Nope, still crashes. Application Event Log reveals:
Faulting application openvpn.exe, version 0.0.0.0, faulting module libeay32.dll, version 0.9.9.0, fault address 0x0005c4c5. I suppose there's no debug info in the MinGW build -- I can attach a debugger when it crashes and could see the source if there was debug info. Invariably something about my config triggers some boundary case. When testing only with cryptoapicert, the failure occurs also, and is logged as having had happened at the same location. -Dave > -----Original Message----- > From: Alon Bar-Lev [mailto:alon.bar...@gmail.com] > Sent: Saturday, October 18, 2008 1:51 PM > To: Dave > Cc: openvpn devel > Subject: Re: [Openvpn-devel] [MSCAPI] Need testers > > > I cannot see what is wrong, what exactly crashes? Do you have > an entry in event log?, I recompiled everything at [1], I may > had a problem with the libraries. Can you please test only > with cryptoapicert and see if it changes something? > > Thanks! > > [1] http://alon.barlev.googlepages.com/openvpn-mscapi-test-6.tar.bz2 > > On 10/18/08, Dave <d...@ziggurat29.com> wrote: > > A little bit further, though now it crashes for me using all the > > binaries you included in your bz file. Log attached > herewith in case > > that helps locate the area affected. > > > > > > -Dave > > > > > -----Original Message----- > > > From: Alon Bar-Lev [mailto:alon.bar...@gmail.com] > > > > > Sent: Saturday, October 18, 2008 1:01 PM > > > To: Dave > > > Cc: openvpn devel > > > > > Subject: Re: [Openvpn-devel] [MSCAPI] Need testers > > > > > > > > > > > Thank you for testing! > > > > > > Found the problem... CryptoAPI cannot validate root > > > certificate... OK, can you please test [1]? > > > > > > I also renamed the option from cryptoapica to > > > cryptoapi-chain-validation, I think it is clearer. > > > > > > Thanks! > > > Alon. > > > > > > [1] > > http://alon.barlev.googlepages.com/openvpn-mscapi-test-5.tar.bz2 > > > > > > On 10/18/08, Dave <d...@ziggurat29.com> wrote: > > > > attached herewith is the log of the (failed) > attempt(s) to connect. > > > > > > > > Certs are all OK as far as I can tell (no red X overlaid). > > > > > > > > This CA cert I created some years back with easy-RSA. > > > These days I > > > > now manage my CA with XCA off a USB key, but I imported > > > that CA cert > > > > rather than rebuilding the PKI. > > > > > > > > Your CRL/OCSP suggestion is interesting, though of > course that's > > > > Windows only (my servers are all Linux). Actually I was > > > hoping for > > > > an extension of the OCSP patch that was submitted about a > > > year ago, > > > > but maybe that is a task for me to do! Then it would > be general > > > > across Windows/Linux. I have not used the extensions > > > before, and I > > > > would love it if you had an example cert with the CDP or OCSP > > > > extensions filled out so I can use that as a reference > to proper > > > > form. My OCSP responder also runs on Linux, rather > than Windows. > > > > > > > > > > > > -Dave > > > > > > > > ... > > > > > > > > > Thank you for your tests! > > > > > > > > > > Your configuration is correct. > > > > > > > > > > Can you please double click the certificate at the MMC, > > > and > see > > > > if it marked "OK"? If there is an error then there is > > probably > > > > something wrong with CA location or CRL fetch. > > > > > > How did you enroll your certificate? If you did this via > > > > > microsoft CA, you have CDP (CRL distribution point) X.509 > > > > > extension that is used by Windows to automatically > fetch your > > > > > CRL. If you got OCSP responder which is integrated with CAPI > > > > > on your machine it will also work in this configuration. > > > > > > > > > > I added some more debugging information. > > > > > Please run the new version [1] with verb 255. > > > > > Thanks! > > > > > > > > ... > > > > > > > > > > > > > > > > -------------------------------------------------------------- > > > ----------- > > > This SF.Net email is sponsored by the Moblin Your Move > > > Developer's challenge Build the coolest Linux based > > > applications with Moblin SDK & win great prizes Grand > prize > is a > > trip for two to an Open Source event anywhere in the > world > > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > > > _______________________________________________ > > > Openvpn-devel mailing list > > > Openvpn-devel@lists.sourceforge.net > > > https://lists.sourceforge.net/lists/listinfo/openvpn-devel > > > > > > > > > -------------------------------------------------------------- > ----------- > This SF.Net email is sponsored by the Moblin Your Move > Developer's challenge Build the coolest Linux based > applications with Moblin SDK & win great prizes Grand prize > is a trip for two to an Open Source event anywhere in the > world http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Openvpn-devel mailing list > Openvpn-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openvpn-devel >