Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox

    Scheduled Pinned Locked Moved webGUI
    23 Posts 9 Posters 27.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      So one thing that a corrupted cert cache doesn't explain is why did it work from your other site? Different profile being used for firefox? Does the other site do a ssl offload or mitm proxy?

      Did you cert cache become corrupted after you had tested from site 2, to pfsense1 and you didn't go back to test if still worked from site2?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • K
        kevindd992002
        last edited by

        No proxy on either site. In terms of webgui configuration, both sites have the same exact settings. Same profile being used with Firefox and I'm also using v69.0. I've tested this with two clients with the same exact result where as long as they are on site1's network it present this error.

        Details of certs as requested:

        c328978c-2403-49ab-b484-06a5b1cd41cb-image.png

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Those are certs on pfsense.. If it was actually in use it would show it. See the in use "webconfigurator" yoru other freerad cert has ZERO to do with you accessing the webgui.

          I don't see a san setting on that cert.. And prob not since its from 2016.. Create a new cert...

          see how mine has SAN:
          san.png

          I can tell you for sure that any modern browser is prob going to balk at no san entry.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            We have seen some recent browser updates fail when a non-server cert is used for the GUI. Some non-SAN certs started failing years ago.

            You can make a fresh GUI cert from the console with current best defaults with pfSsh.php playback generateguicert

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            K 1 Reply Last reply Reply Quote 1
            • K
              kevindd992002
              last edited by

              Ok, I'll try that route. How can you explain pfsense2's webgui working with no issues though? Here's the cert details:

              c8ed74e2-1d2b-4142-90b8-d22fce7a6fae-image.png

              There's also no SAN for the webConfigurator cert. And yes, I know that the FreeRADIUS server cert has nothing to do with my issue but I just included it in the screenshot anyway.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                No clue - but what I can tell you happens alot is users say they do X, when they actually do Y... For all we know your hitting the other pfsense via http vs https. Or something silly like that.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                K 1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  The Key Usage browser error is almost certainly not SAN-related, but the GUI cert not having the bit set to act as a TLS Web Server (or the browser not seeing it for some reason).

                  Either way, generating a new proper cert should work around it.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • K
                    kevindd992002 @johnpoz
                    last edited by

                    @johnpoz said in SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox:

                    No clue - but what I can tell you happens alot is users say they do X, when they actually do Y... For all we know your hitting the other pfsense via http vs https. Or something silly like that.

                    I totally get that. And this is why I'm providing all screenshots that you need to prove what I'm claiming is true. I'm trying to be as troubleshooting-minded as possible here. And no, I'm accessing both through https. There'a nothing silly going on here because this is not really my first time handling pfsense but this issue isn't really familiar.

                    Anyway, I'll juet recreate the cert and be done with it.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      The main reason that's the first step is because that's all we can really do. If the browser doesn't like an old certificate, but it does like a new one, then all you can do is generate a new one. We can't retroactively fix old certs, but when we find out about new/better defaults, we can fix the default cert code to comply for new certs.

                      The only actionable thing for us would be if a new GUI cert also failed.

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        That cert is prob from like 2.2.6 of pfsense or even before, since that is the lastest version of pfsense that was released that could of created that cert. Mar 8, 2016

                        JimP would know how many changes have happened with cert creation since that version and now ;)

                        Which one of those works and the other doesn't one was in Mar and the other in MAY, so you could have actually quite a bit of difference in pfsense versions that could of created those certs.

                        2.2.6 latest that could of created the mar one, but 2.3.1 could of been used to create the may one.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • K
                          kevindd992002 @jimp
                          last edited by

                          @jimp said in SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox:

                          We have seen some recent browser updates fail when a non-server cert is used for the GUI. Some non-SAN certs started failing years ago.

                          You can make a fresh GUI cert from the console with current best defaults with pfSsh.php playback generateguicert

                          Ok, this fixed the issue! Thanks for the help.

                          59245887-d428-4b43-8fb4-f0f82473ebdd-image.png

                          1 Reply Last reply Reply Quote 0
                          • J
                            Jacques
                            last edited by Jacques

                            I am using windows + firefox and also Avast . pfsense is in a VM.
                            I got the same error SEC_ERROR_INADEQUATE_KEY_USAGE
                            Looking at certificats in firefox in Servers tab I found pfsense...
                            This entry should be deleted
                            It was "generated by avast! antivirus for self-signed certificates"

                            1 Reply Last reply Reply Quote 0
                            • M
                              Mohanad
                              last edited by

                              Hi all
                              i have same problem .. but in a different way
                              i have a problem with the ISP and get together and fix it
                              then i restore the last configuration file .. suddenly i can not access the pfsense gui throw https and the openVPN also
                              I try to access from a different PC and it works fine ..
                              Now i can not access to internally or externally .
                              also i am not a high tech person .. i am just a network engineer and a little bit of security .. so i dont know any thing about SSL , certificates
                              SBC.png

                              1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan
                                last edited by

                                Hi,

                                Click on

                                843d4fdc-7408-4ee2-9cf1-fa255668c248-image.png

                                and you see what cert is used by pfSense, what SAN, if the dates are ok, etc.

                                This :

                                @jimp said in SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox:

                                You can make a fresh GUI cert from the console with current best defaults with pfSsh.php playback generateguicert

                                will generate a new cert.
                                Firefox won't trust it at first, but you can overreirde this. because you know that "https://192.168.1" or "https://my-pfsense.my-network.tld" IS your pfSese and not some hacked site.

                                You can also use the console access to reset GUI access, so that http://192.168.1.1 is useable, so you can inspect with the GUI what the issue is.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  Mohanad @Gertjan
                                  last edited by Mohanad

                                  @Gertjan said in SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox:

                                  Hi,

                                  Click on

                                  843d4fdc-7408-4ee2-9cf1-fa255668c248-image.png

                                  and you see what cert is used by pfSense, what SAN, if the dates are ok, etc.

                                  The Time is set good .. no problem with it

                                  This :

                                  @jimp said in SEC_ERROR_INADEQUATE_KEY_USAGE when accessing the webGUI from Firefox:

                                  You can make a fresh GUI cert from the console with current best defaults with pfSsh.php playback generateguicert

                                  This the point .. How i can generate a new cert and from where
                                  Please can you help me

                                  will generate a new cert.
                                  Firefox won't trust it at first, but you can overreirde this. because you know that "https://192.168.1" or "https://my-pfsense.my-network.tld" IS your pfSese and not some hacked site.

                                  You can also use the console access to reset GUI access, so that http://192.168.1.1 is useable, so you can inspect with the GUI what the issue is.

                                  I did this when i could not access since first time .. and it works with http

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.