08:03:52 MANAGEMENT: CMD 'username 'Auth' user1' 08:03:52 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket 08:03:52 OpenVPN 2.5-icsopenvpn armeabi-v7a built on Oct 4 2021 Yesterday I could not connect to the Asus RT-N66U router (Original firmware) from Android 7.1.1. So, not only is there no need to verify, the very idea of verifying the signature of a root CA is non-sensical."Ĭonfirming the error. Since, as was mentioned, certificates must be signed, root CAs are signed with a "dummy" signature, and the simplest way to do that, is to self-sign. For a root CA, there is no higher authority by definition (that's what "root" means), so there is nobody who could possibly sign the certificate. " The purpose of the signature in a certificate chain is that a higher authority certifies a lower authority. It will take some time, so you might consider to run Eddie Android edition 2.4 or 2.5 alpha in the meantime. So, there is no security hazard coming from the signature algorithm of a root CA certificate.Īnyway if the source of the problem is the one you mention we will plan some solution to have OpenVPN for Android compatible again. Signature of a root CA certificate is there only as a dummy one, and the verification of a CA certificate is not based on any signature, obviously.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |