- Newest
- Most votes
- Most comments
Based on the information provided, it seems the issue might indeed be related to your certificates. Here are a few points to consider:
-
Certificate Chain: When using a private CA, it's crucial to include the entire certificate chain in your configuration. This means you should include the CA certificate, the server certificate, and the client certificate in the appropriate sections of your .ovpn file.
-
Certificate Format: Ensure you're using the correct format for your certificates. The entire certificate, including the "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" lines, should be included.
-
Server Certificate in OVPN: The <ca> section in your .ovpn file should contain the CA certificate, not the server certificate. The server certificate is used by the Client VPN endpoint itself.
-
Client Certificate and Key: Make sure you're using the correct client certificate and private key in your .ovpn file. These should be in the <cert> and <key> sections respectively.
-
Certificate Validation: The client certificate is validated against the CA certificate, not directly against the server certificate. The server certificate is also validated against the same CA certificate. This is how the trust chain is established.
-
ACM Import: When importing certificates to ACM, ensure you're importing the entire certificate chain for the server certificate.
To troubleshoot:
- Double-check that your CA certificate is correctly placed in the <ca> section of the .ovpn file.
- Verify that your client certificate and private key are correctly placed in the <cert> and <key> sections.
- Ensure all certificates include the full content, including the BEGIN and END lines.
- Verify that the client certificate was indeed signed by the same CA as the server certificate.
- Check the expiration dates of all certificates to ensure they are still valid.
If the issue persists after verifying these points, you may want to regenerate your certificates and reimport them to ACM, ensuring you follow each step carefully. Also, consider using OpenSSL commands to verify the certificate chain and ensure all parts are correct and compatible.
Sources
Troubleshooting AWS Client VPN: Client software returns a TLS error when trying to connect to Client VPN - AWS Client VPN
AWS Client VPN endpoint configuration file export - AWS Client VPN
Troubleshooting common AWS Client VPN problems - AWS Client VPN
Relevant content
- asked 2 years ago
- asked a year ago
- asked 7 years ago
- asked 3 years ago

I've reimported my certificate, with the server cert in the certificate body section, and the ca cert in the chain section, and re-exported the ovpn file and now it shows the CA cert, and I've added my client crt and key, but while getting further, it's slightly different error now:
I've also verified my certs are trusted by the ca: $openssl verify -CAfile ../ca.crt yyyyyy-vpn.crt yyyyyyy-vpn.crt: OK $openssl verify -CAfile ../ca.crt vpn-user.crt vpn-user.crt: OK
Any idea what I'm doing wrong?