Hi Jeff,

On Thu, Nov 18, 2010 at 03:15:34PM +0800, Zheng, Jeff wrote:
> Do you mean compile with patch " [PATCH v0 1/2] openvpn: add suport for
> static key setup"? compile passed.

Yes, I don't have a static key setup (yet). So the patch should
compile fine but it will almost certently not work.

> But I still failed with SSL/TLS (not with the patch):

First let's get the TLS setup working. This should work(TM).

> # connect-vpn openvpn openvpn xfzheng.sh.intel.com sh.intel.com 
> /root/.openvpn/ca.crt /root/.openvpn/client1.crt /root/.openvpn/client1.key

This looks okay.

> sys.argv[7] is /root/.openvpn/client1.key
> Traceback (most recent call last):
>   File "/usr/lib/connman/test/connect-vpn", line 42, in <module>
>     "OpenVPN.Key": sys.argv[7]}))
>   File "/usr/lib/python2.6/site-packages/dbus/proxies.py", line 68, in 
> __call__
>     return self._proxy_method(*args, **keywords)
>   File "/usr/lib/python2.6/site-packages/dbus/proxies.py", line 140, in 
> __call__
>     **keywords)
>   File "/usr/lib/python2.6/site-packages/dbus/connection.py", line 630, in 
> call_blocking
>     message, timeout)
> dbus.exceptions.DBusException: org.moblin.connman.Error.NotSupported: Not 
> supported
 
Can you post the connman log? I can't figure what's going wrong.

> I can connect with openvpn directly. I'm using openvpn-2.1.3, both server and
> client disable comp-lzo. server is in 64bit fedora11 and client in meego 1.1

For reference here is the configuration for my openvpn server:

dev tun0
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key
dh /etc/openvpn/keys/dh1024.pem
server 10.1.0.0 255.255.255.0
push "redirect-gateway def1"
push "dhcp-option DNS 85.25.128.10"
push "dhcp-option DNS 85.25.255.10"
push "topology net30"

The topology and redirect-gateway push isn't really needed. It just a
left over from a debugging session.

daniel
_______________________________________________
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman

Reply via email to