diff --git a/bin/ovpn_initpki b/bin/ovpn_initpki index c6b2840..1d88290 100755 --- a/bin/ovpn_initpki +++ b/bin/ovpn_initpki @@ -16,20 +16,20 @@ source "$OPENVPN/ovpn_env.sh" nopass=$1 # Download EasyRSA because Ubuntu doesn't have it as a CLI command -wget https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.4/EasyRSA-3.0.4.tgz -tar xvf EasyRSA-3.0.4.tgz +wget https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.6/EasyRSA-unix-v3.0.6.tgz +tar xvf EasyRSA-unix-v3.0.6.tgz -export EASYRSA_SSL_CONF="EasyRSA-3.0.4/openssl-easyrsa.cnf" -cp -r EasyRSA-3.0.4/x509-types/ x509-types/ +export EASYRSA_SSL_CONF="EasyRSA-unix-v3.0.6/openssl-easyrsa.cnf" +cp -r EasyRSA-unix-v3.0.6/x509-types/ x509-types/ # Provides a sufficient warning before erasing pre-existing files -EasyRSA-3.0.4/easyrsa init-pki +EasyRSA-unix-v3.0.6/easyrsa init-pki # CA always has a password for protection in event server is compromised. The # password is only needed to sign client/server certificates. No password is # needed for normal OpenVPN operation. -EasyRSA-3.0.4/easyrsa build-ca $nopass +EasyRSA-unix-v3.0.6/easyrsa build-ca $nopass -EasyRSA-3.0.4/easyrsa gen-dh +EasyRSA-unix-v3.0.6/easyrsa gen-dh openvpn --genkey --secret $EASYRSA_PKI/ta.key # Was nice to autoset, but probably a bad idea in practice, users should @@ -43,12 +43,12 @@ openvpn --genkey --secret $EASYRSA_PKI/ta.key #fi # For a server key with a password, manually init; this is autopilot -EasyRSA-3.0.4/easyrsa build-server-full "$OVPN_CN" nopass +EasyRSA-unix-v3.0.6/easyrsa build-server-full "$OVPN_CN" nopass # Generate the CRL for client/server certificates revocation. -EasyRSA-3.0.4/easyrsa gen-crl +EasyRSA-unix-v3.0.6/easyrsa gen-crl # Remove EasyRSA files when we're done -rm -r EasyRSA-3.0.4/ -rm EasyRSA-3.0.4.tgz +rm -r EasyRSA-unix-v3.0.6/ +rm EasyRSA-unix-v3.0.6.tgz rm -r x509-types/