Thank you very much for the explanation.  It has been a while since we
have upgraded.  We are still using OpenVPN 2.1 beta 15.  Interestingly,
the latest version of OpenVPN, rc15 with openssl 0.9.8g still produces
the same error.  Thanks again - John

On Tue, 2008-12-23 at 10:15 -0500, Scott Rea wrote:
> It would appear that the client you were inst5alling on did not support 
> SHA256 - what version of OpenSSL does your version of OpenVPN include?
> Typically this can be a problem for what ever clients will use these 
> certs e.g. M$ only just added SHA256 support to XP in a recent update
> NIST made a recommendation that folks move to SHA256 asap after some 
> potential vulnerabilities were discovered in SHA1 - it just takes a 
> while to get all platforms moved up...
> Regards,
> _Scott
> 
> 
> John A. Sullivan III wrote:
> > On Tue, 2008-12-23 at 08:23 -0500, John A. Sullivan III wrote:
> >   
> >> On Tue, 2008-12-23 at 07:59 -0500, John A. Sullivan III wrote:
> >>     
> >>> On Tue, 2008-12-23 at 07:55 -0500, John A. Sullivan III wrote:
> >>>       
> >>>> Hello, all.  We're in a bit of a panic here this morning.  After working
> >>>> through various issues, we were delighted to be ready to move OpenCA
> >>>> 1.0.2 into production.  However, in this morning's testing, we found the
> >>>> PKCS#12 packages we issued for use with OpenVPN failing.
> >>>>
> >>>> The error from OpenVPN is:
> >>>> TLS_ERROR: BIO read tls_read_plaintext error: error:04067069:rsa
> >>>> routines:RSA_EAY_PUBLIC_DECRYPT:pkcs1 padding too short
> >>>>
> >>>> >From the little we've been able to find, this could be a key length
> >>>> error.  In version 0.9.2, we simply told it to use a key length of 1024.
> >>>> In 1.0.2, I gather that is now a function of the combination of LOA and
> >>>> key strength.  We chose Low and Base assuming that gave us a 1024 key.
> >>>> When we check the key, it claims to be 1024.  The 0.9.2 packages are
> >>>> working just fine.  Any idea what changed and how to fix it? Thanks -
> >>>> John
> >>>>         
> >>> I should mention we are using server side key generation - John
> >>>       
> >> We've tried using low and weak (512 bits), medium and base (1024 bits).
> >> All failed the same way.  We also tried removing the subjalt entries.
> >>
> >> In 0.9.2, we typically chose a Basic Request.  This option is no longer
> >> available in 1.0.2 so we have been choosing Browser Certificate Request
> >> and changing it to server side key generation. Would this cause a
> >> problem like this? Thanks - John
> >>     
> > Well . . . we've solved the acute problem but do not really know what we
> > have stepped into.  The fix was to edit the
> > etc/openca/openssl/openssl/User.conf.template and change default_md from
> > sha256 to sha1.  We first did this on the pub node but it did not solve
> > the problem.  It worked when we changed it on the RA node.  We have not
> > taken the time to figure out if it needed to be both or just the RA.
> >
> > However, this leaves us with several serious questions:
> >
> > 1) Why was sha256 a problem?
> > 2) Is this a problem for more than just user packages, e.g., VPN
> > servers, Web servers?
> > 3) Whose problem is this? Is it a bad choice of defaults on the part of
> > OpenCA and thus should be treated as an OpenCA bug or is this a
> > shortcoming with OpenVPN?
> >
> > Can anyone offer any insight into what has happened and how we have
> > fixed it? Thanks - John
> >   
> 
-- 
John A. Sullivan III
Open Source Development Corporation
+1 207-985-7880
jsulli...@opensourcedevel.com

http://www.spiritualoutreach.com
Making Christianity intelligible to secular society


------------------------------------------------------------------------------
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to