openVPN generated incorrect certs generated, key too small

OpenVPN profiles, especially certs are too small, which causing unable to establish connection from modern Linux operating systems, like RHEL9 or Fedora 39.
Error is specifically:
OpenSSL: error:0A00018F:SSL routines::ee key too small:
So, is there a way, to customize the size of pem key during generating, or any settings which could be set in .openvpn file?
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
I'm happy to hear that.
- Copy Link
- Report Inappropriate Content
@pepicheck The second option DID NOT WORK!! Only the first option worked.
I added the tls-cipher TLS-DHE-RSA-WITH-AES-128-CBC-SHA to the generated .ovpn file (above and after cipher AES-128-CBC) and then importing to settings but it did not work
client
dev tun
auth-nocache
proto udp
float
nobind
cipher AES-128-CBC
tls-cipher TLS-DHE-RSA-WITH-AES-128-CBC-SHA
comp-lzo adaptive
resolv-retry infinite
persist-key
persist-tun
verb 3
remote XXXXXXXXXXXXXX
Device Firmware Version:1.18.0 0.9.1 v009e.0 Build 241018 Rel.43535n
Device Hardware Version:Archer VR2100v v1 00000000
Any idea why the option 2 did not work for me?
- Copy Link
- Report Inappropriate Content
- Copy Link
- Report Inappropriate Content
@ELAMeri Error message? Distro what you have???
- Copy Link
- Report Inappropriate Content
Same error on a MacBook running Sonoma 15.3
Eventualy reset the OpenVPN client settings to defaults and the issue was solved.
But what puzzled me is that the same OpenVPN setup on multiple Omada controller setups - and only one of them was returning the error message, using the same OpenVPN client app. Of course, all controllers updated to the latest version.
At least it's fixed.
Hopefully this will help someone in the near future.
- Copy Link
- Report Inappropriate Content
@pepicheck I also have the issue with an Archer AX23 v1.2 on the latest firmware.
I tried the second method, but it did not work. I can use the first method, but I have doubts about it.
To me, having VPN access means having a secure access to my private network when I'm away. If I have to degrade the security of this connection that I would rather not have this connection at all.
With that said, I think it is obvious what the solution is: TP-Link updates the server version inside the firmware. I see the downsides as well:
- Some customers stuck on older clients might not be able to connect.
- The efforts to integrate and test the newer server version might not be worth it.
- etc.
With that said, to me it feels like I'm going to part way of VPN servers run on the router. If there is no possibility for the end user to decide to update that application without affecting the rest of the router software, then I cannot see a good solution across the board.
- Copy Link
- Report Inappropriate Content

Information
Helpful: 4
Views: 8889
Replies: 26
Voters 1
