SSL certificate signed
-
Get the certificate in PEM format. It will look something like this:
–---BEGIN CERTIFICATE-----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-----END CERTIFICATE----- -
Hi,
Use this as a guide line : https://forum.pfsense.org/index.php?topic=63791.0 - it mentions an example with a certificate from StartSSL.
I always used a self-generated certificate from pfSense - but already used a real -signed- certificate from StartSSL for my Portal page.
I saw you message, so I decide to generate a valid certificate from StartSSL for my Web GUI pfSense access.
My domain name, which also really exist on the net, is brit-hotel-fumel.net
My host name (pfSense) is : "pfsense"First image :
Add the Intermediate and Root certificate that you must obtain from StartSSL. (because I was already using one certificate from them for my portal interface, they ware already there for me).Next image:
You obtain first from StartSSL a file called "ssl.key" - Keep this file, do not use it directly. Use the command openssl ….. or the tools from StartSSL to decrypt it (using the password you gave to StartSSL to generate it).The ssl.crt file goes into the first 'block' (Certificate data).
Your ssl.key that you decrypted goes into the second block (Private key data).
Give it also a name, like I did : "pfsense GUI Acces"You can see in the second image :
The 'default' auto generated cert from pfSEnse which isn't used now anymore, so I could delete it.
A second cert record for my portal interface : portal.brit-hotel-fumel.net
A third cert record for my web GUI acces (pfsense.brit-hotel-fumel.net) which is, as you can see, generated today : 28 august, 2015 ;)After that, I was already using https acces, but I switch from the auto generated cert to the new StartSSL cert, and ..... looooo, no more warnings from my browser :)
-
Hi,
Use this as a guide line : https://forum.pfsense.org/index.php?topic=63791.0 - it mentions an example with a certificate from StartSSL.
I always used a self-generated certificate from pfSense - but already used a real -signed- certificate from StartSSL for my Portal page.
I saw you message, so I decide to generate a valid certificate from StartSSL for my Web GUI pfSense access.
My domain name, which also really exist on the net, is brit-hotel-fumel.net
My host name (pfSense) is : "pfsense"First image :
Add the Intermediate and Root certificate that you must obtain from StartSSL. (because I was already using one certificate from them for my portal interface, they ware already there for me).Next image:
You obtain first from StartSSL a file called "ssl.key" - Keep this file, do not use it directly. Use the command openssl ….. or the tools from StartSSL to decrypt it (using the password you gave to StartSSL to generate it).The ssl.crt file goes into the first 'block' (Certificate data).
Your ssl.key that you decrypted goes into the second block (Private key data).
Give it also a name, like I did : "pfsense GUI Acces"You can see in the second image :
The 'default' auto generated cert from pfSEnse which isn't used now anymore, so I could delete it.
A second cert record for my portal interface : portal.brit-hotel-fumel.net
A third cert record for my web GUI acces (pfsense.brit-hotel-fumel.net) which is, as you can see, generated today : 28 august, 2015 ;)After that, I was already using https acces, but I switch from the auto generated cert to the new StartSSL cert, and ..... looooo, no more warnings from my browser :)
Thanks for the replies guys!
I also have pfsense.mydomain.net and what I don't understand is how to retrieve Private key data.
As suggested StartSSL website once certificate was generated I followed their instructions and backed up using Chrome https://www.startssl.com/?app=25#4 and I have certificate.pfx file.How did you get ssl.crt and ss.key files?
Tool box on StartSSL did not help me.
![startssl tool box.JPG](/public/imported_attachments/1/startssl tool box.JPG)
![startssl tool box.JPG_thumb](/public/imported_attachments/1/startssl tool box.JPG_thumb) -
You can get the certificate using the "Retrieve Certificate" link there in the Toolbox on the left.
Where the key is depends on how you generated the CSR. Or did you let StartSSL create it?
I've never done it that way. I always generate CSRs locally and upload them (Keeping the private key with me the whole time).
It generates an encrypted private key and gives you this command to decrypt it:
openssl rsa -in ssl.key -out ssl.key
–---BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-256-CBC,...
-----END RSA PRIVATE KEY-----Worked for me. I ended up with ssl.key containing the unencrypted rsa key in PEM format.
That, coupled with the certificate you can get from "Retrieve Certificate" plus the intermediate certificate from "StartCom CA Certificates" (Both in the Toolbox) should be all you need. Their decryption tool worked for me too.
ETA - It's easier just to generate a CSR using pfSense. You can just put BS in the attributes (I just used Temp for everything except email. There I used a@b.c. CAs toss all that stuff anyway, replacing it with what they have verified. All the CSR really needs to contain is the private key fingerprint.)
-
You can get the certificate using the "Retrieve Certificate" link there in the Toolbox on the left.
Where the key is depends on how you generated the CSR. Or did you let StartSSL create it?
I've never done it that way. I always generate CSRs locally and upload them (Keeping the private key with me the whole time).
It generates an encrypted private key and gives you this command to decrypt it:
openssl rsa -in ssl.key -out ssl.key
–---BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-256-CBC,...
-----END RSA PRIVATE KEY-----Worked for me. I ended up with ssl.key containing the unencrypted rsa key in PEM format.
That, coupled with the certificate you can get from "Retrieve Certificate" plus the intermediate certificate from "StartCom CA Certificates" (Both in the Toolbox) should be all you need. Their decryption tool worked for me too.
ETA - It's easier just to generate a CSR using pfSense. You can just put BS in the attributes (I just used Temp for everything except email. There I used a@b.c. CAs toss all that stuff anyway, replacing it with what they have verified. All the CSR really needs to contain is the private key fingerprint.)
When I click on "Retrieve Certificate" link under certificate I don't get anything (see attached screenshot).
Entire certificate was done using StartSSL and Chrome was used to back it up so nothing was done locally (command line).
-
Then it hasn't been issued for some reason.
-
-
If you can't retrieve a certificate under "Retrieve Certificate" then nothing has been generated yet.
First: goto the "Validations Wizard" and do a "Domaine name validation".
Then: goto "Certificates Wizard", select "Web server SSL/TLS Certificate" and run it down.Normally, I let them generate the files.
Because I have a "Debian Jessie" server, I execute the "openssl rsa -in ssl.key -out ssl.key" myself with a detail:
I use this:openssl rsa -in ssl.key -out ssl-decrypted.key
this way I keep the original encrypted key and the decrypted key. You'll be needing the 'ssl-decypted.key' file afterwards.
I'll join an image to motivate you ;)
-
If you can't retrieve a certificate under "Retrieve Certificate" then nothing has been generated yet.
First: goto the "Validations Wizard" and do a "Domaine name validation".
Then: goto "Certificates Wizard", select "Web server SSL/TLS Certificate" and run it down.Normally, I let them generate the files.
Because I have a "Debian Jessie" server, I execute the "openssl rsa -in ssl.key -out ssl.key" myself with a detail:
I use this:openssl rsa -in ssl.key -out ssl-decrypted.key
this way I keep the original encrypted key and the decrypted key. You'll be needing the 'ssl-decypted.key' file afterwards.
I'll join an image to motivate you ;)
Nice motivation :)
I was able to get "Retrieve Certificate" working and the reason was because I never finished the process :(
Now after I have both enter and without any errors like before I still get invalid, how did you "force" your browser to use new certificate? -
Did you install the Intermediate as a CA?
Did you install the StartSSL certificate?
Does pfSense recognize that the Cert is signed by the CA?
Did you tell the webgui to use the new certificate in System > Advanced > Admin Access??
Does the hostname you're browsing to exactly match either the CN or a SAN in the certificate?
-
Did you install the Intermediate as a CA?
Did you install the StartSSL certificate?
Does pfSense recognize that the Cert is signed by the CA?
Did you tell the webgui to use the new certificate in System > Advanced > Admin Access??
Does the hostname you're browsing to exactly match either the CN or a SAN in the certificate?
:(
So I went to check if I was using new certificate under System > Advanced > Admin Access and when I change from self generated to the one I created now I stuck and cannot login into pfsense interface. In chrome I get:
**This webpage is not available
ERR_CONNECTION_TIMED_OUT**
Tried w/ pfsense ip https://192.168.1.1 as well as domain that matched certificate https://linux.mydomain.net:81
-
Tried w/ pfsense ip https://192.168.1.1 as well as domain that matched certificate https://linux.mydomain.net:81
Connect to http://192.168.1.1/ and see what happens.
Did you change the listening port? You're trying https:// and https://host:81 there.
-
….. now I stuck and cannot login into pfsense interface. In chrome I get:
Been there - seen that.
My 'solution' : SSH intp pfSense. Option 8: shell.
Type
viconfigFind
<protocol>https</protocol>
Change it for
<protocol>http</protocol>
Save.
Reboot.Warning : editing the config.xml is "not done" (thats why it works ;)).
You are using editor vi - its somewhat special. -
….. now I stuck and cannot login into pfsense interface. In chrome I get:
Been there - seen that.
My 'solution' : SSH intp pfSense. Option 8: shell.
Type
viconfigFind
<protocol>https</protocol>
Change it for
<protocol>http</protocol>
Save.
Reboot.Warning : editing the config.xml is "not done" (thats why it works ;)).
You are using editor vi - its somewhat special.I'm glad I'm not the only one with this issue ;)
So using Putty SSH I tried to connect to 192.168.1.1 but it keeps timing out. I'm assuming that SSH deamon is not enabled.
My next step would be to physically connect keyboard and monitor and try to connect that way. Are above steps the same? -
Tried w/ pfsense ip https://192.168.1.1 as well as domain that matched certificate https://linux.mydomain.net:81
Connect to http://192.168.1.1/ and see what happens.
Did you change the listening port? You're trying https:// and https://host:81 there.
I did try connecting to http://192.168.1.1/ but it does not connect.
Neither port 80 or 81 worked. -
I'm assuming that SSH deamon is not enabled.
Possible.
But not for me.
A remote system without remote SSH enabled: unthinkable.
SSH is not some kind of 'emergency back door' : its the main maintenance port of any system. (GUI is just the next best thing)
For me, that is. I guess its quiet usual for people born before 1970 ;)My next step would be to physically connect keyboard and monitor and try to connect that way. Are above steps the same?
Of course.
-
….. now I stuck and cannot login into pfsense interface. In chrome I get:
Been there - seen that.
My 'solution' : SSH intp pfSense. Option 8: shell.
Type
viconfigFind
<protocol>https</protocol>
Change it for
<protocol>http</protocol>
Save.
Reboot.Warning : editing the config.xml is "not done" (thats why it works ;)).
You are using editor vi - its somewhat special.Thanks for this, you're a life saver! I thought I need to re-install it :'(
-
Did you install the Intermediate as a CA?
Did you install the StartSSL certificate?
Does pfSense recognize that the Cert is signed by the CA?
Did you tell the webgui to use the new certificate in System > Advanced > Admin Access??
Does the hostname you're browsing to exactly match either the CN or a SAN in the certificate?
Lets try this again since I got locked out :(
Did you install the Intermediate as a CA?
I thought I did, please see attached screenshot.Does pfSense recognize that the Cert is signed by the CA?
I think it does, please see attached.Did you tell the webgui to use the new certificate in System > Advanced > Admin Access??
Everything was fine until I selected new certificate. After that that I was locked out until I tried Gertjan's solution.Does the hostname you're browsing to exactly match either the CN or a SAN in the certificate?
When I created cert. it matched my pfSense hostname.Why did I got locked out once I selected new cert?
-
No. You installed your certificate as a CA. You need to install the StartSSL Class 1 Intermediate Server certificate as a CA. Delete the Web gui linux from CAs and install this.
http://www.startssl.com/certs/sub.class1.server.ca.pem
–---BEGIN CERTIFICATE-----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-----END CERTIFICATE-----After that, when you look at your certificate, it should show as being issued by that cert (Issuer)…
![Screen Shot 2015-09-17 at 10.19.58 PM.png](/public/imported_attachments/1/Screen Shot 2015-09-17 at 10.19.58 PM.png)
![Screen Shot 2015-09-17 at 10.19.58 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2015-09-17 at 10.19.58 PM.png_thumb) -
You know you could of just used pfsense self signed cert.. All you have to do is install the pfsense CA into your machine so that certs signed by that CA are trusted. There is no reason to get a cert from startssl or anyplace be it free or not.
The only time you would need a cert from a public trusted CA would be for say our portal when clients that have not trusted pfsense CA would hit the page via https