Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ultimate Chrome and Firefox browsers do not authenticate

    Scheduled Pinned Locked Moved Captive Portal
    7 Posts 5 Posters 726 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jperezme
      last edited by

      I have my captive portal configured to authenticate through https with self-signed certificate and the authentication page modified by me. Since some versions of chrome and firefox are not able to show add the exception to the certificate and therefore the portal can not redirect to the authentication page. However, edge and IE can. Anyone know how I can solve it?
      Thanks.

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        Hi,

        Hunt down some "@johnpoz " posts** where he explains step by step how to create a root ( "CAs" ) certificate, an intermediate certificate (also on the CAs page) and finally a certificate derived from them on the Certificate page.

        Export de root and intermediate certificate.

        Import the root and intermediate into the Firefox certificate store.

        That should work - it did so up until now.

        If not :
        No more self signed certs for Firefox.
        or
        Use signed certs.

        ** he posted many posts about the subject.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • F
          free4 Rebel Alliance
          last edited by

          another possibility is to use a valid certificate for a subdomain that you own

          using ACME (let's encrypt) plugin on pfsense, you could get valid certificates

          1 Reply Last reply Reply Quote 1
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            Also watch out for OS-specific requirements. For example, recent versions of MacOS and IOS will not consider a new server certificate valid if it has a lifetime of greater than 825 days.

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @jimp
              last edited by

              @jimp said in Ultimate Chrome and Firefox browsers do not authenticate:

              greater than 825 days

              Thank to ... you ! this is a not an issue since more then 2 years ^^

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                https://support.apple.com/en-us/HT210176

                All TLS server certificates must comply with these new security requirements in iOS 13 and macOS 10.15:

                • TLS server certificates and issuing CAs using RSA keys must use key sizes greater than or equal to 2048 bits. Certificates using RSA key sizes smaller than 2048 bits are no longer trusted for TLS.
                • TLS server certificates and issuing CAs must use a hash algorithm from the SHA-2 family in the signature algorithm. SHA-1 signed certificates are no longer trusted for TLS.
                • TLS server certificates must present the DNS name of the server in the Subject Alternative Name extension of the certificate. DNS names in the CommonName of a certificate are no longer trusted.

                Additionally, all TLS server certificates issued after July 1, 2019 (as indicated in the NotBefore field of the certificate) must follow these guidelines:

                • TLS server certificates must contain an ExtendedKeyUsage (EKU) extension containing the id-kp-serverAuth OID.
                • TLS server certificates must have a validity period of 825 days or fewer (as expressed in the NotBefore and NotAfter fields of the certificate).

                All things you should be doing anyhow, but the CA/Cert defaults in the GUI cover all of them except the new lifetime limit.

                If you have certs made before July 1, 2019, then that lifetime limit doesn't apply (yet)

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Are the devices that are going to use this captive portal under your control where they can bet set to trust your CA? If not this is good use of ACME certs..

                  Your own CA only makes sense when you control the devices that will be accessing the sites using certs signed by your CA.

                  And yeah the mentioned new 825 day limit can bite you if your certs are newer..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.