I have successfully downloaded EasyRSA-3.0.8.zip and run the two commands:
./easyrsa init-pki
./easyrsa build-ca
Now it says on the openvpn web site:
----------------------------------Snip Start -------------------
On each server system, generate a keypair and request. Normally these are left unencrypted by using the "nopass" argument since servers usually start up without any password input. This generates an unencrypted key, so protect its access and file permissions carefully.
./easyrsa init-pki
./easyrsa gen-req UNIQUE_SERVER_SHORT_NAME nopass
On each client, generate a keypair and request. The name selected must be unique across the PKI and is otherwise arbitrary. Create a new PKI and request on each client as follows:
./easyrsa init-pki
./easyrsa gen-req UNIQUE_CLIENT_SHORT_NAME
Optionally, the private key can be left unencrypted on-disk with the additional nopass option after the name. This is not recommended unless automated VPN startup is required. Unencrypted private keys can be used by anyone who obtains a copy of the file. Encrypted keys offer stronger protection, but will require the passphrase on initial use.
Send the request files from each entity to the CA system. This is not security sensitive, though it is wise to verify the received file matches the sender's copy if the transport is untrusted.
On the CA, import each entity request file, giving it an arbitrary "short name" as follows. This basically just copies the request file into reqs/ under the PKI dir to prepare it for review and signing.
./easyrsa import-req /path/to/received.req UNIQUE_SHORT_FILE_NAME
Review each request's details if you wish, then sign it as one of the types: server or client.
(optional) review the request:
./easyrsa show-req UNIQUE_SHORT_FILE_NAME
If you are signing as a client:
./easyrsa sign-req client UNIQUE_SHORT_FILE_NAME
If you are signing as a server:
./easyrsa sign-req server UNIQUE_SHORT_FILE_NAME
The CA returns the signed certificate produced in the above step, and includes the CA certificate (ca.crt) unless the client already has it. This can be done over an insecure channel, though the client is encouraged to confirm the received CA cert is valid if the transport is untrusted.
DH Generation
On the PKI for the OpenVPN server, this command will generate DH parameters used during the TLS handshake with connecting clients. The DH params are not security sensitive and are used only by an OpenVPN server.
./easyrsa gen-dh
------------------------------------- Snip End ------------------------
Do i need to do the rest of these things if Im running openvpn on the ddwrt router,
And if so I get confused, what Im suppose to do where, for example it starts with :
"On each server syste" do i do this on the ddwrt since its the server?
I'm just trying to work my way through this one at a time. I have read the ddwrt web page on OpenVPN, but its not really clear, they have too much chaff in there regarding other things in my opinion its not clear unless you know what you are doing.
Regards
Regards
./easyrsa init-pki
./easyrsa build-ca
Now it says on the openvpn web site:
----------------------------------Snip Start -------------------
On each server system, generate a keypair and request. Normally these are left unencrypted by using the "nopass" argument since servers usually start up without any password input. This generates an unencrypted key, so protect its access and file permissions carefully.
./easyrsa init-pki
./easyrsa gen-req UNIQUE_SERVER_SHORT_NAME nopass
On each client, generate a keypair and request. The name selected must be unique across the PKI and is otherwise arbitrary. Create a new PKI and request on each client as follows:
./easyrsa init-pki
./easyrsa gen-req UNIQUE_CLIENT_SHORT_NAME
Optionally, the private key can be left unencrypted on-disk with the additional nopass option after the name. This is not recommended unless automated VPN startup is required. Unencrypted private keys can be used by anyone who obtains a copy of the file. Encrypted keys offer stronger protection, but will require the passphrase on initial use.
Send the request files from each entity to the CA system. This is not security sensitive, though it is wise to verify the received file matches the sender's copy if the transport is untrusted.
On the CA, import each entity request file, giving it an arbitrary "short name" as follows. This basically just copies the request file into reqs/ under the PKI dir to prepare it for review and signing.
./easyrsa import-req /path/to/received.req UNIQUE_SHORT_FILE_NAME
Review each request's details if you wish, then sign it as one of the types: server or client.
(optional) review the request:
./easyrsa show-req UNIQUE_SHORT_FILE_NAME
If you are signing as a client:
./easyrsa sign-req client UNIQUE_SHORT_FILE_NAME
If you are signing as a server:
./easyrsa sign-req server UNIQUE_SHORT_FILE_NAME
The CA returns the signed certificate produced in the above step, and includes the CA certificate (ca.crt) unless the client already has it. This can be done over an insecure channel, though the client is encouraged to confirm the received CA cert is valid if the transport is untrusted.
DH Generation
On the PKI for the OpenVPN server, this command will generate DH parameters used during the TLS handshake with connecting clients. The DH params are not security sensitive and are used only by an OpenVPN server.
./easyrsa gen-dh
------------------------------------- Snip End ------------------------
Do i need to do the rest of these things if Im running openvpn on the ddwrt router,
And if so I get confused, what Im suppose to do where, for example it starts with :
"On each server syste" do i do this on the ddwrt since its the server?
I'm just trying to work my way through this one at a time. I have read the ddwrt web page on OpenVPN, but its not really clear, they have too much chaff in there regarding other things in my opinion its not clear unless you know what you are doing.
Regards
Regards