On 08/08/17 21:28, Mio Vlahović wrote:
> On 08.08.2017 21:13, David Sommerseth wrote:
>> On 08/08/17 20:34, Leonardo Rodrigues wrote:
>>>
>>>      You very likely created your certificated with MD5 hashing, which
>>> was disabled on newer OpenSSL versions of CentOS.
>>>
>>>      Try:
>>>
>>> export NSS_HASH_ALG_SUPPORT=+MD5
>>> export OPENSSL_ENABLE_MD5_VERIFY=1
>>>
>>>      before starting your OpenVPN daemon and watch if that make clients
>>> connect again ...
>> DON'T DO THAT.
>>
>> MD5 based certificates are broken.  If you still use them, upgrade them
>> NOW.  And this knowledge about the brokenness dates back to 2005.
>>
>> <http://eprint.iacr.org/2005/067.pdf>
>> <http://eprint.iacr.org/2005/102.pdf>
>>
>> Anyone using MD5 and re-enables them in the SSL libraries will put their
>> VPN's security at risk.
> 
> No worries, I don't use MD5, but disabling crl_verify as suggested did 
> the trick. Now I still have the issue with generating new certificates.
> 
> I will quote myself again
> "One update... I can no longer generate new certificates. It seemse that
> whichopensslcnf scripts can't find openssl.cnf (which is there in the
> same directory...)
> 
> [root@vpn 2.0]# pwd
> /etc/openvpn/easy-rsa/2.0
> [root@vpn 2.0]# ls -la
> drwx------. 3 nobody nobody  4096 Aug  8 20:25 .
> drwx------. 3 nobody nobody    33 Feb  6  2016 ..
> -rwx------. 1 nobody nobody   119 Feb  6  2016 build-ca
> -rwx------. 1 nobody nobody   352 Feb  6  2016 build-dh
> -rwx------. 1 nobody nobody   188 Feb  6  2016 build-inter
> -rwx------. 1 nobody nobody   163 Feb  6  2016 build-key
> -rwx------. 1 nobody nobody   157 Feb  6  2016 build-key-pass
> -rwx------. 1 nobody nobody   249 Feb  6  2016 build-key-pkcs12
> -rwx------. 1 nobody nobody   268 Feb  6  2016 build-key-server
> -rwx------. 1 nobody nobody   213 Feb  6  2016 build-req
> -rwx------. 1 nobody nobody   158 Feb  6  2016 build-req-pass
> -rwx------. 1 nobody nobody   449 Feb  6  2016 clean-all
> -rwx------. 1 nobody nobody   424 Feb  6  2016 dh2048.pem
> -rwx------. 1 nobody nobody  1471 Feb  6  2016 inherit-inter
> drwx------  2 nobody nobody 36864 Jul 26 15:07 keys
> -rwx------. 1 nobody nobody   302 Feb  6  2016 list-crl
> -rwx------. 1 nobody nobody  7791 Feb  6  2016 openssl-0.9.6.cnf
> -rwx------. 1 nobody nobody  8348 Feb  6  2016 openssl-0.9.8.cnf
> -rwx------  1 nobody nobody  8247 Aug  8 18:37 openssl-1.0.0.cnf
> -rwx------  1 nobody nobody  8247 Aug  8 19:14 openssl.cnf
> -rwx------. 1 nobody nobody 12966 Feb  6  2016 pkitool
> -rwx------. 1 nobody nobody   928 Feb  6  2016 revoke-full
> -rwx------. 1 nobody nobody   178 Feb  6  2016 sign-req
> -rwx------  1 nobody nobody  2138 Aug  8 20:25 vars
> -rwx------. 1 nobody nobody   740 Feb  6  2016 whichopensslcnf
> 
> root@vpn 2.0]# ./build-key xxx
> grep: /etc/openvpn/easy-rsa/2.0/openssl.cnf /etc/openvpn/easy-rsa/2.0:
> No such file or directory
> pkitool: KEY_CONFIG (set by the ./vars script) is pointing to the wrong
> version of openssl.cnf: /etc/openvpn/easy-rsa/2.0/openssl.cnf
> /etc/openvpn/easy-rsa/2.0
> The correct version should have a comment that says: easy-rsa version 2.x"

Did you remember to source the ./vars file first?

$ . ./vars

(yes, a single dot and then ./vars)


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to