2048,SHA256,365,CN = Haupt-CA,E = support@test.com,O= Pri,L = Zuh,S = BW,C = DE
2048,SHA256,365,CN = UnterCA,E = support@test.com,O = Priv,L = Zuh,S = BW,C = DE
Server Mode: Remote Access (SSL/TLS)Protocol: UDPDevice Mode: tunInterface: AnyLocal Port: 1175TLS Authentication: Haken bei "Enable authentication of TLS packets" und Automatically generate a shared TLS authentication key"Peer Certificate Authority: UnterCAServer Certificate: VPN-Server-Cert (UnterCA)DH: 2048 bitEncryption algorithm: AES128-CBCAuth Digest Algorithm: SHA1 (160-bit)Hardware Crypto: No Hardware Crypto AccelerationCertificate Depth: Do Not CheckIPv4 Tunnel Network: 10.100.140.0/24IPv4 Local Network: 10.100.100.0/24Disable IPv6: AktiviertDynamic IP: AktiviertAddress Pool: AktiviertDNS Default Domain: test.testDNS Server 10.100.100.64
openvpn[75278]: xxx.xxx.xxx.xxx VERIFY ERROR: depth=2, error=self signed certificate in certificate chain: C=DE, ST=BW, L=Zuh, O=Pri, emailAddress=support@test.com, CN=HauptCA
TLS Error: TLS handshake failedSIGUSR1[soft,tls-error] received, process restarting
habe den Verschlüsselungsalg. auf beiden Seiten verändert, gespeichert und danach wieder zurückgesetzt.
VERIFY ERROR: depth=1, error=unable to get issuer certificate: C=DE, O=Guenthart, CN=OPNsense-CA
-----BEGIN CERTIFICATE-----MIIFZDCCA0ygAwIgeGHTwWfsdFaFEfeFRBDMQswCQYDVQQGEwJERTES[...] Dies ist mein HAUPT-CAgpjaGrrSFWEF*wefWSEF+feSAFtsWp3257LPagXN5aQf34G+YOv/NEjA==-----END CERTIFICATE----------BEGIN CERTIFICATE-----MIIGADCCA+igAwIBAg4g5r6we1g61G61G165YDVQQGEwJERTES6[...] Dies ist mein UNTER-CAQctqCAfjV7w1fsafsgRGSgASERaREGS/gASfgSAGrgDRGVQUg5I8GiMm+PxAnhZU9Hw==-----END CERTIFICATE-----
OPNsense 19.1.1-amd64FreeBSD 11.2-RELEASE-p8-HBSDOpenSSL 1.0.2q 20 Nov 2018
o openvpn: obey verify-x509-name for remote access (user auth)o openvpn: proper daemonize instead of background jobo openvpn: extract full CA chain for setupo openvpn: missing "port" in protocol export