Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    oVPN client: TLS key not valid

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      orangehand
      last edited by

      I exported the key from the client cert created on the server, but the remote client I am setting up thinks "The field 'TLS key' does not appear to be valid. I've tried opening the key on textedit text mate and notepad to no avail. Can anyone help me understand this please?

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @orangehand
        last edited by

        @orangehand said in oVPN client: TLS key not valid:

        I exported the key from the client cert created on the server

        Huh? The TLS key is not part of the client cert..

        Not sure where you doing what exactly, but in pfsense when you setup a server, and then export the client config you would see the TLS key there..

        example..

        You can see the TLS key on pfsense openvpn server settings, if I use the vpn client export tool in pfsense, and export the inline for most clients its just a text ovpn file you can open with any text editor and see the TLS key

        key.jpg

        If you have a config from some other vpn service, the ovpn file will have the key in it.. Just copy and paste that into your client setup in pfsense.

        Here is config for openvpn-as server I run on a vps out on the net.. And pfsense as a client connects to it, you can see from the config from that server, and then I pasted that into the client settings on pfsense.

        clientkey.jpg

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        O 1 Reply Last reply Reply Quote 0
        • O
          orangehand @johnpoz
          last edited by

          @johnpoz
          Many thanks

          I am following the instructions at https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html#recipe-openvpn-s2s-tls-examplesettings to configure a remote pfsense behind cgnat to connect to their main office pfsense.

          In there it says:
          The next task is to export the certificates and keys which the client requires when connecting to the OpenVPN server.

          Navigate to System > Cert Manager, CAs tab
          Click fa-certificate on the row for the CA to export its certificate
          Navigate to System > Cert Manager, Certificates tab
          Click fa-certificate on the row for each client certificate to export the certificates
          Click fa-key on the row for each client certificate to export the private key for the client certificates.

          When I slavishly copy the steps and then paste in the key obtained in the last step into the remote client ovpn setup I get the error.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @orangehand
            last edited by johnpoz

            @orangehand not sure what your exporting, but the tls key would not be in the cert manager.. But clicking the export cert and or key would export a .crt or .key file that you can open with any text editor..

            buttons.jpg

            The tls key would be in the ovpn file you got or export.. Like I showed in my previous port

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            O 1 Reply Last reply Reply Quote 0
            • O
              orangehand @johnpoz
              last edited by

              @johnpoz exactly what I did (clicked the key icon), opened it in 3 different text editors, then pasted it into the client config. On save I get the error.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @orangehand
                last edited by johnpoz

                @orangehand that is not the TLS key, that is the KEY to a cert or CA.. They are completely different things.. So no posting a cert key into the tls section is never going to work.

                you would find the tls key in your server config for openvpn, or in the ovpn file you have.. They are NOT in the cert manager..

                tlskey.jpg

                From the link you posted

                tlskeylink.jpg

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                O 1 Reply Last reply Reply Quote 0
                • O
                  orangehand @johnpoz
                  last edited by

                  @johnpoz Thank you so much. I had totally misinterpreted the instructions.
                  However, although pfSense remote can ping hosts at the other end, I cannot ping them from a LAN client at the remote end. Any guesses?

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @orangehand
                    last edited by johnpoz

                    @orangehand said in oVPN client: TLS key not valid:

                    I cannot ping them from a LAN client at the remote end.

                    where are you trying to ping, and what are the networks involved..

                    192.168.1/24 - pfsenseA -- vpn tunnel 172.16.0/24 -- pfsenseB - 192.168.2/24

                    So that is example s2s setup.. Who can not ping who.. And do you have routes on both ends pointing to the other network down the vpn, etc

                    also don't forget possible host firewall.. Just because the routes are there and pfsense allows traffic if say 192.168.1.x tried to ping 192.168.2.y doesn't mean that 2.y is going to answer the ping from some remote network, etc.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    O 1 Reply Last reply Reply Quote 0
                    • O
                      orangehand @johnpoz
                      last edited by

                      @johnpoz
                      remote client 10.0.169.0/24 -- 10.0.89.0/24 oVPN tunnel -- 10.0.69.0/24 main office server

                      I'm pinging 10.0.69.16 from remote client pfsense at 10.0.169.1 and get a response. Ping from client on remote lan no response.

                      There is nothing in the remote routing table for destination 10.0.69.0/24, but the guide doesn't say that one needs to deal with routing, hence I haven't!

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @orangehand
                        last edited by johnpoz

                        @orangehand said in oVPN client: TLS key not valid:

                        I'm pinging 10.0.69.16 from remote client pfsense at 10.0.169.1 and get a response. Ping from client on remote lan no response.

                        That screams .16 firewall to me, or .16 not using pfsense as its default gateway.

                        You mean from 69.1 you get a response?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        O 1 Reply Last reply Reply Quote 0
                        • O
                          orangehand @johnpoz
                          last edited by

                          @johnpoz yes, I get a response from 10.0.69.1 AND 10.0.169.1 at the remote end

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @orangehand
                            last edited by

                            @orangehand where exactly are you pinging from.. 169.1 would be pfsense lan IP on the remote end.. There wouldn't be any different with your routing, or normally firewall on the 69.x device.

                            10.0.69.16 -- 69.1 pfsenseA -- vpn tunnel --- pfsenseB 169.1 -- 10.0.169.x

                            If you ping 69.16 from 169.1 interface on pfsenseB, it should work from 169.x unless 169.x is not using pfsenseB as its gateway. Or you doing some sort of policy routing on your 169.1 interface, or you have some firewall rule blocking access to this remote network?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.