On 16.08.23 15:05, Jason Long wrote:
I used "https://www.howtoforge.com/how-to-install-and-configure-openvpn-server-on-debian-10/" tutorial to create my OpenVPN server.
(No date on the article ... no date on the comments ... OpenVPN version not shown anywhere ... according to one systemctl output, probably written in September 2019, when Debian 10 and OpenSSL 1.1.1c were in fact current ... still using /etc/openvpn instead of /etc/openvpn/server and /etc/openvpn/client, respectively ... no mention of doing a "systemctl enable openvpn@ConfigFileBaseName" on the server ... no explicit description of what the VPN set up is supposed to *do* (apparently: secure Inet access for a road warrior, no other servers at the site hosting the VPN peer, no communication back to the clients) ... no discussion of how he came to pick 10.8.0.0/24 for the tunnel IPs, how (far) to check for IP conflicts, how many clients you can accomodate with that /24 ...)
... word of warning: Just because the how-to doesn't ask you to enter something at
Common Name (eg: your user, host, or server name) [client]:
and later has you type in
./easyrsa sign-req client client
doesn't mean that you want all client certs to be named "client", or - even worse - use the same client cert for them all. Make those *unique* - ideally per device, not just per user.
However, if you worked along *that* how-to, your CA certificate is indeed using the CN of "server" (not "Server", but that might be a liberty that MS took). Exactly the same as the server cert. X-C
Common Name (eg: your user, host, or server name) [Easy-RSA CA]:server
About the server log [...] # cat /var/log/openvpn/virt1.log 2023-08-16 06:23:18 WARNING: --topology net30 support for server configs with IPv4 pools will be removed in a future release. Please migrate to --topology subnet as soon as possible.
[...]
2023-08-16 06:23:18 Initialization Sequence Completed
That shows us the startup phase of the OpenVPN server. In order to check what the server thinks about the cert the client presents, you'll have to have the client make an attempt to connect, and then grab the logs from *those* couple seconds.
Kind regards, -- Jochen Bern Systemingenieur Binect GmbH
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users