git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@877 e7ae566f-a301-0410-adde-c780ea21d3b5
| ... | ... |
@@ -1012,6 +1012,7 @@ read_key_file (struct key2 *key2, const char *file, const unsigned int flags) |
| 1012 | 1012 |
const char *error_filename = file; |
| 1013 | 1013 |
|
| 1014 | 1014 |
/* parse info */ |
| 1015 |
+ const char *cp; |
|
| 1015 | 1016 |
int hb_index = 0; |
| 1016 | 1017 |
int line_num = 1; |
| 1017 | 1018 |
int line_index = 0; |
| ... | ... |
@@ -1062,7 +1063,7 @@ read_key_file (struct key2 *key2, const char *file, const unsigned int flags) |
| 1062 | 1062 |
close (fd); |
| 1063 | 1063 |
} |
| 1064 | 1064 |
|
| 1065 |
- const char *cp = (char *)in.data; |
|
| 1065 |
+ cp = (char *)in.data; |
|
| 1066 | 1066 |
while (size) |
| 1067 | 1067 |
{
|
| 1068 | 1068 |
const char c = *cp; |
| ... | ... |
@@ -47,6 +47,20 @@ Release Notes for easy-rsa-2.0 |
| 47 | 47 |
* This release only affects the Linux/Unix version of easy-rsa. |
| 48 | 48 |
The Windows version (written to use the Windows shell) is unchanged. |
| 49 | 49 |
|
| 50 |
+* Use the revoke-full script to revoke a certificate, and generate |
|
| 51 |
+ (or update) the crl.pem file in the keys directory (as set by the |
|
| 52 |
+ vars script). Then use "crl-verify crl.pem" in your OpenVPN server |
|
| 53 |
+ config file, so that OpenVPN can reject any connections coming from |
|
| 54 |
+ clients which present a revoked certificate. Usage for the script is: |
|
| 55 |
+ |
|
| 56 |
+ revoke-full <common-name> |
|
| 57 |
+ |
|
| 58 |
+ Note this this procedure is primarily designed to revoke client |
|
| 59 |
+ certificates. You could theoretically use this method to revoke |
|
| 60 |
+ server certificates as well, but then you would need to propagate |
|
| 61 |
+ the crl.pem file to all clients as well, and have them include |
|
| 62 |
+ "crl-verify crl.pem" in their configuration files. |
|
| 63 |
+ |
|
| 50 | 64 |
INSTALL easy-rsa |
| 51 | 65 |
|
| 52 | 66 |
1. Edit vars. |
| ... | ... |
@@ -24,7 +24,7 @@ LZO = \src\lzo-1.08.vc |
| 24 | 24 |
|
| 25 | 25 |
INCLUDE_DIRS = -I$(OPENSSL)/include -I$(LZO)/include |
| 26 | 26 |
|
| 27 |
-LIBS = lzo.lib ws2_32.lib crypt32.lib iphlpapi.lib winmm.lib gdi32.lib advapi32.lib |
|
| 27 |
+LIBS = lzo.lib ws2_32.lib crypt32.lib iphlpapi.lib winmm.lib gdi32.lib advapi32.lib wininet.lib |
|
| 28 | 28 |
|
| 29 | 29 |
LIB_DIRS = -LIBPATH:$(OPENSSL)\out -LIBPATH:$(LZO) |
| 30 | 30 |
|
| ... | ... |
@@ -37,7 +37,9 @@ proto udp |
| 37 | 37 |
|
| 38 | 38 |
# "dev tun" will create a routed IP tunnel, |
| 39 | 39 |
# "dev tap" will create an ethernet tunnel. |
| 40 |
-# Use "dev tap" if you are ethernet bridging. |
|
| 40 |
+# Use "dev tap0" if you are ethernet bridging |
|
| 41 |
+# and have precreated a tap0 virtual interface |
|
| 42 |
+# and bridged it with your ethernet interface. |
|
| 41 | 43 |
# If you want to control access policies |
| 42 | 44 |
# over the VPN, you must create firewall |
| 43 | 45 |
# rules for the the TUN/TAP interface. |