Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    "Non secure" pfSense URL

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 7 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad @hugoeyng
      last edited by

      @hugoeyng You need to trust the certificate in the web browser or pc.

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      1 Reply Last reply Reply Quote 0
      • J
        Jarhead @hugoeyng
        last edited by

        @hugoeyng said in "Non secure" pfSense URL:

        Hello, Firends.

        When I open pfSense GUI I see the warnning for not secure URL.

        fcc077da-a678-4f48-84f2-f26241ca0baf-image.png

        How to configure pfSense in a way that browsers can "understand" the pfSense URL as secure?

        Go to System/Cert Manager.
        Click the "Export CA" icon for the cert you're using.
        Install that cert to the trusted root certificate authority store on any computer you use to access pfSense.

        hugoeyngH 1 Reply Last reply Reply Quote 0
        • jimpJ jimp moved this topic from Problems Installing or Upgrading pfSense Software on
        • hugoeyngH
          hugoeyng @Jarhead
          last edited by

          @jarhead Thank you for your answer.

          Export from here:
          747db0b8-15e6-4a6c-9f21-bcfb11653a6c-image.png

          7169c0f4-96c5-4978-ae9e-936e4f9cae9b-image.png

          to here:

          12f1ec4a-5aee-4baa-be47-76f2f945ea08-image.png

          Autoridades de Certifcação Raiz Confiáveis = trusted root certificate authority

          Don´t worked.

          I love pfSense!

          Hugo Eyng
          Datamais Sistemas

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @hugoeyng
            last edited by johnpoz

            @hugoeyng well that is not the CA that signed off on your gui cert.. That is a CA for openvpn you must of created when you ran through the wizard for openvpn.

            Create a cert with a CA you created, and trust.. Set your gui to use that cert and your browser will not balk at it..

            I have gone over this multiple times to be honest.. Let me dig up one of the older threads with pictures. Here is one from 2019

            https://forum.netgate.com/post/831783

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            hugoeyngH 1 Reply Last reply Reply Quote 1
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Or realise that it isn't actually any less secure and carry on. In fact it can be argued that by having a server cert issued by a trusted authority you never actually check it.
              If the cert changes your browser will still alert you to that and prompt you to accept the new cert. At which point you can start investigating if it wasn't something you expected.

              Steve

              johnpozJ 1 Reply Last reply Reply Quote 1
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @stephenw10
                last edited by

                I am with steve, the self signed cert is just as secure as one signed by a ca you trust. Its just less annoying for your browser to bug you about it.

                You could argue that if your just accessing it locally, who exactly would be sniff your traffic that you would need to worry about end to end encryption or even validation that it is in fact your pfsense ;)

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 1
                • S
                  SteveITS Galactic Empire @hugoeyng
                  last edited by

                  @hugoeyng The cert validation verifies the hostname matches the certificate, and the certificate is valid (it is from a known good Certificate Authority). If you aren't using a hostname then an IP will never match the certificate. If you are using a hostname then the two options are to import your pfSense's CA certificate into your PC as mentioned above, or buy a valid certificate for the hostname...which will require using a public domain name.

                  Either way the connection IS encrypted, because the browser-to-web-server (router) encryption works...the browser is just complaining that it doesn't recognize the name and/or certificate, which is what it is supposed to do when you visit a site like that.

                  We also just accept the self-signed cert.

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @SteveITS
                    last edited by johnpoz

                    @steveits said in "Non secure" pfSense URL:

                    hostname then an IP will never match the certificate

                    Not actually true ;) if you have put in the IP in the SAN it can validate just fine.

                    certs.jpg

                    Nice thing with creating your own CA and signing your own certs with them, you can use whatever fqdn you want, and you can use rfc1918 IPs as SAN as well, etc. And if you had created them before the browsers got a stickily about age of the certs, you could have made them valid for pretty much how ever you wanted to make them.. Mine are good for 10 years.

                    valid.jpg

                    I still want to play with if I set time to before browsers put in that limit on age when create the cert and see if works ;) I will prob play with that when I finally get around to changing to home.arpa domain.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • hugoeyngH
                      hugoeyng @johnpoz
                      last edited by

                      @johnpoz great. It worked fine.
                      Thank you very much. Your are the guy.

                      b4641bb2-5005-41a7-a64c-edf691115988-image.png

                      I hope to find so clear answer of how to install a patch or how to fix "dummynet: bad switch 21!" But this is another topic. Thank you again.

                      I love pfSense!

                      Hugo Eyng
                      Datamais Sistemas

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        @hugoeyng said in "Non secure" pfSense URL:

                        dummynet: bad switch 21!

                        That is fixed in current dev snapshots but it's not something you can patch at run time to 22.05.
                        22.11 snapshots should be available very soon.

                        Steve

                        hugoeyngH 1 Reply Last reply Reply Quote 1
                        • hugoeyngH
                          hugoeyng @stephenw10
                          last edited by

                          @stephenw10 Thank you, Steve.
                          I will wait.

                          I love pfSense!

                          Hugo Eyng
                          Datamais Sistemas

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User
                            last edited by

                            If someone is interested in build their own PKI at home xCA
                            let you create your own certificates with much more abilities under your full control. xCA

                            It is available for MacOS, Windows and Windows portable.

                            johnpozJ ? 2 Replies Last reply Reply Quote 1
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @A Former User
                              last edited by

                              @dobby_ why not just the cert manager in pfsense? You can create CA, sign certs.. etc. etc..

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              J 1 Reply Last reply Reply Quote 1
                              • J
                                Jarhead @johnpoz
                                last edited by

                                I agree with John. I even use it to create certs for other devices on my network.

                                1 Reply Last reply Reply Quote 1
                                • ?
                                  A Former User @A Former User
                                  last edited by

                                  @dobby_ said in "Non secure" pfSense URL:

                                  If someone is interested in build their own PKI at home xCA
                                  let you create your own certificates with much more abilities under your full control. xCA

                                  It is available for MacOS, Windows and Windows portable.

                                  It is nothing you must do. Only if you are interested.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.