there isn't a clear step-by-step set of repro instructions (I couldn't create one because I was using my own x509 infrastructure and I've never used easy_rsa in my life) but basically, if you're using x509 certificates (ie the same kind you could install in your web browser, for example), and it picks up the name of your client (ie ccd works), then the bug is fixed. The bug _ONLY_ affected x509 certificates; other ways openvpn had of identifying clients were never affected.
-- [SRU] openvpn2.1~rc7 fails to pick up the CN of certificates https://bugs.launchpad.net/bugs/265058 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs