openssl verify error 7 at 1 depth lookup:certificate signature failureOpenSSL: certificate signature failure errorOpenVPN: self-signed certificate in chainVPN Certificate Validation Failed (OpenVPN)? CentOS & UbuntuOpenvpn signing certificates with wrong CAMySQL SSL: bad other signature confirmationHAProxy - ssl client ca chain cannot be verifiedOpenVPN ssl VERIFY ERROR: depth=0, error=certificate signature failure in TI am335x-evm platformSSL certificate working in chrome but not openssl s_client or curlOpenSSL/HAProxy verify client certificates using a non-CA certificateStrongswan with letsencrypt certificates (IKEv2-EAP)

Set outline first and fill colors later

Was this scene in S8E06 added because of fan reactions to S8E04?

Why Emacs (dired+) asks me twice to delete file?

Are runways booked by airlines to land their planes?

Can attacking players use activated abilities after blockers have been declared?

Who wrote “A writer only begins a book. A reader finishes it.”

Why did other houses not demand this?

resolution bandwidth

Why is unzipped directory exactly 4.0K (much smaller than zipped file)?

One word for 'the thing that attracts me'?

What is the use case for non-breathable waterproof pants?

Can diplomats be allowed on the flight deck of a commercial European airline?

Why do testers need root cause analysis?

Goldfish unresponsive, what should I do?

Paired t-test means that the variances of the 2 samples are the same?

Possibility of faking someone's public key

What is to the west of Westeros?

Storing voxels for a voxel Engine in C++

Are there historical examples of audiences drawn to a work that was "so bad it's good"?

Are there any German nonsense poems (Jabberwocky)?

How to deceive the MC

Why do the i8080 I/O instructions take a byte-sized operand to determine the port?

EU rights when flight delayed so much that return is missed

Is keeping the forking link on a true fork necessary (Github/GPL)?



openssl verify error 7 at 1 depth lookup:certificate signature failure


OpenSSL: certificate signature failure errorOpenVPN: self-signed certificate in chainVPN Certificate Validation Failed (OpenVPN)? CentOS & UbuntuOpenvpn signing certificates with wrong CAMySQL SSL: bad other signature confirmationHAProxy - ssl client ca chain cannot be verifiedOpenVPN ssl VERIFY ERROR: depth=0, error=certificate signature failure in TI am335x-evm platformSSL certificate working in chrome but not openssl s_client or curlOpenSSL/HAProxy verify client certificates using a non-CA certificateStrongswan with letsencrypt certificates (IKEv2-EAP)






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








3















I have installed OpenVPN server on CentOS. I have two clients - first under CentOS (all works), and trying connect Windows client now.



I generated client's certificates with build-key utility.



If I check it on server's side - all seems to be OK:



# openssl verify -CAfile /etc/openvpn/clients/setevoy/ca.crt /etc/openvpn/clients/setevoy/setevoy.crt
/etc/openvpn/clients/setevoy/setevoy.crt: OK


But - when I check same certificates under Windows - got error:



$ openssl verify -CAfile ca.crt setevoy.crt
setevoy.crt: /C=UA/ST=CA/L=Kiev/O=Fort-Funston/OU=MyOrganizationalUnit/CN=venti.setevoy.org.ua/name=openvpn_root/emailAddress=root@setevoy.org.ua
error 7 at 1 depth lookup:certificate signature failure


Files seems to be identical on server (from where I copied them) and on Windows client (where they are placed in c/Program Files (x86)/OpenVPN/config:



# md5sum /etc/openvpn/clients/setevoy/ca.crt
53984cf44daffb708cdb937fa3d30438 /etc/openvpn/clients/setevoy/ca.crt

$ md5sum ca.crt
53984cf44daffb708cdb937fa3d30438 *ca.crt

# md5sum /etc/openvpn/clients/setevoy/setevoy.crt
c818d312e58db514a9a2afae4c687241 /etc/openvpn/clients/setevoy/setevoy.crt

$ md5sum setevoy.crt
c818d312e58db514a9a2afae4c687241 *setevoy.crt


I assume, something wrong with Windows OpenSSL mechanism... Or something similar issue:



$ head setevoy.crt | grep Signature
Signature Algorithm: sha256WithRSAEncryption


Then, when I try start OpenVNP GUI - got error:




Wed Dec 17 11:44:25 2014 TLS_ERROR: BIO read tls_read_plaintext error:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
verify failed Wed Dec 17 11:44:25 2014 TLS Error: TLS object ->
incoming plaintext read error Wed Dec 17 11:44:25 2014 TLS Error: TLS
handshake failed




UPD



On server:



# openssl version
OpenSSL 1.0.1e-fips 11 Feb 2013


and on Windows client:



$ openssl.exe version
OpenSSL 0.9.7l 28 Sep 2006


UPD 2



I upgraded OpenSSL for OpenVPN GUI, now it's 1.0.1, and verify works:



$ ../bin/openssl.exe version
OpenSSL 1.0.1j 15 Oct 2014

$ ../bin/openssl.exe verify -CAfile ca.crt setevoy.crt
setevoy.crt: OK


But - I still can't connect, with same error in log.



I also installed new CentOS server, just for testing, and OpenVPN client there - all works. Problem with Windows client only.










share|improve this question






























    3















    I have installed OpenVPN server on CentOS. I have two clients - first under CentOS (all works), and trying connect Windows client now.



    I generated client's certificates with build-key utility.



    If I check it on server's side - all seems to be OK:



    # openssl verify -CAfile /etc/openvpn/clients/setevoy/ca.crt /etc/openvpn/clients/setevoy/setevoy.crt
    /etc/openvpn/clients/setevoy/setevoy.crt: OK


    But - when I check same certificates under Windows - got error:



    $ openssl verify -CAfile ca.crt setevoy.crt
    setevoy.crt: /C=UA/ST=CA/L=Kiev/O=Fort-Funston/OU=MyOrganizationalUnit/CN=venti.setevoy.org.ua/name=openvpn_root/emailAddress=root@setevoy.org.ua
    error 7 at 1 depth lookup:certificate signature failure


    Files seems to be identical on server (from where I copied them) and on Windows client (where they are placed in c/Program Files (x86)/OpenVPN/config:



    # md5sum /etc/openvpn/clients/setevoy/ca.crt
    53984cf44daffb708cdb937fa3d30438 /etc/openvpn/clients/setevoy/ca.crt

    $ md5sum ca.crt
    53984cf44daffb708cdb937fa3d30438 *ca.crt

    # md5sum /etc/openvpn/clients/setevoy/setevoy.crt
    c818d312e58db514a9a2afae4c687241 /etc/openvpn/clients/setevoy/setevoy.crt

    $ md5sum setevoy.crt
    c818d312e58db514a9a2afae4c687241 *setevoy.crt


    I assume, something wrong with Windows OpenSSL mechanism... Or something similar issue:



    $ head setevoy.crt | grep Signature
    Signature Algorithm: sha256WithRSAEncryption


    Then, when I try start OpenVNP GUI - got error:




    Wed Dec 17 11:44:25 2014 TLS_ERROR: BIO read tls_read_plaintext error:
    error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
    verify failed Wed Dec 17 11:44:25 2014 TLS Error: TLS object ->
    incoming plaintext read error Wed Dec 17 11:44:25 2014 TLS Error: TLS
    handshake failed




    UPD



    On server:



    # openssl version
    OpenSSL 1.0.1e-fips 11 Feb 2013


    and on Windows client:



    $ openssl.exe version
    OpenSSL 0.9.7l 28 Sep 2006


    UPD 2



    I upgraded OpenSSL for OpenVPN GUI, now it's 1.0.1, and verify works:



    $ ../bin/openssl.exe version
    OpenSSL 1.0.1j 15 Oct 2014

    $ ../bin/openssl.exe verify -CAfile ca.crt setevoy.crt
    setevoy.crt: OK


    But - I still can't connect, with same error in log.



    I also installed new CentOS server, just for testing, and OpenVPN client there - all works. Problem with Windows client only.










    share|improve this question


























      3












      3








      3








      I have installed OpenVPN server on CentOS. I have two clients - first under CentOS (all works), and trying connect Windows client now.



      I generated client's certificates with build-key utility.



      If I check it on server's side - all seems to be OK:



      # openssl verify -CAfile /etc/openvpn/clients/setevoy/ca.crt /etc/openvpn/clients/setevoy/setevoy.crt
      /etc/openvpn/clients/setevoy/setevoy.crt: OK


      But - when I check same certificates under Windows - got error:



      $ openssl verify -CAfile ca.crt setevoy.crt
      setevoy.crt: /C=UA/ST=CA/L=Kiev/O=Fort-Funston/OU=MyOrganizationalUnit/CN=venti.setevoy.org.ua/name=openvpn_root/emailAddress=root@setevoy.org.ua
      error 7 at 1 depth lookup:certificate signature failure


      Files seems to be identical on server (from where I copied them) and on Windows client (where they are placed in c/Program Files (x86)/OpenVPN/config:



      # md5sum /etc/openvpn/clients/setevoy/ca.crt
      53984cf44daffb708cdb937fa3d30438 /etc/openvpn/clients/setevoy/ca.crt

      $ md5sum ca.crt
      53984cf44daffb708cdb937fa3d30438 *ca.crt

      # md5sum /etc/openvpn/clients/setevoy/setevoy.crt
      c818d312e58db514a9a2afae4c687241 /etc/openvpn/clients/setevoy/setevoy.crt

      $ md5sum setevoy.crt
      c818d312e58db514a9a2afae4c687241 *setevoy.crt


      I assume, something wrong with Windows OpenSSL mechanism... Or something similar issue:



      $ head setevoy.crt | grep Signature
      Signature Algorithm: sha256WithRSAEncryption


      Then, when I try start OpenVNP GUI - got error:




      Wed Dec 17 11:44:25 2014 TLS_ERROR: BIO read tls_read_plaintext error:
      error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
      verify failed Wed Dec 17 11:44:25 2014 TLS Error: TLS object ->
      incoming plaintext read error Wed Dec 17 11:44:25 2014 TLS Error: TLS
      handshake failed




      UPD



      On server:



      # openssl version
      OpenSSL 1.0.1e-fips 11 Feb 2013


      and on Windows client:



      $ openssl.exe version
      OpenSSL 0.9.7l 28 Sep 2006


      UPD 2



      I upgraded OpenSSL for OpenVPN GUI, now it's 1.0.1, and verify works:



      $ ../bin/openssl.exe version
      OpenSSL 1.0.1j 15 Oct 2014

      $ ../bin/openssl.exe verify -CAfile ca.crt setevoy.crt
      setevoy.crt: OK


      But - I still can't connect, with same error in log.



      I also installed new CentOS server, just for testing, and OpenVPN client there - all works. Problem with Windows client only.










      share|improve this question
















      I have installed OpenVPN server on CentOS. I have two clients - first under CentOS (all works), and trying connect Windows client now.



      I generated client's certificates with build-key utility.



      If I check it on server's side - all seems to be OK:



      # openssl verify -CAfile /etc/openvpn/clients/setevoy/ca.crt /etc/openvpn/clients/setevoy/setevoy.crt
      /etc/openvpn/clients/setevoy/setevoy.crt: OK


      But - when I check same certificates under Windows - got error:



      $ openssl verify -CAfile ca.crt setevoy.crt
      setevoy.crt: /C=UA/ST=CA/L=Kiev/O=Fort-Funston/OU=MyOrganizationalUnit/CN=venti.setevoy.org.ua/name=openvpn_root/emailAddress=root@setevoy.org.ua
      error 7 at 1 depth lookup:certificate signature failure


      Files seems to be identical on server (from where I copied them) and on Windows client (where they are placed in c/Program Files (x86)/OpenVPN/config:



      # md5sum /etc/openvpn/clients/setevoy/ca.crt
      53984cf44daffb708cdb937fa3d30438 /etc/openvpn/clients/setevoy/ca.crt

      $ md5sum ca.crt
      53984cf44daffb708cdb937fa3d30438 *ca.crt

      # md5sum /etc/openvpn/clients/setevoy/setevoy.crt
      c818d312e58db514a9a2afae4c687241 /etc/openvpn/clients/setevoy/setevoy.crt

      $ md5sum setevoy.crt
      c818d312e58db514a9a2afae4c687241 *setevoy.crt


      I assume, something wrong with Windows OpenSSL mechanism... Or something similar issue:



      $ head setevoy.crt | grep Signature
      Signature Algorithm: sha256WithRSAEncryption


      Then, when I try start OpenVNP GUI - got error:




      Wed Dec 17 11:44:25 2014 TLS_ERROR: BIO read tls_read_plaintext error:
      error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
      verify failed Wed Dec 17 11:44:25 2014 TLS Error: TLS object ->
      incoming plaintext read error Wed Dec 17 11:44:25 2014 TLS Error: TLS
      handshake failed




      UPD



      On server:



      # openssl version
      OpenSSL 1.0.1e-fips 11 Feb 2013


      and on Windows client:



      $ openssl.exe version
      OpenSSL 0.9.7l 28 Sep 2006


      UPD 2



      I upgraded OpenSSL for OpenVPN GUI, now it's 1.0.1, and verify works:



      $ ../bin/openssl.exe version
      OpenSSL 1.0.1j 15 Oct 2014

      $ ../bin/openssl.exe verify -CAfile ca.crt setevoy.crt
      setevoy.crt: OK


      But - I still can't connect, with same error in log.



      I also installed new CentOS server, just for testing, and OpenVPN client there - all works. Problem with Windows client only.







      windows vpn ssl-certificate openssl






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Dec 17 '14 at 14:22







      setevoy

















      asked Dec 17 '14 at 10:11









      setevoysetevoy

      1941213




      1941213




















          2 Answers
          2






          active

          oldest

          votes


















          0














          OpenSSL 0.9.7 is WAY old and does not support SHA256, and therefore cannot verify your server's cert. You must either upgrade the client OpenSSL to at least 0.9.8 (which isn't binary compatible thus probably requires recompiling, or obtaining a different compilation of, OpenVPN), OR change to a server cert signed with SHA1-RSA.



          "SHA1 is bad": Browsers and CAs on the public web, who drive most SSL/TLS usage, are forcefully phasing out SHA1-signed certs because they are expected to soon come in reach of collision attacks. But VPNs are (usually) a controlled situation where you run the CA and there are only a modest number of clients and you know them in advance; then you don't need to worry about collision attack and SHA1 is adequately secure -- as long as you aren't subject to some regulation or policy that just forbids SHA1 to be on the safe side and you can't get a waiver.



          How? I don't know where OpenVPN/easy-rsa sets the parameters OpenSSL uses for certsigning (it could be in a CONF file or on the commandline and either way could use an envvar); marked community so anyone can easily help. If no one does and you point to specific version or download I can take a look.



          PS- it might help if you tag openvpn specifically instead of vpn.






          share|improve this answer

























          • Please, take a look at UPD 2 in my post :-)

            – setevoy
            Dec 17 '14 at 14:23


















          0














          Problem was caused by Windows OpenSSL, which can't work with sha256 algorithm.



          Solution, I found - edit config file /etc/openvpn/easy-rsa/openssl-1.0.0.cnf(or other, depending on OpenSSL version on your server), and set:



          default_md = md5


          instead of



          default_md = sha245


          Then - re-generate all you server and client's certificates and keys (including Hoffman key).



          After this - OpenVPN GUI almost works...






          share|improve this answer


















          • 1





            As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

            – dave_thompson_085
            Dec 19 '14 at 4:42











          • I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

            – setevoy
            Dec 19 '14 at 10:07











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f653144%2fopenssl-verify-error-7-at-1-depth-lookupcertificate-signature-failure%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          2 Answers
          2






          active

          oldest

          votes








          2 Answers
          2






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          OpenSSL 0.9.7 is WAY old and does not support SHA256, and therefore cannot verify your server's cert. You must either upgrade the client OpenSSL to at least 0.9.8 (which isn't binary compatible thus probably requires recompiling, or obtaining a different compilation of, OpenVPN), OR change to a server cert signed with SHA1-RSA.



          "SHA1 is bad": Browsers and CAs on the public web, who drive most SSL/TLS usage, are forcefully phasing out SHA1-signed certs because they are expected to soon come in reach of collision attacks. But VPNs are (usually) a controlled situation where you run the CA and there are only a modest number of clients and you know them in advance; then you don't need to worry about collision attack and SHA1 is adequately secure -- as long as you aren't subject to some regulation or policy that just forbids SHA1 to be on the safe side and you can't get a waiver.



          How? I don't know where OpenVPN/easy-rsa sets the parameters OpenSSL uses for certsigning (it could be in a CONF file or on the commandline and either way could use an envvar); marked community so anyone can easily help. If no one does and you point to specific version or download I can take a look.



          PS- it might help if you tag openvpn specifically instead of vpn.






          share|improve this answer

























          • Please, take a look at UPD 2 in my post :-)

            – setevoy
            Dec 17 '14 at 14:23















          0














          OpenSSL 0.9.7 is WAY old and does not support SHA256, and therefore cannot verify your server's cert. You must either upgrade the client OpenSSL to at least 0.9.8 (which isn't binary compatible thus probably requires recompiling, or obtaining a different compilation of, OpenVPN), OR change to a server cert signed with SHA1-RSA.



          "SHA1 is bad": Browsers and CAs on the public web, who drive most SSL/TLS usage, are forcefully phasing out SHA1-signed certs because they are expected to soon come in reach of collision attacks. But VPNs are (usually) a controlled situation where you run the CA and there are only a modest number of clients and you know them in advance; then you don't need to worry about collision attack and SHA1 is adequately secure -- as long as you aren't subject to some regulation or policy that just forbids SHA1 to be on the safe side and you can't get a waiver.



          How? I don't know where OpenVPN/easy-rsa sets the parameters OpenSSL uses for certsigning (it could be in a CONF file or on the commandline and either way could use an envvar); marked community so anyone can easily help. If no one does and you point to specific version or download I can take a look.



          PS- it might help if you tag openvpn specifically instead of vpn.






          share|improve this answer

























          • Please, take a look at UPD 2 in my post :-)

            – setevoy
            Dec 17 '14 at 14:23













          0












          0








          0







          OpenSSL 0.9.7 is WAY old and does not support SHA256, and therefore cannot verify your server's cert. You must either upgrade the client OpenSSL to at least 0.9.8 (which isn't binary compatible thus probably requires recompiling, or obtaining a different compilation of, OpenVPN), OR change to a server cert signed with SHA1-RSA.



          "SHA1 is bad": Browsers and CAs on the public web, who drive most SSL/TLS usage, are forcefully phasing out SHA1-signed certs because they are expected to soon come in reach of collision attacks. But VPNs are (usually) a controlled situation where you run the CA and there are only a modest number of clients and you know them in advance; then you don't need to worry about collision attack and SHA1 is adequately secure -- as long as you aren't subject to some regulation or policy that just forbids SHA1 to be on the safe side and you can't get a waiver.



          How? I don't know where OpenVPN/easy-rsa sets the parameters OpenSSL uses for certsigning (it could be in a CONF file or on the commandline and either way could use an envvar); marked community so anyone can easily help. If no one does and you point to specific version or download I can take a look.



          PS- it might help if you tag openvpn specifically instead of vpn.






          share|improve this answer















          OpenSSL 0.9.7 is WAY old and does not support SHA256, and therefore cannot verify your server's cert. You must either upgrade the client OpenSSL to at least 0.9.8 (which isn't binary compatible thus probably requires recompiling, or obtaining a different compilation of, OpenVPN), OR change to a server cert signed with SHA1-RSA.



          "SHA1 is bad": Browsers and CAs on the public web, who drive most SSL/TLS usage, are forcefully phasing out SHA1-signed certs because they are expected to soon come in reach of collision attacks. But VPNs are (usually) a controlled situation where you run the CA and there are only a modest number of clients and you know them in advance; then you don't need to worry about collision attack and SHA1 is adequately secure -- as long as you aren't subject to some regulation or policy that just forbids SHA1 to be on the safe side and you can't get a waiver.



          How? I don't know where OpenVPN/easy-rsa sets the parameters OpenSSL uses for certsigning (it could be in a CONF file or on the commandline and either way could use an envvar); marked community so anyone can easily help. If no one does and you point to specific version or download I can take a look.



          PS- it might help if you tag openvpn specifically instead of vpn.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          answered Dec 17 '14 at 14:15


























          community wiki





          dave_thompson_085













          • Please, take a look at UPD 2 in my post :-)

            – setevoy
            Dec 17 '14 at 14:23

















          • Please, take a look at UPD 2 in my post :-)

            – setevoy
            Dec 17 '14 at 14:23
















          Please, take a look at UPD 2 in my post :-)

          – setevoy
          Dec 17 '14 at 14:23





          Please, take a look at UPD 2 in my post :-)

          – setevoy
          Dec 17 '14 at 14:23













          0














          Problem was caused by Windows OpenSSL, which can't work with sha256 algorithm.



          Solution, I found - edit config file /etc/openvpn/easy-rsa/openssl-1.0.0.cnf(or other, depending on OpenSSL version on your server), and set:



          default_md = md5


          instead of



          default_md = sha245


          Then - re-generate all you server and client's certificates and keys (including Hoffman key).



          After this - OpenVPN GUI almost works...






          share|improve this answer


















          • 1





            As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

            – dave_thompson_085
            Dec 19 '14 at 4:42











          • I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

            – setevoy
            Dec 19 '14 at 10:07















          0














          Problem was caused by Windows OpenSSL, which can't work with sha256 algorithm.



          Solution, I found - edit config file /etc/openvpn/easy-rsa/openssl-1.0.0.cnf(or other, depending on OpenSSL version on your server), and set:



          default_md = md5


          instead of



          default_md = sha245


          Then - re-generate all you server and client's certificates and keys (including Hoffman key).



          After this - OpenVPN GUI almost works...






          share|improve this answer


















          • 1





            As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

            – dave_thompson_085
            Dec 19 '14 at 4:42











          • I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

            – setevoy
            Dec 19 '14 at 10:07













          0












          0








          0







          Problem was caused by Windows OpenSSL, which can't work with sha256 algorithm.



          Solution, I found - edit config file /etc/openvpn/easy-rsa/openssl-1.0.0.cnf(or other, depending on OpenSSL version on your server), and set:



          default_md = md5


          instead of



          default_md = sha245


          Then - re-generate all you server and client's certificates and keys (including Hoffman key).



          After this - OpenVPN GUI almost works...






          share|improve this answer













          Problem was caused by Windows OpenSSL, which can't work with sha256 algorithm.



          Solution, I found - edit config file /etc/openvpn/easy-rsa/openssl-1.0.0.cnf(or other, depending on OpenSSL version on your server), and set:



          default_md = md5


          instead of



          default_md = sha245


          Then - re-generate all you server and client's certificates and keys (including Hoffman key).



          After this - OpenVPN GUI almost works...







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Dec 17 '14 at 18:48









          setevoysetevoy

          1941213




          1941213







          • 1





            As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

            – dave_thompson_085
            Dec 19 '14 at 4:42











          • I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

            – setevoy
            Dec 19 '14 at 10:07












          • 1





            As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

            – dave_thompson_085
            Dec 19 '14 at 4:42











          • I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

            – setevoy
            Dec 19 '14 at 10:07







          1




          1





          As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

          – dave_thompson_085
          Dec 19 '14 at 4:42





          As I said it's not Windows as such, it's the old version 0.9.7 which you happened to have on Windows. I don't understand why upgrading the Windows version, your Update 2, worked only partly. But if you prefer to downgrade the hash and that works, fine. PS: There is no "Hoffman" key; you probably mean Diffie-Hellman parameters which are not actually a key but are usually configured in an SSL/TLS server along with a (RSA, DSA, or ECDSA) key and cert.

          – dave_thompson_085
          Dec 19 '14 at 4:42













          I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

          – setevoy
          Dec 19 '14 at 10:07





          I have upgraded OpenSSL on Win, in OpenVPN/bin up to 1.0.1; regarding Diffie-Hellman - yep, you right, I just wrote it "quickly" :-)

          – setevoy
          Dec 19 '14 at 10:07

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f653144%2fopenssl-verify-error-7-at-1-depth-lookupcertificate-signature-failure%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020