Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port Forwarding not honered for .well-known/acme-challenge

    Scheduled Pinned Locked Moved General pfSense Questions
    25 Posts 6 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • kiokomanK
      kiokoman LAYER 8 @jgrabner
      last edited by

      @jgrabner
      all fine and good, but now that you know that nat reflection works for you, you should consider setting up a split DNS instead if you can

      https://docs.netgate.com/pfsense/en/latest/nat/reflection.html
      NAT reflection is a hack as it loops traffic through the firewall when it is not necessary

      A preferable alternative to NAT reflection is deploying a split DNS infrastructure

      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
      Please do not use chat/PM to ask for help
      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

      GertjanG V 2 Replies Last reply Reply Quote 0
      • GertjanG
        Gertjan @kiokoman
        last edited by Gertjan

        @kiokoman said in Port Forwarding not honered for .well-known/acme-challenge:

        https://docs.netgate.com/pfsense/en/latest/nat/reflection.html
        NAT reflection is a hack as it loops traffic through the firewall when it is not necessary

        I've an example that shows why NAT refection is 'strange' :

        @jgrabner

        You work for a company, the sales department. You just received a big order, and you want to contact the shipping department to check if they have enough stock.
        In your company, internal phone numbers 310 to 320 are the sales numbers, 350 to 360 are the phones of shipping department.
        Suzanne is holding the front desk, and she answers all the incoming calls from all the clients and everybody else out there, when calling your company.

        Let's say : 310->320 and 350->360 are your LANs.
        Suzanne is your pfSense.

        So, what do you do ?
        Do you really call 1-123-456-7890 ? (and thus you will have Suzanne answering, an you have to ask here to put shipping through ? )
        Or do you call 'shipping' directly by dialing for example 350 ?

        If you persist on doing the first option, Suzanne will have a talk with you, explaining you doing it wrong (again). That your methods are maybe not hacky, bit still wrong.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • V
          viragomann @kiokoman
          last edited by

          @kiokoman said in Port Forwarding not honered for .well-known/acme-challenge:

          you should consider setting up a split DNS instead if you can

          You can not. Since you're doing port translation, you need the NAT rule on pfSense.

          However , I'm wondering why your server use non-default ports fot HTTP/S.
          With default ports you could go with local host overrides and get rid of NAT reflection.

          J kiokomanK 2 Replies Last reply Reply Quote 0
          • J
            jgrabner @viragomann
            last edited by

            @viragomann

            Reason for non-standard ports on server:

            1. my webserver is a set of pods in kubernetes. I am using microk8s implementation. While it supports hostPort on ingres (le lets me use port 80 and 443), it is highly discouraged in documentation. Documentation recomends nodePort configuration (ie 30000-). The only reason i could figure is that using hostPort would limit kubernetes to one webserver and kubernetes is designed for scale.
            2. somewhere i read it was less secure to use 80, ie target of more hacking if someone got access to your lan. I suppose this only applies to lower skill hackers.
            1 Reply Last reply Reply Quote 0
            • kiokomanK
              kiokoman LAYER 8 @viragomann
              last edited by kiokoman

              @viragomann said in Port Forwarding not honered for .well-known/acme-challenge:

              @kiokoman said in Port Forwarding not honered for .well-known/acme-challenge:

              you should consider setting up a split DNS instead if you can

              You can not. Since you're doing port translation, you need the NAT rule on pfSense.

              However , I'm wondering why your server use non-default ports fot HTTP/S.
              With default ports you could go with local host overrides and get rid of NAT reflection.

              you can use haproxy in this scenario listening on wan and lan instead of opening ports/creating a nats for each pod in Kubernetes, well if you have a couple of pods it doesn't really matter but since I have 50 services running in test / 50 in staging / 50 in production on Kubernetes behind pfsense it would be unmanageable without haproxy for me

              ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
              Please do not use chat/PM to ask for help
              we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
              Don't forget to Upvote with the 👍 button for any post you find to be helpful.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.