• ACME package update for ACME v2

    Moved
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • ACME package - LetsEncrypt certificate acquired but not activated

    Moved
    2
    0 Votes
    2 Posts
    584 Views
    N
    @breakaway: As in thread title 2.4.2_1 installed today with latest version of ACME package. I have it 99% working - I got it integrated with my Route53 account so it can use TXT records to generate certificates but I am finding that the certificate gets acquired, shows up in the list of certificate list but isn't actually enabled (i.e. webconfigurator default is still enabled). I have to manually update it to use the LE cert. Did I configure this wrong or is this the expected behaviour? Or - is this the expected behaviour? I.e. I set the "certificate name", then this certificate gets generated then subsequent times the certificate is generated, the same certificate will get updated and therefore everything will roll over smoothly? Once you generate the cert for the first time, goto "System / Advanced / Admin Access" and set the "SSL Certificate" to whatever you generated. What you will also need to do is in the ACME "Edit Certificate options" section for that cert is make sure you add an "Action" to restart the WebGUI when its renewed. Like in the attached Picture. [image: Capture.PNG] [image: Capture.PNG_thumb]
  • FEATURE Request: acme "lets encrypt"

    Moved
    4
    0 Votes
    4 Posts
    826 Views
    J
    Sigh.  :-[  Thank you for your patience Jim. –jason
  • SOLVED! Got an LE certificate – really?

    Locked Moved
    14
    0 Votes
    14 Posts
    2k Views
    jimpJ
    Since the OP in this thread is solved and working now, I'm locking this one. There is another open thread to use for similar symptoms here: https://forum.pfsense.org/index.php?topic=144321.0
  • Automatically renew Lets Encrypt with Squid reverse proxy

    Moved
    13
    0 Votes
    13 Posts
    6k Views
    M
    Hello matthijs, I am almost sure I find your solution (I needed it too). Here is my idea : run the function which is called when someone presses the 'save button' on 'reverse proxy' GUI page, but run it from the command line. and then, restart squid. And here are commands I came up with: using php, include 'squid.inc' and 'squid_reverse.inc' file, launch 'squid_resync_reverse' function php -r "require_once('/usr/local/pkg/squid.inc'); require_once('/usr/local/pkg/squid_reverse.inc'); squid_resync_reverse();" using basic command line, restart squid /usr/local/etc/rc.d/squid.sh restart It worked for me once, while pressing 'Issue / Renwe' button. I know need to wait for xx days to see if it does it automatically too (but it should). Hope it will help you (and others ;-) ).
  • Add Zonomi to ACME providers list

    Moved
    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    They just added it after tagging 2.7.6 so it didn't make it into their newest release. We'll pull it in soonish though.
  • ACME Package for ACME v2 coming

    Moved
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Acme certificate with DNS-Manual

    Moved
    6
    0 Votes
    6 Posts
    7k Views
    GertjanG
    @-flo-: Gertjan, can you elaborate on how you set this up? Never did so myself. "DNS-Manual" means that you have to go through the same procedure every 90 days or less. You need a domain name, and you need to have access to "zone information" of this domain name. I guess every registrar gives you this kind of access when you rent a domain name. So, it's rather easy to set a TXT record with the key info letsencrypt gave you when asking for a certificate or renewing a certificate. When you add this key, probably using the GUI used by the registrar to administer your domain name, know that you have to wait several minutes or even more, because the zone info has to be synced among at least one other name server that 'hosts' you domain name. Only when that has been done, you can proceed with the acme interface (pfSense) to ask for a (re) new certificate. I'm using my own dedicated server, and I'm using my own DNS master server that hosts my domain name (actually more then 10). acme used by pfSEnse has been set up to "talk" to my DNS server, so it can add these TXT records itself in the zone file (the file with all the info related to a domain name). This is the so called "nsupdate" method, and is fully automated.
  • LetsEncrypt - DNS

    Moved
    2
    0 Votes
    2 Posts
    771 Views
    GertjanG
    @B-C: like 8443 - I can create the LE cert for one of these VMs, just not clear on how the VM gets the cert installed to use? using a Service Desk Plus specifically running on debian. There is no such thing as a buildin script that copies a certificate (certificate files, or the whole bunch in a 'chained' file) from one device, pfSense, to another device, your server. The files have to get moved over, the service - the web server - has to be restarted. It is possible of course, but for your setup you need your script. When I renew my certificate for my pfsense (pfsense.mynetwork.tld) I also renew for diskstation.mynetwork.tld, printer1.mynetwork.tld printer2.mynetwork.tld, etc. I have to copies the needed  files over to the diskstation, printer1, printer2 etc - most of them do not even have a telnet or ssh access, so scripting is impossible. Best is to run some letsenscrypt support from these devices, if it is possible.
  • Renewed acme certificate requires manual restart of webConfigurator

    Moved
    5
    0 Votes
    5 Posts
    6k Views
    N
    Thank you, this seems to have done the trick. A little bit of extra work because manual DNS is a pita and the local http server can't bind to port 80 becauase of local running ngix - hence a port forwarding is necessary. Also I didn't think of this thread you've mentioned because some renewals still worked with tls, some others didn't so this made it harder for me to specify an exact error scheme. Julian
  • Acme cert help - 400 timeout

    Moved
    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    Should that URL be open to the world? I can't reach it on port 80 over IPv4 or IPv6 right now. Perhaps the validation servers at Let's Encrypt also can't reach it? Since it's a timeout, I would focus on firewall rules or other access rules, maybe even routing upstream, anything that could prevent LE from reaching your web server on port 80. Maybe you have something like pfBlocker filtering access or geoblocking?
  • ACME Package Updates 0.1.31-0.1.34

    Moved
    16
    0 Votes
    16 Posts
    2k Views
    P
    Of course this isn't a general discussion thread, my mistake .
  • 1 Votes
    1 Posts
    3k Views
    No one has replied
  • ACME packages not allowed?

    Moved
    1
    0 Votes
    1 Posts
    860 Views
    No one has replied
  • ACME Provider Update - 0.1.22

    Moved
    13
    0 Votes
    13 Posts
    3k Views
    K
    Ahh, bummer. Thanks!
  • ACME client renewal cronjob - any logs?

    Moved
    7
    0 Votes
    7 Posts
    6k Views
    R
    Done, thanks: https://redmine.pfsense.org/issues/8211
  • HAProxy + ACME [FIXED]

    Moved
    20
    0 Votes
    20 Posts
    5k Views
    U
    COMPLETED… TY PiBa
  • ACME standalone broken in pfSense 2.4.2?

    Moved
    6
    0 Votes
    6 Posts
    3k Views
    K
    Ah ha! I found the issue! jimp, was HAProxy updated with the upgrade to 2.4.2? Using the standalone method, I created a backend in the HAProxy UI with a single server bound to localhost on port 8082, with no health checks, or timeout/retry settings. (I didn't use health checks was because this backend is "down" whenever the acme.sh script isn't running. So I just ignored the overhead of doing a health check.) The problem here is there is an IPv4 and IPv6 address for localhost, so in the newest version of HAProxy, it actually created two servers even though the UI only had one specified: backend 0_HTTP_ACME_Standalone_http_ipvANY mode http log global timeout connect 30000 timeout server 30000 retries 3 server pfsense_0 127.0.0.1:8082  server pfsense_1 ::1:8082  The ACME client only binds to the IPv4 interface using socat: [2.4.2-RELEASE][root@pfsense]/tmp/acme: sockstat -l46 | grep 8082 root    socat      96563 5  tcp4  *:8082                *:* (I ran this sockstat command during the execution of certificate creation/renewal and it only ever listens on 127.0.0.1:8082.) And the nail in the coffin is that with the None option specified in the load balancing section of the backend, it defaults to Round Robin: @HAProxy: The load balancing algorithm of a backend is set to roundrobin when no other algorithm, mode nor option have been set. The algorithm may only be set once for each backend. So LE was successfully reaching in to my infrastructure (as I noted with the packet capture) on the 127.0.0.1:8082 server, but when it attempted to reach in again, it would be Round Robin'd to the ::1:8082 server, to which the ACME client wasn't bound. This would then timeout and cause the validation process to fail. –- I've adjusted the backend to only listen on 127.0.0.1, not localhost, but I would be more satisfied if I knew the proper knobs to turn such that the HAProxy backend would timeout quickly, and a new request would be issued to the next server in the list. Alas, I will have to figure that out another day. Thanks for your help, jimp! –- PS - I actually tried to pull the HEAD of acme.sh's repo to execute on the pfSense box, but as soon as I saw the output I knew there had to be adjustments made to the source code that made it compatible with pfSense. I gave that up quickly. I also only ran it from the command line because the ACME UI actually prints out the full command of what it's executing under the covers. I thought it was safe to copy and paste it so I could have control over execution during debugging.  :) Thanks again
  • Acme/LE help

    Moved
    9
    0 Votes
    9 Posts
    2k Views
    wgstarksW
    I’m in the middle of switching my DNS servers from Namecheap to Cloudflare, just waiting for the changes to take effect (up to 24 hrs). Plan to try authentication using txt record. Not sure why you’re seeing multiple A records? I have one A record and a couple of CNAME’s. Maybe something due to the changing DNS servers? I do see a bunch of MX records which seems strange since I’m not running any email on this site. Currently just planning to use it for VPN. Maybe the MX records are just placeholders?
  • ACME/Letsencrypt: generate certs for VMs in LAN

    Moved
    12
    0 Votes
    12 Posts
    4k Views
    S
    thanks for that informative feedback, will pick up some of your suggestions as soon as I find the time to continue that project. Edit: You use SSL-Offloading for all VMs, OK, same as here. My additional wish is to encrypt the traffic from HAproxy to the backends as well, with a separate SSL-cert with long lifetime, ideally also generated/refreshed on pfsense. So the config of these backends is my current issue.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.