# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 7
# self = https://watcher.sour.is/conv/nyxytka
Having trouble setting up an OpenVPN service on OpenWrt.\n\nRunning through the appropriate instructions on the relevant wiki page didn't generate an .ovpn file; I created one by hand, but now OpenVPN Connect is generating the following error in my OpenWrt system log: \n\n
\nSat May 29 16:51:26 2021 daemon.err openvpn(client)[3024]: 86.8.XXX.XXX:10469 VERIFY ERROR: depth=0, error=unsupported certificate purpose: CN=client, serial=25861211816...\n
\n\nI'm thinking those two problems are linked.
@jlj Certificates have flags that indicate their “purpose”. Looks like you’re trying to use a “client” certificate for “server usage” or the other way around. I think you can view these flags using something like openssl x509 -noout -in mycert.pem -purpose. (Maybe you’re interested in using Wireguard, it’s quite a bit simpler. 🙂) > > >
@jlj Certificates have flags that indicate their “purpose”. Looks like you’re trying to use a “client” certificate for “server usage” or the other way around. I think you can view these flags using something like openssl x509 -noout -in mycert.pem -purpose. (Maybe you’re interested in using Wireguard, it’s quite a bit simpler. 🙂) > > >
@jlj Certificates have flags that indicate their “purpose”. Looks like you’re trying to use a “client” certificate for “server usage” or the other way around. I think you can view these flags using something like openssl x509 -noout -in mycert.pem -purpose. (Maybe you’re interested in using Wireguard, it’s quite a bit simpler. 🙂) > > >
@movq Yeah, that definitely makes sense. I've heard about Wireguard, but haven't looked into it; will correct that now!
@jlj You should setup a wire guard VPN instead. it’s baked into the kernel
@jlj You should setup a wire guard VPN instead. it’s baked into the kernel