Hi,
On 20/05/21 21:49, tincantech via Openvpn-devel wrote:
Hi,
again, I do not understand why openvpn choose to switch to .pem
for this tutorial. PEM -> Private Email, which this is not.
You have a certificate and a key and every other openvpn tutorial
on openvpn and probably the entire planet uses .crt and .key.
This seems to be a poor decision in my opinion.
pem as extension for keys is pretty common and specifies more the
encoding than the type. E.g. there is also the der encoding.
Arne
I accept the principle but openvpn *only* uses PEM-enc, that I know of.
So, why switch to .pem when it has never been used before by openvpn?
If you are all happy to let it go that way then so-be-it,
Hopefully this clarifies things:
- the default output format of OpenSSL is PEM-encoded ; openssl uses the
default extension .pem
- the OpenVPN .crt and .key files are ALSO PEM-encoded by default, but
they've just been named differently by the easy-rsa tools to ensure that
the files can be easily loaded on Windows
- FTR: nearly all webservers I have ever seen are configured to use a
hostcert.pem and hostkey.pem and my guess is that there are (still)
more Linux-based webservers out there than OpenVPN clients and servers.
Having said that, I do agree that after using .crt/.key files left and
right (to accomodate Windows users) for over 15 years, it does seem
confusing to start using files named .pem for peer-fingerprinting all
of sudden. On the other hand, with peer-fingerprinting you don't
*HAVE* a .crt file (at least, you don't need one, technically) but only
a .key file. So choosing a different extension for peer-fingerprinting
does have its merits.
HTH,
JJK
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel