rw- 1 root vyattacf 1854 Jan 21 13:02 cakey.pem Verify the contents of the /config/auth directory. Add read permission for non-root users to the client key files. Mv /config/auth/client2-no-pass.key /config/auth/client2.keyġ4. Mv /config/auth/client1-no-pass.key /config/auth/client1.key mv /config/auth/server-no-pass.key /config/auth/server.key Overwrite the existing keys with the no-pass versions. NOTE:When connecting, the OpenVPN clients will need to enter a password if this step is skipped.ġ3. openssl rsa -in /config/auth/server.key -out /config/auth/server-no-pass.key openssl rsa -in /config/auth/client1.key -out /config/auth/client1-no-pass.key openssl rsa -in /config/auth/client2.key -out /config/auth/client2-no-pass.key Remove the password from the server key file and optionally the client key file(s). Repeat the process for the second OpenVPN client./CA.pl -newreqġ2. Generate, sign and move the certificate and key files for the first OpenVPN client./CA.pl -newreqĮmailAddress = is to be certified until Jan 21 13:05:03 2020 GMT (365 days)ġ1. mv newcert.pem /config/auth/server.pemġ0. Move and rename the server certificate and key files to the /config/auth directory. Generate the server certificate./CA.pl -newreqĮmail Address: Sign the server certificate./CA.pl -signĮmailAddress = is to be certified until Jan 21 13:02:57 2020 GMT (365 days)ġ out of 1 certificate requests certified, commit? yĩ. Copy the newly created certificate + key to the /config/auth directory. NOTE:Replace the location and organizational fields with your own information.Ħ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |