Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection

    Scheduled Pinned Locked Moved OpenVPN
    23 Posts 11 Posters 23.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      Prez_Mgmt @jimp
      last edited by

      @jimp
      yes, I created this thread afterwards

      1 Reply Last reply Reply Quote 0
      • B
        brians
        last edited by

        Good thing I noticed this.
        I was about to send out an appliance using shared to to middle of nowhere and this saved me a bunch of future headache.

        Whereas I could setup a shared key OpenVPN in mere minutes, the TLS method is a bit more complicated. I spent this afternoon learning it and testing - now I believe would be fairly fast to setup.

        jimpJ 1 Reply Last reply Reply Quote 1
        • jimpJ
          jimp Rebel Alliance Developer Netgate @brians
          last edited by

          @brians said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

          Good thing I noticed this.
          I was about to send out an appliance using shared to to middle of nowhere and this saved me a bunch of future headache.

          Whereas I could setup a shared key OpenVPN in mere minutes, the TLS method is a bit more complicated. I spent this afternoon learning it and testing - now I believe would be fairly fast to setup.

          I'm working on writing a migration guide to help with that kind of transition. It's not really all that more difficult these days just a few extra steps involved.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          Bob.DigB 1 Reply Last reply Reply Quote 1
          • Bob.DigB
            Bob.Dig LAYER 8 @jimp
            last edited by Bob.Dig

            @jimp said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

            I'm working on writing a migration guide to help with that kind of transition.

            Sadly your time of YouTube videos seems to be over? ๐Ÿค”
            But help is surely appreciated in any form. ๐Ÿ˜Œ

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              IIRC There are already hangout videos for OpenVPN that cover setting up site-to-site with overrides. Not a lot new for this but I am aiming to try to make it as minimally painful as we can.

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 1
              • P parkerask_centuryci referenced this topic on
              • V viragomann referenced this topic on
              • R
                RandyW
                last edited by

                @jimp
                Hi, this was an interesting read. Unfortunately the v2.6 also killed my PureVPN connection and even the tecks couldn't find the reason for not even connecting at all to their servers. They even logged into my system and said that PFsense v2.6 is incompatible with their servers. BONG... what happened ?
                I thought v2.6 was up to date on all of these changes. ๐Ÿ˜•

                jimpJ 1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate @RandyW
                  last edited by

                  @randyw said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

                  @jimp
                  Hi, this was an interesting read. Unfortunately the v2.6 also killed my PureVPN connection and even the tecks couldn't find the reason for not even connecting at all to their servers. They even logged into my system and said that PFsense v2.6 is incompatible with their servers. BONG... what happened ?
                  I thought v2.6 was up to date on all of these changes. ๐Ÿ˜•

                  pfSense CE 2.6.0 does not use OpenVPN 2.6.0, this post is about OpenVPN 2.6.0 which is still not released yet. Start your own thread with details about your problem, it's most likely an issue in your settings. OpenVPN is OpenVPN and is very good about compatibility but occasionally needs some adjustments as they change options/protocol details.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • M
                    mzaknoen
                    last edited by

                    Thanks for the post! I've read through documentation and watched a few videos. This maybe a foolish question, but if I have multiple "clients" connecting to our server. Do I need recreate a new CA and Certificate for each "client" OR Do I simply need to generate unique client certificate's? And apply the same server TLS key to each client?

                    B jimpJ 2 Replies Last reply Reply Quote 0
                    • Cool_CoronaC
                      Cool_Corona
                      last edited by

                      With certificate generation with Lets Encrypt integration?

                      RootBearR 1 Reply Last reply Reply Quote 0
                      • B
                        brians @mzaknoen
                        last edited by

                        @mzaknoen said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

                        Thanks for the post! I've read through documentation and watched a few videos. This maybe a foolish question, but if I have multiple "clients" connecting to our server. Do I need recreate a new CA and Certificate for each "client" OR Do I simply need to generate unique client certificate's? And apply the same server TLS key to each client?

                        I have followed this guide:
                        https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html

                        I export the CA and client certificates, then import them into the client netgate appliances. Read the entire doc because I missed some things at first regarding client specific overrides but after a couple times reading and actual hands-on it makes sense.

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate @mzaknoen
                          last edited by

                          @mzaknoen said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

                          Thanks for the post! I've read through documentation and watched a few videos. This maybe a foolish question, but if I have multiple "clients" connecting to our server. Do I need recreate a new CA and Certificate for each "client" OR Do I simply need to generate unique client certificate's? And apply the same server TLS key to each client?

                          If your server is setup as SSL/TLS and allows multiple clients on a single server, then it's already not using shared key or P2P mode and it will be fine.

                          The problematic setups are ones using shared key mode specifically (one server with one client, no certificates).

                          If you have multiple servers each with a single client and want to convert them, you can do so individually (still one server for each client) or collectively (convert them to one sever and multiple clients). How you handle the CA structure is up to you. You can use a unique CA per server if you want, but it's not strictly necessary. Each server should have a unique TLS key though, which will also help ensure that a client with the "wrong" cert won't be able to connect to a server it shouldn't be using if you have multiple.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • I ironmonkey referenced this topic on
                          • I ironmonkey referenced this topic on
                          • RootBearR
                            RootBear @Cool_Corona
                            last edited by

                            @cool_corona Are you suggesting that everybody that can use LetsEncrypt should be able to connect to your VPN :-? ๐Ÿคก

                            1 Reply Last reply Reply Quote 0
                            • GertjanG Gertjan referenced this topic on
                            • GertjanG Gertjan referenced this topic on
                            • GertjanG Gertjan referenced this topic on
                            • GertjanG Gertjan referenced this topic on
                            • jimpJ jimp forked this topic on
                            • GertjanG Gertjan referenced this topic on
                            • S SteveITS referenced this topic on
                            • B
                              Bambos
                              last edited by

                              Dear Admins,

                              Can we have a post with the successful procedure of migrating 2.6 to 2.7 , in relation to open VPN Shared key VS SSL/TLS method ?

                              Here are some referenced posts with issues:

                              https://forum.netgate.com/topic/183854/open-vpn-2-7-site-to-site-odd-routing-issue/16
                              https://forum.netgate.com/topic/183644/site-to-site-with-shared-key-gateway-bug/3

                              Are those resolved with 2.7.1 / 2.7.2 ? What is the recommendation for migrating ?

                              GertjanG 1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @Bambos
                                last edited by

                                @Bambos

                                Something isn't / wasn't working ?
                                "Shared keys" was already depreciated many moons ago.

                                So : setup a server (create a second ?!), and when done, redeploy the client "opvn" files to the OpeVN clients / users.

                                00eaf211-930f-4bf1-8515-c1149d055a8f-image.png

                                I use "Remote Access (SSL/TLS)", you could also chose for "Remote Access (SSL/TLS + User Auth).

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                B 1 Reply Last reply Reply Quote 0
                                • B
                                  Bambos @Gertjan
                                  last edited by

                                  @Gertjan thanks for the tips !

                                  for the remote access VPN, if is SSL/TLS + User auth, does this working with freeradius as well ?

                                  For site to site VPN with shared key, according this post: https://forum.netgate.com/topic/183644/site-to-site-with-shared-key-gateway-bug/3 there is no compatibility if server is V2.6 and client V2.7. Will the SSL/TLS tunnel will work between them ?? i have many 2.6 versions clients to upgrade.

                                  GertjanG 1 Reply Last reply Reply Quote 0
                                  • GertjanG
                                    Gertjan @Bambos
                                    last edited by Gertjan

                                    @Bambos said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

                                    for the remote access VPN, if is SSL/TLS + User auth, does this working with freeradius as well ?

                                    I'm using FreeRadius myself for the captive portal.
                                    Never tried to do this ... ๐Ÿ˜Š

                                    You probably want also see this one also : FreeRadius on pfSense software for Two Factor Authentication although I presume that article was written for those who wanted to "why do things the easy way if much harder is so much better ?"

                                    @Bambos said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

                                    i have many 2.6 versions clients to upgrade

                                    Keep in mind that 2.6.0 uses the "old" (now completly ditched because of security) OpenVPN (and now also old OpenSSL !!) libaries.
                                    The recent pfSense uses the more modern OpenVPN and OpenSSL.

                                    All this means that some options won't work anymore.
                                    Some more options will work, but will be depreciated soon (as usual).
                                    I Use OpenVPN myself, so I always have a look at the "source" : web pages like this and the classic openvpn support forum.

                                    The OpenVPN client also changed to support the newer OpenVPN server.

                                    And yes, I agree, syncing the entire openvpn user fleet can be a hassle.

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • GertjanG Gertjan referenced this topic on
                                    • GertjanG Gertjan referenced this topic on
                                    • GertjanG Gertjan referenced this topic on
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.