2048,SHA256,365,CN = Haupt-CA,E = support@test.com,O= Pri,L = Zuh,S = BW,C = DE
2048,SHA256,365,CN = UnterCA,E = support@test.com,O = Priv,L = Zuh,S = BW,C = DE
Server Mode: Remote Access (SSL/TLS)Protocol: UDPDevice Mode: tunInterface: AnyLocal Port: 1175TLS Authentication: Check "Enable authentication of TLS packets" and Automatically generate a shared TLS authentication key"Peer Certificate Authority: UnterCAServer Certificate: VPN-Server-Cert (UnterCA)DH: 2048 bitEncryption algorithm: AES128-CBCAuth Digest Algorithm: SHA1 (160-bit)Hardware Crypto: No Hardware Crypto AccelerationCertificate Depth: Do Not CheckIPv4 Tunnel Network: 10.100.140.0/24IPv4 Local Network: 10.100.100.0/24Disable IPv6: CheckDynamic IP: CheckAddress Pool: CheckDNS Default Domain: test.testDNS Server 10.100.100.64
openvpn[75278]: xxx.xxx.xxx.xxx VERIFY ERROR: depth=2, error=self signed certificate in certificate chain: C=DE, ST=BW, L=Zuh, O=Pri, emailAddress=support@test.com, CN=HauptCA
TLS Error: TLS handshake failedSIGUSR1[soft,tls-error] received, process restarting
After this I created a User and create and signed a certificate from "UnterCA".
: : : : : : .----+----. .----+----. |Usercerts| | SSLCerts | '----+----' '----+----' | | | | | | .----+----. .----+----. | OPNCA | | WinCA | '----+----' '----+----' | | | .----------. | +------| Root-CA |------+ '----+-----'
+----------------+ | | | Haupt-CA | | | +--------+-------+ | | +--------------+---+-------------------+ + + + + + + + + | | | | | | +------+-------+ +------+-------+ +-------+--------+ | | | | | | | OpenVPN-CA | | Windows-CA | | Other Sub-CA | | | | | | | +-+----+-------+ +--------------+ +----------------+ | | | | | |+---------------------+-+ || | || OpenVPN-Server-Cert | || | |+-----------------------+ | | +-------------+ | | | | | User Cert +--+ | | +-------------+