The Client Log Contains "Certificate does not have key usage extension"
Applicable Client
Windows OpenVPN GUI
Symptom
A client cannot connect to a P2C VPN gateway, and the log contains the following error information:
Certificate does not have key usage extension
Possible Causes
The server certificate used by the VPN gateway does not contain the Server Authentication attribute. As a result, certificate verification fails.
Procedure
- Right-click the target server certificate, and choose Properties from the shortcut menu.
- Click the Details tab, and check whether the certificate contains the Server Authentication attribute, as shown in Figure 1.
If the certificate does not contain the Server Authentication attribute, re-generate a server certificate. For details, see Using Easy-RSA to Issue Certificates (Server and Client Sharing a CA Certificate).
A server certificate generated using OpenSSL does not contain the Server Authentication attribute. As such, you need to add extendedKeyUsage = serverAuth to the OpenSSL configuration file. The following is an example:
... keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = serverAuth ...
- Log in to the management console.
- Click
in the upper left corner and select the desired region and project.
- Click
in the upper left corner, and choose .
- In the navigation pane on the left, choose .
- Click the P2C VPN Gateways tab. In the P2C VPN gateway list, locate the target P2C VPN gateway, and click View Server in the Operation column.
- On the Server tab page of the VPN gateway, click Replace.
- In the displayed dialog box, click Upload in the drop-down list box.
Upload the new server certificate to CCM. For details, see Uploading a Server Certificate.
- Download the new client configuration file.
The downloaded client configuration file is client_config.zip.
- Decompress client_config.zip to a specified directory, for example, D:\.
After the decompression, the client_config.ovpn and client_config.conf files are generated.
- Add the client certificate and private key to the file.
- Open the client_config.ovpn file using Notepad or Notepad++.
- Enter the client certificate content and the corresponding private key in between <cert></cert> and <key></key> tags, respectively.
<cert> -----BEGIN CERTIFICATE----- Client certificate content -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- Client private key -----END PRIVATE KEY----- </key>
- Save the .ovpn configuration file.
- Start the OpenVPN client.
- Import the new client configuration file.
- Use the client to reconnect to the VPN gateway.
- Press Win+R and enter cmd to open the command window.
-
XX.XX.XX.XX indicates the private IP address of the ECS to be connected. Replace it with the actual private IP address.
If information similar to the following is displayed, the client can communicate with the ECS:
64 bytes from XX.XX.XX.XX: icmp_seq=1 ttl=63 time=1.27 ms 64 bytes from XX.XX.XX.XX: icmp_seq=2 ttl=63 time=1.36 ms 64 bytes from XX.XX.XX.XX: icmp_seq=3 ttl=63 time=1.40 ms 64 bytes from XX.XX.XX.XX: icmp_seq=4 ttl=63 time=1.29 ms 64 bytes from XX.XX.XX.XX: icmp_seq=5 ttl=63 time=1.35 ms 64 bytes from XX.XX.XX.XX: icmp_seq=6 ttl=63 time=1.52 ms
If the problem persists, submit a service ticket to contact Huawei technical support.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot