Skip to main content

Verifying Access Server Downloads with SHA256SUM

When downloading Access Server files manually, you can ensure that the files you receive are authentic and have not been tampered with. One way to do this is by using SHA256 checksums, which provide a unique signature for each file. You can compare this signature with the one we provide to confirm the integrity of the downloaded files. If the checksum matches, you can be confident that the file is intact and authentic.

SHA256 checksums for Access Server files

Artifacts

File Name

SHA256SUM

openvpn-as-2.14.3_5936bcd7-1.el8.x86_64.rpm

31cc84f25e4cb5908d5d512f7c6cd6aa9f61a8c270d9292763feea7a30d65a91

openvpn-as-2.14.3_5936bcd7-1.el9.x86_64.rpm

83d0ca9a7eb015c9cfd0380a791d8061ca52022ae2645a5b6bbadce5e5f20718

openvpn-as_2.14.3-5936bcd7-Debian11_amd64.deb

8c0555f7c5259fcc5db72326c6b5183caea98388ca2003e2036decd6c5f04383

openvpn-as_2.14.3-5936bcd7-Debian12_amd64.deb

92aea33e99df97148581e69009d5b1bd5463f53b6f4b9c028ac9ec9981921176

openvpn-as_2.14.3-5936bcd7-Ubuntu20_amd64.deb

c7c1ff275b21eacc71c890bd3259780bffd89ee26d064e54db0d61746316f06a

openvpn-as_2.14.3-5936bcd7-Ubuntu20_arm64.deb

157758053f5512e98a063fbfb1f07b8d6c2ad45bb4efa542184493c43f56650f

openvpn-as_2.14.3-5936bcd7-Ubuntu22_amd64.deb

e99afbf93d2d3472c87c6a6e9aa62667d007f4cc99569894a38c3cac59c7f034

openvpn-as_2.14.3-5936bcd7-Ubuntu22_arm64.deb

7c351a8ec85dbec6df154b7111e1babd0586ffcf9064b8f2141c1cc7d49966ee

openvpn-as_2.14.3-5936bcd7-Ubuntu24_amd64.deb

7bce10ed73b282948f1d652daa980fe0db32d25f20096af557751c1d9a657d28

openvpn-as_2.14.3-5936bcd7-Ubuntu24_arm64.deb

c3422cb135a9d4041f69f74da8596a8feacff949a3dd94ee0ee5d9c843ba89f7

openvpn-as-bundled-clients_33_all.deb

143f606fea7adda7e8f80459da4920db2df178fba420e0df7d7bb5f64c594bfc

openvpn-as-bundled-clients-33-1.noarch.rpm

e461d6ecb1d7868c4d869e21e1392b6c72acaabdd34a9107ee6f99ed3aacb4ef

Scripts

File Name

SHA256SUM

Version

install.sh

91780c4c11126a35437343b5a652ee1ba676993d8647dbf434199d86ea767a9

1.5

bridge-down.sh

279a3321fd2760d6eb1acb0ba71c9b862bc33c9ced1efa775142d4697b28a848

1.0

bridge-up.sh

5538ee6e9d6cb2e2bb5882d54c69fd044ca89375c1406ad5432877d01369c091

1.0

ipsec.conf

0123c2613e9a605bb3f2f8817d1e466cbd9f2410450c7e7ddf8f353e4ea9042a

1.0

ipsec.secrets

df247bc3b5d82dc5a30539893a23731b73979345db2a18314cd8b641d367de75

1.0

ipsec.sh

131a9627a686fff6a1cbc067339a3c11057ca1dcf29108805217b6a16036ddff

1.0

pascrs.py

a260aaf39d7b8d3cf6474a852c69a50c7929c4839d5a323a1671fbc69949e9b2

1.0

pasvar.py

4c1c45fa98b39d3372a7da1fcc6437241cb46a111ae98cb60a3e08c5428c0a44

1.0

post_auth_custom_auth.py

55f2fdb1d7b38d635b57443f4ab0e9aee2717d94e06ec5b14c36ca4a36397a08

1.0

post_auth_ip_address_checking.py

c62a78ec338815f9548f77d76166b5a2c050d79db6471fcf9f7fc040fa7d3741

1.0

post_auth_ldap_autologin_dbsave.py

f96dc0a01f9794e9afa10a19df507c0b4cccc6815b440ffbeadad9e536a1827f

1.0

post_auth_mac_address_checking.py

a8adb293a50d304fb82b55adaafde21e1d2fe3d136523c127f5df11feb4604af

2.0

post_auth_pas_only.py

dcb41038549de251461559fb25c25e369a32c72685492ce5005a793fc52d508a

1.0

post_auth_radius_mapping.py

0d838425e6387e2b0846c86e6ae30c2abc583b938c866911dbbdb306850410b1

2.1

post_auth_saml_group_mapping.py

fac6bea6ecb35c1e069ebe7a2f70460b71071c268661def4ecb80502001ec8e6

1.1

SHA256SUM is a tool that generates a 256-bit hash (a unique string of characters) for a file. A calculation based on the file's contents generates this hash, and if even one byte of the file changes, the hash will be completely different. By comparing the hash of your downloaded file with the official hash provided by us, you can verify that the file hasn't been altered or corrupted.

  1. Verifying the file ensures it wasn't corrupted during the download process.

  2. Comparing the checksum helps protect against any unauthorized modifications to the file.

  3. Downloading a file from an official source may not always guarantee safety if the file is intercepted and altered. To ensure the file is legitimate, you should verify the checksum.

We recommend using the install.sh script from the Access Server Portal, as it leverages the operating system's built-in package manager to automatically authenticate packages with a trusted signing key, eliminating the need for manual verification. However, if preferred, you can manually validate the install.sh script's integrity using the SHA256 checksum provided in the table below.

For offline installations, you can manually check the integrity of any downloaded files using the provided SHA256 hashes. To verify a downloaded file, follow these steps:

  1. Connect to the console and get root privileges.

  2. Download the install script from the Access Server portal or manually download the Access Server file.

  3. Calculate the checksum of your downloaded file:

    sha256sum openvpn-as-x.deb1
    

    1

    Replace the filename with the file you want to check the integrity of.

  4. After running the command, the tool returns a checksum.

  5. Compare the checksum with the one listed for the file in the table below. If it matches, your file is authentic.

  • If you're using the installation script from the Access Server Portal, you can verify the integrity of install.sh with the last line in the table.

  • The easiest method to ensure the authenticity of Access Server installation files is to use our install script, which leverages the operating system's built-in package manager to authenticate downloaded packages using a trusted signing key automatically. This eliminates the need for manual file verification. However, suppose you prefer downloading the installation files manually, such as offline installations. In that case, you can authenticate their integrity by comparing the files against the provided SHA256 hashes to ensure they haven't been tampered with or corrupted.