Creating 2048 Self-Signed Keys for OpenVPN Access Server
Posted: Sun Aug 25, 2013 6:02 am
I'm new to using keys and certificates, so I may be missing something crucial. What I'd like to do is use 2048 rsa keys rather than the default 1024.
I've built a new root CA (CA.crt and CA.key) using easy rsa (also tried without using the script).
Then I build and sign server.crt and server.key using the CA root to self-sign the cert.
No matter what I do when I restart OpenVPN after changing these certificates, I get "Invalid Server Certificate" in my web browser when trying to go to the admin OpenVP_AS.
I've tried numerous slightly different methods of generating these root CA and server.key + server.crt and nothing works. I first put the CA, certificate and key all in the ../web-ssl/ folder and I've also tried uploading the new certs and such using the web browser.
To get back to working self-signed keys (but only 1024 bits), I have the use the scripts at the bottom of this page: http://docs.openvpn.net/how-to-tutorial ... ss-server/
So how do i change OpenVPN access self-signed server keys to be 2048 bits?
I'd also like to know, when I download a user config files from the access server web interface, does that config include a user's key to login to the server? Or is the actual VPN authentication done with username/password? What is the size of the rsa key in the config file?
I understand that 1024 keys are probably secure enough, but would rather be safer with 2048 for both the web server and the VPN connection.
I've built a new root CA (CA.crt and CA.key) using easy rsa (also tried without using the script).
Then I build and sign server.crt and server.key using the CA root to self-sign the cert.
No matter what I do when I restart OpenVPN after changing these certificates, I get "Invalid Server Certificate" in my web browser when trying to go to the admin OpenVP_AS.
I've tried numerous slightly different methods of generating these root CA and server.key + server.crt and nothing works. I first put the CA, certificate and key all in the ../web-ssl/ folder and I've also tried uploading the new certs and such using the web browser.
To get back to working self-signed keys (but only 1024 bits), I have the use the scripts at the bottom of this page: http://docs.openvpn.net/how-to-tutorial ... ss-server/
So how do i change OpenVPN access self-signed server keys to be 2048 bits?
I'd also like to know, when I download a user config files from the access server web interface, does that config include a user's key to login to the server? Or is the actual VPN authentication done with username/password? What is the size of the rsa key in the config file?
I understand that 1024 keys are probably secure enough, but would rather be safer with 2048 for both the web server and the VPN connection.