On 19/07/20 10:08 pm, Gert Doering wrote:
> Hi,
> 
> On Sun, Jul 19, 2020 at 09:56:09PM +1200, Richard Hector wrote:
>> I'm aware of the flags in the cert, and (IIRC) managed to enable both
>> client and server flags, and both client and server worked with the same
>> cert.
> 
> Good :-)
> 
>> What I wasn't able to do is have identical (well, reversed) config files
>> on all the servers, using the certificate mode.
> 
> This is true, one side needs to be --tls-server and one sides needs
> to be --tls-client - which differs from --secret mode, which is true
> "peer to peer with no difference in role".
> 
>> I guess I could have some algorithm to decide which is the 'server' of
>> each pair - perhaps the lower ip address - but I'd rather keep the
>> configs as similar as possible.
> 
> It's a tradeoff.  TLS need these roles, but will give you better security
> (due to PFS).  p2p is simpler, but not recommended these days, and as
> such, not as well integrated...

Ok. Looks like I need to do that, then. Oh well.

I assume this is inherent in the TLS protocol, rather than OpenVPN's
implementation?

> Not sure what the original problem is, though.  Are you using --bind
> on both sides?

I guess I am; --nobind was one of the options I had to override to make
it work.

>  NAT with port translation in beteween?  If the port 
> changes after a restart, and the other end has no --float in the config, 
> things will not work.  Here a clear client/server role also helps, as
> there is a well defined "setup connection" phase (p2p just sends off
> packets, no handshake involved).

No NAT. These are all VPSes from a (single) public provider. I use
static ports, so I can configure them predictably and automatically, and
avoid having them tread on each others' toes.

Cheers,
Richard


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to