Looks like you created the private key w/ a passphrase, when that's NOT what you want for configuring the OpenVPN server. It has no means to ask you for the passphrase at runtime, so it errors out.
That is not the one I created tho. It looks like it's a key that came in the OpenVPN server file. It's key.pem and I didn't transfer the certificate files onto the router drive, I copy/pasted the cert text into the inputs of the OpenVPN settings. Also I'm sure I created all the keys without passwords.
Looks like you created the private key w/ a passphrase, when that's NOT what you want for configuring the OpenVPN server. It has no means to ask you for the passphrase at runtime, so it errors out.
That is not the one I created tho. It looks like it's a key that came in the OpenVPN server file. It's key.pem and I didn't transfer the certificate files onto the router drive, I copy/pasted the cert text into the inputs of the OpenVPN settings. Also I'm sure I created all the keys without passwords.
The fact you copied the file's contents to the relevant field in the GUI does NOT mean it's NOT protected by a passphrase. It's NOT the file that's passphrase protected, but the contents itself is encrypted w/ a passphrase. It's done this way to remove any dependence on the file system for controlling permissions.
All that said, it would be next to impossible to NOT know you added a passphrase since you'd be prompted to add one at the time of key creation. Also, the contents of the file would probably indicate it was encrypted in the header.
Furthermore before you do anything, you should upgrade to a recent build, your build is very old, outdated and has security issues.
Recent build is 49268 (49289 is just out and running on my EA6900)
See the forum guidelines with helpful pointers about how to research your router, where and what firmware to download, where and how to post and many other helpful tips:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
*After* upgrade reset to defaults and put settings in manually, never restore from a backup (to different build)
Also after update clear browser cache with CTRL + F5.
Joined: 16 Nov 2015 Posts: 6407 Location: UK, London, just across the river..
Posted: Wed Jun 22, 2022 9:09 Post subject:
1043v2 in VPN client mode with CPU@720Mhz delivers 10Mbit over VPN...with chachapoly ... and router CPU is very maxed...
in VPN server mode...its very likely to be very overwhelmed...well..depends on its use...
Luckily 1043v2 supports Wireguard too, so you can try this instead, as it will perform a touch better, i guess...never tried it...
If your goal is WAN remote access only...you can fairly use SSh over WAN...easy peasy...
-SSh access with 3072Bit key with password for the key
-disable the ssh password login option..
-choose random port away form the first 1024 ports...
sorry to be off topic... _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55179 WAP
TP-Link WR1043NDv2 -DD-WRT 55303 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55460 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55460 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55363 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913