Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal not working on iOS devices only (DHCP 114)

    Scheduled Pinned Locked Moved Captive Portal
    94 Posts 3 Posters 15.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      Bisho
      last edited by Bisho

      Another weird observation: My pfSense is virtualized. The VM Host that has 2 hardwired NICs (WAN to the ISP router & LAN to a WiFi AP) has no issue at all.
      If I paste https://pfsense.afamiahotelresort.com:8003/index.php?zone=cpzone into Chrome or Edge, the connection is secure and the certificate is valid even after resetting both browsers several times. Note that their versions with my laptop are identical.

      I'm getting the connection not secure when I connect my laptop or phone via WiFi.
      To find out if it's an AP issue, I connected my laptop via cable to the pfSense LAN port (no more AP). I got a DHCP IP but I got the connection not secure. So the method of connection doesn't matter.
      My laptop/phone and this VM Host use the same DNS and we both are on Windows 11 and no CRT file is installed.

      Even the VM Host at my friend's hotel overseas is working without any issues as same as mine. I did several tests and the connection is secure and the certificate is valid !!!!

      I really don't know what is special about these VM Hosts. They always accept the Certificate. Unlike clients (laptops/phones)

      By the way, it's worth mentioning that even this working VM Host, does time out when pinging to pfsense.afamiahotelresort.com [192.168.1.1]. So getting a reply doesn't affect the certificate validation as long as the URL is resolving to the IP.

      2024-08-04_14-14-05.png

      Screenshot 2024-08-04 141707.png

      E 1 Reply Last reply Reply Quote 0
      • E
        EDaleH @Bisho
        last edited by

        @basharsaba
        Please take a break while I digest and understand your replies. I will be tied up for a day or so and will do my best to assist when sufficient time is available to review your replies in detail.

        Please remember that any ping test outside your pfSense internal LAN will fail unless a local 192.168.1.1 actually exists. All you confirm is that the DNS entry is pointing to the same address that you associate with your Captive Portal. This is essential for the browser to associate the SSL certificate with the URL's DNS record and pfSense's certificate specified by the Captive Portal configuration..

        1 Reply Last reply Reply Quote 0
        • B
          Bisho
          last edited by

          Please take your time. I'm already grateful for your help.

          @EDaleH said in Captive Portal not working on iOS devices only (DHCP 114):

          Please remember that any ping test outside your pfSense internal LAN will fail unless a local 192.168.1.1 actually exists.

          It makes total sense. In fact, when I'm on pfSense DHCP, the ping test to pfsense.afamiahotelresort.com [192.168.1.1] gets a reply.

          @EDaleH said in Captive Portal not working on iOS devices only (DHCP 114):

          All you confirm is that the DNS entry is pointing to the same address that you associate with your Captive Portal. This is essential for the browser to associate the SSL certificate with the URL's DNS record and pfSense's certificate specified by the Captive Portal configuration

          All Confirmed. Otherwise, the VM Hosts at both locations wouldn't work and get a secure connection with a valid certificate as I explained above.

          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @Bisho
            last edited by Gertjan

            @basharsaba

            The certificate you use contains the (only) 'SAN' : "pfsense.af####.com"
            It should also contain "portal.af####.com".

            Again, the portal URL is "portal.af####.com" so the certificate should contain "portal.af####.com".

            I agree with @EDaleH : a portal should be on it's own LAN type interface like OPTx - but not LAN - or WAN. But ... it does work when you use LAN.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            B 1 Reply Last reply Reply Quote 0
            • B
              Bisho @Gertjan
              last edited by

              @Gertjan
              I'm using now a new URL pfsense.af####.com with a new certificate that only contains pfsense.af####.com and pointing to 192.168.1.1 (Dynamic DNS) and all the configuration has been changed according to this new URL. Why would I still need the old URL portal.af####.com ?? In fact, I can do that, but I know it will lead to the same issue.

              I can work on OPTx later. For the time being, let's keep it on LAN. The most important and mysterious question is why both VM Hosts at both locations are getting a secure connection with a valid certificate, unlike any connected device.

              E GertjanG 2 Replies Last reply Reply Quote 0
              • E
                EDaleH @Bisho
                last edited by

                @basharsaba
                Let’s review the pre-requisites within pfSense besides the setup under Captive Portal.

                Under System, Certificate, Authorities you must have a Certificate Authority for your certificate and it must contain a current copy of the Certificate data. Either ACME is taking care of that for you or you are pasting the Certificate Data into the box with that label. Note the “Name” of that external issuer. Under the Certificates column of Certificate Authorities you will see at least the number 1 for quantity, that is the certificate for the portal.

                So, go to System, Certificate, Certificates and in the name column you will see your domain name listed. The Issuer will match the “Name” in the above. In the “In Use” column you should see at least Captive Portal DNS Resolver and possibly Acme(1) if you are using ACME to renew your certificate.

                If you have not updated the certificate data above after adding a subdomain to the certificate, it won’t work because the SAN list (Subject Alternative Name) does not contain the subdomain you pointed the captive portal at. Thus, certificate error.

                Now that covers the certificate, how does the browser find the Captive Portal?

                You are now familiar with the URL required to launch the login page to get through the captive portal. You can force this page to load in a browser tab by either having the Captive Portal capture your attempt to go to an http site, by entering the portal url directly into the browser URL or by using RFC8910’s DHCP114 to send the URL to an aware device that will typically launch a custom browser to load that page directly without being “captured and redirected to it”. What the browser is and how it got that URL entered is no longer important. Now the browser processes the request.

                Well, it needs to find out where that domain is so it does a DNS query and gets an IP which is the IP of the Captive Portal, 192.168.1.1 in your example.

                As this is an ssl request, it retrieves the public SSL key and it is the job of pfSense to handle the private key. If there is a subdomain like portal.domain.com, the “portal” subdomain must exist in the SAN list of the certificate and it provides the IP address as it also must exist in the DNS for the domain. If there is a discrepancy in any of the above, you get a browser specific SSL certificate error. You can look it up in edge by clicking the lock icon, then details, then Certificate Subject Alternative Name. Below is an example for gmail.com: Note accounts.google.com and *.partner.android.com are SANs

                31e2eb20-4a44-44d2-8b6d-b10425683933-image.png

                For me, the introduction of Dynamic DNS, VM, etc is just a lot of noise to distract you from the final objective. When you have the error on the laptop, drill into the certificate data by clicking on the square icon with the upper right arrow.
                f371dc3c-07c3-4a35-92e1-b26b3c8cc390-image.png
                and try to figure out what is offside. If you get a successful connection, also verify the SAN list.

                You need to identify what is failing and ensure the pfSense certificate data is current. The browser should tell you why it failed.

                1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @Bisho
                  last edited by Gertjan

                  @basharsaba

                  Because : You should (I really advice you to do so) :

                  0ffe3ddd-27c6-457a-8833-fd8dedc30bf0-image.png

                  == remove "portal." in front of the domain name. It doesn't belong their.

                  This pfSEnse.af#######sort.com has IP 192.168.1.1 - that's your LAN host name pfSEnse network name.
                  Now you can access pfSense using pfSEnse.af#######sort.com from LAN.

                  Then : go her :

                  fc433a95-e8db-4f8d-97ea-2076312f881d-image.png

                  and I presume that your captive portal IP is 192.168.2.1.

                  Remember to set up the captive portal DHCP server - pool for example 192.168.2.10 -> 192.168.2.254.

                  For starters : set up a generic pass all fire wall rule on the Portal interface.

                  Check that unbound listens on the portal interface.

                  If you need certs, and you use acme.sh : ask for two (yeah,n why not) certs :
                  One for pfSEnse.af#######sort.com - use this one for the pfSense GUI
                  One for portal.af#######sort.com - use this one on the captive portals setup page.

                  From now on, when a DNS request for "portal.af#######sort.com" comes in (pfSense), it will answer "192.168.2.1" !!
                  The portal web server will be contacted, and it will have a cert that says : I am "portal.af#######sort.com" => this is what https is all about.

                  Done.

                  Btw : Go here : https://www.youtube.com/@NetgateOfficial/videos and look for the 2 (3 ?) captive portal videos.
                  There are old.
                  But still very valid.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • B
                    Bisho
                    last edited by Bisho

                    Hello Gentlemen,

                    Let me answer your questions one by one.

                    @EDaleH

                    My certificate is automatically issued by LE and to my understanding LE is one of the most popular ACME Certificate Authorities. However, the System/Certificate/Authorities section in my pfSsens is blank. Do I still need to create a CA Authroty? if yes, how? what method? Internal, intermediate, or import?

                    The Certificate is imported correctly and validated for the URL pfsense.afamiahotelresort.com and the "In Use" column is exactly as you described.
                    The SAN list does contain DNS Name: pfsense.afamiahotelresort.com

                    I also compared every single field in the Certificate Details between my laptop (with no secure connection) and the VM Host (with a secure connection) and they are all identical. I couldn't find anything offside on my laptop.

                    2024-08-05_21-49-30.png

                    2024-08-05_21-48-55.png

                    @Gertjan

                    Just to recap. I'm no longer using the portal.afamiahotelresort.com nor 192,168.2.1. It's now pfsense.afamiahotelresort.com that has a Dynamic DNS resolving to 192.168.1.1 which is already added in the Host Overrides.
                    So to rephrase what you said: From now on, when a DNS request for pfsense.afamiahotelresort.com comes in (pfSense), it will answer 192.168.1.1

                    2024-08-05_21-55-30.png

                    GertjanG E 2 Replies Last reply Reply Quote 0
                    • GertjanG
                      Gertjan @Bisho
                      last edited by Gertjan

                      @basharsaba said in Captive Portal not working on iOS devices only (DHCP 114):

                      ... However, the System/Certificate/Authorities section in my pfSsens is blank. Do I still need to create a CA Authroty? if yes, how? what method? Internal, intermediate, or import?

                      I use the pfSense acme.sh package also.
                      It will also populate the System > Certificate > Authorities "CA" page :

                      9fffbd60-aeee-404c-a558-fc41707589e4-image.png

                      Note : some of them are old, and I should remove them.
                      AFAIK, when a web server serves a cert to a web browser, it will create a cert chain : CA, intermediate and the cert itself. It send the entire chain to the browser. If the CA is missing, that could very well explain your https error.

                      My browser shows the chain :

                      edd3e0fa-be2d-44c2-8fd5-5bba44076638-image.png

                      So ISRG Root X1 signs R10 signs my domain (wildcard) certificate.

                      Btw :

                      5724ac4c-85fb-4a8c-9f43-c866560665a0-image.png
                      is probably not need as you have also this :

                      a8a08ab7-69b3-47d8-9944-deddf3b76a47-image.png

                      Check for yourself : look at your /etc/hosts file : you have "pfsense.afamiahotelresort.com = 192.168.1.1" now twice.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 0
                      • E
                        EDaleH @Bisho
                        last edited by

                        @basharsaba said in Captive Portal not working on iOS devices only (DHCP 114):

                        I also compared every single field in the Certificate Details between my laptop (with no secure connection) and the VM Host (with a secure connection) and they are all identical. I couldn't find anything offside on my laptop.

                        1b60519b-4b60-4b4a-854f-63294a340e58-image.png

                        Your certificate is "afamiahotelresort.com", that is what it should say in the name column. It simply will not work the way it is because it is currently looking for a second level domain as in: pfsense.portal.afamiahotelresort.com which you don't have.

                        Below is what a typical multi portal Captive Portal setup SAN certificate chain might look like for example:

                        DNS Name: domain.com
                        DNS Name: free.domain.com
                        DNS Name: day.domain.com
                        DNS Name: week.domain.com
                        DNS Name: month.domain.com
                        DNS Name: data.domain.com
                        DNS Name: somethingelse.domain.com
                        DNS Name: pfsense.domain.com
                        DNS Name: security.domain.com

                        Each would typically point to a different IP unless you use two different URLs to access the same page. domain.com and pfsense.domain.com could both point to the webconfigurator on 192.168.1.1. and security.domain.com could be a Network Video Recorder on 192.168.1.253 with free.domain.com on a Captive portal which is on VLan10 on 192.168.10.1 which is associated with interface OPT1 as a VLan under interfaces, the same for the rest, all on different VLans/IP ranges. Each will need DHCP, a firewall rule and DNS setup to function. If you are using VLans you will need Level 2 switches that support 802.1Q. The assumption in this thread has been that you are doing everything on the LAN, which is assumed to be on 192.168.1.1/24. Gertjan's responses assume you associated a VLan on 192.168.2.1 which is entirely valid but DIFFERENT. Your Captive Portal IP's DHCP Server must match be supplying an address in the same range(subnet) as the the DNS IP specified in the domain registration for subdomain.domain.com (pfsense.afamiahotelresort.com) in your case.

                        There will be an external Certificate Authority for domain.com (just the domain name, no subdomain, i.e. only one period before .com, no more periods). Under System, Certificate, Authorities you should see something like:

                        Acmecert: O=Internet Security
                        Research Group, CN=ISRG Root X1, C=US external

                        Under System, Certificate, Certificates you will have one entry for just that domain.com, no subdomains, i.e. only one period before .com

                        Name:
                        domain.com
                        CA: No
                        Server: Yes

                        Issuer:
                        Acmecert: O=Let's Encrypt, CN=R11, C=US CN=domain.com
                        Valid From: Thu, 18 Jul 2024 02:31:26 -0400
                        Valid Until: Wed, 16 Oct 2024 02:31:25 -0400

                        In Use:
                        webConfigurator Captive Portal DNS Resolver
                        Acme (1)

                        The only place you enter your subdomain name(s) is in the captive portal and DNS Host overrides, everything else is referring to the primary domain exclusively.

                        Below is a DHCP screenshot of a setup similar to what I described above:
                        1f2fb934-ead1-4a26-a104-a706fd9d4d4b-image.png

                        If you are working with just the LAN, you will only see WAN and LAN on your setup. The remainder are all related to L2 VLans, the first being the interface and the remainder the VLans assigned to that interface. Each of them has their own Captive Portal and DHCP assisgned to them.

                        So you have only one LAN, one DHCP server on the LAN and thus a Captive Portal running on the LAN subnet 192.168.1.1/24 (pfSense default setup address assumed)

                        Bottom Line: My suggestion is that you have not registered your certificate correctly. That certificate should be afamiahotelresort.com

                        When I check your certificate two interesting things show up. It is not Trusted and it appears to have a wildcard SAN *.afamiahotelresort.com indicating you can add any subdomain in front of afamiahotelresort.com? This is the certificate foundation upon which you have built your configuration.

                        a8535551-cd1d-455f-b8c7-a3ae69656b23-image.png
                        and
                        ece2882f-5a4d-4531-9cf0-fe0757cc723a-image.png

                        The certificate is not signed !! My Mcafee will not permit me to look at www.afamiahotelresort.com, it pops up a "Suspicious" error.

                        If you are working with an existing domain that serves your website and trying to add in a captive portal, you have many additional variables to deal with. I would suggest a new domain name that supports single level subdomains for free. Cloudflare is one example for $10 or so a year. Well worth the simplicity it adds. Let your web designer and ISP play with your web site, take control of your Captive Portal by using a dedicated domain/ACME setup, likely with a 90 day free let's encrypt certificate. I am confused though that you seem to be maintaining the afamiahotelresort.com certificate yourself (ACME/pfSense), did you by any chance override the original registration? It looks like a wildcard certificate and they are expensive.

                        GertjanG 1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @EDaleH
                          last edited by Gertjan

                          Added to what @EDaleH said :

                          I rent a domain domain name, #######.hotel-fumel.net that I solely use for my pfSense LAN networks(s). (LAN, Portal, DMZ, etc.)

                          I also have the #######.hotel-fumel.fr domain that is used for the hotel's web site. This domain is accessible and usable "on the Internet" for the public.

                          My #######.hotel-fumel.net - when used on the Internet, points to nothing .....shuuut, don't tell anyone : my IPv4 ISP WAN IP. Which is actually a pfSense network ^^

                          Right now, I guess your host ? - or you, get a wild card certificate to be used on the public web server.
                          And locally, with pfSense, the acme.sh package, you also get a certificate using the same domain.
                          That's ... Ok, I guess.

                          My acme.sh setup :

                          deee7b72-ead0-4570-ad5e-d74489db097d-image.png

                          which is the 'wild card' setup - the certificate I get back from Letsencrypt :

                          6d153090-37d7-4320-8bbe-a688073c2630-image.png

                          And now I can use this certificate for all GUI web interfaces on my LAN network for the devices that have a web GUI :
                          printer1.#######.hotel-fumel.net set with a DHCP MAC Lease
                          synology1.#######.hotel-fumel.net set with a DHCP MAC Lease
                          Airco.#######.hotel-fumel.net set with a DHCP MAC Lease
                          and also
                          pfSense.#######.hotel-fumel.net = 192.168.1.1 set in the pfSense GUI.
                          and
                          portal.#######.hotel-fumel.net = 192.168.2.1 set with a resolver host override.

                          VLAN : I'll use them as soon as I have some spare time, so I can safely abandon the Keep It Simple principle. It should work, though, when set up correctly (sic).

                          Extra - totally not related : : http://www.afamiah#telresort.com/welcome/ shouldn't really exist anymore. http is ok, and should do just one thing : redirecting to https:// Typically this is done as early as possible, in the web server config.
                          For me, this domain name (web site), the https part, had no certificate errors ....

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          E 1 Reply Last reply Reply Quote 0
                          • E
                            EDaleH @Gertjan
                            last edited by

                            @Gertjan
                            The status of the certificate changes with different ssl checkers. Only sslchecker.com fails it, ssl.com gives it a clean bill of health. It is curious that one checker fails it though.

                            The certificate is a wild card certificate.

                            • this is great because you can create any single level domain name you want without any further work. Despite that, read on.

                            The certificate authority does not exist in pfSense System, Certificates, Authorities?

                            •  - Is this a serious problem, I am unsure but I think so.  Normally ACME handles that when you create the certificate but your certificate already existed?  The fact you have no Authority listed in pfSense is undefined and potentially a fatal flaw.
                              

                            The certificate name in pfSense Syste, Certificates, Certificates has the subdomain?

                            •  - This is wrong as now you need to create pfsense.pfsense.afamiahotelresort.com in DNS.  and I am unsure if second level domains are supported in pfSense?
                              
                            • It needs to be afamiahotelresort.com. That will permit the Dynamic DNS subdomain pfsense.afamiahotelresort.com to work with captive portal and DNS Resolver. Again though, read on.

                            You still need to have DNS resolve for pfsense.afamiahotelresort.com to the subnet you put the Captive Portal on -> LAN?, (assumed to be 192.168.1.1). This appears to be done.

                            Given all the above, I suggest a clean start that gives you complete control over the Captive Portal:

                            Advice: Buy a new domain that supports 1st level subdomains for your pfSense and Captive Portal. Be careful, most issuers do not support subdomains or charge a large fee for them. Cloudflare for one does not charge extra, I am sure there are others out there.

                            • Add DNS subdomains like portal, pfsense, and no subdomain at all.
                            • point pfsense at the webconfig address 192.168.1.1
                            • point portal at the Captive Portal DHCP Subnet, likely same 192.168.1.1.
                            • Setup ACME from scratch for the new certificate starting with Account Key, then configure the ACME certificate including all 1st level subdomain names and domain name without any subdomain.
                            • Setup DNS Resolver and Captive Portal for the new domain name and subdomains. Don't forget the firewall rule to allow internet access.
                            • test from the laptop.
                            • configure RFC8910 DHCP 114 support for the new domain name and test devices that support it.
                            1 Reply Last reply Reply Quote 0
                            • B
                              Bisho
                              last edited by Bisho

                              Hello @EDaleH and @Gertjan,

                              I went through all your notes and advice, I have no problem getting a new/dedicated domain from Cloudflare, but I feel I'm very close to achieving what I want using the existing domain. Let Cloudflare be the last resort.

                              Out of curiosity, I went to a hotel nearby today where my laptop and Android device always get a secure connection and checked their Captive Portal certificate details, then applied what you guys suggested and compared it to this hotel's Captive Portal certificate that uses 2 SANs. One is the domain and one is the wildcard domain. Their URL also resolves to an internal IP. Here is a screenshot.

                              2024-08-06_09-49-38.png

                              2024-08-05_10-14-56.png

                              And here is mine

                              2024-08-06_22-04-36.png

                              Anyway, I started from scratch, but when I was doing the Acme Certificate options, I didn't know what to put in the Server, Key, Key Name, and Algorithm. I appreciate your advice.
                              By the way. I used the LE's Production ACME V2 to register the ACME account key.

                              Also, I got an error when I tried to issue/renew the certificate. Is there anything I need to do from the domain/registrar's side?

                              2024-08-06_22-29-03.png
                              2024-08-06_22-24-35.png

                              I also used afamiahotelresort.com for the Certificate's Common Name.

                              2024-08-06_22-34-47.png

                              GertjanG 1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @Bisho
                                last edited by Gertjan

                                @basharsaba

                                You saw the difference ?

                                1b874a5a-9b7e-41d2-bda0-457cb1fc438d-image.png

                                and

                                17e50a37-8acc-41ed-9c05-dc463a30329c-image.png

                                Btw :

                                5d48cd57-f7d4-445c-8dd0-ccb8a1dfffcb-image.png

                                update fail.
                                If you want more details : see the "more details".

                                5893369b-86a1-47c8-a508-e2c30760fa9c-image.png

                                As you can see, the "CA" is also available. and afaik 'acme' would have stored it in the CA list if it is missing.
                                You know where it is, you could place it in there manually, if needed.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 0
                                • B
                                  Bisho
                                  last edited by Bisho

                                  @Gertjan,

                                  Yes I saw the difference, Their Certification Hierarchy starts with a Certificate Authority which I'm missing.

                                  In my particular situation, where am I supposed to create the Certificate Authority? Under System/Certificate/Authorities? If yes, Internal, intermediate, or import?

                                  Or under ACME Certificates? What about the Key fields?

                                  Here is the acme_issuecert.log.txt It's tooooooooo long and confusing. I couldn't spot the exact issue.

                                  GertjanG 1 Reply Last reply Reply Quote 0
                                  • GertjanG
                                    Gertjan @Bisho
                                    last edited by Gertjan

                                    @basharsaba

                                    I saw the log.

                                    f1eab8d0-5bc2-416b-9dc1-3d5581e61662-image.png

                                    is wrong.
                                    (stopped looking for more)

                                    The NS server here is the master domain name server.
                                    Not optional or something.
                                    The 'nsupdate' has to have an IP - this one :

                                    536e1c2b-aca5-413c-90b6-0999a4579fc8-image.png

                                    as that IP is my 'master domain name server' where the zone of the domain resides.

                                    Your could be

                                    [24.03-RELEASE][root@pfSense.bhf.tld]/root: dig afamiahotelresort.com NS +short
                                    ns203.canadianwebhosting.com.
                                    ns204.canadianwebhosting.com.
                                    [24.03-RELEASE][root@pfSense.bhf.tld]/root: dig ns204.canadianwebhosting.com A +short
                                    104.36.151.152
                                    [24.03-RELEASE][root@pfSense.bhf.tld]/root: dig ns203.canadianwebhosting.com A +short
                                    104.36.151.151
                                    

                                    This IP, the secret key and the algorithm type are made available to you be the domain registrar.

                                    edit :

                                    On the domain name server side, during the certificate renewal I showed above, I found this in the 'bind' logs :

                                    07-Aug-2024 07:53:10.411 update: client @0x7ff5325d5070 82.127.26.108#55966/key update: updating zone '#####-hotel-fumel.net/IN': adding an RR at '_acme-challenge.#####-hotel-fumel.net' TXT "JLJQnIUFDoiQKHfN6iyFvHIuMMhF_-h7I5-mWcaZGX4"
                                    07-Aug-2024 07:53:10.719 update-security: client @0x7ff5325d5070 82.127.26.108#65112/key update: signer "update" approved
                                    07-Aug-2024 07:53:10.719 update: client @0x7ff5325d5070 82.127.26.108#65112/key update: updating zone '#####-hotel-fumel.net/IN': adding an RR at '_acme-challenge.#####-hotel-fumel.net' TXT "Rmcf8iJ7-R7joIpa_hEMgfYBm9jpt_YuSP3eyBjSfq4"
                                    07-Aug-2024 07:55:17.432 update-security: client @0x7ff5325d5070 82.127.26.108#57576/key update: signer "update" approved
                                    07-Aug-2024 07:55:17.432 update: client @0x7ff5325d5070 82.127.26.108#57576/key update: updating zone '#####-hotel-fumel.net/IN': deleting rrset at '_acme-challenge.#####-hotel-fumel.net' TXT
                                    07-Aug-2024 07:55:17.596 update-security: client @0x7ff528513520 82.127.26.108#55196/key update: signer "update" approved
                                    07-Aug-2024 07:55:17.596 update: client @0x7ff528513520 82.127.26.108#55196/key update: updating zone '#####-hotel-fumel.net/IN': deleting rrset at '_acme-challenge.#####-hotel-fumel.net' TXT
                                    07-Aug-2024 07:55:38.455 update-security: client @0x7ff532233980 2a01:cb19:907:a600:92ec:77ff:fe29:392a#52512/key update: signer "update" approved
                                    

                                    You can see that at 07h53:10 the two TXT fields are added under the sub domain "_acme-challenge".
                                    Then there was the DNSsleep of two minutes.
                                    The the two TXT fields are deleted / cleaned up.

                                    What also happens : as soon as the master zone is updated, the master DNS domain names servers signals the DNS slaves. As shown above, you have a master, and a slave.
                                    These slave(s), when they see fit ( !! ) will contact the master and ask for a zone sync.
                                    Only when is this done, Letsencrypt should start validating your domain, which is nothing more as checking if under _acme-challenge.afamiahotelresort.com exists, if there is a TXT field and if it contains the 'secret random' text string value that Letenscrypt gave to acme when it started.
                                    Because I asked for a wild card cert, there are two TXT fields.
                                    That's all that is needed to proof that YOU 'own' your domain.
                                    As no one else could do this.

                                    I can see this log info as from the other side as I'm doing my own DNS stuff for my own domains ;: I run my own DNS servers (advise : don't do what I do).

                                    No "help me" PM's please. Use the forum, the community will thank you.
                                    Edit : and where are the logs ??

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      Bisho
                                      last edited by

                                      @Gertjan

                                      A few questions:

                                      1. In your SAN Table, you created 2 domain names. One is the main domain and one is the wildcard one. Does the zone need to match the domain name? I mean one zone is the main domain and the other one is the wildcard one?

                                      2. Is the key for the SAN table the same SSL/TLS Certificate's Private Key that I have imported to Certificates, or am I supposed to look for another key?

                                      3. I saw that you entered a Key Name. It's optional, shall I leave it blank or enter the domain name?

                                      4. I couldn't find the Algorithm from the Registrar, so I chose the most common one SHA256

                                      E 1 Reply Last reply Reply Quote 0
                                      • E
                                        EDaleH @Bisho
                                        last edited by

                                        @basharsaba & @Gertjan
                                        I am not replying to the questions asked but rather clarifying a few points and making observations:

                                        First, Let's Encrypt certificates through ACME support wildcard subdomains for the SAN list. I was not actually aware of that until now. It does not change anything, it just makes subdomain setup in the DNS easier and somewhat less secure if others have access to the DNS server setup. Specifying subdomains individually works just fine and you have control over which work. Your call when setting up your Let's Encrypt certificate in ACME.

                                        Next, @Gertjan pointed out the certificate authorities associated with ACME, there appear to be 3 ACME related authorities. Of note is that the "external" one is NOT the one used for the certificate managed by the ACME package. The bottom one in Gertjan's screen capture is:
                                        ebaecb39-3983-4019-b23a-ccac0247a7f1-image.png
                                        You can see that there is "1" certificate associated with it. This certificate is the one you will use for the Captive Portal https setup. The certificate is associated with the domain name, no subdomain is in play at all in the System, Certificates setup.
                                        Now we look at @basharsaba 's original Certificate.
                                        d5aef758-307d-49c6-a2d4-6efeb6353efa-image.png
                                        The two things of note here are

                                        • As stated previously, the Certificate includes the subdomain name which it should NOT include. It simply won't work as this is the security certificate which already includes the ability to handle wildcard subdomains in this case. It will force a second level domain resolution that is not supported.
                                        • The issuer is listed as "external". This is wrong, it should be the Certificate Authority that is listed last as shown in @Gertjan 's image above but the exact syntax, in particular the CN=R?? part may change. In my opinion, this is why the original configuration was not working, the Certificate authority was wrong and thus failing for Captive Portal. This is why the Certificate Hierarchy is not correct, it simply doesn't exist. In the example below, the red should say "afamiahotelresort.com". The yellow will likely be different.
                                          c5b77264-890c-48f3-89b0-38190e561a85-image.png

                                        Lastly, the DNS setup points to the address of the captive portal, but it matters not how it came to do so, DNS server, Dynamic DNS or DNS Resolver Host Override. It is simply important that it resolve to the correct address pool that matches the DHCP associated with the Captive Portal. It has nothing to do with the certificate other than enabling that field in the SSL/TLS verification process to match on subdomain and Captive Portal to match on IP address.

                                        Once the above configuration is achieved, I believe you will be operational.

                                        E 1 Reply Last reply Reply Quote 0
                                        • E
                                          EDaleH @EDaleH
                                          last edited by

                                          @Gertjan @basharsaba

                                          Sorry, I forgot one more suggestion. If you go to Services, ACME, General Settings, you can turn on the saving of all of your certificates to /conf/acme, including the authority. That way you can check the authority in System, Certificates, for both Authorities and Certificates:
                                          e785a070-289f-4c85-b4a3-cb07f4be08b9-image.png

                                          I used the Authority certificate to create an authority for a second pfSense server on our network (I wanted https for webconfig on the second pfSense unit) and then pasted in the certificate using that authority, associating it with webconfig. I update it manually every time ACME renews the certificate itself which is a pain but of importance here, I re-created the configuration without configuring ACME itself and successfully enabled https. Thus Authority + Certificate is all that is needed to make https work on a subdomain.

                                          1 Reply Last reply Reply Quote 0
                                          • B
                                            Bisho
                                            last edited by Bisho

                                            Hello @EDaleH and @Gertjan, I have 50% good news.

                                            So after numerous attempts of playing with the settings and troubleshooting the errors I was never able to get ACME to issue a certificate. I believe this is because we are not using the DNS from NameSilo (Registrar) but instead, we are using the DNS from the Canadian Web Hosting company. There wasn't enough room to play with the DNS settings or let's say the required parameters for the Domain SAN list in pfSense (Key, Token, Account, or Zone ID) were not available.

                                            Long story short, I took your advice and purchased a brand new domain on Cloudflare (www.afamiahotelresort.net). As pfSesne already has DNS-CloudFlare listed, I was able to fill in the required fields and get the certificate issued.

                                            I also enabled the 2 options (Cron Entry and Write Certificates).

                                            The Certificate Authority and the Certificate were created automatically for the Wildcard domain.

                                            2024-08-08_07-49-11.png

                                            fff.png

                                            You previously said I should have a subdomain.domain.tld that will be used for the Captive Portal. So I went to CloudFlare and created A record for pfsense.afamiahotelresort.net that is resolving to 192.168.1.1

                                            I got an error when the Proxied option was enabled, so I had to disable it and the record was created as DNS only. Is this ok?

                                            2024-08-08_08-07-05.png

                                            I went after that and changed all the other settings according to the new URL (Domain, DNS Server Settings (IP and Hostname), Captive Portal HTTPS Options, DHCP 114, DNS Resolver Host Overrides...etc but unfortunately, the connection to the Captive Portal page was still not secure.

                                            2024-08-08_16-13-14.png

                                            Is it because I used the ACME Staging, not Production? I have to wait about a week to be able to re-issue a new Production Certificate because I have had a lot of failing ones.

                                            Here are the new settings screenshots. Let me know why you think it's still not working.
                                            DHCP 114 String is now "https://pfsense.afamiahotelresort.net:8003/rfc8910.php?zone=cpzone"

                                            2024-08-08_16-06-31.png

                                            111.png

                                            222.png

                                            E GertjanG 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.