
- Beitrag melden
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html
[content:399659]
Zertifikate unter Turnkey OpenVPN Linux erstellen
Ich hab einen TurnkeyOpenVPN Server (Linux) aufgesetzt. Die TurnKey Installation war eine Vorgabe - komme also nicht drumherum.
Die Installation läuft automatisiert ab. Da kann ich nichts einstellen (Serverzertifikaterstellung läuft automatisiert ab)
Ist ein DEBIAN Linux
Nach Abschluss der Installation wird mir eine Seite mit einer URL angezeigt (SSH URL...).
Das Ziel soll sein, dass ich auf meinem Client eine Verbindung zu dem Server herstellen kann und auch aus dem entsprechenden Netz eine Webseite aufrufen kann.
Vom OpenVPN Server aus ist der Rechner, den ich erreichen soll auch pingbar.
Was ich aber im Moment nicht weiß, ist folgendes:
• Wie erstelle ich die Zertifikate und exportiere sie auf meinen Client?
In Windows wüsste ich wie vorgehen kann - hier hab ich auch mehrfach OpenVPN installiert...
Aber auf dem TurnKey Linux OpenVPN...
Bin per SSH eingelogt und kann auch die Verzeichnisse sehen. Weiß aber nicht weiter.
Hat jemand von Euch einen Ansatz?
Vielen Dank schon mal vorab (sollte etwas unklar sein werde ich diese Fragen gerne beantworten).
Content-ID: 399659
Url: https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html
Ausgedruckt am: 29.04.2025 um 21:04 Uhr
- Kommentarübersicht - Bitte anmelden

- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341016
[content:399659#1341016]
ganz gewöhnlich über die Easy-RSA Skripte. Ob diese bei diesem Image bereits installiert sind, musst du in der Dokumentation prüfen.
Tutorials zu den Easy-RSA Skripten findest du massenhaft im Netz.
Alternativ kannst du die CA und die Schlüssel direkt mit OpenSSL generieren. Auch dazu findest du zahlreiche Tutorials.
Die Schlüssel einfach mit SCP kopieren.
P.S. Fertige Images sind immer mit Vorsicht zu genießen, da man nie weiß, was der Anbieter in diesen Image an Änderungen vorgenommen hat.
Viele Grüße,
Exception
- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341043
[content:399659#1341043]
Ich versuche jetzt ein Clientzertifikat zu erzeugen, scheitere jedoch daran, dass die Meldung erscheint "Command not found"
In Windows wechsel ich in das Verzeichnis Easy-RSA, lade die Datei vars.bat, danach erstelle ich ein Zertifikat mit build-key-pkcs12.bat und kopiere das in das config Verzeichnis (mit der Config Datei des Clients) des Windos Clients.
Wie mache ich das bei Linux?
Ich hab schon mal in verschiedenen Foren geschaut, aber nicht das gefunden was ich suche. Es muss doch auch zuerst die vars Datei und dann die Datei build-key-pkcs12 aufgerufen werden in Linux, oder? Wenn ja wie?
Danke schon mal vorab
- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341062
[content:399659#1341062]
https://blog.doenselmann.com/openvpn-zertifikate-unter-linux-erzeugen/

- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341057
[content:399659#1341057]
Funktioniert exakt gleich. Der einzigste Unterschied liegt an den Skriptsprachen.
Unter Windows ist das ein Batch und unter Linux ein Bash Script. Sonst gibts da keine Unterschiede.
Dann hast du nicht das entsprechende Script aufgerufen sondern irgendwas anderes, was von der Shell als Command interpretiert wird.
Eigentlich super einfach:
1) . vars Datei editieren und Variablen in die aktuelle Shell Sitzung importieren: source ./vars
2) /clean-all ausführen
3) CA Zert und DH-Key erstellen
-> ./build-ca
-> ./build-dh
4) Server Cert erstellen: /build-key-server <server common name>
5) Client Cert erstellen: ./build-key <client common name>
- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341076
[content:399659#1341076]
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Ich hap PKCS12 Zertifikate erstellt, da wir unter Windows auch solche verwenden.
Meine Client Config sieht so aus:
client
pull
dev tun
dev-node OpenVPN
proto udp
remote IP ADRESSE 1194
resolv-retry infinite
nobind
persist-key
persist-tun
auth-nocache
ca ca.crt
cipher AES-256-CBC
comp-lzo
verb 5
remote-cert-tls server
pkcs12 "C:\\Program Files\\OpenVPN\\config\\CLIENT.p12"
Meine Server Config sieht so aus.
port 1194
proto udp
dev tun
comp-lzo
keepalive 10 120
persist-key
persist-tun
user nobody
group nogroup
chroot /etc/openvpn/easy-rsa/keys/crl.jail
crl-verify crl.pem
ca /etc/openvpn/easy-rsa/keys/ca.crt
dh /etc/openvpn/easy-rsa/keys/dh2048.pem
tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
key /etc/openvpn/easy-rsa/keys/server.key
cert /etc/openvpn/easy-rsa/keys/server.crt
ifconfig-pool-persist /var/lib/openvpn/server.ipp
client-config-dir /etc/openvpn/server.ccd
status /var/log/openvpn/server.log
verb 4
- virtual subnet unique for openvpn to draw client addresses from
- the server will be configured with x.x.x.1
- important: must not be used on your network
- push routes to clients to allow them to reach private subnets
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
cipher AES-256-CBC

- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341101
[content:399659#1341101]
das ist kein Fehler. Bitte mal das vollständige Log posten und ggf. das Log Level erhöhen.
P.S. Bitte nutze die Code Tags für Code, Config und Log Ausgaben.
VG
Exception
- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341204
[content:399659#1341204]
Hab das Log Level auf 6 erhöht. Ich hoffe das reicht aus.
Hab einmal die Zertifikate neu erstellt (pkcs12 Zertifikate), dann erscheint das untere Log.
Tue Jan 29 10:45:52 2019 us=536058 Current Parameter Settings:
Tue Jan 29 10:45:52 2019 us=536058 config = 'C:\Program Files\OpenVPN\config\XX1.ovpn'
Tue Jan 29 10:45:52 2019 us=536058 mode = 0
Tue Jan 29 10:45:52 2019 us=536558 show_ciphers = DISABLED
Tue Jan 29 10:45:52 2019 us=536558 show_digests = DISABLED
Tue Jan 29 10:45:52 2019 us=536558 show_engines = DISABLED
Tue Jan 29 10:45:52 2019 us=536558 genkey = DISABLED
Tue Jan 29 10:45:52 2019 us=536558 key_pass_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=536558 show_tls_ciphers = DISABLED
Tue Jan 29 10:45:52 2019 us=536558 connect_retry_max = 0
Tue Jan 29 10:45:52 2019 us=541548 Connection profiles :
Tue Jan 29 10:45:52 2019 us=542047 proto = udp
Tue Jan 29 10:45:52 2019 us=542047 local = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=542047 local_port = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=542047 remote = '123.456.789.111'
Tue Jan 29 10:45:52 2019 us=542047 remote_port = '1194'
Tue Jan 29 10:45:52 2019 us=542047 remote_float = DISABLED
Tue Jan 29 10:45:52 2019 us=542047 bind_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=542546 bind_local = DISABLED
Tue Jan 29 10:45:52 2019 us=542546 bind_ipv6_only = DISABLED
Tue Jan 29 10:45:52 2019 us=542546 connect_retry_seconds = 5
Tue Jan 29 10:45:52 2019 us=542546 connect_timeout = 120
Tue Jan 29 10:45:52 2019 us=542546 socks_proxy_server = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=542546 socks_proxy_port = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=542546 tun_mtu = 1500
Tue Jan 29 10:45:52 2019 us=543046 tun_mtu_defined = ENABLED
Tue Jan 29 10:45:52 2019 us=543046 link_mtu = 1500
Tue Jan 29 10:45:52 2019 us=543046 link_mtu_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=543046 tun_mtu_extra = 0
Tue Jan 29 10:45:52 2019 us=543046 tun_mtu_extra_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=543547 mtu_discover_type = -1
Tue Jan 29 10:45:52 2019 us=544043 fragment = 0
Tue Jan 29 10:45:52 2019 us=544542 mssfix = 1450
Tue Jan 29 10:45:52 2019 us=545540 explicit_exit_notification = 0
Tue Jan 29 10:45:52 2019 us=546040 Connection profiles END
Tue Jan 29 10:45:52 2019 us=546539 remote_random = DISABLED
Tue Jan 29 10:45:52 2019 us=547537 ipchange = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=548036 dev = 'tun'
Tue Jan 29 10:45:52 2019 us=548535 dev_type = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=549033 dev_node = 'OpenVPN'
Tue Jan 29 10:45:52 2019 us=555523 lladdr = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=556520 topology = 1
Tue Jan 29 10:45:52 2019 us=557018 ifconfig_local = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=557518 ifconfig_remote_netmask = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=558516 ifconfig_noexec = DISABLED
Tue Jan 29 10:45:52 2019 us=558516 ifconfig_nowarn = DISABLED
Tue Jan 29 10:45:52 2019 us=559015 ifconfig_ipv6_local = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=559514 ifconfig_ipv6_netbits = 0
Tue Jan 29 10:45:52 2019 us=560013 ifconfig_ipv6_remote = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=560512 shaper = 0
Tue Jan 29 10:45:52 2019 us=560512 mtu_test = 0
Tue Jan 29 10:45:52 2019 us=561012 mlock = DISABLED
Tue Jan 29 10:45:52 2019 us=561511 keepalive_ping = 0
Tue Jan 29 10:45:52 2019 us=562009 keepalive_timeout = 0
Tue Jan 29 10:45:52 2019 us=562510 inactivity_timeout = 0
Tue Jan 29 10:45:52 2019 us=563009 ping_send_timeout = 0
Tue Jan 29 10:45:52 2019 us=563507 ping_rec_timeout = 0
Tue Jan 29 10:45:52 2019 us=564005 ping_rec_timeout_action = 0
Tue Jan 29 10:45:52 2019 us=567998 ping_timer_remote = DISABLED
Tue Jan 29 10:45:52 2019 us=568995 remap_sigusr1 = 0
Tue Jan 29 10:45:52 2019 us=569495 persist_tun = ENABLED
Tue Jan 29 10:45:52 2019 us=569495 persist_local_ip = DISABLED
Tue Jan 29 10:45:52 2019 us=569495 persist_remote_ip = DISABLED
Tue Jan 29 10:45:52 2019 us=569994 persist_key = ENABLED
Tue Jan 29 10:45:52 2019 us=570493 passtos = DISABLED
Tue Jan 29 10:45:52 2019 us=570992 resolve_retry_seconds = 1000000000
Tue Jan 29 10:45:52 2019 us=570992 resolve_in_advance = DISABLED
Tue Jan 29 10:45:52 2019 us=571491 username = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=571990 groupname = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=572489 chroot_dir = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=572988 cd_dir = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=573487 writepid = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=573487 up_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=573986 down_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=574485 down_pre = DISABLED
Tue Jan 29 10:45:52 2019 us=574984 up_restart = DISABLED
Tue Jan 29 10:45:52 2019 us=575484 up_delay = DISABLED
Tue Jan 29 10:45:52 2019 us=575484 daemon = DISABLED
Tue Jan 29 10:45:52 2019 us=575982 inetd = 0
Tue Jan 29 10:45:52 2019 us=576482 log = DISABLED
Tue Jan 29 10:45:52 2019 us=580474 suppress_timestamps = DISABLED
Tue Jan 29 10:45:52 2019 us=580973 machine_readable_output = DISABLED
Tue Jan 29 10:45:52 2019 us=581472 nice = 0
Tue Jan 29 10:45:52 2019 us=581971 verbosity = 5
Tue Jan 29 10:45:52 2019 us=582470 mute = 0
Tue Jan 29 10:45:52 2019 us=582969 gremlin = 0
Tue Jan 29 10:45:52 2019 us=583469 status_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=583469 status_file_version = 1
Tue Jan 29 10:45:52 2019 us=583968 status_file_update_freq = 60
Tue Jan 29 10:45:52 2019 us=584467 occ = ENABLED
Tue Jan 29 10:45:52 2019 us=584965 rcvbuf = 0
Tue Jan 29 10:45:52 2019 us=585465 sndbuf = 0
Tue Jan 29 10:45:52 2019 us=585465 sockflags = 0
Tue Jan 29 10:45:52 2019 us=585964 fast_io = DISABLED
Tue Jan 29 10:45:52 2019 us=586463 comp.alg = 2
Tue Jan 29 10:45:52 2019 us=586962 comp.flags = 1
Tue Jan 29 10:45:52 2019 us=587461 route_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=587960 route_default_gateway = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=587960 route_default_metric = 0
Tue Jan 29 10:45:52 2019 us=588459 route_noexec = DISABLED
Tue Jan 29 10:45:52 2019 us=592451 route_delay = 5
Tue Jan 29 10:45:52 2019 us=592951 route_delay_window = 30
Tue Jan 29 10:45:52 2019 us=592951 route_delay_defined = ENABLED
Tue Jan 29 10:45:52 2019 us=593450 route_nopull = DISABLED
Tue Jan 29 10:45:52 2019 us=593948 route_gateway_via_dhcp = DISABLED
Tue Jan 29 10:45:52 2019 us=594447 allow_pull_fqdn = DISABLED
Tue Jan 29 10:45:52 2019 us=594946 management_addr = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=594946 management_port = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=595446 management_user_pass = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=595945 management_log_history_cache = 250
Tue Jan 29 10:45:52 2019 us=596444 management_echo_buffer_size = 100
Tue Jan 29 10:45:52 2019 us=596943 management_write_peer_info_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=596943 management_client_user = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=597442 management_client_group = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=597941 management_flags = 0
Tue Jan 29 10:45:52 2019 us=598440 shared_secret_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=598939 key_direction = not set
Tue Jan 29 10:45:52 2019 us=599438 ciphername = 'AES-256-CBC'
Tue Jan 29 10:45:52 2019 us=599937 ncp_enabled = ENABLED
Tue Jan 29 10:45:52 2019 us=600437 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Tue Jan 29 10:45:52 2019 us=600437 authname = 'SHA1'
Tue Jan 29 10:45:52 2019 us=604428 prng_hash = 'SHA1'
Tue Jan 29 10:45:52 2019 us=604928 prng_nonce_secret_len = 16
Tue Jan 29 10:45:52 2019 us=605427 keysize = 0
Tue Jan 29 10:45:52 2019 us=605926 engine = DISABLED
Tue Jan 29 10:45:52 2019 us=606425 replay = ENABLED
Tue Jan 29 10:45:52 2019 us=606924 mute_replay_warnings = DISABLED
Tue Jan 29 10:45:52 2019 us=606924 replay_window = 64
Tue Jan 29 10:45:52 2019 us=607423 replay_time = 15
Tue Jan 29 10:45:52 2019 us=607922 packet_id_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=608421 use_iv = ENABLED
Tue Jan 29 10:45:52 2019 us=608920 test_crypto = DISABLED
Tue Jan 29 10:45:52 2019 us=608920 tls_server = DISABLED
Tue Jan 29 10:45:52 2019 us=609419 tls_client = ENABLED
Tue Jan 29 10:45:52 2019 us=609919 key_method = 2
Tue Jan 29 10:45:52 2019 us=610417 ca_file = 'ca.crt'
Tue Jan 29 10:45:52 2019 us=610916 ca_path = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=610916 dh_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=611416 cert_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=611915 extra_certs_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=612413 priv_key_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=615906 pkcs12_file = 'C:\Program Files\OpenVPN\config\XX3XX.p12'
Tue Jan 29 10:45:52 2019 us=616406 cryptoapi_cert = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=616906 cipher_list = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=617404 tls_cert_profile = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=617903 tls_verify = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=618402 tls_export_cert = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=618402 verify_x509_type = 0
Tue Jan 29 10:45:52 2019 us=618901 verify_x509_name = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=619400 crl_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=619899 ns_cert_type = 0
Tue Jan 29 10:45:52 2019 us=620399 remote_cert_ku[i] = 65535
Tue Jan 29 10:45:52 2019 us=620399 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=620898 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=621397 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=621895 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622395 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622395 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622894 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=623393 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=623892 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=624391 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=624391 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=628884 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=628884 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=629383 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=629881 remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=630380 remote_cert_eku = 'TLS Web Server Authentication'
Tue Jan 29 10:45:52 2019 us=630879 ssl_flags = 0
Tue Jan 29 10:45:52 2019 us=631378 tls_timeout = 2
Tue Jan 29 10:45:52 2019 us=631877 renegotiate_bytes = -1
Tue Jan 29 10:45:52 2019 us=631877 renegotiate_packets = 0
Tue Jan 29 10:45:52 2019 us=632376 renegotiate_seconds = 3600
Tue Jan 29 10:45:52 2019 us=632875 handshake_window = 60
Tue Jan 29 10:45:52 2019 us=633374 transition_window = 3600
Tue Jan 29 10:45:52 2019 us=633873 single_session = DISABLED
Tue Jan 29 10:45:52 2019 us=633873 push_peer_info = DISABLED
Tue Jan 29 10:45:52 2019 us=634372 tls_exit = DISABLED
Tue Jan 29 10:45:52 2019 us=634872 tls_auth_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=635370 tls_crypt_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=635870 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636369 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636369 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636868 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641155 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641155 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641655 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=642156 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=642653 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=643152 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=643651 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=644150 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=644150 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645147 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645645 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645645 pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=646525 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=646525 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=647026 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=647526 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=648025 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=648524 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649023 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649023 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649522 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=650021 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=654013 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=654512 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655012 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655510 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655510 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=656010 pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=656509 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657007 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657506 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657506 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=658006 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=658504 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659004 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659502 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659502 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=660002 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=660501 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661000 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661499 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661499 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661997 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=662497 pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=662996 pkcs11_pin_cache_period = -1
Tue Jan 29 10:45:52 2019 us=666988 pkcs11_id = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=667487 pkcs11_id_management = DISABLED
Tue Jan 29 10:45:52 2019 us=667986 server_network = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=668486 server_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=668486 server_network_ipv6 = ::
Tue Jan 29 10:45:52 2019 us=668985 server_netbits_ipv6 = 0
Tue Jan 29 10:45:52 2019 us=669484 server_bridge_ip = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=669983 server_bridge_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670481 server_bridge_pool_start = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670481 server_bridge_pool_end = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670981 ifconfig_pool_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=671480 ifconfig_pool_start = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=671979 ifconfig_pool_end = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=672477 ifconfig_pool_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=672477 ifconfig_pool_persist_filename = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=672977 ifconfig_pool_persist_refresh_freq = 600
Tue Jan 29 10:45:52 2019 us=673476 ifconfig_ipv6_pool_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=673975 ifconfig_ipv6_pool_base = ::
Tue Jan 29 10:45:52 2019 us=674473 ifconfig_ipv6_pool_netbits = 0
Tue Jan 29 10:45:52 2019 us=674473 n_bcast_buf = 256
Tue Jan 29 10:45:52 2019 us=678467 tcp_queue_limit = 64
Tue Jan 29 10:45:52 2019 us=679157 real_hash_size = 256
Tue Jan 29 10:45:52 2019 us=679660 virtual_hash_size = 256
Tue Jan 29 10:45:52 2019 us=679660 client_connect_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=680159 learn_address_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=680657 client_disconnect_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=681156 client_config_dir = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=681655 ccd_exclusive = DISABLED
Tue Jan 29 10:45:52 2019 us=682154 tmp_dir = 'C:\Users\SASCHA~1.GRA\AppData\Local\Temp\'
Tue Jan 29 10:45:52 2019 us=682154 push_ifconfig_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=682654 push_ifconfig_local = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=683153 push_ifconfig_remote_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=683652 push_ifconfig_ipv6_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=683652 push_ifconfig_ipv6_local = ::/0
Tue Jan 29 10:45:52 2019 us=684151 push_ifconfig_ipv6_remote = ::
Tue Jan 29 10:45:52 2019 us=684650 enable_c2c = DISABLED
Tue Jan 29 10:45:52 2019 us=685149 duplicate_cn = DISABLED
Tue Jan 29 10:45:52 2019 us=685647 cf_max = 0
Tue Jan 29 10:45:52 2019 us=686147 cf_per = 0
Tue Jan 29 10:45:52 2019 us=686147 max_clients = 1024
Tue Jan 29 10:45:52 2019 us=686646 max_routes_per_client = 256
Tue Jan 29 10:45:52 2019 us=687145 auth_user_pass_verify_script = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=691138 auth_user_pass_verify_script_via_file = DISABLED
Tue Jan 29 10:45:52 2019 us=691637 auth_token_generate = DISABLED
Tue Jan 29 10:45:52 2019 us=692136 auth_token_lifetime = 0
Tue Jan 29 10:45:52 2019 us=692635 client = ENABLED
Tue Jan 29 10:45:52 2019 us=692635 pull = ENABLED
Tue Jan 29 10:45:52 2019 us=693134 auth_user_pass_file = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=693633 show_net_up = DISABLED
Tue Jan 29 10:45:52 2019 us=694132 route_method = 0
Tue Jan 29 10:45:52 2019 us=694631 block_outside_dns = DISABLED
Tue Jan 29 10:45:52 2019 us=694631 ip_win32_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=695130 ip_win32_type = 3
Tue Jan 29 10:45:52 2019 us=695629 dhcp_masq_offset = 0
Tue Jan 29 10:45:52 2019 us=696128 dhcp_lease_time = 31536000
Tue Jan 29 10:45:52 2019 us=696626 tap_sleep = 0
Tue Jan 29 10:45:52 2019 us=696626 dhcp_options = DISABLED
Tue Jan 29 10:45:52 2019 us=697126 dhcp_renew = DISABLED
Tue Jan 29 10:45:52 2019 us=697625 dhcp_pre_release = DISABLED
Tue Jan 29 10:45:52 2019 us=698124 domain = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=698622 netbios_scope = '[UNDEF]'
Tue Jan 29 10:45:52 2019 us=698622 netbios_node_type = 0
Tue Jan 29 10:45:52 2019 us=699122 disable_nbt = DISABLED
Tue Jan 29 10:45:52 2019 us=703115 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Tue Jan 29 10:45:52 2019 us=703614 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Jan 29 10:45:52 2019 us=704113 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Enter Private Key Password:
Tue Jan 29 10:46:01 2019 us=447622 LZO compression initializing
Tue Jan 29 10:46:01 2019 us=447622 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Tue Jan 29 10:46:01 2019 us=448121 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Tue Jan 29 10:46:01 2019 us=449120 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Jan 29 10:46:01 2019 us=449618 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Jan 29 10:46:01 2019 us=451116 TCP/UDP: Preserving recently used remote address: [AF_INET]123.456.789.111:1194
Tue Jan 29 10:46:01 2019 us=453111 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Jan 29 10:46:01 2019 us=453611 UDP link local: (not bound)
Tue Jan 29 10:46:01 2019 us=454609 UDP link remote: [AF_INET]123.456.789.111:1194
WWWW

- Internen Kommentar-Link kopieren
- Externen Kommentar-Link kopieren
- Zum Anfang der Kommentare
https://administrator.de/forum/zertifikate-unter-turnkey-openvpn-linux-erstellen-399659.html#comment-1341508
[content:399659#1341508]
hm seltsam. Schon mal im Log des OpenVPN Servers geschaut, ob es überhaupt eine Verbindung vom Client an den Server gab?
VG
Exception