After upgrading a tunnel server or client hub to 23.4.7 from any prior version, the following symptoms may occur:
OpenSSL upgrade mandates SHA384 signature algorithm for hub certificates
In order to resolve this issue, the tunnel server CA will need to be reset, and all existing tunnel client certificates will have to be invalidated, and new certificates issued to replace them.
If you have upgraded the Tunnel Server only, but no clients:
If you have upgraded your tunnel server hub to 23.4.7 but the clients are still on 23.4.6 or earlier, you can temporarily downgrade the hub back to a prior version (23.4.6 or earlier). This will allow the tunnel clients to reconnect.
Then, before upgrading any tunnel hub to 23.4.7 you will need to recreate the Tunnel Server CA and issue new client certificates.
If you have a small number of clients, you can choose to manually distribute the new client certificates. However, this is much easier to do if you can set up a second tunnel server, especially if there are a large number of clients.
The high level process is as follows:
This process is described in further detail here.
Additional details on using a superpackage to distribute new certificates is available here.
If you have upgraded one or more Tunnel Clients, but not the tunnel server:
If you have upgraded one or more tunnel clients to 23.4.7 and they have gone offline, it will be a little more difficult to bring them back.
You will need to take the following steps:
Once the hub is downgraded to 23.4.6 or earlier, it will come back online using the existing client certificate.
Once all the clients are back online, you will need to go through the process of recreating the Tunnel Server CA and re-issuing the client certificates as described in the section above this one.