On 26/02/2024 10:59, Peter Davis via Openvpn-users wrote:
Hello,
Why can't I reload the OpenVPN service?
# systemctl reload openvpn
Failed to reload openvpn.service: Job type reload is not applicable for
unit openvpn.service.
#
# systemctl reload openvpn@Server
Failed to reload
On 19/02/2024 15:33, mich...@fritscher.net wrote:
Good day,
actually I use Easy-RSA on Windows on a regular base. Sometimes even for
OpenVPN servers on Windows, but most times for provisioning customer
configurations (1 server and 2-3 clients, fairly static) with an unique
key+cert set.
In
On 05/02/2024 13:38, Mathias Jeschke wrote:
Bo Berglund wrote:
I mean the logs being produced from these server.conf lines:
status /etc(openvpn/log/openvpn-status.log
log /etc(openvpn/log/openvpn.log
verb 4
Why do you insist on using legacy file based logs? Systemd's journal has
much better
On 05/02/2024 15:12, Bo Berglund wrote:
On Mon, 5 Feb 2024 14:04:38 +0100, Gert Doering wrote:
Hi,
On Mon, Feb 05, 2024 at 12:25:51PM +0100, Bo Berglund wrote:
How old is your OpenVPN?
This is on the Ubuntu 20.04 LTS server:
Aug 21 2023:
$ openvpn --version
OpenVPN 2.4.12
On 21/01/2024 17:34, tincantech via Openvpn-users wrote:
Can I edit this file and remove the item --suppress-timestamps to possibly
enable the timestamps? And remove the machine-readable-output item in the actual
service conf file?
Will that result in human-readable timestamps?
The
On 27/12/2023 12:43, Jason Long via Openvpn-users wrote:
[...snipp...]
Server config is:
port 2023
proto udp
dev tun1
ca /etc/openvpn/server/ca.crt
cert /etc/openvpn/server/H_Server.crt
key /etc/openvpn/server/H_Server.key
dh /etc/openvpn/server/dh.pem
server 20.20.0.0 255.255.255.0
On 07/01/2024 21:20, Bo Berglund wrote:
[...snip...]
If you have a couple of OpenVPN servers operating off of certs and keys
generated back in 2014 (like I have), then these are probably set to expire this
year 2024 because I think that the easyrsa I used back then sets a 10 year life
of these.