Jump to content

Certificate CA help

Sir Asvald

Hello Guys. I'm currently using my Pfsense box as my CA for my domain. I want it to able to install all the certificates automatically when anyone connects through Wi-Fi or LAN. Right now, anyone who tries to access the intranet within the network, will get an error saying the Certificate isn't trusted.

 

How can I achieve this?

 

Thanks. 

 

 

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

You can't have it automatically trusted unless you add your CA as a trusted authority on all the devices, i believe.

"What am I even meant to put here?" - Me 2016

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, Reallifecat said:

You can't have it automatically trusted unless you add your CA as a trusted authority on all the devices, i believe.

That's what I meant. instead of going to each device and doing it manually, is there a different way?

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

 

Just now, Abdul201588 said:

That's what I meant. instead of going to each device and doing it manually, is there a different way?

I'm not sure there is due to the nature of SSL security, because you cant have just anyone accessing your network and installing them self as a CA.

"What am I even meant to put here?" - Me 2016

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Reallifecat said:

 

I'm not sure there is due to the nature of SSL security, because you cant have just anyone accessing your network and installing them self as a CA.

No, I want to install the CA Certificate on their device. I don't want them to be CA.. So any site they access it doesn't give them an error saying its not trusted..

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Abdul201588 said:

No, I want to install the CA Certificate on their device. I don't want them to be CA.. So any site they access it doesn't give them an error saying its not trusted..

you misunderstood me, you cant automatically install the certificates onto devices remotely as this would pose a security risk. 

"What am I even meant to put here?" - Me 2016

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Reallifecat said:

you misunderstood me, you cant automatically install the certificates onto devices remotely as this would pose a security risk. 

Devices are connected to internal network. Nothing do to with them being in some remote area..

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

You can buy from a trusted CA ... try getting certs from letsencrypt 

Can Anybody Link A Virtual Machine while I go download some RAM?

 

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, unijab said:

You can buy from a trusted CA ... try getting certs from letsencrypt 

I've got server that isn't connected to the internet, therefore I cannot get a CA from letsencrypt.. It hosts my intranet..

 

 

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

You can use a GPO to deploy the certificate. You could even link the machine/user certs to security groups for greater security control over who gets it deployed.

Spoiler

Desktop: Ryzen9 5950X | ASUS ROG Crosshair VIII Hero (Wifi) | EVGA RTX 3080Ti FTW3 | 32GB (2x16GB) Corsair Dominator Platinum RGB Pro 3600Mhz | EKWB EK-AIO 360D-RGB | EKWB EK-Vardar RGB Fans | 1TB Samsung 980 Pro, 4TB Samsung 980 Pro | Corsair 5000D Airflow | Corsair HX850 Platinum PSU | Asus ROG 42" OLED PG42UQ + LG 32" 32GK850G Monitor | Roccat Vulcan TKL Pro Keyboard | Logitech G Pro X Superlight  | MicroLab Solo 7C Speakers | Audio-Technica ATH-M50xBT2 LE Headphones | TC-Helicon GoXLR | Audio-Technica AT2035 | LTT Desk Mat | XBOX-X Controller | Windows 11 Pro

 

Spoiler

Server: Fractal Design Define R6 | Ryzen 3950x | ASRock X570 Taichi | EVGA GTX1070 FTW | 64GB (4x16GB) Corsair Vengeance LPX 3000Mhz | Corsair RM850v2 PSU | Fractal S36 Triple AIO + 4 Additional Venturi 120mm Fans | 14 x 20TB Seagate Exos X22 20TB | 500GB Aorus Gen4 NVMe | 2 x 2TB Samsung 970 Evo Plus NVMe | LSI 9211-8i HBA

 

Link to comment
Share on other sites

Link to post
Share on other sites

Sounds like you have configured SSL proxy which is pretty much a bad idea. You're essentially doing a man-in-the-middle attack on anyone using your network to browse secure web sites defeating the whole point of having secure websites. This is something I don't do unless it really is required and people using the internet need to know this before using it, you could get banking passwords etc.

Link to comment
Share on other sites

Link to post
Share on other sites

15 hours ago, Reallifecat said:

you misunderstood me, you cant automatically install the certificates onto devices remotely as this would pose a security risk. 

 

15 hours ago, Abdul201588 said:

Devices are connected to internal network. Nothing do to with them being in some remote area..

What he means is there is no way to just push/install certificates on to devices like this unless the device is centrally managed by something like Active Directory. Certificate management and certificate stores on devices are fundamental to PKI security and underpins secure access on the internet, this is why so few CA exist due to the implicit trust we put in them because if one were to go rouge or get compromised literally everyone would be screwed and there would be no secure access on the internet anymore, it only takes one.

 

Private CA's need to be treated the same as a public CA for all involved in using or interacting with it, you can seriously compromise a device's security if not careful.

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, Abdul201588 said:

Hello Guys. I'm currently using my Pfsense box as my CA for my domain. I want it to able to install all the certificates automatically when anyone connects through Wi-Fi or LAN. Right now, anyone who tries to access the intranet within the network, will get an error saying the Certificate isn't trusted.

 

How can I achieve this?

 

Thanks. 

 

 

Get certificate from pfsense box. Make GPO that deploys certificate to all clients on the network. All these systems now see the "external site" certificates that are issued by "pfsense box" as trusted. is the basic jist of it. guests will still get the "Not trusted", but you could setup a tunnel and push clients through that unsecured tunnel either via a white list or black list.

 

This is extremely common in schools to protect the kiddies.

Link to comment
Share on other sites

Link to post
Share on other sites

19 minutes ago, Blake said:

Get certificate from pfsense box. Make GPO that deploys certificate to all clients on the network. All these systems now see the "external site" certificates that are issued by "pfsense box" as trusted. is the basic jist of it. guests will still get the "Not trusted", but you could setup a tunnel and push clients through that unsecured tunnel either via a white list or black list.

 

This is extremely common in schools to protect the kiddies.

I rarely setup SSL proxy for schools too though. I use DNS based filtering to do it, most firewall solutions out there can do it however through subscription services like FortiGuard. There should actually be no need to break PKI to provide adequate protection and should be done when there is a security and auditing need to do so and not because it's possible.

 

The other consideration is what do you actually gain by being able to intercept and scan the content of secure websites, not much beyond word score weighting and block over threshold with something like DansGuardian. 99.99% of bad sites can be identified before needing to scan the page content. If you're worried about Google search you can enforce safe search at the proxy/firewall for everyone.

 

You'll find not many staff members will be happy to find out you can collect any passwords they use on secure websites and arguments like personal banking should not be done on the school/work network basically won't fly.

 

It's cool and all to be able to do this but people need to be mindful of what they are actually doing and what it means, you also need to secure the proxy logs and have stricter access on who can view them.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×