-
-
Notifications
You must be signed in to change notification settings - Fork 21
Quick Start Full No CA mode
TinCanTech edited this page Dec 13, 2021
·
1 revision
This page describes how to use Easy-TLS to build complete Server and Client Inline files using No-CA mode.
Note:
- It is recommanded, although not essential, that the following procedure is done on your OpenVPN Server.
Otherwise, you will have to transfer these files to your server in order to use them.
However, if you use a router to run your Openvpn Server then you can run this on any other machine instead,
including Linux or Windows, and upload the files to your router when you are finished.
- Initialise Easy-TLS in No-CA mode:
./easytls init no-ca
- Create your self-signed Server X509 certificate:
./easytls sss server
Instead ofserver
use your own name.
- Create your self-signed Client X509 certificate:
./easytls ssc alice
Instead ofalice
use your client name.
- Create your self-signed Client X509 certificate:
./easytls ssc bob
Instead ofbob
use your client name.
- Create all of your client certificates and keys.
https://github.com/TinCanTech/easy-tls/wiki/build-and-inline-tls-auth
https://github.com/TinCanTech/easy-tls/wiki/build-and-inline-tls-crypt
https://github.com/TinCanTech/easy-tls/wiki/build-and-inline-tls-crypt-v2
The inline
files contain private data which must be shared over a secure channel, such as scp
.
Do not send any files to your clients over an insecure channel, such as email
.