• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Certificate Issues

Scheduled Pinned Locked Moved OpenVPN
7 Posts 3 Posters 1.7k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Offline
    guardian Rebel Alliance
    last edited by Dec 19, 2017, 7:28 PM Dec 19, 2017, 7:10 PM

    Did 2.3 Default to sign certificates with MD5?

    I'm getting a warning from the new version of OpenVPN Connect for android about TLS certificate signed with MD5.

    How can I display all my certificates to see what is going on?  The certificate manager doesn't seem to show any details.

    I started the process of recreating another certificate just to see what signing algo is used and it seems to default to SHA256.

    How can I troubleshoot… I have CA, Intermediate CA, Server Cert, User Certs... I'd like to know for sure if the problem goes all the way back to the CA, or if it's just a server cert.

    or is it the TLS Key in the cryptographic settings (# 2048 bit OpenVPN static key) that was generated automatically.

    Any advice/assistance is much appreciated.

    If you find my post useful, please give it a thumbs up!
    pfSense 2.7.2-RELEASE

    1 Reply Last reply Reply Quote 0
    • V Offline
      viragomann
      last edited by Dec 19, 2017, 9:03 PM

      @guardian:

      Did 2.3 Default to sign certificates with MD5?

      I'm in doubt.

      In the cert manager you can find an i(nfo) symbol beside each cert. After a click on it you can see the signature digest.

      1 Reply Last reply Reply Quote 0
      • G Offline
        guardian Rebel Alliance
        last edited by Dec 20, 2017, 1:46 AM

        @viragomann:

        @guardian:

        Did 2.3 Default to sign certificates with MD5?

        I'm in doubt.

        In the cert manager you can find an i(nfo) symbol beside each cert. After a click on it you can see the signature digest.

        Thanks for the hint.  I see why you are in doubt.

        So am I, but OpenVPN Connect (v1.1.26-Build 95 Dec 12, 2017) running on on Android 5.1.1 gave me the following message:

        Warning!
        TLS: received certificate signed
        with MD5. Please inform your
        admin to upgrade to stronger
        algorithm. Support for MD5 will be
        dropped the end of Apr 2018

        I wasn't able to check the automatically generated TLS certificate, but when I checked each of the user certs the relevant info was:

        Signature Digest: RSA-SHA512
        EKU: TLS Web Client Authentication

        There is no (i) for the CA, so I don't know exactly what is going on, but after a quick search I found an openssl command to try.

        I the CA/Intermediate CA into stdio for openssl x509 -noout -text and got the following output:

        Primary CA

        Certificate:
            Data:
                Version: 3 (0x2)
                Serial Number: 0 (0x0)
            Signature Algorithm: sha512WithRSAEncryption
                Issuer: [REDACTED]
                Validity
                    Not Before: May  5 07:15:26 2017 GMT
                    Not After : May  3 07:15:26 2027 GMT
                Subject:  [REDACTED]
                Subject Public Key Info:
                    Public Key Algorithm: rsaEncryption
                        Public-Key: (8192 bit)
                        Modulus:
                               [REDACTED]
                        Exponent: 65537 (0x10001)
                X509v3 extensions:
                    X509v3 Subject Key Identifier: 
                         [REDACTED - 20 Bytes - 40hex digits]
                    X509v3 Authority Key Identifier: 
                        keyid:[REDACTED - 20 Bytes - 40hex digits]
                        DirName:[REDACTED]
                        serial:00
        
                    X509v3 Basic Constraints: 
                        CA:TRUE
                    X509v3 Key Usage: 
                        Certificate Sign, CRL Sign
            Signature Algorithm: sha512WithRSAEncryption
                        [REDACTED - 20 Bytes - 40hex digits]
        
        

        Intermediate CA

        Certificate:
            Data:
                Version: 3 (0x2)
                Serial Number: 3 (0x3)
            Signature Algorithm: sha512WithRSAEncryption
                Issuer: [REDACTED]
                Validity
                    Not Before: May  5 07:25:42 2017 GMT
                    Not After : May  3 07:25:42 2027 GMT
                Subject: [REDACTED]
                Subject Public Key Info:
                    Public Key Algorithm: rsaEncryption
                        Public-Key: (4096 bit)
                        Modulus:
                        [REDACTED]
                        Exponent: 65537 (0x10001)
                X509v3 extensions:
                    X509v3 Subject Key Identifier: 
                         [REDACTED - 20 Bytes - 40hex digits]
                    X509v3 Authority Key Identifier: 
                        keyid: [REDACTED - 20 Bytes - 40hex digits]
                        DirName:[REDACTED]
                        serial:00
        
                    X509v3 Basic Constraints: 
                        CA:TRUE
                    X509v3 Key Usage: 
                        Certificate Sign, CRL Sign
            Signature Algorithm: sha512WithRSAEncryption
                       [REDACTED]
        
        

        The Key Identifiers are 160bits long, and the signature algo was shs512, which is a far cry from MD5!

        I looked in the OpenVPN Connect log (can't copy/paste or otherwise copy it) and I see two certificates being verified (and they indicate they are  signed using RSA/SHA512 (4096 bits)).

        Then I get the following lines: (Transcribed manually)

        SSL Handshake TLSv1.2/TLS-ECDHE-RSA-WITH-AES256-GCM-SHA384
        Session is ACTIVE
        EVENT: WARN info 'TLS: received certificate signed with MD5. Please inform your…

        From the log, the server key and user keys are both RSA/SHA512 (4096 bits)), so the problem is either the 2048 bit automatically generated TLS key (which I don't know how to check), the android app or something else I haven't thought of.

        Any suggestions?  Have I found an OpenVPN bug, an android problem or what?

        If you find my post useful, please give it a thumbs up!
        pfSense 2.7.2-RELEASE

        1 Reply Last reply Reply Quote 0
        • G Offline
          guardian Rebel Alliance
          last edited by Jan 6, 2018, 1:39 AM

          The problem must have been with the android client.  There was an update awhile back, and I just thought to check, and the problem is gone.

          If you find my post useful, please give it a thumbs up!
          pfSense 2.7.2-RELEASE

          1 Reply Last reply Reply Quote 0
          • N Offline
            nicolamersi
            last edited by Mar 12, 2018, 6:52 PM

            I have the same problem with openvpn connect 1.1.27 on android and openvpn 1.2.9 0 (iOS 64-bit) both latest versions.
            I cannot understand what is md5 signed but I am worried april is round the corner.

            openvpn.png
            openvpn.png_thumb

            1 Reply Last reply Reply Quote 0
            • N Offline
              nicolamersi
              last edited by Mar 14, 2018, 2:37 PM

              I still cannot figure if it is a mistake of the cli version or if my openvpn connection is going to stop working

              1 Reply Last reply Reply Quote 0
              • V Offline
                viragomann
                last edited by Mar 14, 2018, 2:46 PM

                I'm also using OpenVPN Connect 1.2.9 build 0 (iOS 64-bit) and there's no problem like that.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  [[user:consent.lead]]
                  [[user:consent.not_received]]