Hello, My name is Oana Comanici and I am developing a zero config application based on OpenVPN. I have encountered an issue regarding the generation of certificates for clients. Since the application is supposed to require as little configuration as possible, the actual method for generating the certificates on the server machine and copying them afterwards to the client is not appropriate.
There are three possible solutions that I have found so far, but I don't know exactly which one is easier to implement and more efficient. 1. The clients could use self-signed SSL certificates for the communication with the server. At the moment, OpenVPN servers only accept connections from clients with certificates signed by the server's CA. However, it would decrease the level of security provided by the VPN. 2. The communication between client and server would be no longer based on certificates, but on a public key and a private key. Does the actual OpenVPN implementation offers any kind of support for this method? 3. The server acts as a CA, signing the Certificate Signing Request sent by the client. This would probably imply that the server was listening on a separate port for a .csr file from a file. These are the solutions that I have thought of so far, but if there is a more efficient one, please tell me. Also, I would like to know which of the three ideas would be the best. Thank you, Oana