pivpn: Error using iOS OpenVPN
I’ve successfully installed PiVPN and have generated an ovpn file I would like to use on my phone. I’ve imported the ovpn into OpenVPN 1.0.7 build 199 for iOS successfully.
When I attempt to connect the following error appears: OpenVPN error: PolarSSL: error parsing config private key : PK - Bad input parameters to function.
Can anyone tell me what I’ve done incorrectly?
Thanks, Bob
PiVPN Issue Template
Console output of curl install.pivpn.io | bash
Console output of pivpn add or pivpn add nopass
Console output of pivpn debug
::: Generating Debug Output
::: :::
:: PiVPN Debug ::
::: :::
:: Latest Commit ::
::: :::
commit 6b406ffb27fad7edaae4fee3e6ccafa523c1ed9f
Author: Kaladin Light <0.kaladin@gmail.com>
Date: Sun Dec 11 10:04:33 2016 -0500
Fix type for moving client script
::: :::
:: Recursive list of files in ::
:: /etc/openvpn/easy-rsa/pki ::
::: :::
/etc/openvpn/easy-rsa/pki/:
test.ovpn
ca.crt
Default.txt
dh4096.pem
index.txt
index.txt.attr
index.txt.attr.old
index.txt.old
issued
private
serial
serial.old
ta.key
/etc/openvpn/easy-rsa/pki/issued:
test.crt
server.crt
/etc/openvpn/easy-rsa/pki/private:
test.key
ca.key
server.key
::: :::
:: Output of /etc/pivpn/* ::
::: :::
:: START /etc/pivpn/DET_PLATFORM ::
Raspbian
:: END /etc/pivpn/DET_PLATFORM ::
:: START /etc/pivpn/INSTALL_PORT ::
1194
:: END /etc/pivpn/INSTALL_PORT ::
:: START /etc/pivpn/INSTALL_PROTO ::
udp
:: END /etc/pivpn/INSTALL_PROTO ::
:: START /etc/pivpn/INSTALL_USER ::
pi
:: END /etc/pivpn/INSTALL_USER ::
:: START /etc/pivpn/NO_UFW ::
1
:: END /etc/pivpn/NO_UFW ::
:: START /etc/pivpn/REVOKE_STATUS ::
0
:: END /etc/pivpn/REVOKE_STATUS ::
::: :::
:: /etc/openvpn/easy-rsa/pki/Default.txt ::
::: :::
client
dev tun
proto udp
remote (hostname) 1194
resolv-retry infinite
nobind
persist-key
persist-tun
key-direction 1
remote-cert-tls server
tls-version-min 1.2
verify-x509-name server name
cipher AES-256-CBC
auth SHA256
comp-lzo
verb 1
::: :::
:: Output of iptables ::
::: :::
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
::: :::
:: Debug Output Complete ::
::: :::
:::
::: Debug output completed above.
::: Copy saved to /tmp/debug.txt
:::
Issue
About this issue
- Original URL
- State: closed
- Created 8 years ago
- Comments: 27 (4 by maintainers)
There is some chatter on other groups that some OpenVPN implementations cannot handle client keys that are encrypted with RSA.
If your client key is encrypted, you might try a different client that is unencrypted, or re-encrypting your current client key using 3DES.
openssl rsa -in Client1.key -des3 -out Client1.3des.keyand then replace your old client key with the new client key in your configuration.