I would consider [1] as verified, at least partially. I did not try any negative tests outside of the absence of the cert/key does not enable login, also I did not try in the 'service' scenario, which I imagine just means 'put the cert in the machine's store'.
attached herewith is my log, and also my config file for reference. the error is on line 18. I can re-run and bump up the verb, as 3 is probably too low for you? I would also like to test revocation, both by explicitly untrusting a cert, and by having a crl. When I import a CRL using the default 'choose a sane place' option, it goes under Intermediate Certification Authorities Certificate Revocation List which strikes me as odd since this is not an intermediate CA, and because the CA cert went under the 'Trusted Root CA' as expected, and not the 'Intermediate CA'. Such, I suppose, are the mysteries of capi. It would be great if the 'CRL distribution point' and 'Authority Info Access' 'OCSP' certificate extensions were used, but that's another projectlette in itself, no?.... -Dave > -----Original Message----- > From: Alon Bar-Lev [mailto:alon.bar...@gmail.com] > Sent: Sunday, October 12, 2008 1:07 AM > To: Dave > Cc: openvpn devel; Peter 'Luna' Runestig > Subject: Re: [Openvpn-devel] [MSCAPI] Need testers > > > Thank you dave! > > Let's divide this into two threads. > > 1. I've cleanup the OpenSSL integration, this should not > change existing behavior... All you need to verify that > OpenVPN continue to work while using private key from CAPI store. > > 2. Add the CAPI certificate validation. > > From what I understand, (1) works at your side? > > For the VERIFY ERROR, can you please paste some more log > lines? Should be something like "Failed to verify certificate..." > > Thanks! > Alon. > > On 10/12/08, Dave <d...@ziggurat29.com> wrote: > > ... > > > > > ... > > > > As part of modification of the mscapi (cryptoapi.c) > file, I > > > > try to cleanup the openssl usage. I don't have Windows > > > > environment to test. > > > > > > I will be glad if users of this feature help me testing this. > > > > ... > > > > > ... > > > Sure, I could do it now but what are the test cases we > are > going > > to run? This is for the cryptoapicert feature? -Dave > > > > > > > OK, I'm not getting it. Educate me. I am using an existing and > > functional server, and removed all the ca cert and key > options in my > > config and replaced them with: > > > > cryptoapica > > cryptoapicert "SUBJ:plexus" > > > > Nevermind the second one -- I verified it works fine in isolation > > (i.e. meaning having ca or <ca> makes it work finding the cert and > > key via capi). That was mostly a 'using capi to do > something at all' > > sanity check. > > > > I imported my CA cert. I used the 'pick a sensible place' > option. I > > verified that it is located (according to the MMC snapin) at: > > > > Certificates - Current User > > Trusted Root Certification Authorities > > Certificates > > > > which does seem a sensible place. > > > > Upon connect, I am getting the error: > > > > Sat Oct 11 22:25:16 2008 VERIFY ERROR: depth=1, error=self signed > > certificate in certificate chain: > > > /C=US/ST=TX/L=Cedar_Park/O=ziggurat29/CN=ziggurat29_CA/emailAddress=de > > v@zigg > > urat29.com > > > > Not sure what to say about that -- root CA certs are always > > self-signed, no? > > > > For fun I also imported the server cert. It wound up at: > > > > Certificates - Current User > > Other People > > Certificates > > > > Didn't do any good there -- no surprise -- but I moved it > over to the > > trusted root CA and it did no good there either. > > > > I'll be happy to give configs, logs, certs if it's useful. > > > > > > -Dave > > > > >
WRT54GL cryptoapica.ovpn
Description: Binary data
WRT54GL cryptoapica.log
Description: Binary data