Thank you for testing! Found the problem... CryptoAPI cannot validate root certificate... OK, can you please test [1]?
I also renamed the option from cryptoapica to cryptoapi-chain-validation, I think it is clearer. Thanks! Alon. [1] http://alon.barlev.googlepages.com/openvpn-mscapi-test-5.tar.bz2 On 10/18/08, Dave <d...@ziggurat29.com> wrote: > attached herewith is the log of the (failed) attempt(s) to connect. > > Certs are all OK as far as I can tell (no red X overlaid). > > This CA cert I created some years back with easy-RSA. These days I now > manage my CA with XCA off a USB key, but I imported that CA cert rather than > rebuilding the PKI. > > Your CRL/OCSP suggestion is interesting, though of course that's Windows > only (my servers are all Linux). Actually I was hoping for an extension of > the OCSP patch that was submitted about a year ago, but maybe that is a task > for me to do! Then it would be general across Windows/Linux. I have not > used the extensions before, and I would love it if you had an example cert > with the CDP or OCSP extensions filled out so I can use that as a reference > to proper form. My OCSP responder also runs on Linux, rather than Windows. > > > -Dave > > ... > > > Thank you for your tests! > > > > Your configuration is correct. > > > > Can you please double click the certificate at the MMC, and > > see if it marked "OK"? If there is an error then there is > > probably something wrong with CA location or CRL fetch. > > > > How did you enroll your certificate? If you did this via > > microsoft CA, you have CDP (CRL distribution point) X.509 > > extension that is used by Windows to automatically fetch your > > CRL. If you got OCSP responder which is integrated with CAPI > > on your machine it will also work in this configuration. > > > > I added some more debugging information. > > Please run the new version [1] with verb 255. > > Thanks! > > ... > >