From 66aa4d602234d9b597bd7fb43acaef47e53a4a68 Mon Sep 17 00:00:00 2001 From: DL6ER Date: Wed, 18 Jan 2017 22:16:05 +0100 Subject: [PATCH] Updated Pi hole OpenVPN server (markdown) --- Pi-hole---OpenVPN-server.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/Pi-hole---OpenVPN-server.md b/Pi-hole---OpenVPN-server.md index b668a2c..561537b 100644 --- a/Pi-hole---OpenVPN-server.md +++ b/Pi-hole---OpenVPN-server.md @@ -79,7 +79,12 @@ Your whole network traffic will now securely be transferred to your Pi-hole. ![](http://www.dl6er.de/pi-hole/openVPN/VPNclients.png) --- -(Optional) If your server is visible to the world, you might want prevent port 53/80 from being accessible from the outside. You will still be able to connect to your Pi-hole from within the VPN. +### Optional: Security information +For security purposes, it is recommended that the CA machine should be separate from the machine running OpenVPN. If you loose control of your CA private key, you can no longer trust any certificates from this CA. Anyone with access to this CA private key can sign new certificates without your knowledge, which then can connect to your OpenVPN server without needing to modify anything on the VPN server. Place your CA files on a storage which can be offline as much as possible, only to be activated when you need to get a new certificate for a client or server. + +--- +### Optional: Firewall configuration (using iptables) +If your server is visible to the world, you might want prevent port 53/80 from being accessible from the outside. You will still be able to connect to your Pi-hole from within the VPN. Using `iptables`: First, verify that there is no rule that explicitly accepts `http` requests ```