Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal certificate issues

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 3 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rm
      last edited by

      Hi, I have some guest end users that have very restrictive laptops. We are using a captive portal with an external SSL certificate but the certificate is being flagged since the endpoints cannot reach the external CAs to verify. These devices are configured to not allow the users to proceed with a bad cert and the warning page.

      I'm wondering if I can allow internet access to just allow the certificate verification traffic to the CAs? Would these just be firewall rules to circumvent the Captured portal? Is there an alternative setting?

      There is no ability to reconfigure these endpoints and want SSL to protect the credentials . Not able to pre-coordinate a per-device passthrough.

      Any ideas? Thanks!

      DerelictD GertjanG 2 Replies Last reply Reply Quote 0
      • R
        rm
        last edited by

        I just foound the "allowed hostname" area. Possible solution? Work with wildcards?

        1 Reply Last reply Reply Quote 0
        • R
          rm
          last edited by

          went through the cert chain and added any domain urls I could find. We'll see if it helps.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate @rm
            last edited by

            @rm If they are requiring OCSP then you have to be sure all of the addresses necessary to perform that are reachable pre-auth. Your certificate should contain everything you need to find the hostnames/addresses.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            R 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @rm
              last edited by Gertjan

              @rm said in Captive Portal certificate issues:

              These devices are configured to not allow the users to proceed with a bad cert and the warning page.

              That's the default browser behaviour these days.

              @rm said in Captive Portal certificate issues:

              We are using a captive portal with an external SSL certificate

              What is an "external certificate" ?

              @rm said in Captive Portal certificate issues:

              but the certificate is being flagged since the endpoints cannot reach the external CAs to verify.

              If you use a certificate with the OSCP option set, then the browser could take the decision that it should do the steps for validating - this means : it will contact the OSCP servers.

              This means you've created a "chicken and egg" problem.

              1. The user needs an Internet access and is behind a captive portal.
              2. The user (device) visits the portal, it has a certifciate.
              3. The browser is told by the certificate to do OSCP. That's Ok => jump to 1)

              Solution : use a cert without the OSCP flag.

              edit :
              After all, the certificate just facilitates the access to the login page. All browser want a valid 'https' these day, "http" is close to 'dead' now.
              That's not a very important web page with private info etc. It's just a captive portal login page, no big deal.

              Read What is OCSP Stapling? and you'll ask "what are the host names I have to add to the list" ?
              You could get this info from the entitu that crated the cert you use.
              And now, be carefull : this will not be a host name that points to an IPn, but many IP's.
              Your captive portal firewall doesn't work with hos names, it converts them first an "IP". Chances are that the wrong (not all of them) IP's will get approved.
              So again, security is fine, but a captive portal isn't like your not a 'bank' access. No OSCP needed for a portal.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              R 2 Replies Last reply Reply Quote 0
              • R
                rm @Derelict
                last edited by

                @derelict Is the proper spot to do this in allowed host names? I went through the cert authority chain and entered all the hostnames I could find.

                2bd46014-ead2-4c8d-9c82-60b714fc3479-image.png

                DerelictD 1 Reply Last reply Reply Quote 0
                • R
                  rm @Gertjan
                  last edited by

                  @gertjan Thanks for the reply, External as in 3rd party, public cert authority. Endpoints have strict security that we do not control. We can't change their behavior or install certs on them.
                  I added hostnames I could find in the cert chain but not sure if it works. I tried adding a test hostname but could not navigate to it. Is there a PFsense firewall change needed?

                  This problem has probably been around for awhile but now these endpoints are configured to not allow the browser to proceed with an unverified certificate. We cannot make any browser entries such as trusted sites and "thisissafe" is not working either.

                  1 Reply Last reply Reply Quote 0
                  • R
                    rm @Gertjan
                    last edited by

                    @gertjan Asking provider about OCSP flags. I don't have one of these endpoints available to test but thought they would need a CA to validate, always thought it was a browser/OS driven setting and not a certificate one. I'll see what they come back with.

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate @rm
                      last edited by

                      @rm it depends on whether that is good enough to add all the IP addresses necessary. Experimentation will be necessary.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @rm
                        last edited by

                        @rm said in Captive Portal certificate issues:

                        always thought it was a browser/OS driven setting and not a certificate one

                        Welcome to the club ;)

                        Read "What is OCSP Stapling? " and you start to understand what it actually is/does.
                        Or pick one the very first OSCP hit from Youtube and you know 'enough'.

                        OSCP is fine for a classic web servers, like this one, my "test domain" that I use to fool around with.
                        Not for a "captive portal https web server front end page". See this as an exception to the rule.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        DerelictD 1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate @Gertjan
                          last edited by

                          If the OCSP URL/location was not taken from one of the signed attributes in the certificate it would be worthless.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rm @Derelict
                            last edited by

                            @derelict I might be out of luck. "I'd like to mention that according to their team, the certificate can not be issued without OCSP."
                            The allowed hostnames area doesn't seem to work as I had hoped. Assumed these were hostnames (URLs) that would not be redirected to the captured portal. Seems like they still do. Any additional settings required?

                            R GertjanG 2 Replies Last reply Reply Quote 0
                            • R
                              rm @rm
                              last edited by

                              @rm I may have had a break through. MY test site seems accessible so hopefully the CA hosts above will be reachable on these endpoints. Will have to wait and see when one arives.

                              1 Reply Last reply Reply Quote 0
                              • GertjanG
                                Gertjan @rm
                                last edited by Gertjan

                                @rm said in Captive Portal certificate issues:

                                I might be out of luck.

                                You have a certificate, so you have( you rent ) a domain name.
                                Depending on the registrat you have, you can use the acme.sh pfSense package to obtain a domain name for your portal https access : no more need for Comodo, no more need to install the cert each year.

                                Let's say you domain name is "my-network.tld".
                                use acme to ask for a certificate with these two SANs :
                                pfsense.my-network.tld
                                portal.my-network.tld

                                Now you can use this cert for the GUI access, and the captive portal access.
                                I presume you access your captive portal from 192.168.2.0/24 and this interface will got grant access to the pfSEnse GUI. A captive portal 'should' be using its won interface, and this should not be LAN ( It is possible, true )
                                The standard LAN 192.168.1.0/24 has access to the pfSEnse GUI.

                                Un check OCSP stapling ( before you request a cart ) and issue solved.

                                @rm said in Captive Portal certificate issues:

                                MY test site seems accessible so hopefully the CA hosts above will be reachable

                                Be careful. OSCP requests from a browser are cached by the browser. So when it seems to work, the info used was available locally. When the cache times out, the request is made again.

                                No "help me" PM's please. Use the forum, the community will thank you.
                                Edit : and where are the logs ??

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.