This bug was fixed in the package openvpn - 2.0.9-5ubuntu0.2 --------------- openvpn (2.0.9-5ubuntu0.2) feisty-security; urgency=low
* init.c: Do not attempt to verify the key file with openvpn-vulnkey if it is not accessible (any more). This happens when using the 'user', 'group', or 'chroot' options in multi-client mode, and the SSL key file thus becomes unreadable from the second time on. If the key file is not accessible at the very start, this is already handled anyway, so we can safely ignore this condition. (LP: #230208) Note that this is not an issue when using pre-shared keys (do_init_crypto_static(), since multi-client mode only works with TLS. However, we also check it here just to be on the safe side. -- Martin Pitt <[EMAIL PROTECTED]> Wed, 14 May 2008 13:41:04 +0200 -- OpenVPN doesn't start after USN-612-3: New key is accused to be vulnerable https://bugs.launchpad.net/bugs/230208 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs