Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    connection is not private when using Chrome

    Cache/Proxy
    squid squid-proxy
    3
    3
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      karimhaydar31
      last edited by

      Hi,
      i installed squid on pfsense and created certificates and imported it to firefox and every things works normally,

      but when i imported cert. to windows globally and tried to access pfsense from chrome i got the attached error (connection is not private) and if i click on advanced to proceed i got the error:

      (92) Protocol error (TLS code: X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN)
      pfsense-error-ssl.png pfsense-error-not-private.png

      your help is very appreciated

      Thanks

      M GertjanG 2 Replies Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @karimhaydar31
        last edited by

        @karimhaydar31
        pfsense web UI still has a self signed cert attached. Change it.

        b38e018b-9b66-4b6d-840e-d52bfed80a35-image.png

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @karimhaydar31
          last edited by

          @karimhaydar31 said in connection is not private when using Chrome:

          X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN

          The certificate is valid, but not co-signed by one of the major players, like Verisign etc. see here for a list.

          The thing is, your browser only accepts (and stays silent) certificates if they were co or toot signed by one of the authorities that are on 'the list' (in your device).
          You could actually empty this list, and your browser would not even trust https://www.micirostf.com any more.

          So, the easiest thing to do, is : export the certificate that is being used by the Webconfigurator, and import it into you browser / OS.
          Now, your browser / OS it trust it, and no more errors. That's all it takes !

          You could also get your hands on a certificate that is trusted out of the box.
          A trusted certificate is free.
          Example : if these are your general settings :

          5f251b0a-5c89-4ab6-aec6-556829c21c72-image.png

          and you actually own, or rent the some-domain.tld domain name, you could obtain certificate for *.some-domain.tld for free.
          The pfSense package "acme" is all about that functionality.
          Again : the certificate will be free, the domain name will cost some money.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.