After updating to OpenVPN v2.4.7 and OpenSSL 1.1.1c on Arch Linux, I can't connect to the server I previously used:
➜ untangle-vpn sudo openvpn --verb 11 --config ./config.ovpn
Fri Jun 7 21:46:11 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
Fri Jun 7 21:46:11 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10
Fri Jun 7 21:46:11 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]XX.XXX.XXX.XXX:XXXX
Fri Jun 7 21:46:11 2019 UDP link local: (not bound)
Fri Jun 7 21:46:11 2019 UDP link remote: [AF_INET]XX.XXX.XXX.XXX:XXXX
Fri Jun 7 21:46:11 2019 Certificate does not have key usage extension
Fri Jun 7 21:46:11 2019 OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
Fri Jun 7 21:46:11 2019 TLS_ERROR: BIO read tls_read_plaintext error
Fri Jun 7 21:46:11 2019 TLS Error: TLS object -> incoming plaintext read error
Fri Jun 7 21:46:11 2019 TLS Error: TLS handshake failed
The people running our VPN server seem unlikely to re-issue my certificates with key usage extension any time soon.
Can I skip key usage extension check somehow?
My current config:
➜ untangle-vpn head -n 15 ./config.ovpn
client
resolv-retry 20
keepalive 10 60
nobind
mute-replay-warnings
remote-cert-tls server
comp-lzo
verb 1
persist-key
persist-tun
explicit-exit-notify 1
dev tun
proto udp
port 1194
cipher AES-128-CBC