Thank you very much for the explanation. It has been a while since we have upgraded. We are still using OpenVPN 2.1 beta 15. Interestingly, the latest version of OpenVPN, rc15 with openssl 0.9.8g still produces the same error. Thanks again - John
On Tue, 2008-12-23 at 10:15 -0500, Scott Rea wrote: > It would appear that the client you were inst5alling on did not support > SHA256 - what version of OpenSSL does your version of OpenVPN include? > Typically this can be a problem for what ever clients will use these > certs e.g. M$ only just added SHA256 support to XP in a recent update > NIST made a recommendation that folks move to SHA256 asap after some > potential vulnerabilities were discovered in SHA1 - it just takes a > while to get all platforms moved up... > Regards, > _Scott > > > John A. Sullivan III wrote: > > On Tue, 2008-12-23 at 08:23 -0500, John A. Sullivan III wrote: > > > >> On Tue, 2008-12-23 at 07:59 -0500, John A. Sullivan III wrote: > >> > >>> On Tue, 2008-12-23 at 07:55 -0500, John A. Sullivan III wrote: > >>> > >>>> Hello, all. We're in a bit of a panic here this morning. After working > >>>> through various issues, we were delighted to be ready to move OpenCA > >>>> 1.0.2 into production. However, in this morning's testing, we found the > >>>> PKCS#12 packages we issued for use with OpenVPN failing. > >>>> > >>>> The error from OpenVPN is: > >>>> TLS_ERROR: BIO read tls_read_plaintext error: error:04067069:rsa > >>>> routines:RSA_EAY_PUBLIC_DECRYPT:pkcs1 padding too short > >>>> > >>>> >From the little we've been able to find, this could be a key length > >>>> error. In version 0.9.2, we simply told it to use a key length of 1024. > >>>> In 1.0.2, I gather that is now a function of the combination of LOA and > >>>> key strength. We chose Low and Base assuming that gave us a 1024 key. > >>>> When we check the key, it claims to be 1024. The 0.9.2 packages are > >>>> working just fine. Any idea what changed and how to fix it? Thanks - > >>>> John > >>>> > >>> I should mention we are using server side key generation - John > >>> > >> We've tried using low and weak (512 bits), medium and base (1024 bits). > >> All failed the same way. We also tried removing the subjalt entries. > >> > >> In 0.9.2, we typically chose a Basic Request. This option is no longer > >> available in 1.0.2 so we have been choosing Browser Certificate Request > >> and changing it to server side key generation. Would this cause a > >> problem like this? Thanks - John > >> > > Well . . . we've solved the acute problem but do not really know what we > > have stepped into. The fix was to edit the > > etc/openca/openssl/openssl/User.conf.template and change default_md from > > sha256 to sha1. We first did this on the pub node but it did not solve > > the problem. It worked when we changed it on the RA node. We have not > > taken the time to figure out if it needed to be both or just the RA. > > > > However, this leaves us with several serious questions: > > > > 1) Why was sha256 a problem? > > 2) Is this a problem for more than just user packages, e.g., VPN > > servers, Web servers? > > 3) Whose problem is this? Is it a bad choice of defaults on the part of > > OpenCA and thus should be treated as an OpenCA bug or is this a > > shortcoming with OpenVPN? > > > > Can anyone offer any insight into what has happened and how we have > > fixed it? Thanks - John > > > -- John A. Sullivan III Open Source Development Corporation +1 207-985-7880 jsulli...@opensourcedevel.com http://www.spiritualoutreach.com Making Christianity intelligible to secular society ------------------------------------------------------------------------------ _______________________________________________ Openca-Users mailing list Openca-Users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openca-users