I cannot see what is wrong, what exactly crashes? Do you have an entry
in event log?, I recompiled everything at [1], I may had a problem
with the libraries.
Can you please test only with cryptoapicert and see if it changes something?

Thanks!

[1] http://alon.barlev.googlepages.com/openvpn-mscapi-test-6.tar.bz2

On 10/18/08, Dave <d...@ziggurat29.com> wrote:
> A little bit further, though now it crashes for me using all the binaries
>  you included in your bz file.  Log attached herewith in case that helps
>  locate the area affected.
>
>
>  -Dave
>
>  > -----Original Message-----
>  > From: Alon Bar-Lev [mailto:alon.bar...@gmail.com]
>
> > Sent: Saturday, October 18, 2008 1:01 PM
>  > To: Dave
>  > Cc: openvpn devel
>
> > Subject: Re: [Openvpn-devel] [MSCAPI] Need testers
>  >
>  >
>
> > Thank you for testing!
>  >
>  > Found the problem... CryptoAPI cannot validate root
>  > certificate... OK, can you please test [1]?
>  >
>  > I also renamed the option from cryptoapica to
>  > cryptoapi-chain-validation, I think it is clearer.
>  >
>  > Thanks!
>  > Alon.
>  >
>  > [1] http://alon.barlev.googlepages.com/openvpn-mscapi-test-5.tar.bz2
>  >
>  > On 10/18/08, Dave <d...@ziggurat29.com> wrote:
>  > > attached herewith is the log of the (failed) attempt(s) to connect.
>  > >
>  > >  Certs are all OK as far as I can tell (no red X overlaid).
>  > >
>  > >  This CA cert I created some years back with easy-RSA.
>  > These days I
>  > > now  manage my CA with XCA off a USB key, but I imported
>  > that CA cert
>  > > rather than  rebuilding the PKI.
>  > >
>  > >  Your CRL/OCSP suggestion is interesting, though of course that's
>  > > Windows  only (my servers are all Linux).  Actually I was
>  > hoping for
>  > > an extension of  the OCSP patch that was submitted about a
>  > year ago,
>  > > but maybe that is a task  for me to do!  Then it would be general
>  > > across Windows/Linux.  I have not  used the extensions
>  > before, and I
>  > > would love it if you had an example cert  with the CDP or OCSP
>  > > extensions filled out so I can use that as a reference  to proper
>  > > form.  My OCSP responder also runs on Linux, rather than Windows.
>  > >
>  > >
>  > >  -Dave
>  > >
>  > >  ...
>  > >
>  > > > Thank you for your tests!
>  > >  >
>  > >  > Your configuration is correct.
>  > >  >
>  > >  > Can you please double click the certificate at the MMC,
>  > and  > see
>  > > if it marked "OK"? If there is an error then there is  > probably
>  > > something wrong with CA location or CRL fetch.  >
>  > >  > How did you enroll your certificate? If you did this via
>  > >  > microsoft CA, you have CDP (CRL distribution point) X.509
>  > >  > extension that is used by Windows to automatically fetch your
>  > >  > CRL. If you got OCSP responder which is integrated with CAPI
>  > >  > on your machine it will also work in this configuration.
>  > >  >
>  > >  > I added some more debugging information.
>  > >  > Please run the new version [1] with verb 255.
>  > >  > Thanks!
>  > >
>  > > ...
>  > >
>  > >
>  >
>
> > --------------------------------------------------------------
>  > -----------
>  > This SF.Net email is sponsored by the Moblin Your Move
>  > Developer's challenge Build the coolest Linux based
>  > applications with Moblin SDK & win great prizes Grand prize
>  > is a trip for two to an Open Source event anywhere in the
>  > world http://moblin-contest.org/redirect.php?banner_id=100&url=/
>  > _______________________________________________
>  > Openvpn-devel mailing list
>  > Openvpn-devel@lists.sourceforge.net
>  > https://lists.sourceforge.net/lists/listinfo/openvpn-devel
>  >
>
>

Reply via email to