• ACME package installation destroyed my WebUI!!

    9
    0 Votes
    9 Posts
    1k Views
    GertjanG
    You are login with the user "admin" ?
  • 0 Votes
    2 Posts
    509 Views
    jimpJ
    That's already shown under System > Cert Manager where the certificates are held. The ACME package doesn't track renewal times. Though it's not terribly hard to calculate (last renew +90d). If you are worried about expiring certificates, add your e-mail address under the account key when making a new cert, then LE will e-mail you if anything gets close to expiring.
  • Is the WebGUI missing Acme DNS Alias Verification?

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    dns_cf is the DNS-Cloudflare selection in the ACME certificate settings. When you choose that, there is still a box for Enable DNS alias mode to do what you want.
  • ACME Setup Steps

    15
    0 Votes
    15 Posts
    4k Views
    R
    Im all set. I was able to create wild card certs (since Sept 27)
  • How to generate a wildcard certificate with ACME and AWS Route53?

    7
    0 Votes
    7 Posts
    2k Views
    jimpJ
    [image: 1538850084896-screenshot_2018-10-06-bill-lab-jimp-pw-services-acme-certificate-options-edit-resized.png]
  • 0 Votes
    3 Posts
    711 Views
    GertjanG
    Ok, got it (0.3.2_3). Guess I gonna line up for 2.4.4 now
  • [Bug]ACME adds a blank for Duckdns TXT

    8
    0 Votes
    8 Posts
    1k Views
    I
    yes I found. Looks like this tag></tag>
  • Script Error in DNS-Namesilo method

    3
    0 Votes
    3 Posts
    1k Views
    N
    Will do. Thanks
  • Create ACME cert for an existing website SSL?

    6
    0 Votes
    6 Posts
    2k Views
    jimpJ
    If you want to offload SSL to HAProxy on pfSense and let ACME handle the validation, you can. You do not need to import anything from your other servers, let the ACME package create and request the certificates for you. Even though they already exist, as long as the validation passes it will be OK. From the look of that last error you do not have the proper settings for DNS validation. You could instead follow the example at https://forum.netgate.com/topic/90643/let-s-encypt-support/31 and configure it so HAProxy can assist in handling the validation instead of using DNS.
  • How to automate pulling certs to DMZ?

    3
    0 Votes
    3 Posts
    802 Views
    S
    ok. Installed cert-bot on the mailserver and set up that ACME-challenge-dir etc // seems to work now. Thanks so far!
  • unable to load EC Private Key

    3
    0 Votes
    3 Posts
    830 Views
    jimpJ
    The GUI does not have support for EC keys at this time.
  • Generated certificates do not include full certificate chain

    10
    0 Votes
    10 Posts
    3k Views
    M
    Ok worked fine with HAProxy. I would suggest you to drop the Squid packages since many features are deprecated or not working properly :) Thank you for all your amazing stuff.
  • ACME issue?

    Moved
    5
    0 Votes
    5 Posts
    978 Views
    K
    Thanks for the reply, gotcha i thought it was a bug on pfSense will update it the package edit: solved thank you @jimp
  • Account key registration throwing curl error 52

    13
    0 Votes
    13 Posts
    2k Views
    B
    Well I don't know WTF changed, but this problem has automagically resolved itself after a reboot. My guess is some stale routing state somewhere. The GUI changes in latest ACME package work well, though!
  • Certificate Manager only exports insecure P12 Server certificates

    4
    0 Votes
    4 Posts
    1k Views
    B
    @napsterbater Thanks for the response. I found that post before posing my question here. The issue is that this solution required the installation of a different certificate manager. What follows is not a complaint but an observation. It is now clear to me that the pfSense Certificate Manager is designed to import and export certificates needed by the router. It's a great router. We really shouldn't need it to be a CA as well. So I installed OpenSSL and used it to recreated all my certs, replacing the old ones as needed. We no longer generate certificates in the pfSense Certificate Manager.
  • [BUG] Account registration failing silently in GUI

    2
    0 Votes
    2 Posts
    653 Views
    jimpJ
    I opened https://redmine.pfsense.org/issues/8682 to add a proper check on the AJAX response for this, and just pushed the change in the latest version of the ACME package. An update should show up shortly. It won't solve your other issue (which I can't reproduce) but it will at least hopefully indicate success or failure properly. It did in my testing, but I couldn't induce a server side failure to test a real-world failure, only a locally faked one.
  • ACME Wildcard - Export Key Pair - Programmaticly?

    2
    0 Votes
    2 Posts
    676 Views
    jimpJ
    In the ACME general settings, check Write Certificates, and then have your script check in /conf/acme/ and copy them wherever you want. The script doesn't need to hook on an update, it could check the file modification time or use some other method. Calling it from cron once a day some time after the ACME update would be sufficient.
  • ACME TXT entry and Plesk XML API?

    2
    0 Votes
    2 Posts
    955 Views
    DerelictD
    That would be a matter of configuring plesk to accept updates via the nsupdate method. Using their API is going to be completely different unless it implements that somehow. nsupdate is an implementation of a specific protocol, RFC2136. This is a guide on what is required to get a bind server configured to accept updates: https://www.netgate.com/docs/pfsense/dns/rfc2136-dynamic-dns.html An alternate strategy might be to set up a bind server like in that link that serves as the master of a dynamic zone with the plesk as the slave but that would preclude managing the zone in plesk which is likely undesirable. The heavy lifting for this probably needs to be done on the plesk. Instead of accepting updates via their proprietary API they should have a standard method such as RFC2136.
  • SFTP/FTPS error connecting for challenge aquisition

    acme sftp ftps
    5
    0 Votes
    5 Posts
    1k Views
    G
    @gertjan - Thanks so much! Your suggestion led me to a realization. I dropped to the pfSense shell and SSH'd into my Serv-U instance. First thing I noticed (I suspected this would be the case) was that the SSH crypto key wasn't recognized in the host list, and I didn't know if the ACME package forced acceptance the first time it connected so I added the key to the list manually from the shell and then realized something else... I had originally assumed that the FTP Webroot connection was coming from Let's Encrypt issuing servers, but I remembered reading somewhere in their forums that they don't use FTP at all for challenges, rather this is a function of the pfSense ACME package. I had been using one of my DDNS hostnames for the SFTP setup in the ACME package and I realized that this meant that if the FTP connection was coming from the pfSense box then the DDNS URI would be trying to use reflection to resolve the IP address, which probably wouldn't work. Now that I understood the FTP connection was coming from pfSense and not Let's Encrypt I should change the URI to use the actual LAN IP of the Serv-U host. I did this and the FTP Webroot challenge worked like a charm.
  • ACME / Let's Encrypt - "Verify error:Fetching: Timeout"

    Moved
    8
    0 Votes
    8 Posts
    7k Views
    lifeboyL
    I'm posting this response simply to add to the information here on the configuration of the acme plugin to successfully create/renew a Let'sEncrypt certificate. I had quite a struggle to get it to work and also got a timeout error message. It seems essential that port 80 is open for the pfSense web interface. Under "System / Advanced / Admin Access" the WebGUI redirect" tickbox must not be ticked, to allow port 80 to be redirected to port 443. If this is ticked, port 80 does not respond and the certbot script to fails. Under "Services / Acme / Certificate options: Edit" it's easy to miss the small little "+" for RootFolder under Domain SAN list. Here's the spot! [image: pfsense-Domain-SAN-list.png] Ensure that the directory is specified. Lastly, I have created a firewall rule that allows port 80 access to "this firewall" in the WAN rules. I did this before I discovered point 1 above, so it may not be required, but I'm not going to delete my cert now to test it again :-) Hope that helps future finders of this thread.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.