doczenith1
Very Senior Member
Well for whatever reason I am still able to connect to my ovpn server after updating the OpenVPN for Android app. I was getting ready to apply the work around but thought I'd try to connect first and it just connected.
Stop. This is an issue --a very specific and repeatable issue--connecting to an Asus router running Merlin from something running on Android because the AsusMerlin firmware is encoding a cert with SHA1. One fix is for that something not to be so sensitive, and that's been figured out, the other is exploring whether the cert can/should be encoded with something else. This isn't something swanning around, and no VPN provider in the mix.Your router, your client device(s), your choice of firmware and/or VPN providers, and any and all combinations thereof, are the culprit, today.
I updated, had no problem, and then updated again and had this exact problem, which went away with the exact workaround.ell for whatever reason I am still able to connect to my ovpn server after updating the OpenVPN for Android app. I was getting ready to apply the work around but thought I'd try to connect first and it just connected.
How did you create your certificates? Because mines have a SHA256 signatures here...I updated, had no problem, and then updated again and had this exact problem, which went away with the exact workaround.
admin@stargate88ax:/jffs/openvpn# openssl x509 -in vpn_crt_server1_crt -noout -text | grep Signature
Signature Algorithm: sha256WithRSAEncryption
Digital Signature, Key Encipherment
Signature Algorithm: sha256WithRSAEncryption
commit 2e150ce55828638fb2fb474468e01c73fdfbd6cb
Author: Eric Sauvageau <[email protected]>
Date: Fri Dec 23 12:22:55 2016 -0500
openvpn: Use sha256 for key/certs generated by Easy-RSA (used by key/certs auto-generated by the firmware)
Interesting. For me all I did originally is setup the VPN server with the defaults, worked fine up until yesterday with the update to OpenVPN for Android. I've since reset etc and it's still doing the same thing unless I put the work around in.How did you create your certificates? Because mines have a SHA256 signatures here...
Code:admin@stargate88ax:/jffs/openvpn# openssl x509 -in vpn_crt_server1_crt -noout -text | grep Signature Signature Algorithm: sha256WithRSAEncryption Digital Signature, Key Encipherment Signature Algorithm: sha256WithRSAEncryption
In fact, I "fixed" that 5 years ago.
Code:commit 2e150ce55828638fb2fb474468e01c73fdfbd6cb Author: Eric Sauvageau <[email protected]> Date: Fri Dec 23 12:22:55 2016 -0500 openvpn: Use sha256 for key/certs generated by Easy-RSA (used by key/certs auto-generated by the firmware)
See my updated post. I fixed that 5 years ago, but when I merged Asus's upstream code with the big 386 merge, the change got lost. So certs generated under 384 used SHA256, but since 386.1 they were generated with SHA1.Interesting. For me all I did originally is setup the VPN server with the defaults, worked fine up until yesterday with the update to OpenVPN for Android. I've since reset etc and it's still doing the same thing unless I put the work around in.
I only made it on the app. I added it to the servers and now the workaround is working. Thanks a lot for your support.Did you make the change to *both* the server and client configs?
Thanks a lot Merlin for your explanation.See my updated post. I fixed that 5 years ago, but when I merged Asus's upstream code with the big 386 merge, the change got lost. So certs generated under 384 used SHA256, but since 386.1 they were generated with SHA1.
Hi Merlin,Yes, I will reapply the fix for a future release. People would need to regenerate keys and certificates if they want to switch to SHA256 signatures and they were using certs generated with 386.x or with the stock firmware.
SHA1 signatures are not a real security concern in this case.
Thanks for the update, and for saying it isn't a real security concern, which was my biggest worry!Yes, I will reapply the fix for a future release. People would need to regenerate keys and certificates if they want to switch to SHA256 signatures and they were using certs generated with 386.x or with the stock firmware.
SHA1 signatures are not a real security concern in this case.
This has been such a stable app for years, much better than the official app, but just at the moment is in a strange place. Somewhat ironically the changelog says that it has been revised to improve compatibility with older servers! And we need now to make changes in an area marked "you are on your own hereThere's been another update to the app (v. 0.7.26) and with it the VPN wouldn't start as the app says it doesn't support the BF-CBC cipher. Worked around by enablingLoad OpenSSL legacy providerunder the profile configuration Basic tab. This is more likely an app issue.

Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!