Hi, On 05/11/2011 11:42 PM J. Echter wrote: > i imported my keys from an former ipcop installation. i'd like to create > new client keys but i don't know to handle this situation. > > any one could help me out maybe? > > all i got is the pasted keys in my server configuration and some > converted ones for my ubuntu openvpn. > > i use pfsense 1.2.3
in case you're running linux on your workstation and also if you wouldn't mind keeping your CA locally you might want consider using TinyCA2 [1]. It provides you with a GTK frontend (perl+bindings) which makes managing your ca an ease. You can also import your existing CA to TinyCA2 by pointing it to your CA private key and certificate. But if you're in need of more control in handling automatic creation of configuration tarballs and such you should stick with the easy-rsa scripts shipped with openvpn instead [2]. There is also a german part of documentatin within the OpenVPN Wiki describing on how to use these scrips to generate and revoke client certificates on the CLI [3]. Just skip the part of generating a new ca and copy your files to their appropriate places and all should just work like a charm. Hope this helps .. :) Jan --- [1] TinyCA2 - http://tinyca.sm-zone.net/ [2] OpenVPN Documentation - http://www.openvpn.net/index.php/open-source/documentation/miscellaneous/77-rsa-key-management.html [3] OpenVPN EU-Wiki [GER] - http://wiki.openvpn.eu/index.php/Erzeugen_einer_PKI_mit_EasyRSA
signature.asc
Description: OpenPGP digital signature