Downloaded client configuration file does not work as is

0

A client VPN certificate expired. I created a new endpoint. I downloaded the file.

CONTENTS:

client
dev tun
proto udp
remote ENDPOINT-URL.clientvpn.us-east-1.amazonaws.com 443
remote-random-hostname
resolv-retry infinite
nobind
remote-cert-tls server
cipher AES-256-GCM
verb 3
<ca>
-----BEGIN CERTIFICATE-----
CERT-VALUE
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
CERT-VALUE
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
CERT-VALUE
-----END CERTIFICATE-----
</ca>


reneg-sec 0

verify-x509-name PRIVATE-URL name

This format is NOT the same as the previous certificate.

It has no <cert /> or <key /> sections and it has the odd line at the end.

Tried as is, it fails to create the profile in ClientVPN. The config should have either cert and key, auth-user-pass or auth-federate specified.

I modified Line 4 to have the random value asdf. to the beginning. It still fails to create the profile with the same error.

I modified the file further to surround the first CERT-VALUE with <ca />, the second with <cert />, and the last with <key />. I also removed the last line of the file. I could now create the profile.

Upon connection, I get: The VPN process failed to start. The port is already in use by another process.. Which it is not as this is a documented mis-identification that points at the config file for errors.

I am not sure where to go from here.

EDIT:
My OS: Mac My VPN: AWS ClientVPN

Other user that gets same errors: OS: Windows VPN: OpenVPN

Also, I've verified the file encoding is UTF-8

tazbill
asked 9 months ago427 views
1 Answer
0

There is a Client VPN troubleshooting guide for all common errors. If the original error was The config should have either cert and key, auth-user-pass or auth-federate specified., I assume one of your authentication methods is mutual. For the mutual authentication you need to manually add the client certificate and key information to the configuration file. They can be usually found in the .crt and .key files. You do not need to modify what is between the <ca> </ca> tags because it is not your client certificate and key.

AWS
Max
answered 9 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions