On 08.08.2017 21:13, David Sommerseth wrote:
> On 08/08/17 20:34, Leonardo Rodrigues wrote:
>>
>>      You very likely created your certificated with MD5 hashing, which
>> was disabled on newer OpenSSL versions of CentOS.
>>
>>      Try:
>>
>> export NSS_HASH_ALG_SUPPORT=+MD5
>> export OPENSSL_ENABLE_MD5_VERIFY=1
>>
>>      before starting your OpenVPN daemon and watch if that make clients
>> connect again ...
> DON'T DO THAT.
> 
> MD5 based certificates are broken.  If you still use them, upgrade them
> NOW.  And this knowledge about the brokenness dates back to 2005.
> 
> <http://eprint.iacr.org/2005/067.pdf>
> <http://eprint.iacr.org/2005/102.pdf>
> 
> Anyone using MD5 and re-enables them in the SSL libraries will put their
> VPN's security at risk.

No worries, I don't use MD5, but disabling crl_verify as suggested did 
the trick. Now I still have the issue with generating new certificates.

I will quote myself again
"One update... I can no longer generate new certificates. It seemse that
whichopensslcnf scripts can't find openssl.cnf (which is there in the
same directory...)

[root@vpn 2.0]# pwd
/etc/openvpn/easy-rsa/2.0
[root@vpn 2.0]# ls -la
drwx------. 3 nobody nobody  4096 Aug  8 20:25 .
drwx------. 3 nobody nobody    33 Feb  6  2016 ..
-rwx------. 1 nobody nobody   119 Feb  6  2016 build-ca
-rwx------. 1 nobody nobody   352 Feb  6  2016 build-dh
-rwx------. 1 nobody nobody   188 Feb  6  2016 build-inter
-rwx------. 1 nobody nobody   163 Feb  6  2016 build-key
-rwx------. 1 nobody nobody   157 Feb  6  2016 build-key-pass
-rwx------. 1 nobody nobody   249 Feb  6  2016 build-key-pkcs12
-rwx------. 1 nobody nobody   268 Feb  6  2016 build-key-server
-rwx------. 1 nobody nobody   213 Feb  6  2016 build-req
-rwx------. 1 nobody nobody   158 Feb  6  2016 build-req-pass
-rwx------. 1 nobody nobody   449 Feb  6  2016 clean-all
-rwx------. 1 nobody nobody   424 Feb  6  2016 dh2048.pem
-rwx------. 1 nobody nobody  1471 Feb  6  2016 inherit-inter
drwx------  2 nobody nobody 36864 Jul 26 15:07 keys
-rwx------. 1 nobody nobody   302 Feb  6  2016 list-crl
-rwx------. 1 nobody nobody  7791 Feb  6  2016 openssl-0.9.6.cnf
-rwx------. 1 nobody nobody  8348 Feb  6  2016 openssl-0.9.8.cnf
-rwx------  1 nobody nobody  8247 Aug  8 18:37 openssl-1.0.0.cnf
-rwx------  1 nobody nobody  8247 Aug  8 19:14 openssl.cnf
-rwx------. 1 nobody nobody 12966 Feb  6  2016 pkitool
-rwx------. 1 nobody nobody   928 Feb  6  2016 revoke-full
-rwx------. 1 nobody nobody   178 Feb  6  2016 sign-req
-rwx------  1 nobody nobody  2138 Aug  8 20:25 vars
-rwx------. 1 nobody nobody   740 Feb  6  2016 whichopensslcnf

root@vpn 2.0]# ./build-key xxx
grep: /etc/openvpn/easy-rsa/2.0/openssl.cnf /etc/openvpn/easy-rsa/2.0:
No such file or directory
pkitool: KEY_CONFIG (set by the ./vars script) is pointing to the wrong
version of openssl.cnf: /etc/openvpn/easy-rsa/2.0/openssl.cnf
/etc/openvpn/easy-rsa/2.0
The correct version should have a comment that says: easy-rsa version 2.x"


-- 
Mio Vlahović
Linux/Network Administrator @ BCS d.o.o.
GSM: +385 95 6308 809
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to