So, I'm not sure if this [the dev list] is the place to post this - though I
suspect the well of knowledge here vs the regular list will be more appropriate
to answer.
It's been a long time since I needed to roll out openvpn to an iOS device and
the last time I did it, I did it via separate PKCS12 and config files. [IIRC,
PKCS12 is 3DES encrypted - not very secure.]
The last time, I also had a modestly secure way of getting the PKCS12 files to
the clients. But in iOS, unified confg files can't be pulled from a website -
essentially you either email the config, or transfer it via itunes.
So, I'm trying to do a unified config file with the ca, certs and keys
embedded. However, it appears that current versions of iOS can't handle AES-256
encrypted keys. [At least that's my best guess from the errors I get - using my
weak google-foo etc. "OpenVPN error polarssl error parsing config private key :
PK - Bad input parameters to function."]
So all that dross above to ask:
Does anyone know definitively what key encryptions/decryptions the iOS client
will properly handle? [And if there's any difference using unfied vs
non-unified setups.]
TIA
-Greg
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel