Replacing a self-signed certificate on pfSense with a trusted SSL/TLS certificate from a CA is relatively easy and improves security
@unixfly Жыл бұрын
How about a valid signed certs for squid proxy?
@AlexDiamantopulo6 ай бұрын
@@unixfly use ACME package
@garethcamp3048 Жыл бұрын
One of the clearest and most to the point videos I have ever seen on youtube, many thanks.
@TechTutorialsDavidMcKone Жыл бұрын
Good to know the video was useful
@Zambiziify Жыл бұрын
Yes, I totally agree.. very clear and concise, the very opposite of me =)
@brittanysikora87279 ай бұрын
Worked like a charm, thank you so much!!
@TechTutorialsDavidMcKone9 ай бұрын
Good to know the video was helpful Thanks for the feedback
@alejom200 Жыл бұрын
good video but how I dont see when the crt file is created.
@TechTutorialsDavidMcKone Жыл бұрын
I didn't cover that because there are so many ways to create one Some will use the CA on their NAS, maybe a Public CA, the CA with pfSense itself and so on In the case of internal CAs it would also require covering the topic of how to get browsers to trust the CA, etc I came to the conclusion that it wouldn't be practical to repeat this again and again in every video I create for different services I'd be repeating the same thing in every video and it just results in longer videos with content folks have already seen So I have one broad video covering OpenSSL for instance which shows how to setup the CA, server certificates, etc. kzbin.info/www/bejne/pIC2nWeaot6qm5o That way, if someone wants to use their NAS instead, they don't need to skip over that in this video
@JPEaglesandKatz2 жыл бұрын
Nice video although I think you may have skipped a step telling us where to actually send the exported signing request. I have no idea where to send this file but it is still early day so maybe I've missed something.. Otherwise yet another great video.. Appreciate the clear, calm and skillful explanation :)
@TechTutorialsDavidMcKone2 жыл бұрын
Thanks for the feedback, it's really appreciated The file needs to be sent to a certificate authority (CA) your web browser trusts, who will then send back a signed certificate There are too many options when it comes to CAs and everyone will have their own preference, so that's why I only said send it to a CA but didn't provide any details E.g. you can create your own CA on a NAS, on a Linux server using OpenSSL, even on pfSense itself I don't use a public CA myself as it's not a recommended practice, but each to their own Because I did an earlier video on how to create a CA using OpenSSL though, there's a section at the end on how you can use that to get a signed certificate for pfSense
@ierosgr2 жыл бұрын
@@TechTutorialsDavidMcKone I am trying to understand the general idea of this method. After the certificate request is send, was sent where? Isn t somewhere needed an option to set where this ssl/tlc certificate exists? Else how is it going to know the destination of that request? (you kind anwered still how do I know what the browser trusts or not? and where is that option to change the ca inside the pfsense at least before exporting the file) Do you trick the browser in order to copy paste the pending certificate for approval and you use it in the certificate you exported?
@TechTutorialsDavidMcKone2 жыл бұрын
The idea is that you create a certificate request (CSR) and send that to a certificate authority (CA) How you send that depends on the CA, but it could involve uploading the CSR file we exported to a website for instance The CA will carry out background checks and if everything is OK, they'll create a signed certificate that was created by one of their root or intermediary CA servers How you get that certificate again depends on the CA, but you might download it from their website Once you have this certificate you update pfSense in this case by copying and pasting it in and this completes the certificate request process The end result is pfSense now has a signed certificate stored on it's hard drive But we have to re-configure pfSense so that it presents the signed certificate to web browsers going forward By default, web browsers come supplied with what are called root certificates from various publicly trusted CA servers If a web server presents a certificate signed by one of them, there's nothing else to do on a web browser because they trust the root certificate and any certificate signed by the server it came from But that's not a recommended practice for internal servers It's better to have your own root/intermediary CA server and sign these yourself because you don't want to make internal computer information publicly available There are different ways to do this although I've covered OpenSSL for instance in a separate video For that, I copied the exported file to my root CA using SFTP, created a certificate, then copied that to the PC so I could add it to pfSense Now a web browser won't trust a certificate from an internal CA by default and so you have to add the root certificate from your own CA server to your web browser, which I also covered in the other video After that it will trust any certificate signed by your root server
@satstube2 жыл бұрын
@@TechTutorialsDavidMcKone So basically if I want to use my own domain managed by cloudflare and it's 15yr signed certificates All i need t do then is go to the Manage Certificates section in pfsense 1. Add/import (basically copy) over the CERTIFICATE BEGIN AND KEY into the certificates section 2. Follow the reset to the video Optionally add the root cloudflare CA pem file they let you download Or do we need to create CSR for any external cloudflare Certificates for instance? TIA
@jimmatrix7244 Жыл бұрын
Where did you get pfsensemgt.crt file from? I am getting public key mismatch error. Any idea how to fix that?
@TechTutorialsDavidMcKone Жыл бұрын
The pfsensemgmt.crt file is a SSL/TLS certificate file that I created using OpenSSL for pfSense But first you need to create a certificate request in pfsense You then get a certificate authority to sign that and give you an actual certificate to use But I did that myself using OpenSSL Back in pfSense paste the contents of that crt file into the Final certificate data field That gives you a certificate to use in pfSense Make sure the Alternate Hostname in the Admin Access page is correct and matches what the certificate supports and what you point your browser to e.g. fw.templab.lan in my case Then select the new certificate from the drop down menu SSL/TLS Certificate to tell pfSense to use it
@jimmatrix7244 Жыл бұрын
@@TechTutorialsDavidMcKone Thank you for the reply. I am still blur with your explanation. Anyway, I figured it out and pfsense itself has an option to "sign a certificate request ". I used that and it works. Thank you again for your prompt reply.
@tanayongkongyai18042 жыл бұрын
Hi, How did you get the file in the 8.11 minute?
@TechTutorialsDavidMcKone2 жыл бұрын
I copied the request to my Root CA Then used OpenSSL to create a signed certificate my browser would trust I then copied that to my computer
@_rrrrr67982 жыл бұрын
hello how did you get the common name or the domain name for your firewall? do you have a seperate video for it? that is all thank you!
@TechTutorialsDavidMcKone2 жыл бұрын
I made it up as it's an internal domain Only public facing servers need to use public domain names And using different domain names makes it easy to know if you're connecting to an an internal computer or an external one
@_rrrrr67982 жыл бұрын
@@TechTutorialsDavidMcKone did you do something in the dns resolver? Like override host or domain overrides to direct any search queries to your domain name(firewall)?
@TechTutorialsDavidMcKone2 жыл бұрын
@@_rrrrr6798 I built an internal DNS server which resolves that common name to the static IP address the firewall uses
@_rrrrr67982 жыл бұрын
@@TechTutorialsDavidMcKone oh okay thank you!
@MatthewDudek Жыл бұрын
But you don't cover how to get an internal, non-public URL signed by a trusted, public CA such that the browsers can actually trust it...
@TechTutorialsDavidMcKone Жыл бұрын
Using a Public CA for internal servers doesn't fit security guidance They have to do some form of checking and even a DNS check will expos internal information to the wider public making reconnaissance easier Security is all about layers, so for Internal servers it's better to use an internal CA pfSense can act as a CA itself although I covered how to create your own CA using OpenSSL in a separate video While none of that is covered in this video, I wanted to avoid duplicating the same information in multiple videos which saves time for everyone
@orcrist484Ай бұрын
@@TechTutorialsDavidMcKone This may seem 'trivial' but it is clearly the most difficult part of the process. If you have another video on this you should reference that.
@TechTutorialsDavidMcKoneАй бұрын
@@orcrist484 Like I said, there are too many ways to do this Some folks may use a CA on a NAS for instance and I won't know how that works If it helps, I used OpenSSL, and a card linking to it should have popped up when I mentioned it in the video But if you're interested in setting it up I have another video here kzbin.info/www/bejne/pIC2nWeaot6qm5o
@dksn1p3r2 жыл бұрын
I'd suggest listing at least one free CA that would take cert requests in the video.
@TechTutorialsDavidMcKone2 жыл бұрын
Thanks for the feedback I did mention OpenSSL in the video which is a free option. It's covered at the end And I have another video showing how to install that if that's what you're interested in pfSense also has it's own CA so you could use that but I don't as I prefer to keep a firewall just doing firewall services so it's less likely to be vulnerable
@achillescasas40182 жыл бұрын
tried this one, how long does it take the request to be approved ?
@TechTutorialsDavidMcKone2 жыл бұрын
It really depends on the certificate authority
@achillescasas40182 жыл бұрын
@@TechTutorialsDavidMcKone thank you for the response, hopefully they'll approve it asap :)
@VBFilms2 жыл бұрын
Why did you just skip that one part at 7:35?
@TechTutorialsDavidMcKone2 жыл бұрын
Because there are lots of different ways to get a certificate request signed and it depends on what the firewall is being used for The video is more about how to create the signing request and how to then install the signed certificate However, at the end I do offer a way to do this using OpenSSL for anyone who will be using that method
@VBFilms2 жыл бұрын
@@TechTutorialsDavidMcKone Okay thanks!
@user-zr7kz4vs7c Жыл бұрын
why not use letsencrypt cert ?
@TechTutorialsDavidMcKone Жыл бұрын
Let's Encrypt like other Public CAs provide certificates for Public facing devices i.e. ones that are meant to be accessed over the Internet Part of the CA's job involves validating the request e.g. Microsoft don't want somebody else setting up a server and pretending that it belongs to microsoft.com So to use a Public CA you have to expose information about your network/device as part of that validation, even when it's automated, to prove your request is legitimate And once you do, it's then in the Public domain Now that's fine for a Public facing server as that information is already Public knowledge But it's a terrible idea for devices on an internal network I've worked in IT for a long long time and you sometimes have to jump through hoops to exchange IT information like this, even if they're trusted 3rd parties Because the last thing anybody wants is to make a hacker's life easier by making that information Public So unless the device is meant to be exposed to the Internet, you should run your own internal CA for TLS certificates Then you set up your devices to trust it and you issue your own internal certificates to your internal servers
@kinbech.526 ай бұрын
My Linux brainrot is too strong . . . I immediately identified the Pop_OS! system(s) just by the font.
@TechTutorialsDavidMcKone6 ай бұрын
Now that says something I've got used to the annoying update reminder, but didn't notice the font