On Tue, 2008-12-23 at 07:55 -0500, John A. Sullivan III wrote:
> Hello, all.  We're in a bit of a panic here this morning.  After working
> through various issues, we were delighted to be ready to move OpenCA
> 1.0.2 into production.  However, in this morning's testing, we found the
> PKCS#12 packages we issued for use with OpenVPN failing.
> 
> The error from OpenVPN is:
> TLS_ERROR: BIO read tls_read_plaintext error: error:04067069:rsa
> routines:RSA_EAY_PUBLIC_DECRYPT:pkcs1 padding too short
> 
> >From the little we've been able to find, this could be a key length
> error.  In version 0.9.2, we simply told it to use a key length of 1024.
> In 1.0.2, I gather that is now a function of the combination of LOA and
> key strength.  We chose Low and Base assuming that gave us a 1024 key.
> When we check the key, it claims to be 1024.  The 0.9.2 packages are
> working just fine.  Any idea what changed and how to fix it? Thanks -
> John
I should mention we are using server side key generation - John
-- 
John A. Sullivan III
Open Source Development Corporation
+1 207-985-7880
jsulli...@opensourcedevel.com

http://www.spiritualoutreach.com
Making Christianity intelligible to secular society


------------------------------------------------------------------------------
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to