Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Letsencrypt working in 2.3

    Scheduled Pinned Locked Moved pfSense Packages
    44 Posts 31 Posters 53.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mr_penguin
      last edited by

      As explained above, your arguments against LetsEncrypt are essentially arguments against DV certificates in general. Ok, I'll concede that - the world is an imperfect place. A site with only a DV (or LetsEncrypt) cert should probably not be trusted with the nuclear launch codes.

      However, I find the crux of your argument to be completely ridiculous in the terms of the pfSense WebGUI. First, I disagree that there are ever good reasons to expose a firewall GUI to the internet. If you're really concerned about security, that should be the first thing to go. If you broke VPN, you would just need to get physical hands on the device (or have a second VPN). Second, there should only be (in a large organization) a handful of people that even have access to said WebGUI and only another handful of people that even know it exists. Are you really that concerned about an attacker spoofing your firewall WebGUI login that maybe 10 people have credentials to? If so you need to re-evaluate the group of people that have access to the WebGUI. They shouldn't be trusted anyhow.

      Should we all get EV certificates? In a perfect world - sure, let's assume there's nothing better to do with $2k+ a year than going through the arduous process of EV for a WebGUI that isn't internet facing anyhow. But in reality, you're eliminating a valid and reasonable method for users to get encrypted access to their firewall GUI. I think we can all agree that LetsEncrypt is a better option than say using Chrome's –ignore-certificate-errors option. But that is exactly what you're implying that small businesses and home users should be doing. Because you wouldn't use a LetsEncrypt certificate on your installation. No one is saying you have to.

      I also want to point out the double standard of making a huge huff about LetsEncrypt while leaving plain HTTP as a single radio button away. Clearly that's the better option.  ::)

      I love that last line in the reddit comment "This is exactly why there isn't support for Let's Encrypt in pfSense 2.3. (I'd looked at it and decided that it wasn't yet time.)"
      Cool story, bro - I didn't realize pfSense was a maintained by a dictatorship. Not everyone's use case matches yours. Lighten up old man.

      1 Reply Last reply Reply Quote 0
      • MikeV7896M
        MikeV7896
        last edited by

        Just thought I'd point out that there appears to be a feature request being worked on to have LetsEncrypt support in version 2.4…

        https://redmine.pfsense.org/issues/5434

        The S in IOT stands for Security

        1 Reply Last reply Reply Quote 0
        • P
          PiBa
          last edited by

          p.s. its not only usefull for the webgui itself, but also for other packages running on pfSense like for example haproxy or maybe vhosts package or even the captive portal might use a trusted cert to let people enter their voucher codes.

          I would really like to have it available through 'official' channels instead of people needing to take lots of different scripts from sources the search-engine of choice presents..

          1 Reply Last reply Reply Quote 0
          • M
            michaelschefczyk
            last edited by

            Dear All,

            As StartCom is likely to go down based in this issue: https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ/preview, I would expect that many more people will feel the need to switch to Letsencrypt soon. Having certbot or another update client in the HAProxy package in a sufficiently secure manner would superb then.

            Regards,

            Michael

            1 Reply Last reply Reply Quote 0
            • D
              danb35
              last edited by

              This might be slightly off-topic for this thread, but it's at least related.  I have a public-facing web server that obtains Let's Encrypt certificates for a number of internal hosts using the dehydrated script (https://github.com/lukas2511/dehydrated), and I'm able to automate deploying certs to most of those hosts using some fairly simple scripting.  Typically this involves using scp to copy the relevant cert files to the appropriate locations, and then reloading the web server or other software using the cert.  Is there any reasonably-straightforward way to automatically deploy a cert to a pfSense machine?

              1 Reply Last reply Reply Quote 0
              • Y
                YoMarK
                last edited by

                @michaelschefczyk:

                Dear All,

                As StartCom is likely to go down based in this issue: https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ/preview, I would expect that many more people will feel the need to switch to Letsencrypt soon. Having certbot or another update client in the HAProxy package in a sufficiently secure manner would superb then.

                Regards,

                Michael

                Yes, second that. I'm using StartCom at home now, using pfSense as a reverse proxy(add-on) that adds https for the websites running behind it. As StartCom is going down, I started looking into Letsencrypt and found this thread.
                Letsencrypt seems ideal for this kind of stuff where you just want a little bit more(convenient) then self signed certificates.

                1 Reply Last reply Reply Quote 0
                • KOMK
                  KOM
                  last edited by

                  As StartCom is going down

                  They don't think they're going down.  Their page mentions them generating new root certs for Mozilla to get off the shit list.  IE and Chrome still trust them.  It might be premature to dump your existing cert.  I also use StartCom for my dinky site and I haven't seen any problems in Firefox with it yet.

                  1 Reply Last reply Reply Quote 0
                  • Y
                    YoMarK
                    last edited by

                    @KOM:

                    IE and Chrome still trust them.

                    The(they have multiple, it's unclear to me which is which) root CA is also on the Chrome "shitlist" as of a few days ago.
                    Anyway, it seemend a good idea to switch to something else, as I do have to replace my certificates soon because of StartCom's problems.

                    1 Reply Last reply Reply Quote 0
                    • I
                      idarlund
                      last edited by

                      I've been doing some testing and the script here is working well;
                      https://raw.githubusercontent.com/Neilpang/acme.sh/master/acme.sh
                      put this script in your ~/.achme.sh/ folder and you're good to go with commands like;
                      ~/.achme.sh/acme.sh –issue --dns -d yourdomain.tld -d sub.yourdomain.tld
                      after DNS is updated you're then able to update the certs and keys with
                      ~/.achme.sh/acme.sh --renew -d yourdomain.tld (no need to specify all the subs here)

                      this will create and update certs under ~/.achme.sh/yourdomain.tld/

                      I imported the key and cert manually in the web gui, but I'd like to do this automatically. Where are these keys/certs stored when using the web gui? and is it possible to load(move/copy) them with cli somehow?
                      After some digging I found the file /var/etc/haproxy/blabla.pem - however if i just cat my cert and key into this file and reloads haproxy, the old certificate is still in use.

                      so.. how to import and reload certificates with cli?

                      1 Reply Last reply Reply Quote 0
                      • H
                        hvisage
                        last edited by

                        @idarlund:

                        I've been doing some testing and the script here is working well;
                        https://raw.githubusercontent.com/Neilpang/acme.sh/master/acme.sh

                        so.. how to import and reload certificates with cli?

                        Something similar to:
                        https://forum.pfsense.org/index.php?topic=107161.msg651063#msg651063

                        1 Reply Last reply Reply Quote 0
                        • I
                          idarlund
                          last edited by

                          @hvisage:

                          @idarlund:

                          I've been doing some testing and the script here is working well;
                          https://raw.githubusercontent.com/Neilpang/acme.sh/master/acme.sh

                          so.. how to import and reload certificates with cli?

                          Something similar to:
                          https://forum.pfsense.org/index.php?topic=107161.msg651063#msg651063

                          Thanks a lot for the "script.sh"! that helped me alot!
                          My certs that i use for haproxy is now being updated automatically!

                          I see that in the script you are restarting the webgui (reloading the config file) with "/etc/rc.restart_webgui". I've checked "/etc/rc.*" but there's no haproxy restart script there (I can only find a "/etc/rc.haproxy_ocsp.sh" which updates haproxy OCSP responses).

                          How do I restart haproxy from cli?
                          EDIT: /usr/local/etc/rc.d/haproxy.sh

                          1 Reply Last reply Reply Quote 0
                          • J
                            jwt Netgate
                            last edited by

                            FYI

                            https://github.com/pfsense/FreeBSD-ports/pull/89

                            that is all

                            1 Reply Last reply Reply Quote 0
                            • J
                              jpns
                              last edited by

                              Great to see this is getting some traction. I don't get all the hate towards LE. It seems even cPanel have implemented Letsencrypt into their AutoSSL feature.

                              I too am using a StartCom free DV cert to secure my pfsense webGUI, and a captive portal authentication page.

                              I intend to start using HAProxy soon to serve content from local webservers to the outside world directly from pfsense, rather than from a transparent Apache proxy inside the LAN. I'm already using Letsencrypt on this but I would much prefer to have this moved to the firewall.

                              I'll be watching this with great interest. Thanks for the great work guys.

                              1 Reply Last reply Reply Quote 0
                              • S
                                stpq
                                last edited by

                                Hi All
                                Initially thanks for the howto. I did use a different one, as it worked better for me.
                                I also managed to have it automated.

                                Im using acme.sh by Neilpang (i did install bash):
                                https://github.com/Neilpang/acme.sh

                                Im running the web if on different port, therefore i need the validation on that different port (666):
                                for issue:
                                /root/.acme.sh/acme.sh –issue -d domain.tld --standalone --tlsport 666 -w /usr/local/www/
                                for renew:
                                /root/.acme.sh/acme.sh --renew-all --standalone --tlsport 666 -w /usr/local/www/

                                after that i modified script from here, especially the parts with write rights, and hardlinks:
                                https://gist.github.com/mamedov/f3c63322dde1a73537b11c621a4fd02e

                                Now it should work automagically. (of course you still need to change webconfigurator to https)

                                its not really a comprehensive guide, but it has some inspiration, i hope.

                                1 Reply Last reply Reply Quote 0
                                • H
                                  heper
                                  last edited by

                                  @stpq:

                                  Hi All
                                  Initially thanks for the howto. I did use a different one, as it worked better for me.
                                  I also managed to have it automated.

                                  Im using acme.sh by Neilpang (i did install bash):
                                  https://github.com/Neilpang/acme.sh

                                  Im running the web if on different port, therefore i need the validation on that different port (666):
                                  for issue:
                                  /root/.acme.sh/acme.sh –issue -d domain.tld --standalone --tlsport 666 -w /usr/local/www/
                                  for renew:
                                  /root/.acme.sh/acme.sh --renew-all --standalone --tlsport 666 -w /usr/local/www/

                                  after that i modified script from here, especially the parts with write rights, and hardlinks:
                                  https://gist.github.com/mamedov/f3c63322dde1a73537b11c621a4fd02e

                                  Now it should work automagically. (of course you still need to change webconfigurator to https)

                                  its not really a comprehensive guide, but it has some inspiration, i hope.

                                  The PR above has been pulled in. 2.4 should have a working package

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    stpq
                                    last edited by

                                    @heper:

                                    @stpq:

                                    Hi All
                                    Initially thanks for the howto. I did use a different one, as it worked better for me.
                                    I also managed to have it automated.

                                    Im using acme.sh by Neilpang (i did install bash):
                                    https://github.com/Neilpang/acme.sh

                                    Im running the web if on different port, therefore i need the validation on that different port (666):
                                    for issue:
                                    /root/.acme.sh/acme.sh –issue -d domain.tld --standalone --tlsport 666 -w /usr/local/www/
                                    for renew:
                                    /root/.acme.sh/acme.sh --renew-all --standalone --tlsport 666 -w /usr/local/www/

                                    after that i modified script from here, especially the parts with write rights, and hardlinks:
                                    https://gist.github.com/mamedov/f3c63322dde1a73537b11c621a4fd02e

                                    Now it should work automagically. (of course you still need to change webconfigurator to https)

                                    its not really a comprehensive guide, but it has some inspiration, i hope.

                                    The PR above has been pulled it. 2.4 should have a working package

                                    Great news!
                                    https://redmine.pfsense.org/projects/pfsense/roadmap

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      Mats
                                      last edited by

                                      Any plans for Lets Encrypt support in a 2.3 release?
                                      Took a look at the 2.3 snapshot but couldn't find it

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        doktornotor Banned
                                        last edited by

                                        Already available in 2.3.3

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          And now on 2.3.2_1

                                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          1 Reply Last reply Reply Quote 0
                                          • mudmanc4M
                                            mudmanc4
                                            last edited by

                                            Maybe I'm clueless as far as how acme/letsencrypt can help me on a inward facing network. Where the GUI is strictly accessible over internal / VPN network to start with.

                                            So I allow an external influence to sort my internal certs, counter productive much?

                                            Don't get me wrong, EFF has this thing going on, and I use them and trust them, by all means.

                                            What am I missing here? I've got to be missing the larger picture, right?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.