Finally got it sorted out this morning, after running the windows client and looking at the output in Wireshark to see how the various certs were being used.
This is the process I followed:
Step 0: Delete any prior configuration - openvpn client configurations for the beta, imported keys, certificates, CAs for the beta.
I remember seeing references to always following the order "create the CA, then create the cert" and, welp, ignored it to much wasted time. The creation order seems important here.
1) System. Cert manager. CA. Import CA.
From the .ovpn file downloaded from the web portal at https://beta.vpn.sonic.net, use the uncommented stanza bracketed by
<ca> </ca>
Do not use the private key, that's only for the cert
2) System. Cert Manager. Certificates. Import Cert
Certificate data: paste in stanza bracketd by
<cert> </cert>
Private key data: Paste in stanza bracketed by
<key> </key>
Only after doing 1 and 2, create the VPN:
3) VPN... OpenVPN
These are the settings I used:
peer to peer
udp
tun
pick a phy interface, probably one with an IP address, I used one that had no other tunnels bound
server: beta.vpn.sonic.net
port 1194
Proxy Auth method: None
User Authentication Settings
username: your username at Sonic, without @sonic.net
password: your Sonic account password.
Enable authentication of TLS packets: checked.
Generate key automatically: Unchecked
Paste in the uncommented stanza delimited by
<tls-auth> </tls-auth>
Peer CA - choose the CA you created from scratch in step one
Client cert - choose the cert you created from scratch in step two
If you're on capable hardware, enable the BSD crypto engine
Compression - enable with adaptive.
There is still some ginching in my setup about packet length. That's controlled by one of the
options in the freetext entry box. Options are set as --option-name value and multiple options
are set using a semicolon delimiter.
This is the process I followed:
Step 0: Delete any prior configuration - openvpn client configurations for the beta, imported keys, certificates, CAs for the beta.
I remember seeing references to always following the order "create the CA, then create the cert" and, welp, ignored it to much wasted time. The creation order seems important here.
1) System. Cert manager. CA. Import CA.
From the .ovpn file downloaded from the web portal at https://beta.vpn.sonic.net, use the uncommented stanza bracketed by
<ca> </ca>
Do not use the private key, that's only for the cert
2) System. Cert Manager. Certificates. Import Cert
Certificate data: paste in stanza bracketd by
<cert> </cert>
Private key data: Paste in stanza bracketed by
<key> </key>
Only after doing 1 and 2, create the VPN:
3) VPN... OpenVPN
These are the settings I used:
peer to peer
udp
tun
pick a phy interface, probably one with an IP address, I used one that had no other tunnels bound
server: beta.vpn.sonic.net
port 1194
Proxy Auth method: None
User Authentication Settings
username: your username at Sonic, without @sonic.net
password: your Sonic account password.
Enable authentication of TLS packets: checked.
Generate key automatically: Unchecked
Paste in the uncommented stanza delimited by
<tls-auth> </tls-auth>
Peer CA - choose the CA you created from scratch in step one
Client cert - choose the cert you created from scratch in step two
If you're on capable hardware, enable the BSD crypto engine
Compression - enable with adaptive.
There is still some ginching in my setup about packet length. That's controlled by one of the
options in the freetext entry box. Options are set as --option-name value and multiple options
are set using a semicolon delimiter.