Hi,
ich habe einen OpenVPN Server zu dem ich nicht verbinden kann. Hier erstmal die Server und Client Konfiguration:
server-split.conf
client-split.conf
Auf dem Server habe ich folgende Dateien hinterlegt:
Auf dem Client habe ich folgende Dateien hinterlegt:
CA_Cert.cer ist der Public Key der Root CA. openvpn.cer und openvpn.pem sind Public und Private Keys des OpenVPN Servers welche von der Root CA signiert sind. So jedenfalls mein Verständnis, das ich mir gerade über SSL Zertifikate angelesen habe.
Wenn ich nun auf dem Client eine Verbindung um Server aufbaue sieht das so aus:
Dabei erzählt der Server das hier:
Der interssante Teil ist wohl der hier:
Nagut das Zertifikat ist self-signed - was ja an sich kein Problem sein sollte oder?
ciao
serow
ich habe einen OpenVPN Server zu dem ich nicht verbinden kann. Hier erstmal die Server und Client Konfiguration:
server-split.conf
Code:
dev tun-split
proto tcp-server
port 1194
server 10.12.53.0 255.255.255.0
dh /etc/openvpn/keys/dh1024.pem
ca /etc/openvpn/keys/CA_cert.cer
cert /etc/openvpn/keys/openvpn.cer
key /etc/openvpn/keys/openvpn.pem
comp-lzo
keepalive 10 30
persist-tun
tun-mtu 1225
push "route 10.0.0.0 255.255.255.0"
client-split.conf
Code:
client
proto tcp
port 1194
dev tun-nbgsplit
remote ***********************
ca openvpn.cer
cert mathias-ewald.cer
key mathias-ewald.pem
comp-lzo
keepalive 10 30
persist-tun
tun-mtu 1225
script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf
Auf dem Server habe ich folgende Dateien hinterlegt:
Code:
-rw-r--r-- 1 root root 2074 2010-12-29 10:18 CA_cert.cer
-rw-r--r-- 1 root root 245 2010-12-29 10:38 dh1024.pem
-rw-r--r-- 1 root root 804 2010-12-29 10:25 dsa_params
-rw-r--r-- 1 root root 1009 2010-12-29 10:19 openvpn.cer
-rw-r--r-- 1 root root 1743 2010-12-29 10:19 openvpn.pem
Auf dem Client habe ich folgende Dateien hinterlegt:
Code:
-rwx------ 1 mathias mathias 1306 2010-12-29 10:45 mathias-ewald.cer
-rwx------ 1 mathias mathias 1743 2010-12-29 10:45 mathias-ewald.pem
-rw-r--r-- 1 mathias mathias 1009 2010-12-29 10:46 openvpn.cer
CA_Cert.cer ist der Public Key der Root CA. openvpn.cer und openvpn.pem sind Public und Private Keys des OpenVPN Servers welche von der Root CA signiert sind. So jedenfalls mein Verständnis, das ich mir gerade über SSL Zertifikate angelesen habe.
Wenn ich nun auf dem Client eine Verbindung um Server aufbaue sieht das so aus:
Code:
mathias@x61t:~/openvpn/spiderman$ sudo openvpn --config client-split.conf
Wed Dec 29 11:11:01 2010 OpenVPN 2.1.0 x86_64-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
Wed Dec 29 11:11:01 2010 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Wed Dec 29 11:11:01 2010 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Enter Private Key Password:
Wed Dec 29 11:11:06 2010 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Dec 29 11:11:06 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
Wed Dec 29 11:11:06 2010 LZO compression initialized
Wed Dec 29 11:11:06 2010 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1225)
Wed Dec 29 11:11:06 2010 Attempting to establish TCP connection with [AF_INET]188.98.2.139:1194 [nonblock]
Wed Dec 29 11:11:07 2010 TCP connection established with [AF_INET]188.98.2.139:1194
Wed Dec 29 11:11:07 2010 TCPv4_CLIENT link local: [undef]
Wed Dec 29 11:11:07 2010 TCPv4_CLIENT link remote: [AF_INET]188.98.2.139:1194
Wed Dec 29 11:11:09 2010 Connection reset, restarting [0]
Wed Dec 29 11:11:09 2010 SIGUSR1[soft,connection-reset] received, process restarting
Wed Dec 29 11:11:14 2010 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Wed Dec 29 11:11:14 2010 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Dec 29 11:11:14 2010 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Dec 29 11:11:14 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
Wed Dec 29 11:11:14 2010 LZO compression initialized
Wed Dec 29 11:11:14 2010 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1225)
Wed Dec 29 11:11:14 2010 Attempting to establish TCP connection with [AF_INET]188.98.2.139:1194 [nonblock]
Wed Dec 29 11:11:15 2010 TCP connection established with [AF_INET]188.98.2.139:1194
Wed Dec 29 11:11:15 2010 TCPv4_CLIENT link local: [undef]
Wed Dec 29 11:11:15 2010 TCPv4_CLIENT link remote: [AF_INET]188.98.2.139:1194
Wed Dec 29 11:11:17 2010 Connection reset, restarting [0]
Wed Dec 29 11:11:17 2010 SIGUSR1[soft,connection-reset] received, process restarting
Dabei erzählt der Server das hier:
Code:
Wed Dec 29 11:10:31 2010 OpenVPN 2.1_rc11 x86_64-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Sep 18 2008
Wed Dec 29 11:10:40 2010 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Dec 29 11:10:40 2010 WARNING: file '/etc/openvpn/keys/openvpn.pem' is group or others accessible
Wed Dec 29 11:10:40 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
Wed Dec 29 11:10:40 2010 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1225)
Wed Dec 29 11:10:40 2010 TUN/TAP device tun-split opened
Wed Dec 29 11:10:40 2010 /sbin/ifconfig tun-split 10.12.53.1 pointopoint 10.12.53.2 mtu 1225
Wed Dec 29 11:10:40 2010 Listening for incoming TCP connection on [undef]:1194
Wed Dec 29 11:10:40 2010 TCPv4_SERVER link local (bound): [undef]:1194
Wed Dec 29 11:10:40 2010 TCPv4_SERVER link remote: [undef]
Wed Dec 29 11:10:40 2010 Initialization Sequence Completed
Wed Dec 29 11:11:07 2010 Re-using SSL/TLS context
Wed Dec 29 11:11:07 2010 LZO compression initialized
Wed Dec 29 11:11:07 2010 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1225)
Wed Dec 29 11:11:07 2010 TCP connection established with 91.9.117.250:37965
Wed Dec 29 11:11:07 2010 TCPv4_SERVER link local: [undef]
Wed Dec 29 11:11:07 2010 TCPv4_SERVER link remote: 91.9.117.250:37965
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 VERIFY ERROR: depth=0, error=self signed certificate: /C=DE/ST=Bavaria/L=Nuremberg/O=Mathias_Ewald/CN=Mathias_Ewald/emailAddress=mathias@mathias-ewald.de
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS Error: TLS object -> incoming plaintext read error
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS Error: TLS handshake failed
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 Fatal TLS error (check_tls_errors_co), restarting
Wed Dec 29 11:11:15 2010 Re-using SSL/TLS context
Wed Dec 29 11:11:15 2010 LZO compression initialized
Wed Dec 29 11:11:15 2010 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1225)
Wed Dec 29 11:11:15 2010 TCP connection established with 91.9.117.250:37192
Wed Dec 29 11:11:15 2010 TCPv4_SERVER link local: [undef]
Wed Dec 29 11:11:15 2010 TCPv4_SERVER link remote: 91.9.117.250:37192
Wed Dec 29 11:11:17 2010 91.9.117.250:37192 VERIFY ERROR: depth=0, error=self signed certificate: /C=DE/ST=Bavaria/L=Nuremberg/O=Mathias_Ewald/CN=Mathias_Ewald/emailAddress=mathias@mathias-ewald.de
Wed Dec 29 11:11:17 2010 91.9.117.250:37192 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Wed Dec 29 11:11:17 2010 91.9.117.250:37192 TLS Error: TLS object -> incoming plaintext read error
Wed Dec 29 11:11:17 2010 91.9.117.250:37192 TLS Error: TLS handshake failed
Wed Dec 29 11:11:17 2010 91.9.117.250:37192 Fatal TLS error (check_tls_errors_co), restarting
Der interssante Teil ist wohl der hier:
Code:
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 VERIFY ERROR: depth=0, error=self signed certificate: /C=DE/ST=Bavaria/L=Nuremberg/O=Mathias_Ewald/CN=Mathias_Ewald/emailAddress=mathias@mathias-ewald.de
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS Error: TLS object -> incoming plaintext read error
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 TLS Error: TLS handshake failed
Wed Dec 29 11:11:09 2010 91.9.117.250:37965 Fatal TLS error (check_tls_errors_co), restarting
Nagut das Zertifikat ist self-signed - was ja an sich kein Problem sein sollte oder?
ciao
serow