Answer the question
In order to leave comments, you need to log in
How to safely spoof an OpenVPN server?
Hello.
There is a working OpenVPN server on FreeBSD 11.4 Every day from 10 to 50 people use it, in total there are about a hundred users. Authorization is configured by login - password. At clients to a config of connection certificates are registered.
There is a desire to transfer the server to Ubuntu, but I would not like to change the configs of the clients at all. On the test server, I configured everything so that I can connect with the same config, only by specifying the IP address of the test VPN server.
Answer the question
In order to leave comments, you need to log in
Absolutely normal. These are your certificates. On the old server, you generated them yourself (well, or the one who was in your place and set up OpenVPN). OpenVPN itself has no other certificates other than the ones you provide to it.
In principle, for a new server, you could generate other certificates (server.crt and server.key files) that do not need to be transferred to the client. So it would be absolutely correct (but it is also quite possible to use the keys of the old server). To generate, you will need the CA private key (ca.key), if it is not there, then it is no longer possible to generate new keys. And in this case, you will run into a problem when the certificates expire. In general, in the entire infrastructure of encryption keys, the CA key and certificate are the most valuable components, the rest can be easily changed.
i had to replace the files
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question