Re: [Openvpn-users] TLS key negotiation failed to occur within 60 seconds

2014-04-01 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello Gert, thanks for your reply. Am 01.04.14 15:39, schrieb Gert Doering: > Hi, > > On Tue, Apr 01, 2014 at 01:15:01PM +, Bonno Bloksma wrote: >> If so I would like to be able to disable it for just 1 client >> via a ccd file for instan

Re: [Openvpn-users] TLS key negotiation failed to occur within 60 seconds

2014-04-01 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello Bonno, Am 01.04.14 15:15, schrieb Bonno Bloksma: > Hi, > > > The problem with this you almost have to know that the time is the > problem before knowing to use the feature, if David does decide to > implement it. > > But like David wrote,

Re: [Openvpn-users] TLS key negotiation failed to occur within 60 seconds

2014-04-01 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello David, Am 01.04.14 14:41, schrieb David Sommerseth: > On 01/04/14 08:30, Michael Post wrote: >> The failure was a misadjusted time. The clients has the time >> 1970, but the certificate is valid beginning

Re: [Openvpn-users] TLS key negotiation failed to occur within 60 seconds

2014-03-31 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, thanks for your reply. Am 01.04.14 00:56, schrieb Jan Just Keijser: > Hi Michael, > > in 99% of the cases this error is caused by a switch of firewall > that is blocking access; cheap switches are notoriously bad at > forwarding UDP traffi

[Openvpn-users] TLS key negotiation failed to occur within 60 seconds

2014-03-30 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, i have the following configuration ## Serverside openvpn.conf dev tun # OpenVPN laeuft als Server und verwendet 78.46.103.0/24 # als VPN-Subnetz; IP des Servers: 78.46.103.167 mode server ;tls-server ifconfig 78.46.103.167 255.255.255.0

Re: [Openvpn-users] Extend SSL Certification Problem

2014-03-09 Thread Michael Post
, schrieb Gert Doering: > HI, > > On Sun, Mar 09, 2014 at 03:29:31PM +0100, Michael Post wrote: >> openssl verify -CAfile ca_cert.pem -verbose >> clients/client-cert-MichaelPost.pem says that my client >> certificate is also expired. > > Oh, besides the suggestion

Re: [Openvpn-users] Extend SSL Certification Problem

2014-03-09 Thread Michael Post
. Any clue? Thanks a lot, Michael Am 09.03.14 15:11, schrieb Gert Doering: > Hi, > > On Sun, Mar 09, 2014 at 02:39:03PM +0100, Michael Post wrote: >> Is there any possibility to extend the certificates, keys and so >> on server-side WITHOUT any change at client-side? >

[Openvpn-users] Extend SSL Certification Problem

2014-03-09 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, last year i created my keys, certs and so on with the following steps: # Serverside openssl req -new -x509 -newkey rsa:2048 -keyout ssl_priv.pem -out ca_cert.pem -days 3650 -config ./openssl.conf openssl x509 -in ca_cert.pem

[Openvpn-users] Extend SSL Certificate

2014-03-09 Thread Michael Post
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, last year i created my keys, certs and so on with the following steps: openssl req -new -x509 -newkey rsa:2048 -keyout ssl_priv.pem -out ca_cert.pem -days 3650 -config ./openssl.conf openssl x509 -in ca_cert.pem -out ca_cert.crt openssl ge