Cannot connect to OpenVPN after upgrade to 18.04
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}
After upgrading to Bionic, OpenVPN gives me the following error when connecting to my company's VPN
nm-openvpn[3360]: OpenSSL: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak
Connecting to VPN is not possible.
Yes I know that my company IT uses crappy old certificates and they should upgrade, but still I need to connect to the VPN otherwise I cannot do my work :)
How to fix?
networking vpn openvpn
add a comment |
After upgrading to Bionic, OpenVPN gives me the following error when connecting to my company's VPN
nm-openvpn[3360]: OpenSSL: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak
Connecting to VPN is not possible.
Yes I know that my company IT uses crappy old certificates and they should upgrade, but still I need to connect to the VPN otherwise I cannot do my work :)
How to fix?
networking vpn openvpn
add a comment |
After upgrading to Bionic, OpenVPN gives me the following error when connecting to my company's VPN
nm-openvpn[3360]: OpenSSL: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak
Connecting to VPN is not possible.
Yes I know that my company IT uses crappy old certificates and they should upgrade, but still I need to connect to the VPN otherwise I cannot do my work :)
How to fix?
networking vpn openvpn
After upgrading to Bionic, OpenVPN gives me the following error when connecting to my company's VPN
nm-openvpn[3360]: OpenSSL: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak
Connecting to VPN is not possible.
Yes I know that my company IT uses crappy old certificates and they should upgrade, but still I need to connect to the VPN otherwise I cannot do my work :)
How to fix?
networking vpn openvpn
networking vpn openvpn
asked Jun 26 '18 at 7:53
Bastian VoigtBastian Voigt
1,5602617
1,5602617
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
WARNING
This solution is only for users who cannot upgrade the VPN server. If you have admin access to your VPN server, please upgrade it and generate new keys, otherwise you will lose VPN security!
You need to add the following options in your OpenVPN config file:
tls-cipher "DEFAULT:@SECLEVEL=0"
remote-cert-tls server
This seems to not be possible with the network-manager GUI tool (correct me if I'm wrong), so you need to export your network-manager config to a file using this command:
nmcli c export MyVPN > ~/myvpn.openvpn
Then add the two options mentioned above to the end of the file, and launch openVPN from command line using this command:
sudo openvpn --config ~/myvpn.openvpn
Once you verify that the connection is working again, you can import back your unpdated configuration file and continue to use the Network Manager to setup the tunnel (thanks Eineki):
nmcli c import type openvpn file myvpn.ovpn
Once you verify that the connection is working again, you can import back your unpdated configuration file withsudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel
– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1049798%2fcannot-connect-to-openvpn-after-upgrade-to-18-04%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
WARNING
This solution is only for users who cannot upgrade the VPN server. If you have admin access to your VPN server, please upgrade it and generate new keys, otherwise you will lose VPN security!
You need to add the following options in your OpenVPN config file:
tls-cipher "DEFAULT:@SECLEVEL=0"
remote-cert-tls server
This seems to not be possible with the network-manager GUI tool (correct me if I'm wrong), so you need to export your network-manager config to a file using this command:
nmcli c export MyVPN > ~/myvpn.openvpn
Then add the two options mentioned above to the end of the file, and launch openVPN from command line using this command:
sudo openvpn --config ~/myvpn.openvpn
Once you verify that the connection is working again, you can import back your unpdated configuration file and continue to use the Network Manager to setup the tunnel (thanks Eineki):
nmcli c import type openvpn file myvpn.ovpn
Once you verify that the connection is working again, you can import back your unpdated configuration file withsudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel
– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
add a comment |
WARNING
This solution is only for users who cannot upgrade the VPN server. If you have admin access to your VPN server, please upgrade it and generate new keys, otherwise you will lose VPN security!
You need to add the following options in your OpenVPN config file:
tls-cipher "DEFAULT:@SECLEVEL=0"
remote-cert-tls server
This seems to not be possible with the network-manager GUI tool (correct me if I'm wrong), so you need to export your network-manager config to a file using this command:
nmcli c export MyVPN > ~/myvpn.openvpn
Then add the two options mentioned above to the end of the file, and launch openVPN from command line using this command:
sudo openvpn --config ~/myvpn.openvpn
Once you verify that the connection is working again, you can import back your unpdated configuration file and continue to use the Network Manager to setup the tunnel (thanks Eineki):
nmcli c import type openvpn file myvpn.ovpn
Once you verify that the connection is working again, you can import back your unpdated configuration file withsudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel
– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
add a comment |
WARNING
This solution is only for users who cannot upgrade the VPN server. If you have admin access to your VPN server, please upgrade it and generate new keys, otherwise you will lose VPN security!
You need to add the following options in your OpenVPN config file:
tls-cipher "DEFAULT:@SECLEVEL=0"
remote-cert-tls server
This seems to not be possible with the network-manager GUI tool (correct me if I'm wrong), so you need to export your network-manager config to a file using this command:
nmcli c export MyVPN > ~/myvpn.openvpn
Then add the two options mentioned above to the end of the file, and launch openVPN from command line using this command:
sudo openvpn --config ~/myvpn.openvpn
Once you verify that the connection is working again, you can import back your unpdated configuration file and continue to use the Network Manager to setup the tunnel (thanks Eineki):
nmcli c import type openvpn file myvpn.ovpn
WARNING
This solution is only for users who cannot upgrade the VPN server. If you have admin access to your VPN server, please upgrade it and generate new keys, otherwise you will lose VPN security!
You need to add the following options in your OpenVPN config file:
tls-cipher "DEFAULT:@SECLEVEL=0"
remote-cert-tls server
This seems to not be possible with the network-manager GUI tool (correct me if I'm wrong), so you need to export your network-manager config to a file using this command:
nmcli c export MyVPN > ~/myvpn.openvpn
Then add the two options mentioned above to the end of the file, and launch openVPN from command line using this command:
sudo openvpn --config ~/myvpn.openvpn
Once you verify that the connection is working again, you can import back your unpdated configuration file and continue to use the Network Manager to setup the tunnel (thanks Eineki):
nmcli c import type openvpn file myvpn.ovpn
edited Feb 11 at 10:55
answered Jun 26 '18 at 7:58
Bastian VoigtBastian Voigt
1,5602617
1,5602617
Once you verify that the connection is working again, you can import back your unpdated configuration file withsudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel
– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
add a comment |
Once you verify that the connection is working again, you can import back your unpdated configuration file withsudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel
– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
Once you verify that the connection is working again, you can import back your unpdated configuration file with
sudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel– Eineki
Nov 3 '18 at 19:52
Once you verify that the connection is working again, you can import back your unpdated configuration file with
sudo nmcli c import type openvpn file <name or your .ovpn file>
and continue to use the Network Manager to setupp the tunnel– Eineki
Nov 3 '18 at 19:52
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
This will disable all VPN security (not recommended).
– xinthose
Feb 5 at 15:11
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@xinthose do you have any better recommendation?
– Bastian Voigt
Feb 6 at 14:44
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
@BastianVoigt I had to upgrade my server's OpenVPN to the latest version and regenerate all my keys. This will break all current client connections. HOWTO
– xinthose
Feb 6 at 17:16
1
1
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
@xinthose yeah, as I wrote in my question. I know company IT should upgrade the OpenVPN server but they don't do it and I still need to connect to VPN for doing my work. Of course, if you have admin access to the VPN server you should upgrade this first!
– Bastian Voigt
Feb 11 at 10:52
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1049798%2fcannot-connect-to-openvpn-after-upgrade-to-18-04%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown