adding a new user onto openvpn

Business solution to host your own OpenVPN server with web management interface and bundled clients.
Post Reply
paddy
OpenVpn Newbie
Posts: 1
Joined: Wed Jul 11, 2012 3:36 pm

adding a new user onto openvpn

Post by paddy » Wed Jul 11, 2012 4:00 pm

Hi

We have currently taken over the support of a local companies IT and they use OpenVPN to access the companies IT when working remotely. The problem that i am facing is that a new starter as joined the company and requires setting up so he can dial in remotely using OpenVPN.

I have never used this software before and am having a problem in getting this user setup, this is what i have done so far -

Installed openvpn-2.2.2.exe onto his laptop (windows 7) but i am having trouble generating the .key and .crt for him. Should i be running the commands to create his two files on the server or on his laptop.

Currently when i try to create the key file for him on the server i am getting the following

C:\Program Files\OpenVPN\easy-rsa>build-key.bat matt
C:\Program Files\OpenVPN\easy-rsa
WARNING: can't open config file: c:/openssl/ssl/openssl.cnf
req [options] <infile >outfile
where options are
-inform arg input format - DER or PEM
-outform arg output format - DER or PEM
-in arg input file
-out arg output file
-text text form of request
-pubkey output public key
-noout do not output REQ
-verify verify signature on REQ
-modulus RSA modulus
-nodes don't encrypt the output key
-engine e use engine e, possibly a hardware device
-subject output the request's subject
-passin private key password source
-key file use the private key contained in file
-keyform arg key file format
-keyout arg file to send the key to
-rand file;file;...
load the file (or the files in the directory) into
the random number generator
-newkey rsa:bits generate a new RSA key of 'bits' in size
-newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'
-newkey ec:file generate a new EC key, parameters taken from CA in 'file'
-[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)
-config file request template file.
-subj arg set or modify request subject
-multivalue-rdn enable support for multivalued RDNs
-new new request.
-batch do not ask anything during request generation
-x509 output a x509 structure instead of a cert. req.
-days number of days a certificate generated by -x509 is valid for.
-set_serial serial number to use for a certificate generated by -x509.
-newhdr output "NEW" in the header lines
-asn1-kludge Output the 'request' in a format that is wrong but some CA's
have been reported as requiring
-extensions .. specify certificate extension section (override value in config
file)
-reqexts .. specify request extension section (override value in config file
)
-utf8 input characters are UTF8 (default ASCII)
-nameopt arg - various certificate name options
-reqopt arg - various request text options

WARNING: can't open config file: c:/openssl/ssl/openssl.cnf
unknown option -config
usage: ca args

-verbose - Talk alot while doing things
-config file - A config file
-name arg - The particular CA definition to use
-gencrl - Generate a new CRL
-crldays days - Days is when the next CRL is due
-crlhours hours - Hours is when the next CRL is due
-startdate YYMMDDHHMMSSZ - certificate validity notBefore
-enddate YYMMDDHHMMSSZ - certificate validity notAfter (overrides -days)
-days arg - number of days to certify the certificate for
-md arg - md to use, one of md2, md5, sha or sha1
-policy arg - The CA 'policy' to support
-keyfile arg - private key file
-keyform arg - private key file format (PEM or ENGINE)
-key arg - key to decode the private key if it is encrypted
-cert file - The CA certificate
-selfsign - sign a certificate with the key associated with it
-in file - The input PEM encoded certificate request(s)
-out file - Where to put the output file(s)
-outdir dir - Where to put output certificates
-infiles .... - The last argument, requests to process
-spkac file - File contains DN and signed public key and challenge
-ss_cert file - File contains a self signed cert to sign
-preserveDN - Don't re-order the DN
-noemailDN - Don't add the EMAIL field into certificate' subject
-batch - Don't ask questions
-msie_hack - msie modifications to handle all those universal strings
-revoke file - Revoke a certificate (given in file)
-subj arg - Use arg instead of request's subject
-utf8 - input characters are UTF8 (default ASCII)
-multivalue-rdn - enable support for multivalued RDNs
-extensions .. - Extension section (override value in config file)
-extfile file - Configuration file with X509v3 extentions to add
-crlexts .. - CRL extension section (override value in config file)
-engine e - use engine e, possibly a hardware device.
-status serial - Shows certificate status given the serial number
-updatedb - Updates db for expired certificates
Could Not Find C:\*.old

I cannot locate the file c:/openssl/ssl/openssl.cnf as we did not install the product originally

Is this the first command i should be running to create a key for a client to use on his laptop so he can dial in remotely or should i be doing something else first.

Any help on this would be appreciated, and thanks in advance.

Regards Paddy

rbmaine
OpenVpn Newbie
Posts: 5
Joined: Wed Sep 12, 2012 6:28 pm

Re: adding a new user onto openvpn

Post by rbmaine » Wed Sep 12, 2012 7:39 pm

i think it's a bug in the windows version. I'm having the same issue. I have my server running on a windows 7 machine and i'm unable to add clients to it after the fact.

The build-key clientx has to be run on the server side then the files that are created need to be copied to the cleints pc .

jrunrumbash
OpenVpn Newbie
Posts: 3
Joined: Fri May 31, 2013 11:11 pm

Re: adding a new user onto openvpn

Post by jrunrumbash » Sat Jun 01, 2013 2:04 pm

run the vars command
then use the build-key command

Post Reply