Amigos:

Usaba debian 11 con una VPN sin ningún problema. Realizo una instalación limpia de Debian 12 y ahora me sale esto

2023-06-21 09:56:28 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2023-06-21 09:56:28 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your config
uration and/or add BF-CBC to --data-ciphers.
2023-06-21 09:56:28 OpenVPN 2.6.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-06-21 09:56:28 library versions: OpenSSL 3.0.9 30 May 2023, LZO 2.10
2023-06-21 09:56:28 DCO version: N/A
2023-06-21 09:56:28 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Enter Private Key Password: ********
2023-06-21 09:56:33 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2023-06-21 09:56:33 TCP/UDP: Preserving recently used remote address: [AF_INET]181.13.51.141:1194
2023-06-21 09:56:33 UDPv4 link local: (not bound)
2023-06-21 09:56:33 UDPv4 link remote: [AF_INET]181.13.51.141:1194
2023-06-21 09:56:33 VERIFY ERROR: depth=0, error=CA signature digest algorithm too weak: C=AR, ST=MZ, L=Mendoza, O=DIC, CN=server, emailAddress=ry...@mendoza.gov.ar, serial=465 2023-06-21 09:56:33 OpenSSL: error:0A000086:SSL routines::certificate verify failed
2023-06-21 09:56:33 TLS_ERROR: BIO read tls_read_plaintext error
2023-06-21 09:56:33 TLS Error: TLS object -> incoming plaintext read error
2023-06-21 09:56:33 TLS Error: TLS handshake failed
2023-06-21 09:56:33 SIGUSR1[soft,tls-error] received, process restarting
^C2023-06-21 09:56:34 SIGINT[hard,init_instance] received, process exiting

Alguna idea?

Responder a