Hello, all.  We're in a bit of a panic here this morning.  After working
through various issues, we were delighted to be ready to move OpenCA
1.0.2 into production.  However, in this morning's testing, we found the
PKCS#12 packages we issued for use with OpenVPN failing.

The error from OpenVPN is:
TLS_ERROR: BIO read tls_read_plaintext error: error:04067069:rsa
routines:RSA_EAY_PUBLIC_DECRYPT:pkcs1 padding too short

>From the little we've been able to find, this could be a key length
error.  In version 0.9.2, we simply told it to use a key length of 1024.
In 1.0.2, I gather that is now a function of the combination of LOA and
key strength.  We chose Low and Base assuming that gave us a 1024 key.
When we check the key, it claims to be 1024.  The 0.9.2 packages are
working just fine.  Any idea what changed and how to fix it? Thanks -
John
-- 
John A. Sullivan III
Open Source Development Corporation
+1 207-985-7880
jsulli...@opensourcedevel.com

http://www.spiritualoutreach.com
Making Christianity intelligible to secular society


------------------------------------------------------------------------------
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to