Hi Gert,

> Hi,
>
> On Thu, Oct 16, 2025 at 11:53:51AM +0200, Simon Matter via Openvpn-users
> wrote:
>> I'm trying to upgrade an old openvpn 2.4 based vpn to 2.7.
>> The old systems do have openssl 1.x while the new systems on AlmaLinux
>> 10
>> will have openssl 3.2.2.
>
> OpenSSL 3.x is much strikter regarding "outdated crypto", so certficates
> based on MD5 or SHA1 hash are refused by default.
>
> Try adding "tls-cert-profile legacy" or "tls-cert-profile insecure" to
> your config and see if that makes it work (this enables SHA1 and MD5
> support).
>
> The error message you see is not the "typical" one, normally it says
> something like "MD too weak" in this case.  But it might still help.
>

I've tried both options but unfortunately they don't make a difference.

Is there anything else I can try?

Simon



_______________________________________________
Openvpn-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to