"why is it breaking for you
in particular, while it works for other Linux users just fine" (half
of my testbed is Linux...)
Indeed, that is the interesting question. This has to do with how the client certificate is signed by the client, which in TLS1.2 is negotiated between the client and server - and depends on the available/selected ciphers.

As I wrote here: http://sourceforge.net/p/openvpn/mailman/message/32265218/, I 
believe I know where this is coming from, just not why.
I'd like to set a breakpoint in the client and forward/back track to find out.

George: One way to do that would be what I suggested here:  
http://sourceforge.net/p/openvpn/mailman/message/32264919/

Is this feasible?  At this point, I think it would be the most efficient way to 
proceed.

I could give you instructions for creating a process dump - but a dump file 
would have more secrets in it than what I suggested.

The two referenced mail messages are as far as I got by inspection.


On 28-Apr-14 11:22, Gert Doering wrote:
Hi,

On Mon, Apr 28, 2014 at 04:04:10PM +0100, George Ross wrote:
OK, with the attached patch it does appear to work for me.  I'll give it
some more exercise tomorrow morning, but in a quick test the tunnel does
now appear to come up properly.
Thanks.  That confirms the theory "it's the TLS negotiation patch", and
in particular "TLS 1.1 works, TLS 1.2 breaks".

Now the even more interesting question is "why is it breaking for you
in particular, while it works for other Linux users just fine" (half
of my testbed is Linux...)

gert


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to