Welcome, Guest. Please login or register.
Did you miss your activation email?
Saturday 09 November 2024, 01:03:54 pm

Login with username, password and session length

Download the latest community FREE version  HERE
14250 Posts in 4377 Topics by 6515 Members
Latest Member: hulteends
Search:     Advanced search
+  EFW Support
|-+  Support
| |-+  VPN Support
| | |-+  No ca certificate available
0 Members and 1 Guest are viewing this topic. « previous next »
Pages: [1] Go Down Print
Author Topic: No ca certificate available  (Read 18554 times)
savage007
Jr. Member
*
Offline Offline

Posts: 2


« on: Wednesday 11 February 2009, 08:46:16 am »

Hello,

i am trying to set up a net2net connection throug openvpn but there seams to be a problem with the ca certificate.

The certificate doesnt show and i cannot download it.(there is a link but when i click it , nothing happens) 

Looks like this  but without the certificate text.



Any help would be aprieciated.

Grtz, Edwin.
Logged
savage007
Jr. Member
*
Offline Offline

Posts: 2


« Reply #1 on: Thursday 12 February 2009, 08:58:40 am »

I've got this solved it was a browser error, used konqueror instead of opera.

But now ive got the following problem:

Wed Feb 11 22:10:42 2009 Restart pause, 2 second(s)
Wed Feb 11 22:10:44 2009 Re-using SSL/TLS context
Wed Feb 11 22:10:44 2009 LZO compression initialized
Wed Feb 11 22:10:44 2009 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Wed Feb 11 22:10:44 2009 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Feb 11 22:10:44 2009 Local Options hash (VER=V4): '41690919'
Wed Feb 11 22:10:44 2009 Expected Remote Options hash (VER=V4): '530fdded'
Wed Feb 11 22:10:44 2009 Socket Buffers: R=[124928->131072] S=[124928->131072]
Wed Feb 11 22:10:44 2009 UDPv4 link local: [undef]
Wed Feb 11 22:10:44 2009 UDPv4 link remote: 192.168.1.15:1194
Wed Feb 11 22:10:44 2009 TLS: Initial packet from 192.168.1.15:1194, sid=3a7b1d71 3ff6a784
Wed Feb 11 22:10:44 2009 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Feb 11 22:10:44 2009 VERIFY OK: depth=1, /C=IT/O=efw/CN=efw_CA
Wed Feb 11 22:10:44 2009 VERIFY nsCertType ERROR: /C=IT/O=efw/CN=127.0.0.1, require nsCertType=SERVER
Wed Feb 11 22:10:44 2009 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Feb 11 22:10:44 2009 TLS Error: TLS object -> incoming plaintext read error
Wed Feb 11 22:10:44 2009 TLS Error: TLS handshake failed
Wed Feb 11 22:10:44 2009 TCP/UDP: Closing socket
Wed Feb 11 22:10:44 2009 SIGUSR1[soft,tls-error] received, process restarting
Wed Feb 11 22:10:44 2009 Restart pause, 2 second(s)


How do i configure the right nscerttype ?
Logged
Pages: [1] Go Up Print 
« previous next »
Jump to:  

Page created in 0.031 seconds with 18 queries.
Powered by SMF 1.1 RC2 | SMF © 2001-2005, Lewis Media Design by 7dana.com