On 29/03/2025 14:16, Bo Berglund wrote:
[...snip...]
> It seems like that solution is based on the clients being "registered" on the
> server with a fingerprint created client side, but how can you do such things 
> on
> a mobile phone?
> So a Linux client would work but not a phone..

Kinda ... The client config still need a client certificate and a key.
That information will not be created on the mobil device - and that is
exactly the same as with the CA/easy-rsa approach.  You prepare a config
file containing everything, and that file is imported on the mobile device.

What is different is that you run an 'openssl x509' command to retrieve
the SHA-256 fingerprint of the client and server certificates.  The
client certificate fingerprint is put into the <peer-fingerprint> "blob"
in the server config.  And in the client config, the server certificate
fingerprint is given to the peer-fingerprint option.  IIRC, on *older*
OpenVPN versions on the client side (not supporting peer-fingerprint),
the server certificate can be used in the <ca> "blob" in the client config.

> We need the phone to also be able to connect to the server and be geolocated
> there.
> And that has worked for many years using the ovpn file (same file for the 
> client
> irrespective of device used).

That should not be any different.  What peer-fingerprint does is
basically removing the need for client and server certificates to be
signed by a CA.  So the CA certificate is no longer needed when using
peer-fingerprint.  Client and server certificates are self-signed when
using peer-fingerprint.


-- 
kind regards,

David Sommerseth
OpenVPN Inc



_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to