Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Certificate Authority SAN names not working in 2.1

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    8 Posts 5 Posters 5.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NitrobeastN
      Nitrobeast
      last edited by

      Hey Guys, It appears Subject Alternative Names are not working in the CA module for pfsense 2.1. Not sure where you wanted me to log this so I figured I would post it here.

      I added SAN names to a certificate and they display within the properties of the cert but when I try to connect using one of the SAN names I get an ssl error stating the cert does not match. When I connect using the default defined domain name it works just fine.

      1 Reply Last reply Reply Quote 0
      • T
        Truster
        last edited by

        Same problem here!
        The fault is, the certificate has no "Subject Alternative Name" Attribute, all "SAN" Entries filled into "Subject" field, there is no SAN extension in the certificate.
        look at the attachments.

        Explanation to the attachments:
        1st: correct san certificate created with openssl
        2nd: incorrect san certificate created with pfsense 2.1 (part1)
        3rd: incorrect san certificate created with pfsense 2.1 (part2)

        best regards, Dave

        incorrect_san2.png_thumb
        incorrect_san2.png
        incorrect_san.png_thumb
        incorrect_san.png
        correct_san.png_thumb
        correct_san.png

        1 Reply Last reply Reply Quote 0
        • T
          Truster
          last edited by

          No new info at this?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            This appears to have been a known issue for some time:
            https://redmine.pfsense.org/issues/894

            Steve

            1 Reply Last reply Reply Quote 0
            • T
              Truster
              last edited by

              Hi Stephen,

              this is not an issue, it's a feature request. pfSense 2.1 is the first version supporting additional SAN. But it isn't implemented correctly. So it wont work.

              Thanks for the Link, it looks like a bug tracking System, I'll try to raise a bug.

              Done; Bug #3347

              1 Reply Last reply Reply Quote 0
              • T
                tobiascapin
                last edited by

                I have this problem with squid 3.4: all SAN certificates are invalid.
                Is there any news about this?

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  @tobiascapin:

                  I have this problem with squid 3.4: all SAN certificates are invalid.
                  Is there any news about this?

                  This should be fixed in 2.2.x. (That said, not verified since we moved all certificates stuff to AD CS servers.)

                  (Not sure how's squid relevant here, by using the SSL bump junk in Squid, you are breaking all certificates intentionally, SANs are the least of your concern here…  ::))

                  1 Reply Last reply Reply Quote 0
                  • T
                    tobiascapin
                    last edited by

                    @doktornotor:

                    (Not sure how's squid relevant here, by using the SSL bump junk in Squid, you are breaking all certificates intentionally, SANs are the least of your concern here…  ::))

                    I'm under active directory, pfsense is a C.A. for all my clients, so the single-name certificate is well-working!
                    My problem is the SANs certificates (facebook, gmail and so on…) because my browser recognize valid only the common name  :o
                    When a website serve a certificate with CN different from its hostname the match fails, also if in the original certificate there is its hostname in the alternative names (SAN).

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.