OpenVPN CA

Discussions for BiPAC 8900 series: 8900AX-1600, 8900AX-2400, 8900X
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

SPAU00 wrote: Mon Feb 13, 2023 11:55 am
billion_fan wrote: Mon Feb 13, 2023 9:19 am
SPAU00 wrote: Fri Feb 10, 2023 2:54 pm

OpenVPN server CA should be distinguished as a server certificate. Renewed CA is not. “extendedKeyUsage = critical, serverAuth”
Our engineer are asking how you verified the renewed cert does not have “extendedKeyUsage = critical, serverAuth”, so they can investigate
OpenVPN connection log gives the following warning which has prompted me to import cert and take a closer look. It's not generated with extendedKeyUsage (eku) which is bad... Renewed CA's are currently useless.
"WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info."
I'm guessing the default CA is pre-installed and the renewed are being generated by firmware?

CA must be generated with “extendedKeyUsage = critical, serverAuth” and as were using the same CA to export to clients, "“extendedKeyUsage = critical, clientAuth”.

Your OpenVPN client export file should contain the line "remote-cert-eku “TLS Web Server Authentication”" or "remote-cert-tls server"

Ask your guys to checkout the below link....
https://openvpn.net/community-resources ... ecting-to/
:)
I should add if the below line is added to client file as it should be, the connection will fail because the CA isn’t a server certificate.

"remote-cert-tls server"
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

SPAU00 wrote: Mon Feb 13, 2023 12:07 pm
SPAU00 wrote: Mon Feb 13, 2023 11:55 am
billion_fan wrote: Mon Feb 13, 2023 9:19 am

Our engineer are asking how you verified the renewed cert does not have “extendedKeyUsage = critical, serverAuth”, so they can investigate
OpenVPN connection log gives the following warning which has prompted me to import cert and take a closer look. It's not generated with extendedKeyUsage (eku) which is bad... Renewed CA's are currently useless.
"WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info."
I'm guessing the default CA is pre-installed and the renewed are being generated by firmware?

CA must be generated with “extendedKeyUsage = critical, serverAuth” and as were using the same CA to export to clients, "“extendedKeyUsage = critical, clientAuth”.

Your OpenVPN client export file should contain the line "remote-cert-eku “TLS Web Server Authentication”" or "remote-cert-tls server"

Ask your guys to checkout the below link....
https://openvpn.net/community-resources ... ecting-to/
:)
I should add if the below line is added to client file as it should be, the connection will fail because the CA isn’t a server certificate.

"remote-cert-tls server"
I've attached screen shots of the differences between the default CA and a Renewed CA. The default CA has no eku so all intended purposes are allowed. However server config should have written: "remote-cert-tls client".

The renewed CA has eku but the server and client intended purposes are missing so are not allowed. Refer to recent post and links of what should be allowed when generated.
You do not have the required permissions to view the files attached to this post.
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

SPAU00 wrote: Mon Feb 13, 2023 10:57 pm
SPAU00 wrote: Mon Feb 13, 2023 12:07 pm
SPAU00 wrote: Mon Feb 13, 2023 11:55 am

OpenVPN connection log gives the following warning which has prompted me to import cert and take a closer look. It's not generated with extendedKeyUsage (eku) which is bad... Renewed CA's are currently useless.
"WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info."
I'm guessing the default CA is pre-installed and the renewed are being generated by firmware?

CA must be generated with “extendedKeyUsage = critical, serverAuth” and as were using the same CA to export to clients, "“extendedKeyUsage = critical, clientAuth”.

Your OpenVPN client export file should contain the line "remote-cert-eku “TLS Web Server Authentication”" or "remote-cert-tls server"

Ask your guys to checkout the below link....
https://openvpn.net/community-resources ... ecting-to/
:)
I should add if the below line is added to client file as it should be, the connection will fail because the CA isn’t a server certificate.

"remote-cert-tls server"
I've attached screen shots of the differences between the default CA and a Renewed CA. The default CA has no eku so all intended purposes are allowed. However server config should have written: "remote-cert-tls client".

The renewed CA has eku but the server and client intended purposes are missing so are not allowed. Refer to recent post and links of what should be allowed when generated.
You do not have the required permissions to view the files attached to this post.
billion_fan
Posts: 5375
Joined: Tue Jul 19, 2011 4:30 pm

Re: OpenVPN CA

Post by billion_fan »

SPAU00 wrote: Mon Feb 13, 2023 10:58 pm
SPAU00 wrote: Mon Feb 13, 2023 10:57 pm
SPAU00 wrote: Mon Feb 13, 2023 12:07 pm

I should add if the below line is added to client file as it should be, the connection will fail because the CA isn’t a server certificate.

"remote-cert-tls server"
I've attached screen shots of the differences between the default CA and a Renewed CA. The default CA has no eku so all intended purposes are allowed. However server config should have written: "remote-cert-tls client".

The renewed CA has eku but the server and client intended purposes are missing so are not allowed. Refer to recent post and links of what should be allowed when generated.
Try using the attached firmware, engineers have said they have added the extendedKeyUsage
You do not have the required permissions to view the files attached to this post.
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

billion_fan wrote: Tue Feb 14, 2023 1:53 pm
SPAU00 wrote: Mon Feb 13, 2023 10:58 pm
SPAU00 wrote: Mon Feb 13, 2023 10:57 pm

I've attached screen shots of the differences between the default CA and a Renewed CA. The default CA has no eku so all intended purposes are allowed. However server config should have written: "remote-cert-tls client".

The renewed CA has eku but the server and client intended purposes are missing so are not allowed. Refer to recent post and links of what should be allowed when generated.
Try using the attached firmware, engineers have said they have added the extendedKeyUsage
Thanks. You made us a custom firmware a while back to resolve a separate issue. Unfortunately, the issue persists on the latest Australian public release of the firmware where it’s documented as being fixed so we've stuck with your custom firmware. Would you mind asking your guys to add the extendedKeyUsage to the below firmwares please? I’ll test and report back.

File exceeds your attachment limit. Please pull from below link....
https://1drv.ms/u/s!AsqoznSTwevflspEsXk ... A?e=3Sp84w
billion_fan
Posts: 5375
Joined: Tue Jul 19, 2011 4:30 pm

Re: OpenVPN CA

Post by billion_fan »

SPAU00 wrote: Tue Feb 14, 2023 9:21 pm
billion_fan wrote: Tue Feb 14, 2023 1:53 pm
SPAU00 wrote: Mon Feb 13, 2023 10:58 pm
Try using the attached firmware, engineers have said they have added the extendedKeyUsage
Thanks. You made us a custom firmware a while back to resolve a separate issue. Unfortunately, the issue persists on the latest Australian public release of the firmware where it’s documented as being fixed so we've stuck with your custom firmware. Would you mind asking your guys to add the extendedKeyUsage to the below firmwares please? I’ll test and report back.

File exceeds your attachment limit. Please pull from below link....
https://1drv.ms/u/s!AsqoznSTwevflspEsXk ... A?e=3Sp84w
I have provided your email to AU support who will contact you regarding AU firmware (in the future use this contact window for any support requests)
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

billion_fan wrote: Wed Feb 15, 2023 10:04 am
SPAU00 wrote: Tue Feb 14, 2023 9:21 pm
billion_fan wrote: Tue Feb 14, 2023 1:53 pm

Try using the attached firmware, engineers have said they have added the extendedKeyUsage
Thanks. You made us a custom firmware a while back to resolve a separate issue. Unfortunately, the issue persists on the latest Australian public release of the firmware where it’s documented as being fixed so we've stuck with your custom firmware. Would you mind asking your guys to add the extendedKeyUsage to the below firmwares please? I’ll test and report back.

File exceeds your attachment limit. Please pull from below link....
https://1drv.ms/u/s!AsqoznSTwevflspEsXk ... A?e=3Sp84w
I have provided your email to AU support who will contact you regarding AU firmware (in the future use this contact window for any support requests)
I won’t hold my breath! Your renew CA was implemented from my posts and that’s a disappointing response considering pointing out security flaws and efforts made here.
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

SPAU00 wrote: Wed Feb 15, 2023 10:29 am
billion_fan wrote: Wed Feb 15, 2023 10:04 am
SPAU00 wrote: Tue Feb 14, 2023 9:21 pm

Thanks. You made us a custom firmware a while back to resolve a separate issue. Unfortunately, the issue persists on the latest Australian public release of the firmware where it’s documented as being fixed so we've stuck with your custom firmware. Would you mind asking your guys to add the extendedKeyUsage to the below firmwares please? I’ll test and report back.

File exceeds your attachment limit. Please pull from below link....
https://1drv.ms/u/s!AsqoznSTwevflspEsXk ... A?e=3Sp84w
I have provided your email to AU support who will contact you regarding AU firmware (in the future use this contact window for any support requests)
I won’t hold my breath! Your renew CA was implemented from my posts and that’s a disappointing response considering pointing out security flaws and efforts made here.
Haven’t heard from your AU support so what now?
billion_fan
Posts: 5375
Joined: Tue Jul 19, 2011 4:30 pm

Re: OpenVPN CA

Post by billion_fan »

SPAU00 wrote: Fri Feb 17, 2023 9:25 am
SPAU00 wrote: Wed Feb 15, 2023 10:29 am
billion_fan wrote: Wed Feb 15, 2023 10:04 am

I have provided your email to AU support who will contact you regarding AU firmware (in the future use this contact window for any support requests)
I won’t hold my breath! Your renew CA was implemented from my posts and that’s a disappointing response considering pointing out security flaws and efforts made here.
Haven’t heard from your AU support so what now?
They said they sent a email to post.************@outlook.com.au your registered email address on this forum (maybe it went to your junk folder)

If you are not using this email anymore, let me know your new email address and I'll get them to email you on that
SPAU00
Posts: 39
Joined: Mon Oct 28, 2019 8:35 am

Re: OpenVPN CA

Post by SPAU00 »

billion_fan wrote: Fri Feb 17, 2023 9:28 am
SPAU00 wrote: Fri Feb 17, 2023 9:25 am
SPAU00 wrote: Wed Feb 15, 2023 10:29 am

I won’t hold my breath! Your renew CA was implemented from my posts and that’s a disappointing response considering pointing out security flaws and efforts made here.
Haven’t heard from your AU support so what now?
They said they sent a email to post.************@outlook.com.au your registered email address on this forum

If you are not using this email anymore, let me know your new email address and I'll get them to email you on that
Got nothing. Checked spam. I get your notices to this email. Another email would be same without “post.”
I’d like to get this resolved please. Is it not possible your guys can adjust files as you’ve done in the past with dongle routing issue which got sorted?
Post Reply