More curiosity than an issue. I'm on 386.4 with an AC86U at the moment.
I've gotten around to regenerating all of my OpenVPN server configs with SHA256 keys rather than SHA1 keys. (This is due to a regression in Asus's 386 code that Merlin fixed.)
Because I have three older Chromebooks that do not support the unofficial Android client, I need to use the native OpenVPN .onc process. Chromebooks don't support two server certs for the same router, so I generate the first server, then copy the certs over to the second server. Here's the rub: when I export the configuration for the second server, the client cert and key are missing, like so:
This essentially repeats what is in the corresponding /tmp/etc/openvpn/ server directory. It isn't a big deal to paste the client cert and key in from the first server configuration, and those configurations then work fine in the windows laptops and the chromebooks that support the unofficial client, but I'm curious if anyone knows why this might be so.
A further thing I don't understand, is that
I've gotten around to regenerating all of my OpenVPN server configs with SHA256 keys rather than SHA1 keys. (This is due to a regression in Asus's 386 code that Merlin fixed.)
Because I have three older Chromebooks that do not support the unofficial Android client, I need to use the native OpenVPN .onc process. Chromebooks don't support two server certs for the same router, so I generate the first server, then copy the certs over to the second server. Here's the rub: when I export the configuration for the second server, the client cert and key are missing, like so:
Code:
<cert>
paste client certificate data here
</cert>
<key>
paste client key data here
</key>
A further thing I don't understand, is that
/jffs/openvpn/vpn_crt_server1_client_crt
is different than /jffs/openvpn/vpn_crt_server2_client_crt
.
Last edited: