It seems we are talking about two different things.
I have used the LetsEncrypt certificate to authenticate the server
itself. Peers are using username and password using EAP, that's not an
issue.
The problem is charon is refusing to load the cert file via symbolic
link, giving me "Permission denied error". That's the problem I'm trying
to solve right now. Apart from that everything works fine.
On 10.2.2017 11:05, Noel Kuntze wrote:
Am 10.02.2017 um 00:22 schrieb Jose Novacho:
if I replace the symbolic link with the actual file fullchain1.pem everything
works as expected.
I have also replaced the link, so it points at the
/etc/letsencrypt//archive//trinity.ingames.cz/cert1.pem file. But that didn't
help either. I'm still getting permission denied on the cert file.
Do you know which of the following LestEncrypt files is the correct one?
/root@Trinity:/etc/letsencrypt/archive/trinity.ingames.cz# ls -la
celkem 24
drwxr-xr-x 2 root root 4096 úno 6 20:51 .
drwx------ 3 root root 4096 úno 6 20:51 ..
-rw-r--r-- 1 root root 1805 úno 6 20:51 cert1.pem
-rw-r--r-- 1 root root 3452 úno 6 20:51 fullchain1.pem
-rw-r--r-- 1 root root 1647 úno 6 20:51 chain1.pem
-rw-r--r-- 1 root root 1704 úno 6 20:51 privkey1.pem
/ I'm not really sure how to use them for VPN otherwise.
1. What I mentioned is just an additonal failure that will occur, after charon
read the certificate.
2. Your peer should have all the CA certificates that lie in the trust path
from the root to its certificate.
If you make charon just load cert1.pem or fullchain1.pem, then it will only
have its own certificate, but no CA certificate.
3. You need to split chain1.pem into seperate certificates and put them in
ipsec.d/cacerts. The chain will likely not change any time soon.
You need to make charon reload the certificate and the CA certificates
(togetherwith purging old ones) when they are updated.
You could also script something with the letsencrypt client. I use acmetool
and did something similiar[1] for my webserver setup.
4. Public CAs are not suitable to authenticate VPN peers, because the network
that is accessed using the VPN is private,
not public. You're entrusting a public entity with controlling access to
your private network.
[1] https://gist.github.com/Thermi/05f2a2903dee6c37bbbb31405ee082d2
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users