How to revoke server certificates when working with OpenVPN and Tunnelblick

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • synackfin
    Junior Member
    • May 2024
    • 2

    How to revoke server certificates when working with OpenVPN and Tunnelblick

    The OpenVPN documentation describes how to revoke client certificates, if you want to disable access to the VPN from a particular client. But what if the server certificate's private key gets compromised?

    I asked the tunnelblick folks ( https://groups.google.com/g/tunnelbl.../c/_KdKEAYwJmE ), and it sounds like Tunnelblick does not respect certificate revocation lists if the server private key (or its intermediate signing private key or root certificate's private key) needs to be revoked.

    Should an OpenVPN server's certificate's private key be compromised, how does OpenVPN recommend that customers respond? What about if the intermediate certificate's private key is compromised? What about if the root cert is compromised?
  • synackfin
    Junior Member
    • May 2024
    • 2

    #2
    Ah - never mind. Found it.

    crl-verify can be used to specify the CRL for clients to check. https://openvpn.net/community-resour...-certificates/

    Comment

    Working...
    😀
    😂
    🥰
    😘
    🤢
    😎
    😞
    😡
    👍
    👎