Just wanted to say thanks for this guide... Not doing anything complicated, just connecting to a public VPN server but your PDF was helpful....
Steps (in case anyone else looking)
a. Install openvpn, bridge-utils (probably not required) and network-manager-openvpn-gnome in admin
b. In ordinary user mode, register for VPN service and download .ovpn file, save securely. At this point you could use the 'Import' feature in the VPN connections tab but that doesn't work in 10.04 (at least with the file I had)
c. Open the file (say client.ovpn) and extract the following sections and save as separate files:
d. Use these files while setting up the VPN connection in Network Manager as described in pgs 8, 9, 10 of the guide.
File 1: ca.cert: All the text between the <ca> </ca> tags i.e. somthing like this
File 2: user.crt: All the test between the <cert> </cert> tags i.e.
File 3: private.key: All the text between the <key> </key> tags i.e.
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
File 4: tlsauth.key: All the text between the <tls-auth> </tls-auth> tags i.e.
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
e. Look for the following bits in the .ovpn file (or may be given in documentation from the VPN provider) and setup accordingly
e. In addition to the above fields make sure you use the Cipher and Hash function (under Advanced -> Security) prescribed by the VPN provider. In my case it's BF-CBC (Blowfish-CBC) and SHA1.
remote us.shieldexchange.com 1194 udp # Map to Gateway, Port & 'Use a TCP Connection' field (Advanced... in this case, no)
dev-type tun # Map to 'Use a TAP device' field in Advanced... (in this case, no)
key-direction 1 # Map to Key Direction in Advanced -> TLS Authentication along with the tlsauth.key