Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Renewed CA and Cert; now I can't log in from Safari 14.1.2

    Scheduled Pinned Locked Moved webGUI
    11 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jarhead @TheWaterbug
      last edited by

      @thewaterbug Did you export and install the CA?
      Most times people install the server cert, you need the CA

      T 1 Reply Last reply Reply Quote 0
      • T
        TheWaterbug @Jarhead
        last edited by

        @jarhead

        Yes, I downloaded and installed the CA, and I still have the same problem.

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @TheWaterbug
          last edited by johnpoz

          @thewaterbug said in Renewed CA and Cert; now I can't log in from Safari 14.1.2:

          I downloaded and installed the CA

          And what CA did you install - the self signed cert that pfsense generates as no CA to download and trust.

          Also that common name is not what would be generated by pfsense selfsigned cert, yours just says "common name" ??

          Here is example of self signed cert for the webgui that pfsense generates.

          cert.jpg

          If you want a cert that you can install the CA from so your browser trusts it, then create a CA in the cert manager, then create a cert using that CA, putting in the appropriate CN and SANs that you access your webgui with.. You can even add rfc1918 addresses, etc. Use that cert for your web gui.

          Now have your browser trust that CA.. And it will not warn you about the cert on the pfsense web gui.

          edit: example here is my CA, and the cert the web gui uses that was issued by that CA.

          ca-cert.jpg

          You wont be able to use a 10 year cert, because browsers no longer accept those, unless they were created before they put in those limits of like 398 or something days.

          edit2: I don't have a mac to play with for safari - but I do have it on my phones. Phones are a bit different, but you install the ca cert as a profile, then you go to your trust cert settings under general settings, and you can enable to trust that CA.. Then if you load load up safari it will trust the webgui cert signed by the CA you trust

          safari.jpg

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • T
            TheWaterbug
            last edited by

            Thanks! I had done most of the steps, but didn't know I had to change the cert that the webGUI was using in System: Advanced: Admin Access: SSL/TLS Certificate:

            5197e082-808c-4e1e-bd71-68429dabd9a1-image.png

            I selected the new cert, and now I can log in from Safari after accepting the warning once.

            Thanks again!

            johnpozJ T 2 Replies Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @TheWaterbug
              last edited by

              @thewaterbug said in Renewed CA and Cert; now I can't log in from Safari 14.1.2:

              Safari after accepting the warning once.

              there shouldn't be a warning at all if you trust the ca, using the correct cert and the fqdn san your using to access it matches

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              T 1 Reply Last reply Reply Quote 0
              • T
                TheWaterbug @TheWaterbug
                last edited by

                This post is deleted!
                1 Reply Last reply Reply Quote 0
                • T
                  TheWaterbug @johnpoz
                  last edited by

                  @johnpoz said in Renewed CA and Cert; now I can't log in from Safari 14.1.2:

                  there shouldn't be a warning at all if you trust the ca, using the correct cert and the fqdn san your using to access it matches

                  I'm afraid I don't grok what the Alternative Names entry/ies mean.

                  Do I enter the names/attributes of the pfsense box here? Or the attributes of the machines that will be browsing to the pfsense box?

                  If the latter, what should I enter if it's a mobile device that might be on any network, with any IP address, connecting through the VPN?

                  On a Mac laptop, the hostname changes all the time, as it gets an incrementing number appended to it randomly, e.g. Steven-Kans-MBP-2093.local.

                  bingo600B johnpozJ 2 Replies Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @TheWaterbug
                    last edited by bingo600

                    @thewaterbug said in Renewed CA and Cert; now I can't log in from Safari 14.1.2:

                    I'm afraid I don't grok what the Alternative Names entry/ies mean.

                    The SAN would be "Alternative names"/IP's the certificate should be valid for.
                    Since the certificate here "validates" the pfSense, it would be alternate names/ip's for accessing the pfSense.

                    In general (server use) you could make a cert , that would be valid for multiple fqdn names, and ie. install the same cert on several servers.

                    These are examples of SAN's

                    Company Web server
                    www.acme.com

                    Company Mail server
                    mail.acme.com

                    Company FTP server
                    ftp.acme.com

                    And the "full monty" ... Often discouraged by "Public ROOT CA's"
                    Everyting company related
                    *.acme.com

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @TheWaterbug
                      last edited by johnpoz

                      @thewaterbug as mentioned @bingo600 your SAN would the names or IPs you want to access the service using the cert on..

                      For example here is mine for my webgui cert.

                      san.jpg

                      Your CN should be what you commonly use, CN = Common Name, but you really should have at least SAN that matches your CN.. So for example my CN is the sg4860.local.lan, and also you see I have a SAN with the same fqdn.

                      edit: btw here is one of my older walk thru creating a CA and cert.

                      https://forum.netgate.com/topic/141033/tls-certificate-can-i-make-a-fake-ca/19?_=1665333214113

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      T 1 Reply Last reply Reply Quote 0
                      • T
                        TheWaterbug @johnpoz
                        last edited by

                        @johnpoz and @bingo600

                        Thank you! That did the trick.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.