Derek Cole wrote:

> Great - thakns for the information. I had come across that nsCertType
> deprecation and spent the afternoon implementing the remote-cert-tls
> directive. So far I was able to issue certificates that are either client
> or server, with the right attributes. Am I correct in understanding you
> that if I isser a cert that has both clientAuth and serverAuth directives,
> it'd be able to connect in both ways? This would be good for me because I
> have one server that acts as a server for users, and itself is a client to
> another vpn server. If I could use the same cert there it'd be convenient
> for me.

That depends a bit how you set the key usage flags in the cert. See 
OpenVPN's manpage for the --remote-cert-tls option, but it requires both the 
'key usage' and 'extended key usage' match expected values. You could set 
the key usage to 'digitalSignature' and 'keyAgreement' which is valid for 
both.

An easier option might be to use the --remote-cert-eku directive instead 
which only checks the TLS attribute for clientAuth or serverAuth, which will 
happily ignore the key usage flags. You can then sign certs with both eKu 
attributes, then do:

In client configs:
    remote-cert-eku "TLS Web Server Authentication"

In server configs:
    remote-cert-eku "TLS Web Client Authentication"

-- 
Josh


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to