Skip to main content

Verifying Access Server Downloads with SHA256SUM

Abstract

Official SHA256 checksums for OpenVPN Access Server downloads, including Linux packages, VM images, bundled clients, post-auth, and installation scripts.

When downloading Access Server files manually, you can verify that the files you receive are authentic and unaltered. One way to do this is by using SHA256 checksums, which provide a unique signature for each file. You can compare this signature with the one we provide to confirm the integrity of the downloaded files. If the checksum matches, you can be confident that the file is intact and authentic.

SHA256 checksums for Access Server files

Artifacts

Platform

Architecture

Package

SHA256SUM

RHEL 8

x86_64

openvpn-as-3.2.0_c21a0724-1.el8.x86_64.rpm

9c92f85fef3438e20cf9929cb9fa80f62bfa453c1f141d5fead5f22e94f363fa

RHEL 9

x86_64

openvpn-as-3.2.0_c21a0724-1.el9.x86_64.rpm

b9eaf6fca8411c0b6ece6081e3c6d51cd056a263e570363dbbe4f10a2e13badc

RHEL 10

x86_64

openvpn-as-3.2.0_c21a0724-1.el10.x86_64.rpm

e16aa27331b50ab20c4e63e8daf3a272e3ab2e54dcdc236987d4f9c73ace7bdf

Debian 12 (Bookworm)

amd64

openvpn-as_3.2.0-c21a0724-Debian12_amd64.deb

428690cdffbaa9255c1ff1b4e3e8d275b51d5456d8dd19b2d67c18114c340e7e

Debian 13 (Trixie)

amd64

openvpn-as_3.2.0-c21a0724-Debian13_amd64.deb

1397b54462203a0077ae49fb836549b97e758ddc04581c6d8de5e4a927a6e5bf

Ubuntu 22 (Jammy)

amd64

openvpn-as_3.2.0-c21a0724-Ubuntu22_amd64.deb

929a50fdab904e54e0d98c0410d3186e7f796d7ffbcede91e0304d5950e01ed7

Ubuntu 22 (Jammy)

arm64

openvpn-as_3.2.0-c21a0724-Ubuntu22_arm64.deb

297abd9e75e20cb7243c810e044136c6c4a1b8b3abd3cd1f592f171fe0b749ce

Ubuntu 24 (Noble)

amd64

openvpn-as_3.2.0-c21a0724-Ubuntu24_amd64.deb

bd9fa838e1d877eb9d9072db9040245c4a929017ddcaf64a2040e91cce03b11a

Ubuntu 24 (Noble)

arm64

openvpn-as_3.2.0-c21a0724-Ubuntu24_arm64.deb

4c2b4dc1b2aac4c7789fe50baae4ffc968d6fa6f20a3befa7f8a8cd23e207bc9

VMware ESXi

x86_64

as-ubuntu-image-noble-3.1.0.ova

b5e2ebb967229b4838506f8a0a94330b7e3f2b89be1b38283566f48291606027

Hyper-V

x86_64

as-ubuntu-image-noble-3.1.0.vhdx.zip

fcc5b64bb9d3a3db7dd7dae9dc571939abf65d871a8cd868cf9f99cf6c38ef8b

Debian/Ubuntu (clients bundle)

all

openvpn-as-bundled-clients-latest.deb

be1e15752555470bee3527d72e49502648f5b1c26248ff00cee607a97d9b2140

RHEL (clients bundle)

all

openvpn-as-bundled-clients-latest.rpm

843790fa48fed3c784b00d08b9a62f26e499406707d812f515a64f7e32b52418

Scripts

File Name

SHA256SUM

Version

install.sh

40287bc6cdd1a985cc8a414da7cb344808d6124ed591346f8ac4b69c5683b791

2.0

bridge-down.sh

279a3321fd2760d6eb1acb0ba71c9b862bc33c9ced1efa775142d4697b28a848

1.0

bridge-up.sh

5538ee6e9d6cb2e2bb5882d54c69fd044ca89375c1406ad5432877d01369c091

1.0

aws-updown.sh

8ecd0465d6ba39ba376c76f129aaa6ac303c47f9783810b25fe1591e6270a77b

1.0

ipsec.conf

4da7378f563f079ecd635b2fb7201308ab33269b707a71b687c234a6dfb9167d

1.1

ipsec.secrets

46fe56cd944fb8c87c7fbf24d50c9730e361228be5b57a5de04dac0f901fff35

1.0

pascrs.py

a260aaf39d7b8d3cf6474a852c69a50c7929c4839d5a323a1671fbc69949e9b2

1.0

pasvar.py

4c1c45fa98b39d3372a7da1fcc6437241cb46a111ae98cb60a3e08c5428c0a44

1.0

post_auth_custom_auth.py

55f2fdb1d7b38d635b57443f4ab0e9aee2717d94e06ec5b14c36ca4a36397a08

1.0

post_auth_ip_address_checking.py

c62a78ec338815f9548f77d76166b5a2c050d79db6471fcf9f7fc040fa7d3741

1.0

post_auth_ldap_autologin_dbsave.py

8fefb1df6a82dda1181fcb25ae9ae21a44e437196e4829d963ec53394d9ce537

1.1

post_auth_mac_address_checking.py

608074f2de974145d9fd7646359504ab6f07759c4db8f8ab7ff290c4caa1af76

2.1

post_auth_pas_only.py

b4cf2e3d497516c59a4a7ba55aa8a3cbf538940122543652ab03d0f6eabb486f

1.1

post_auth_radius_mapping.py

0d838425e6387e2b0846c86e6ae30c2abc583b938c866911dbbdb306850410b1

2.1

post_auth_saml_group_mapping.py

fac6bea6ecb35c1e069ebe7a2f70460b71071c268661def4ecb80502001ec8e6

1.1

post_auth_x509_group.py

97266d0235fb47dd00687a737a43cc54a06a036e0c3b9a2cc83d8056b855a89e

1.0

post_auth_x509.py

22bd5dab4fc2bf299c76c793e72ba712038d700ac709e9034797e5a0dc731a67

1.0

SHA256SUM is a tool that generates a 256-bit hash (a unique string of characters) for a file. A calculation based on the file's contents generates this hash, and if even one byte of the file changes, the hash will be completely different. By comparing the hash of your downloaded file with the official hash provided by us, you can verify that the file hasn't been altered or corrupted.

  1. Verifying the file ensures it wasn't corrupted during the download process.

  2. Comparing the checksum helps protect against any unauthorized modifications to the file.

  3. Downloading a file from an official source may not always guarantee safety if the file is intercepted and altered. To ensure the file is legitimate, you should verify the checksum.

We recommend using the install.sh script from the Access Server Portal, as it leverages the operating system's built-in package manager to automatically authenticate packages with a trusted signing key, eliminating the need for manual verification. However, if preferred, you can manually validate the install.sh script's integrity using the SHA256 checksum provided in the table above.

For offline installations, you can manually check the integrity of any downloaded files using the provided SHA256 hashes. To verify a downloaded file, follow these steps:

  1. Connect to the console and get root privileges.

  2. Download the install script from the Access Server portal or manually download the Access Server file.

  3. Calculate the checksum of your downloaded file:

    sha256sum openvpn-as-x.deb1
    

    1

    Replace the filename with the file you want to check the integrity of.

  4. After running the command, the tool returns a checksum.

  5. Compare the checksum with the one listed for the file in the scripts table. If it matches, your file is authentic.

  • If you're using the installation script from the Access Server Portal, you can verify the integrity of install.sh by comparing the SHA256SUM and version from the scripts table.

  • The easiest way to ensure the authenticity of Access Server installation files is to use our install script, which leverages the operating system's built-in package manager to authenticate downloaded packages using a trusted signing key. This eliminates the need for manual file verification. However, suppose you prefer downloading the installation files manually, such as for offline installations. In that case, you can authenticate their integrity by comparing the files against the provided SHA256 hashes to ensure they haven't been tampered with or corrupted.