Hi,

I run my own private CA with a structure like:

 rootCA ---- vpnSubCA
  |            |-------- vpnCertificate1
  |            |-------- vpnCertificate2
  |            |-------- vpnCertificate3
  |
  |---- otherCertificate1
  |---- otherCertificate2
  |---- otherCertificate3
  |---- otherCertificate4


I need OpenVPN to accept (for verify-x509-name and ccid-exclusive)
only certificates signed by vpnSubCA, *not* any certificate signed
directly by "root CA" nor by any other sub-CA of rootCA.


But when I try to do that, I get on the client side an error like:

VERIFY ERROR: depth=1, error=unable to get local issuer certificate: 
SUBJECT_OF_vpnSubCA

Here's how I try to do that:
On the client *and* the server, I put in the configuration file
ca /etc/ssl/certs/vpnSubCA.pem


I successfully got OpenVPN to work with:

 * On the client
   ca /etc/ssl/certs/rootCA.pem

 * On the server
   ca file_with_rootCA_and_vpnSubCA_concatenated

But that does not do what I want.

I'm using OpenVPN 2.3.4 (Debian package).

Thanks in advance for any help,

-- 
Lionel

------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to