Amigos:
Usaba debian 11 con una VPN sin ningún problema. Realizo una instalación limpia de Debian 12 y ahora me sale esto
2023-06-21
09:56:28 WARNING: Compression for receiving enabled.
Compression has been used in the past to break encryption.
Sent packets are not compressed unless "allow-compression yes"
is also set.
2023-06-21 09:56:28 Note: --cipher is not set. OpenVPN versions
before 2.5 defaulted to BF-CBC as fallback when cipher
negotiation failed in this case. If you need this fallback
please add '--data-ciphers-fallback BF-CBC' to your config
uration and/or add BF-CBC to --data-ciphers.
2023-06-21 09:56:28 OpenVPN 2.6.3 x86_64-pc-linux-gnu [SSL
(OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD]
[DCO]
2023-06-21 09:56:28 library versions: OpenSSL 3.0.9 30 May 2023,
LZO 2.10
2023-06-21 09:56:28 DCO version: N/A
2023-06-21 09:56:28 WARNING: No server certificate verification
method has been enabled. See http://openvpn.net/howto.html#mitm
for more info.
Enter Private Key Password: ********
2023-06-21 09:56:33 WARNING: this configuration may cache
passwords in memory -- use the auth-nocache option to prevent
this
2023-06-21 09:56:33 TCP/UDP: Preserving recently used remote
address: [AF_INET]181.13.51.141:1194
2023-06-21 09:56:33 UDPv4 link local: (not bound)
2023-06-21 09:56:33 UDPv4 link remote:
[AF_INET]181.13.51.141:1194
2023-06-21 09:56:33 VERIFY ERROR: depth=0, error=CA signature
digest algorithm too weak: C=AR, ST=MZ, L=Mendoza, O=DIC,
CN=server, emailAddress=rycom@mendoza.gov.ar, serial=465
2023-06-21 09:56:33 OpenSSL: error:0A000086:SSL
routines::certificate verify failed
2023-06-21 09:56:33 TLS_ERROR: BIO read tls_read_plaintext error
2023-06-21 09:56:33 TLS Error: TLS object -> incoming
plaintext read error
2023-06-21 09:56:33 TLS Error: TLS handshake failed
2023-06-21 09:56:33 SIGUSR1[soft,tls-error] received, process
restarting
^C2023-06-21 09:56:34 SIGINT[hard,init_instance] received,
process exiting
Alguna idea?