Hello there, Use of certificates in PF.
PF Version prior 10: Captive portal = /usr/local/pf/conf/ssl/server.pem (Private Key + Cert + intermediate) Configuration: /usr/local/pf/conf/haproxy-portal.conf Web admin = /usr/local/pf/conf/ssl//server.crt (Certificate) /usr/local/pf/raddb/certs/server.key (Private key) /usr/local/pf/raddb/certs/intermediates.crt (Intermediates) Configuration: /usr/local/pf/conf/httpd.conf.d/ssl-certificates.conf RADIUS = /usr/local/pf/raddb/certs/server.crt (Certificate) /usr/local/pf/raddb/certs/server.key (Private key) /usr/local/pf/raddb/certs/ca.pem (Root CA for EAP TLS) Configuration: /usr/local/pf/conf/radiusd/eap.conf PF Version 10: Captive portal = /usr/local/pf/conf/ssl/server.pem (Private Key + Cert + intermediate) Configuration: /usr/local/pf/conf/haproxy-portal.conf Web admin = /usr/local/pf/conf/ssl/server.pem (Private Key + Cert + intermediate) Configuration: /usr/local/pf/conf/haproxy-admin.conf RADIUS = /usr/local/pf/raddb/certs/server.crt (Certificate) /usr/local/pf/raddb/certs/server.key (Private key) /usr/local/pf/raddb/certs/ca.pem (Root CA for EAP TLS) Configuration: /usr/local/pf/conf/radiusd/eap.conf Hope it shed some light. Thanks, Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Nov 12, 2020, at 10:55 PM, ypefti--- via PacketFence-users > <packetfence-users@lists.sourceforge.net> wrote: > > It is some sort of conspiracy. > No luck at all. Maybe someone will tell me what else to do to install an > external SSL certificate to PF. > The server.key is also there, in the same folder. Do I really need *.pem file > ? > I didn’t receive it from CA. Fine, I converted *.crt to *.pem, still doesn’t > fly. > Why am I getting this error on PF GUI ? > > A networking error occurred. Is the API service running? > > Eugene > > From: E.P. <ype...@gmail.com <mailto:ype...@gmail.com>> > Sent: Thursday, November 12, 2020 3:03 PM > To: 'Michael Brown' <michaelbrow...@yahoo.com > <mailto:michaelbrow...@yahoo.com>>; packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Subject: RE: [PacketFence-users] Wildcard SSL certificate installation on PF > > Thank you, Michael. > I did it almost the same way. > What I don’t understand is the logic of PF and Apache integration. > It appears that the original Apache config file, i.e. httpd.conf is useless > and not in use by PF > I will play and explore the SAN attribute in the certificate > > Eugene > > From: Michael Brown <michaelbrow...@yahoo.com > <mailto:michaelbrow...@yahoo.com>> > Sent: Thursday, November 12, 2020 1:47 PM > To: packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Cc: ype...@gmail.com <mailto:ype...@gmail.com> > Subject: Re: [PacketFence-users] Wildcard SSL certificate installation on PF > > I have a wildcard from Digicert and used this to get the cert: > Apache: CSR & SSL Installation (OpenSSL) > <https://www.digicert.com/kb/csr-ssl-installation/apache-openssl.htm> > > <image003.png> > > <image001.png> > Apache: CSR & SSL Installation (OpenSSL) > Apache: Generating your Apache CSR with OpenSSL and installing your SSL > certificate and Mod_SSL web server confi... > > > Also, when requesting the duplicate from Digicert it allows you to enter > additional SANs beyond the *.domain.com <http://domain.com/>. I put my > pf.domain.com <http://pf.domain.com/> as one of the SANs when requesting the > duplicate. I also used WinSCP to connect to my packetfence server to get the > csr and key files. I know that's not needed but just thought I would mention > it. > > > > > On Thursday, November 12, 2020, 04:29:50 PM EST, ypefti--- via > PacketFence-users <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>> wrote: > > > More digging, more tries, more frustrations 😉 > Further to my previous email. I replaced three files from SSL folder with > files that correspond to the new certificated, i.e. > /usr/local/pf/conf/ssl/server.key > /usr/local/pf/conf/ssl/server.crt > /usr/local/pf/conf/ssl/server.pem > > PF web interface said bye-bye to me. Why do I see this error in > /usr/local/pf/logs/httpd.webservices.error > > Nov 12 13:04:07 pf httpd_webservices_err: AH00558: httpd: Could not reliably > determine the server's fully qualified domain name, using > fe80::250:56ff:fe8a:e674. Set the 'ServerName' directive globally to suppress > this message > > What happened to Apache and PF ? > > And what drives me mad is the fact that if I put old certificate files back I > still can't login via PF GUI. > Having this error: > > A networking error occurred. Is the API service running? > > Eugene > > -----Original Message----- > From: ype...@gmail.com <mailto:ype...@gmail.com> <ype...@gmail.com > <mailto:ype...@gmail.com>> > Sent: Thursday, November 12, 2020 11:26 AM > To: packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Cc: 'mj' <li...@merit.unu.edu <mailto:li...@merit.unu.edu>> > Subject: RE: [PacketFence-users] Wildcard SSL certificate installation on PF > > Thank you, MJ, > It looks like questions asked here are replied selectively. > At least out of 4 questions that I asked only this one was finally "noticed" > after the resend 😉 > I wouldn't bother the list with my questions if the procedure is well > documented and works. > The existing documentation mentions only this: > > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > "Upon PacketFence installation, self-signed certificates will be created in > /usr/local/pf/conf/ssl (server.key and server.crt). Those certificates can be > replaced anytime by your 3rd-party or existing wild card certificate without > problems. Please note that the CN (Common Name) needs to be the same as the > one defined in the PacketFence configuration file (pf.conf)." > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > > This is very confusing. We all know that CN in the wildcard certificate looks > like this: > *.example.com <http://example.com/> > How would I make use of it with PF ? > > If you refer me to Let's Encrypt certificates should I understand that I need > to do it from www.sslforfree.com <http://www.sslforfree.com/> And what's the > correct procedure to install an SSL certificate to PF. Never saw it in the > documentation. > I need it for a captive portal. > > Eugene > > -----Original Message----- > From: mj via PacketFence-users <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>> > Sent: Wednesday, November 11, 2020 1:38 AM > To: packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Cc: mj <li...@merit.unu.edu <mailto:li...@merit.unu.edu>> > Subject: Re: [PacketFence-users] Wildcard SSL certificate installation on PF > > Hi Eugene, > > The list has always been alive, from where we are. :-) > > Anyway: I would encourage you to take a look a Let's Encrypt certificates > with packetfence. I think they are a bit more secure than a wildcard > certificate, plus they are free and work very well. > > (there are some threads on this mailinglist on that subject) > > Good luck, > MJ > > On 11/10/20 5:31 PM, E.P. via PacketFence-users wrote: > > Since this group suddenly became alive I dare asking my previous again > > 😉 > > > > How would I install a wildcard SSL certificate on PF, see more details > > below > > > > Eugene > > > > *From:* E.P. <ype...@gmail.com <mailto:ype...@gmail.com>> > > *Sent:* Saturday, October 31, 2020 2:43 PM > > *To:* packetfence-users@lists.sourceforge.net > > <mailto:packetfence-users@lists.sourceforge.net> > > *Subject:* Wildcard SSL certificate installation on PF > > > > Guys, > > > > I’m trying to overcome the issue with a self-signed SSL certificate > > that PF offers to WiFi authentication via captive portal. > > > > This a certificate that is in use by HTTPS sessions > > > > Certificate/Key match > > > > Chain is invalid > > > > common_name > > > > 127.0.0.1, emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca> > > <mailto:emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca>> > > > > issuer > > > > C=CA, ST=QC, L=Montreal, O=Inverse, CN=127.0.0.1, > > emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca> > > <mailto:emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca>> > > > > not_after > > > > Oct 7 15:29:09 2021 GMT > > > > not_before > > > > Oct 7 15:29:09 2020 GMT > > > > serial > > > > A500DC03671C0E35 > > > > subject > > > > C=CA, ST=QC, L=Montreal, O=Inverse, CN=127.0.0.1, > > emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca> > > <mailto:emailAddress=supp...@inverse.ca <mailto:supp...@inverse.ca>> > > > > Is there any way to import and install a company wild card SSL > > certificate into PF > > > > Eugene > > > > > > > > _______________________________________________ > > PacketFence-users mailing list > > PacketFence-users@lists.sourceforge.net > > <mailto:PacketFence-users@lists.sourceforge.net> > > https://lists.sourceforge.net/lists/listinfo/packetfence-users > > <https://lists.sourceforge.net/lists/listinfo/packetfence-users> > > > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://lists.sourceforge.net/lists/listinfo/packetfence-users> > > > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://lists.sourceforge.net/lists/listinfo/packetfence-users>_______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users