OpenVPN with DDNS return error when client trying to connect:2024-02-28 23:28:31 OpenSSL: error:0308010C:digital envelope routines::unsupported:Global default library context, Algorithm (RC2-40-CBC : 0), Properties ()2024-02-28 23:28:31 OpenSSL: error:11800071:PKCS12 routines::mac verify failure:2024-02-28 23:28:31 Decoding PKCS12 failed. Probably wrong password or unsupported/legacy encryptionI located those comment. Still what is the correct way to resolve the problem?
Best is to:- Update OPNsense to latest version- Set the config of OpenVPN server to best practice (opnsense docs)- Recreate certficates for the users (no p12)- Export new profiles- Install latest OpenVPN on the clients https://openvpn.net/community-downloads/- Import profile and enjoy
OpenVPN with DDNS return error when client trying to connect:It turn out I have many problems. Some of those problems are now fixed. The first problem was DDNS configuration was not working.Find solution and now it is OK. I am now seeing my ISP external IP in DDNS config table.The IP is 78.83.81.* This is my external IP from ISPI do not have access to ISP router.My WAN IP is: 192.168.99.20My LAN IP: 192.168.1.1My port forwarding rule for port 1194 is:My router have WAN IP: 192.168.100.*My router is behind ISP router.My ISP external IP is 78.83.81.*On my router my DDNS is set to IP: 78.83.81.*and host name: cloudstreamsors.mooo.comIset-up one forwarding port rule: source port: * destination address:WAN address destination port: 1194 NAT IP: 192.168.2.1 (router LAN ip)NAT PORT REDIRECT: 1194My router LAN IP is: 192.168.2.1 it is virtual machine on ESXi.My router WAN IP is: 192.168.100.65I try is port 1194 on 78.83.81.168 is open? Use tool from external network to check.The ip: 78.83.81.168 is external IP from ISP router.I do not have access to ISP router.Now the question is. Is the port forwarding will work? All is made in my router.I located those comment. Still what is the correct way to resolve the problem?You can change it permamently in OpenSSL configuration. Just modify file /etc/ssl/openssl.cnfFind the [default_sect] section and change it to:[default_sect]activate = 1[legacy_sect]activate = 1Then find the [provider_sect] and use:[provider_sect]default = default_sectlegacy = legacy_sectSave file.