Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Create CA cert for unraid

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CloudNode
      last edited by

      Hello; i am trying to create a cert for unraid ssl and was wondering if anyone has been able to do this?

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        In the pfSense cert manager? Export it from there and then import it into Unraid?

        That seems like a convoluted way to do it but it should work.

        Steve

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @stephenw10
          last edited by

          I use certs signed by a CA in pfsense cert manager for multiple devices on my network. Switches, Nas, unifi controller, printer, etc.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            I expect something like Unraid to have that built in, though I've never used it.

            If you want to use a shared CA though it seems reasonable to export certs from pfSense.

            Except the thread title is 'create CA cert'.....

            1 Reply Last reply Reply Quote 0
            • C
              CloudNode
              last edited by

              Seemed to have got this working; I had first created my own internal CA and then made a wildcard cert from there. This did not work so i ended up just using my wildcard cert from my haProxy setup.

              Not sure if this is the best way or if I still should have been able to use y own internal CA..

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @CloudNode
                last edited by johnpoz

                You should always be able to use cert from your own CA, as long as the devices/browser trusts this CA.

                As I stated I use multiple certs from CA created in pfsense cert manager on multiple devices.

                Without details of what you actually did or didn't do not sure why you were having issue. Did you install the CA as trusted in the browser you were using to access whatever you installed this cert on? I take it you used an acme cert that you had installed in haproxy?

                Advantage of using your own certs, is you can use rfc1918 in them as san, you can use whatever domain you want.. I use local.lan for example.. Verse some public domain.

                Advantage of acme certs is they are default trusted by browsers.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                C 1 Reply Last reply Reply Quote 0
                • C
                  CloudNode @johnpoz
                  last edited by

                  @johnpoz I had installed it for my one PC and it was working there but as soon as I went on the other PC, it was not secure. I was looking for a way where i would not need to install the cert on every PC that i use at home. So i went with haProxy via acme cert and this allowed me to go on any PC on my LAN without having to install the cert.

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @CloudNode
                    last edited by johnpoz

                    @iptvcld but now you have to update that cert every 90 days. And you can not use whatever you local domain is. Its normally not good practice to use public domain internally. It can make resolution difficulties.

                    But if your goal is to have this cert trusted by every browser out of the box, then yes you have to use a cert your browser would natively trust, like something from acme.

                    Internal services that use https are normally admin sort of web interface - these rarely need to be trusted by every browser out of the box. Since they are normally only accessed by "admins" ;)

                    Nobody is accessing my switches except me for example. no one is using the nas admin site, nor unifi controller other than myself. My internal CA is trusted by all browsers on all machines I might used to access these resources. Its a 1 time thing, that now all future certs I create would be automatically trusted by my browser..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    C 1 Reply Last reply Reply Quote 1
                    • C
                      CloudNode @johnpoz
                      last edited by CloudNode

                      @johnpoz My haprox cert is a wildcard cert *test.ca and in pfsense i created a Host Override as unraid.test.ca which points to the unraid server ip.

                      By doing this, unraid.test.ca is only available via LAN as it is not registered on my domain dns. Also for my acme i have it set to auto renew that cert before it expires.

                      Great suggestions, appreciate the tips :)

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.