introducere \u00een OpenVPN | Informare de Securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg","datePublished":"2022-10-05T20:31:15+00:00","description":"Vrei s\u0103 afli mai multe despre cum func\u021bioneaz\u0103 OpenVPN? Acest ghid ofer\u0103 o introducere \u00een elementele de baz\u0103 ale acestui software VPN open source.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/Introduction-to-OpenVPN-2-1.jpg","width":558,"height":500,"caption":"Introduction to OpenVPN"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/vpn\/introduction-to-openvpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Introduction to OpenVPN"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=713"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/713\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1000"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}