there isn't a clear step-by-step set of repro instructions (I couldn't
create one because I was using my own x509 infrastructure and I've never
used easy_rsa in my life) but basically, if you're using x509
certificates (ie the same kind you could install in your web browser,
for example), and it picks up the name of your client (ie ccd works),
then the bug is fixed.  The bug _ONLY_ affected x509 certificates; other
ways openvpn had of identifying clients were never affected.

-- 
[SRU] openvpn2.1~rc7 fails to pick up the CN of certificates
https://bugs.launchpad.net/bugs/265058
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to