• ACME and FreeDNS password symbols causing pfSenseConfigurator errors

    Moved
    3
    0 Votes
    3 Posts
    839 Views
    w0wW
    AFAIK the NIST guideline sounded like "Drop the algorithmic complexity song and dance No more arbitrary password complexity requirements needing mixtures of upper case letters, symbols and numbers. Like frequent password changes, it’s been shown repeatedly that these types of restrictions often result in worse passwords." Yes it was about that you can not require a complex password with short length over much more longer password but without any complexity. The length is limited by freeDNS and I am sure in case of limited length complexity always wins  ;)
  • ACME package: script broken, needs updated

    Moved
    3
    0 Votes
    3 Posts
    934 Views
    T
    Nice Jimp!  Quick work, thanks.
  • ACME Package: account key creation not working

    Moved
    6
    0 Votes
    6 Posts
    2k Views
    GertjanG
    I remember posting somewhere on this forum about this ACME package that even a space " " in the name (field) will give a situation were the account key exists, but can't be show or edited anymore …
  • ACME Provider and Route 53 - doesn't ask for Zone ID

    Moved
    2
    0 Votes
    2 Posts
    855 Views
    jimpJ
    ACME only updates TXT records, it has nothing to do with dynamic DNS for regular A/AAAA records. The package does not share any code or functionality with dynamic DNS in the base system. The ACME package only asks for what the acme.sh dnsapi script for Route53 wants (dns_aws.sh) and that is only the AWS Access Key ID and secret.
  • HaProxy and LetsEncrypt Cert Renewal Failure without 443 Port Forward

    Moved
    11
    0 Votes
    11 Posts
    3k Views
    C
    No love. As I mentioned, I confirmed  www.foo.com/.well-known/acme-challenge isn't redirecting, but the renewal is still failing. Oddly, the error.log shows this: AH00112: Warning: DocumentRoot [/var/lib/letsencrypt/tls_sni_01_page/] does not exist [Fri Oct 27 09:47:19.831094 2017] [ssl:warn] [pid 35459] AH01906: b0e858dd145cedac69bf9f2ff813bdce.4aff4cc0f637d578fdb7e19834ea33dc.acme.invalid:443:0 server certificate is a CA certificate (BasicConstraints: CA == TRUE !?) [Fri Oct 27 09:47:19.831626 2017] [mpm_prefork:notice] [pid 35459] AH00163: Apache/2.4.18 (Ubuntu) OpenSSL/1.0.2g configured – resuming normal operations [Fri Oct 27 09:47:19.831636 2017] [core:notice] [pid 35459] AH00094: Command line: '/usr/sbin/apache2' [Fri Oct 27 09:47:26.617630 2017] [mpm_prefork:notice] [pid 35459] AH00171: Graceful restart requested, doing restart [Fri Oct 27 09:47:26.657069 2017] [mpm_prefork:notice] [pid 35459] AH00163: Apache/2.4.18 (Ubuntu) OpenSSL/1.0.2g configured – resuming normal operations [Fri Oct 27 09:47:26.657091 2017] [core:notice] [pid 35459] AH00094: Command line: '/usr/sbin/apache2' If I can figure out how to force a renewal, I'll test on my other host and see if I can replicate it.
  • [Solved] Bug in ACME 0.1.20 package

    Moved
    9
    0 Votes
    9 Posts
    2k Views
    dragoangelD
    Thank you. And please do not understand me wrong - i'm only want to help community.
  • ACME Letsencrypt + sftp webroot, 404 error when trying to issue cert

    Moved
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    What exactly did you enter for the SFTP server? It should be sftp://x.x.x.x not just a bare IP address. See https://doc.pfsense.org/index.php/ACME_package#FTP_Webroot
  • Let's Encypt support

    Locked Moved
    86
    0 Votes
    86 Posts
    65k Views
    jimpJ
    Please start separate threads for distinct issues, having multiple unrelated discussions simultaneously in a thread like this is hard for anyone to follow properly.
  • Packages | Acme Certificate Manager TUTORIAL

    Moved
    1
    0 Votes
    1 Posts
    5k Views
    No one has replied
  • Acme Letsencrypt is failing to verify manual DNS entry

    Locked Moved
    15
    0 Votes
    15 Posts
    4k Views
    jimpJ
    Your probably is highly unlikely to be related to this subject, and your suggestion is also not relevant. If you want to hack up your own firewall, feel free, but do not suggest others repeat your mistakes. Locking this thread since it has been solved and is deviating from the original topic.
  • Acme dns validation with hurricane electric

    Moved
    3
    0 Votes
    3 Posts
    949 Views
    P
    @doktornotor: https://github.com/pfsense/FreeBSD-ports/pull/420 It says it needs testing. I could do that if someone points me to the documentation on how to do that.
  • ACME + HAProxy [Answered]

    Moved
    5
    0 Votes
    5 Posts
    1k Views
    A
    That's great, thanks.
  • ACME package clouDNS support

    Moved
    2
    0 Votes
    2 Posts
    1k Views
    T
    The ACME package is based on acme.sh which already take care of cloudns.net (https://github.com/Neilpang/acme.sh). I am in the same situation but I am using GandiLive. Therefore, would it be possible to bump the ACME package to the latest acme.sh version?
  • Automating ACME Letsencrypt

    Moved
    12
    0 Votes
    12 Posts
    8k Views
    R
    @remis4: So the ACME action section has THE example i was looking for to restart haproxy. That's simple enough of a fix when my cert renews. On another note, I wrote a script that works as a cron job in pfSense to update GoDaddy A records. https://github.com/nkleck/Godaddy-DDNS.git Its a bit simpler than some of the other options out there, but its written with libraries already available in pfsense FreeBSD python. So you dont have to worry about installing requests, its using urllib2  :-X . The usage is pretty straight forward in the cron job. 2 * * * * root /usr/local/bin/python2.7 /home/<your user="">/godaddy-ddns.py hostname.domain.tld It also restarts HAProxy at the end of it if a change was detected. Not sure if its needed, as I found today the 'Reload behaviour' checkbox in HAProxy that might do the same thing.</your> hi, i saw you script for the DNS A record on Godaddy, is it possible to make it work to change the @ record? i'm just to dumb to figure out how to change it :|
  • Renew certificate fails with CSR error -> unable to load Private Key

    Moved
    5
    0 Votes
    5 Posts
    2k Views
    S
    Got it :-) Just mkdir /usr/local/www/.well-know/ mkdir /usr/local/www/.well-know/acme-challenge and use stand-alone HTTP server in Domain SAN list
  • ACME run renew show error message.

    Moved
    1
    0 Votes
    1 Posts
    646 Views
    No one has replied
  • ACME Pkg Questions

    Moved
    3
    0 Votes
    3 Posts
    983 Views
    A
    Awesome, thanks! i'll give that a shot and see how that goes.
  • Acme: Usage of "Actions list"

    Moved
    3
    0 Votes
    3 Posts
    2k Views
    jimpJ
    The actions list will call a shell command as-is. Whether or not that will be able to copy certificates to other hosts depends on the rest of your configuration. You would test/debug that like any other shell script. By default the certificates only exist in the pfSense configuration file. Unless something reads them from there and writes them out, a shell script could not easily obtain them. For example, if you have the certificate set to be used by the GUI and followed the example to have the actions list restart the GUI, it would write the certificate out to /var/etc/cert.crt and a shell script run after that could copy that file. Otherwise it whatever script is run would (probably easiest if it's PHP) would have to parse the config.xml and read the certificate and then write it out somewhere. Eventually we might include something like Anvil to help with this.
  • HAProxy And ACME standalone

    Moved
    9
    0 Votes
    9 Posts
    3k Views
    yuljkY
    Hi Mats - I've managed to get a bit further.  I decided to start from fresh. I created 3 backends like so:- ACME active localacmeserv Address+Port: 192.168.50.10 8126 no WebServers active THEMIS Address+Port: 192.168.50.189 80 no WebServers2 active GLAUCUS Address+Port: 192.168.50.185 80 no I created 4 Frontends :- HTTP-Edge Any (IPv4) 80 Any (IPv6) 80 Any (IPv4) 443 Any (IPv6) 443 Use "forwardfor" option - Ticked (Wasn't sure if this is needed or not) WebServers Shared Frontend option - ticked Primary frontend - HTTP-Edge ACL1 Host matches: no www.mywebsite.co.uk Actions Use Backend See below ACL1 Use backend WebServers I then cloned this frontend an setup an ACL for my second website to the Webservers2 backend.  This all seems to work. I created a final frontend for ACME like so:- ACMEFrontend Shared front end - ticked Front end - HTTP-Edge acme Path starts with: yes /.well-known/acme-challenge Use Backend See below acme Backend points to ACME backend. Attempt to renew Exchange 2013 SAN certificate which has enabled mail.mydomain.co.uk standalone HTTP server Port 8126 Enabled autodiscover.mydomain.co.uk standalone HTTP server Port 8126 [Fri Jul 7 00:20:11 BST 2017] Standalone mode. [Fri Jul 7 00:20:12 BST 2017] Standalone mode. [Fri Jul 7 00:20:12 BST 2017] Multi domain='DNS:autodiscover.mydomain.co.uk' [Fri Jul 7 00:20:12 BST 2017] Getting domain auth token for each domain [Fri Jul 7 00:20:12 BST 2017] Getting webroot for domain='mail.mydomain.co.uk' [Fri Jul 7 00:20:12 BST 2017] Getting new-authz for domain='mail.mydomain.co.uk' [Fri Jul 7 00:20:28 BST 2017] The new-authz request is ok. [Fri Jul 7 00:20:28 BST 2017] Getting webroot for domain='autodiscover.mydomain.co.uk' [Fri Jul 7 00:20:28 BST 2017] Getting new-authz for domain='autodiscover.mydomain.co.uk' [Fri Jul 7 00:20:30 BST 2017] The new-authz request is ok. [Fri Jul 7 00:20:30 BST 2017] mail.mydomain.co.uk is already verified, skip http-01. [Fri Jul 7 00:20:30 BST 2017] Verifying:autodiscover.mydomain.co.uk [Fri Jul 7 00:20:30 BST 2017] Standalone mode server [Fri Jul 7 00:20:36 BST 2017] autodiscover.mydomain.co.uk:Verify error:Invalid response from http://autodiscover.mydomain.co.uk/.well-known/acme-challenge/-G-QfC3FZa66VzIHB2rvanHig3CqBxJPONFSdO0QxLs The Exchange 2013 server is running behind the firewall. Any ideas? - This is hurting my brain!
  • ACME no CA.key, can't create user certs without

    Moved
    6
    0 Votes
    6 Posts
    2k Views
    H
    I didn't mean that I submitted the user certificates to acme, I actually had the CA key "intermediate cert I guess" that I had as a result of a previous certificate certificate that acme returned to me for pfSense and about a half dozen other hosts downstream. Valid, no BS, I still have a legit key+cert that I can sign new public certificates with, it expires July 14. Anyway, I am just using self signed for everything.  I managed to find the intermediate and server certs I created in Cert Mgr in freeradius3 /usr/local/etc/raddb/certs. I compared the keys I downloaded from Cert Mgr against the keys there, sure enough. Used intermediate to create new server cert on second box counting down to avoid certs with same serial number. It would sure make things earlier, but I guess that's the point sort of, but if someone is smart enough to gain access to the OS then they are smart enough to find them, it just took me a lot longer because I am not very good at this. I will surface again shortly on free radius post, not having any luck with certificate authentication, pswd auth is good though. See ya there Jimp, thanks for the advice.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.