Ik heb op een CentOS 7 server OpenVPN geinstalleerd, ik maak gebruik van self-signed certificaten.
Een aantal checks:
Mijn server.conf:
Mijn Windows 10 configuratie:
Server log:
Windows client log:
De client zegt duidelijk in de logs het volgende:
Een aantal checks:
code:
1
2
3
4
5
| [user@openvpn openvpn]$ sudo openssl verify -CAfile ca.crt server.crt server.crt: OK [user@openvpn openvpn]$ sudo openssl verify -CAfile ca.crt client-user.crt client-user.crt: OK [user@openvpn openvpn]$ |
Mijn server.conf:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
| [user@openvpn openvpn]$ sudo cat /etc/openvpn/server.conf |grep -v '^;\|^#\|^$' port 1194 proto udp dev tun ca ca.crt cert server.crt key server.key # This file should be kept secret dh dh2048.pem topology subnet server 10.8.0.0 255.255.255.0 ifconfig-pool-persist ipp.txt keepalive 10 120 tls-crypt myvpn.tlsauth cipher AES-256-CBC user nobody group nobody persist-key persist-tun status openvpn-status.log verb 5 explicit-exit-notify 1 remote-cert-eku "TLS Web Client Authentication" [user@openvpn openvpn]$ |
Mijn Windows 10 configuratie:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| client tls-client ca "C:\\Users\\polat\\OpenVPN\\config\\ca.crt" cert "C:\\Users\\polat\\OpenVPN\\config\\client-user.crt" key "C:\\Users\\polat\\OpenVPN\\config\\client-user.key" tls-crypt "C:\\Users\\polat\\OpenVPN\\config\\myvpn.tlsauth" remote-cert-eku "TLS Web Client Authentication" proto udp remote <openvpn server> 1194 udp dev tun topology subnet pull user nobody group nobody |
Server log:
code:
1
2
3
4
5
6
7
8
9
| Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=606586 MULTI: multi_create_instance called Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=607330 83.84.27.x:1194 Re-using SSL/TLS context Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=607504 83.84.27.x:1194 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ] Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=607528 83.84.27.X:1194 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=607577 83.84.27.X:1194 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' Dec 8 13:36:37 openvpn openvpn: Sat Dec 8 13:36:37 2018 us=607595 83.84.27.X:1194 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' Dec 8 13:36:37 openvpn openvpn: RSat Dec 8 13:36:37 2018 us=607707 83.84.27.X:1194 TLS: Initial packet from [AF_INET]83.84.27.x:1194, sid=f6c4a4a3 46cf3dc9 Dec 8 13:36:42 openvpn openvpn: WRRWWWWRWRRWWRSat Dec 8 13:36:42 2018 us=665568 83.84.27.X:1194 TLS: new session incoming connection from [AF_INET]83.84.27.x:1194 Dec 8 13:36:47 openvpn openvpn: WRRWWWWRWRRWWWWRSat Dec 8 13:36:47 2018 us=718079 83.84.27.X:1194 TLS: new session incoming connection from [AF_INET]83.84.27.x:1194 |
Windows client log:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
| Sat Dec 08 13:36:39 2018 NOTE: --user option is not implemented on Windows Sat Dec 08 13:36:39 2018 NOTE: --group option is not implemented on Windows Sat Dec 08 13:36:39 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018 Sat Dec 08 13:36:39 2018 Windows version 6.2 (Windows 8 or greater) 64bit Sat Dec 08 13:36:39 2018 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 Enter Management Password: Sat Dec 08 13:36:39 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]85.17.X.X:1194 Sat Dec 08 13:36:39 2018 UDP link local (bound): [AF_INET][undef]:1194 Sat Dec 08 13:36:39 2018 UDP link remote: [AF_INET]85.17.x.x:1194 Sat Dec 08 13:36:40 2018 OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Sat Dec 08 13:36:40 2018 TLS_ERROR: BIO read tls_read_plaintext error Sat Dec 08 13:36:40 2018 TLS Error: TLS object -> incoming plaintext read error Sat Dec 08 13:36:40 2018 TLS Error: TLS handshake failed Sat Dec 08 13:36:40 2018 SIGUSR1[soft,tls-error] received, process restarting Sat Dec 08 13:36:45 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]85.17.x.x:1194 Sat Dec 08 13:36:45 2018 UDP link local (bound): [AF_INET][undef]:1194 Sat Dec 08 13:36:45 2018 UDP link remote: [AF_INET]85.17.x.x:1194 Sat Dec 08 13:36:45 2018 OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Sat Dec 08 13:36:45 2018 TLS_ERROR: BIO read tls_read_plaintext error Sat Dec 08 13:36:45 2018 TLS Error: TLS object -> incoming plaintext read error Sat Dec 08 13:36:45 2018 TLS Error: TLS handshake failed Sat Dec 08 13:36:45 2018 SIGUSR1[soft,tls-error] received, process restarting |
De client zegt duidelijk in de logs het volgende:
code:
maar volgens mij klopt de certificaat gewoon, dus wat kan er nog meer verkeerd/fout zijn?
1
| OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed |
EU DNS: 86.54.11.100