• No connection after certificate renewal

    OpenVPN certificate openvpn tls error
    1
    0 Votes
    1 Posts
    210 Views
    No one has replied
  • ACME with a private CA (step-ca)

    ACME acme certificate configuration
    7
    0 Votes
    7 Posts
    2k Views
    johnpozJ
    @seism0saurus said in ACME with a private CA (step-ca): Certificate Revocation Lists are basically broken. Which has really ZERO to do with the cert you have on your local printer or switch, or some software your running gui like the unifi controller or your nas.. [image: 1728396033940-nas.jpg] What is the scenario where I would need to revoke this cert? It is accessed by me, on my local network. To be honest I could just use http for this but the browser complains.
  • 0 Votes
    4 Posts
    1k Views
    GertjanG
    @jcubillo Oh ... great. I guess they want to stop being the registrar for 'everybody'.
  • Unable to generate ACME Certificate

    ACME acme certificate
    3
    1 Votes
    3 Posts
    695 Views
    J
    @johnpoz said in Unable to generate ACME Certificate: re you trying to write this dns entry, lost-sierra.blog isn't a valid domain on the public internet.. I show nxdomain for that domain, Thanks John. I had a lame typo in my dns entry. Should not have included the '-' between lost and sierra. Looks like I'm all set now. You get a gold star! Jeff
  • 0 Votes
    21 Posts
    3k Views
    R
    @Gertjan said in WAN requiring root CA to be installed for internet access: Ok to keep old software. But mixing new stuff (pfSense 2.7.2 uses FreeBSD 14) on old stuff, is like installing windows 11 on a PC without a TPM : you can (probably) force it, but it needs uncommon knowledge to do so. I know, but the iron does not support 6.0 and later. @bmeeks said in WAN requiring root CA to be installed for internet access: @reqman said in WAN requiring root CA to be installed for internet access: Unfortunately, a bit later the VM shutted down by itself. Tried the exact same procedure, but no go. The problem is likely the vmxnet3 driver. Change your virtual machine to use the e1000 NIC driver and try again. You will take a performance hit using the e1000 virtual driver, but that should let the newer pfSense boot and run. Very useful info, thanks. Will give it a try, when I find some time to reschedule this experiment.
  • 0 Votes
    12 Posts
    1k Views
    johnpozJ
    @swami_ you can setup haproxy to use your wan or you lan interface. Comes down to where the traffic is going to hit. Even if you ha proxy listens on you wan IP, unless you open a firewall rule on the wan that would not be available to internet IPs. But your wan IP is still going to be able to be hit via your lan devices. Comes down to where you want to point the fqdn you want to use to point to - if all your going to want it for is lan, then just use your lan IP and point all your fqdn you want to use to your pfsense lan IP.
  • 0 Votes
    2 Posts
    976 Views
    J
    @coyotekg The client certs use the CA as the issuer just like the server certs do so yes, you would need to change them.
  • 0 Votes
    3 Posts
    2k Views
    blasterspikeB
    Still following the thread I mentioned above, I saw that the eval previously was right before RESULT=. I have tried to comment the if statement block and move eval, so this way # eval serial="\$tls_serial_${check_depth}" # if [ -n "$serial" ]; then eval serial="\$tls_serial_${check_depth}" RESULT=$(/usr/local/bin/php-cgi -q /etc/inc/openvpn.tls-verify.php "servercn=$2&depth=$3&certdepth=$4&certsubject=$5&serial=$serial&co nfig=$config") if [ "${RESULT}" = "FAILED" ]; then exit 1 fi # fi and I don't get anymore the error on the certificate! I don't know if I need to open an issue about this. However, now I get the error about the user authentication SENT CONTROL [spike]: 'AUTH_FAILED' (status=1) like I was getting when I set "Certificate Depth = Do Not Check". I looks like I'm not the only one having this issue.
  • TLS Error : something wrong with Certificates ?

    OpenVPN tls certificate open vpn
    13
    0 Votes
    13 Posts
    2k Views
    DaddyGoD
    @Bekoj said in TLS Error : something wrong with Certificates ?: installed pfsense brand new in 2.4.5 version installed pfsense brand new in 2.4.5 version hmmm, next time I'll ask first... @Gertjan "Oooohhhh. And you're telling that now ?" Yes, we went around a bit, the point is, it's okay
  • 0 Votes
    39 Posts
    7k Views
    DaddyGoD
    @rafamello Como pensávamos, o problema é com *.GOV + cert.
  • 0 Votes
    3 Posts
    1k Views
    G
    OK, I see the logic. Thanks.
  • 0 Votes
    5 Posts
    2k Views
    V
    @viktor_g I will update it as soon as possible.
  • 0 Votes
    26 Posts
    7k Views
    D
    After playing around for a little while I made an interesting discovery that I have not been able to find an explanation to... FreeRadius EAP Settings has a check box "Check Client Certificate CN" ("When enabled, the Common Name of the client certificate must match the username set in 'FreeRADIUS > Users'"). When using a certificate to authenticate, it seems to me that the certificate CN would NOT be checked against the Users database. Regardless of the users I have added, I always get error messages like below when I have that check box checked: Nov 30 17:33:15 radiusd 1388 tls: Certificate CN (K14) does not match specified value (host/K14)! Nov 30 17:33:15 radiusd 1388 tls: TLS_accept: Error in error Nov 30 17:33:15 radiusd 1388 (4) Login incorrect (Failed retrieving values required to evaluate condition): [host/K14/<via Auth-Type = eap>] (from client SW21 port 2 cli xx-xx-xx-xx-xx-xx) host/K14 - So far I have not been able to figure how to effectively enable the client cert. CN check. I wonder if this is also some stupid beginner's mistake, or is this something else? And where does this "host/" prefix come from? At least it seems to be independent of the 802.1X authentication mode in the client (User vs. computer authentication)... When the check box is not checked, authentication with the certificate succeeds without any problems. FWIW, Radius debug log reveals: (2) files: users: Matched entry host/K14 at line 2 (2) [files] = ok ...so it seems that it indeed performs the check against user database where I have an entry "host/K14".
  • 0 Votes
    2 Posts
    637 Views
    JeGrJ
    Do it even easier: Run acme package on FW1 (I assume it's a CARP cluster with syncing?) and let it create a certificate for both names (fw1.xxx AND fw2.xxx). When it's done, select the cert for the webui. Then login to FW2 and select it, too, as certificates get synchronized automatically (if selected) to the secondary. There choose the same certificate as WebUI cert and be done :) Just check that you configure the acme service on fw1 to restart its own webserver after renewal AND via remote the service on fw2 (see the help for this)! Greets
  • Установка сертификата

    Russian certificate windows
    5
    1 Votes
    5 Posts
    3k Views
    D
    @jmurr Человек явно написал свою специфику работы: чтобы браузер не ругался...
  • Publish a CRL

    General pfSense Questions certificate
    6
    0 Votes
    6 Posts
    1k Views
    C
    I want to setup multiple OpenVPN servers using a common CA, with the ability to revoke users from a central location.
  • OpenVPN CRL Verification Fails

    OpenVPN openvpn openvpn problem certificate crl
    2
    0 Votes
    2 Posts
    2k Views
    L
    It is likely that your VPN interface isn't enabled in pfSense. Open Interfaces and select the VPN interface that you added to System > Routing > Gateways and click the Enable box. Click Save. Navigate to Status > OpenVPN and restart the service. It should show a green check mark and show local, virtual, and remote host addresses.
  • 0 Votes
    2 Posts
    1k Views
    A
    Would anyone have an idea as to what is going on? I'm kind of stumped at this point.
  • 0 Votes
    2 Posts
    937 Views
    johnpozJ
    You would have to edit php file used when creating cert.. https://github.com/pfsense/pfsense/blob/master/src/usr/local/www/system_certmanager.php if ($act == "new") { $pconfig['method'] = $_POST['method']; $pconfig['keylen'] = "2048"; $pconfig['digest_alg'] = "sha256"; $pconfig['csr_keylen'] = "2048"; $pconfig['csr_digest_alg'] = "sha256"; $pconfig['csrsign_digest_alg'] = "sha256"; $pconfig['type'] = "user"; $pconfig['lifetime'] = "3650"; } Keep in mind that would be reverted every time you updated pfsense and that file gets redone, etc.
  • 0 Votes
    2 Posts
    1k Views
    johnpozJ
    Where are you getting your cert from? Your going to have to give us more details if you want anyone to be able to figure out what your doing wrong. For what possible reason would you want to use a wildcard cert for the webgui? How many possible fqdn/IPs could you point to the web gui? The web gui should be accessed by limited number of users. Create as cert with your own ca, have the users that will access it trust your ca. Put in whatever SANs you want to access it by. Done - set the cert to be good for 10 years. Never have to deal with this issue again.