Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Chrome and Safari not liking pfSense generated certificates (gives revoked error and non compliant)

    Scheduled Pinned Locked Moved General pfSense Questions
    8 Posts 5 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CubedRoot
      last edited by

      I have pfSense running with hostname of pfsense.homedomain.com (not the actual domain for security of course).

      I have created a CA using the certificate manager, and then exported the keys and have them trusted as a CA root on my OSX machine. Likewise, I have imported the CA into Firefox's chain as well.

      Then I created a new internal certificate, using pfsense.homedomain.com as my common name, and created a few SAN's using "pfsense" another SAN using the IP of the machine just to be sure. Once I had the cert created I configured the WebUI to use this new certificate.

      Now, here's where it gets stupid. Firefox will work 100% since I have the CA from pfsense imported into its chain. I also get a green lock and the entire chain looks great!

      Wrong. Chrome and Safari REFUSE to let me access the site. I have confirmed that the CA is in my OSX keychain as a trusted CA. but when I browse I get this error on Chrome:
      https://share.getcloudapp.com/NQuvL7rB

      Image 2019-11-27 at 10.16.14 PM.png

      Likewise, when I try to visit the page using Safari I get a different message about the certificate:
      Image 2019-11-27 at 10.19.14 PM.png

      I can't get this to work with Chrome or Safari, and the errors aren't leading me to anything concrete to fix. Can someone give me some suggestions?

      1 Reply Last reply Reply Quote 0
      • T
        tman222
        last edited by

        Hi @CubedRoot - are you running MacOS 10.15.x by chance? If so, you are probably running into this:

        https://support.apple.com/en-us/HT210176

        Hope this helps.

        1 Reply Last reply Reply Quote 1
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yes, try using a cert with less that 825 days lifetime. pfSense uses 3650 by default.

          Steve

          1 Reply Last reply Reply Quote 2
          • C
            CubedRoot
            last edited by

            Holy crap! The expiration date was the key! I bumped it down to 800 days and it worked perfectly.

            Thanks everyone! This one had me pulling my hair out trying to figure it out. I would have never figured it was the expiration date on the cert.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              Yeah that for sure could bite some people in the ass ;) Prob should change the default time and add a note in the cert manager..

              Since all my local certs where issued before the March 1, 2018 timeframe - they should still be good for the 10 years ;)

              But will have to double check them all ;)
              Tuesday, December 12, 2017
              Friday, December 10, 2027

              I might have redone some recently..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 1
              • C
                CubedRoot
                last edited by

                Thats not a bad idea @johnpoz . I haven't tried chrome on Windows, but with how strict Chrome is with SSL certs, I imagine they are heading to this direction (if not already there).

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Already done in 2.5: https://redmine.pfsense.org/issues/9825

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    On 2.4.4-p3 you can apply 71185882dc168e49347f0924f33a207aaf6e2db0 with the system patches package and then run pfSsh.php playback generateguicert and it will make you a new GUI cert with the new 825-day default.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 1
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.