On 08/08/17 21:28, Mio Vlahović wrote: > On 08.08.2017 21:13, David Sommerseth wrote: >> On 08/08/17 20:34, Leonardo Rodrigues wrote: >>> >>> You very likely created your certificated with MD5 hashing, which >>> was disabled on newer OpenSSL versions of CentOS. >>> >>> Try: >>> >>> export NSS_HASH_ALG_SUPPORT=+MD5 >>> export OPENSSL_ENABLE_MD5_VERIFY=1 >>> >>> before starting your OpenVPN daemon and watch if that make clients >>> connect again ... >> DON'T DO THAT. >> >> MD5 based certificates are broken. If you still use them, upgrade them >> NOW. And this knowledge about the brokenness dates back to 2005. >> >> <http://eprint.iacr.org/2005/067.pdf> >> <http://eprint.iacr.org/2005/102.pdf> >> >> Anyone using MD5 and re-enables them in the SSL libraries will put their >> VPN's security at risk. > > No worries, I don't use MD5, but disabling crl_verify as suggested did > the trick. Now I still have the issue with generating new certificates. > > I will quote myself again > "One update... I can no longer generate new certificates. It seemse that > whichopensslcnf scripts can't find openssl.cnf (which is there in the > same directory...) > > [root@vpn 2.0]# pwd > /etc/openvpn/easy-rsa/2.0 > [root@vpn 2.0]# ls -la > drwx------. 3 nobody nobody 4096 Aug 8 20:25 . > drwx------. 3 nobody nobody 33 Feb 6 2016 .. > -rwx------. 1 nobody nobody 119 Feb 6 2016 build-ca > -rwx------. 1 nobody nobody 352 Feb 6 2016 build-dh > -rwx------. 1 nobody nobody 188 Feb 6 2016 build-inter > -rwx------. 1 nobody nobody 163 Feb 6 2016 build-key > -rwx------. 1 nobody nobody 157 Feb 6 2016 build-key-pass > -rwx------. 1 nobody nobody 249 Feb 6 2016 build-key-pkcs12 > -rwx------. 1 nobody nobody 268 Feb 6 2016 build-key-server > -rwx------. 1 nobody nobody 213 Feb 6 2016 build-req > -rwx------. 1 nobody nobody 158 Feb 6 2016 build-req-pass > -rwx------. 1 nobody nobody 449 Feb 6 2016 clean-all > -rwx------. 1 nobody nobody 424 Feb 6 2016 dh2048.pem > -rwx------. 1 nobody nobody 1471 Feb 6 2016 inherit-inter > drwx------ 2 nobody nobody 36864 Jul 26 15:07 keys > -rwx------. 1 nobody nobody 302 Feb 6 2016 list-crl > -rwx------. 1 nobody nobody 7791 Feb 6 2016 openssl-0.9.6.cnf > -rwx------. 1 nobody nobody 8348 Feb 6 2016 openssl-0.9.8.cnf > -rwx------ 1 nobody nobody 8247 Aug 8 18:37 openssl-1.0.0.cnf > -rwx------ 1 nobody nobody 8247 Aug 8 19:14 openssl.cnf > -rwx------. 1 nobody nobody 12966 Feb 6 2016 pkitool > -rwx------. 1 nobody nobody 928 Feb 6 2016 revoke-full > -rwx------. 1 nobody nobody 178 Feb 6 2016 sign-req > -rwx------ 1 nobody nobody 2138 Aug 8 20:25 vars > -rwx------. 1 nobody nobody 740 Feb 6 2016 whichopensslcnf > > root@vpn 2.0]# ./build-key xxx > grep: /etc/openvpn/easy-rsa/2.0/openssl.cnf /etc/openvpn/easy-rsa/2.0: > No such file or directory > pkitool: KEY_CONFIG (set by the ./vars script) is pointing to the wrong > version of openssl.cnf: /etc/openvpn/easy-rsa/2.0/openssl.cnf > /etc/openvpn/easy-rsa/2.0 > The correct version should have a comment that says: easy-rsa version 2.x"
Did you remember to source the ./vars file first? $ . ./vars (yes, a single dot and then ./vars) -- kind regards, David Sommerseth OpenVPN Technologies, Inc
signature.asc
Description: OpenPGP digital signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users