Not really a wireless question, but indirectly…
I am trying to set up a RB411 running RouterOS 5.6 as wireless CPE.
Weeks or months ago, I did a quick test with it, at the time running OpenSSL 0.9.8something and RouterOS 4.15 IIRC, and importing a certificate that I created on a Linux server did work for me. Connected via EAP-TLS, all good. People still connecting with other brand CPE, all good there too.
Now I’m getting ready to do it for real, running OpenSSL 1.0.0d now, and it can not import the new certificate I created for it. I did it the same, exact way that I did with OpenSSL 0.9.8something.
I have read another post or two in these forums that describe a problem with the way that OpenSSL 1.0.x creates keys vs. 0.9.8x Can anyone confirm this to save me a bunch of time? For me, to downgrade OpenSSL on this machine means re-building and re-installing it from source, it and everything that uses it (FreeRADIUS, OpenSSH, BIND, …). Easy, but very time consuming.
Of course, if anyone knows of some magical command-line flag I can use with OpenSSL 1.0.0d to get it to create the keys in a RouterOS 5.6-friendly way, that would be most welcome.
Thanks in advance