So, I'm not sure if this [the dev list] is the place to post this - though I 
suspect the well of knowledge here vs the regular list will be more appropriate 
to answer.

It's been a long time since I needed to roll out openvpn to an iOS device and 
the last time I did it, I did it via separate PKCS12 and config files. [IIRC, 
PKCS12 is 3DES encrypted - not very secure.]

The last time, I also had a modestly secure way of getting the PKCS12 files to 
the clients. But in iOS, unified confg files can't be pulled from a website - 
essentially you either email the config, or transfer it via itunes.

So, I'm trying to do a unified config file with the ca, certs and keys 
embedded. However, it appears that current versions of iOS can't handle AES-256 
encrypted keys. [At least that's my best guess from the errors I get - using my 
weak google-foo etc. "OpenVPN error polarssl error parsing config private key : 
PK - Bad input parameters to function."]

So all that dross above to ask:
Does anyone know definitively what key encryptions/decryptions the iOS client 
will properly handle? [And if there's any difference using unfied vs 
non-unified setups.]


TIA

-Greg
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to