Certificate not correctly signed

Post your questions about SoftEther VPN software here. Please answer questions if you can afford.
Post Reply
lauronaj
Posts: 12
Joined: Wed Jan 30, 2019 10:22 am

Certificate not correctly signed

Post by lauronaj » Wed Jan 30, 2019 10:26 am

I'm getting this error when i try to connect using openvpn client on my android phone.

09:37:11.139 -- EVENT: CONNECTING

09:37:11.143 -- Tunnel Options:V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client

09:37:11.145 -- Creds: Username/Password

09:37:11.147 -- Peer Info:
IV_GUI_VER=OC30Android
IV_VER=3.2
IV_PLAT=android
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2


09:37:11.226 -- VERIFY FAIL -- The certificate is not correctly signed by the trusted CA : depth=2
cert. version : 3
serial number : 4C:AA:F9:CA:DB:63:6F:E0:1F:F7:4E:D8:5B:03:86:9D
issuer name : C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
subject name : C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
issued on : 2010-01-19 00:00:00
expires on : 2038-01-18 23:59:59
signed using : RSA with SHA-384
RSA key size : 4096 bits
basic constraints : CA=true
key usage : Key Cert Sign, CRL Sign


09:37:11.227 -- VERIFY OK : depth=1
cert. version : 3
serial number : 2B:2E:6E:EA:D9:75:36:6C:14:8A:6E:DB:A3:7C:8C:07
issuer name : C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
subject name : C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
issued on : 2014-02-12 00:00:00
expires on : 2029-02-11 23:59:59
signed using : RSA with SHA-384
RSA key size : 2048 bits
basic constraints : CA=true, max_pathlen=0
key usage : Digital Signature, Key Cert Sign, CRL Sign
ext key usage : TLS Web Server Authentication, TLS Web Client Authentication


09:37:11.229 -- VERIFY OK : depth=0
cert. version : 3
serial number : 18:C5:07:C1:C2:26:06:A7:2C:7A:58:3C:54:29:2A:3E
issuer name : C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
subject name : OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
issued on : 2017-04-01 00:00:00
expires on : 2020-03-31 23:59:59
signed using : RSA with SHA-256
RSA key size : 2048 bits
basic constraints : CA=false
subject alt name : *.opengw.net, opengw.net
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication, TLS Web Client Authentication


09:37:11.230 -- Transport Error: mbed TLS: SSL read error : X509 - Certificate verification failed, e.g. CRL, CA or signature check failed

09:37:11.231 -- EVENT: CERT_VERIFY_FAIL info='mbed TLS: SSL read error : X509 - Certificate verification failed, e.g. CRL, CA or signature check failed'

09:37:11.235 -- EVENT: DISCONNECTED

09:37:11.237 -- EVENT: CORE_THREAD_INACTIVE

09:37:11.238 -- Tunnel bytes per CPU second: 0

09:37:11.239 -- ----- OpenVPN Stop -----

thisjun
Posts: 2458
Joined: Mon Feb 24, 2014 11:03 am

Re: Certificate not correctly signed

Post by thisjun » Fri Mar 15, 2019 8:28 am

Did you import the .ovpn file that is generated by the VPN server?

Post Reply