Hello, 

My name is Oana Comanici and I am developing a zero config application based on 
OpenVPN. I have encountered an issue regarding the generation of certificates 
for clients. Since the application is supposed to require as little 
configuration as possible, the actual method for generating the certificates on 
the server machine and copying them afterwards to the client is not 
appropriate. 

There are three possible solutions that I have found so far, but I don't know 
exactly which one is easier to implement and more efficient.

1. The clients could use self-signed SSL certificates for the communication 
with the server. At the moment, OpenVPN servers only accept connections from 
clients with certificates signed by the server's CA. However, it would decrease 
the level of security provided by the VPN.

2. The communication between client and server would be no longer based on 
certificates, but on a public key and a private key. Does the actual OpenVPN 
implementation offers any kind of support for this method?

3. The server acts as a CA, signing the Certificate Signing Request sent by the 
client. This would probably imply that the server was listening on a separate 
port for a .csr file from a file.

These are the solutions that I have thought of so far, but if there is a more 
efficient one, please tell me. Also, I would like to know which of the three 
ideas would be the best.

Thank you,
    Oana



Reply via email to