-
-
Notifications
You must be signed in to change notification settings - Fork 20
Introduction
This script is intended to:
- Generate OpenVPN specific TLS keys
- Generate OpenVPN specific
.inline
files, which include:- OpenVPN specific TLS keys and required settings
- An Easy-RSA generated x509 Public Key Infra-structure
- Marshal requirements to maintain valid
.inline
status
- Openvpn 2.5
- Easy-RSA 3.0.7
Supports all "popular" OS:
- Minimum requirement: All code must be compatible with EasyRSA3 for Windows.
- Simply copy the
easytls
script to youreasyrsa3
working directory.
The following items can also be found in EasyTLS-Howto-ii.md
or NEED TO BE ADDED TO IT!
-
EasyTLS saves the Identity to a text file which
easytls-cryptv2-verify.sh
reads, instead of loadingopenssl
to extract the CA fingerprint andsed
to format it. -
Use:
easytls save-id
andeasytls-cryptv2-verify.sh
option--cache-id
. See respectivehelp
for usage details.My test showed an almost 1 second improvement running the unit test a lot.
-
Load the Identity as a command line parameter when OpenVPN calls
easytls-cryptv2-verify.sh
. This eliminates the need to repeatedlycat
the Identity file. -
Use:
easytls-cryptv2-verify.sh
option--preload-cache-id=<ID>
. Seehelp
for usage details.
-
Identity is the CA certificate fingerprint formatted to one contiguous string.
EG:
OpenSSL fingerprint output:
SHA1 Fingerprint=95:DC:<..snipped..>:03:DA
EasyTLS Identity format:
95DC<..snipped..>03DA