-
-
Notifications
You must be signed in to change notification settings - Fork 210
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #980 from pi-hole/new/v6_browser_tls
How to add TLS CA to browser's trust stores
- Loading branch information
Showing
24 changed files
with
111 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,110 @@ | ||
Pi-hole creates a self-signed certificate during installation. This certificate is used to encrypt the web interface and the API. While this certificate is secure, it is not trusted by your browser. This means that you will get a warning when you open the web interface or use the API like: | ||
|
||
![Warning in Firefox](../images/api/firefox-tls-insecure.png) | ||
|
||
You can avoid this warning by either using your own secure certificate and domain or by adding the certificate to your trusted certificates. | ||
|
||
## Adding the CA to your browser | ||
|
||
If you want to use the self-signed certificate, you can add the automatically generated certificate authority (CA) to your browser. This will make your browser trust all certificates signed by this CA. This is the same mechanism that is used by your browser to trust certificates signed by a certificate authority like Let's Encrypt. The following instructions show how to add the CA to Firefox and Chrome. The instructions for other browsers are similar. | ||
|
||
It is also possible to add the CA to your operating system's certificate store. This will make all applications that use the operating system's certificate store trust the CA. The instructions for this are operating system specific and are not covered here. | ||
|
||
Note that you have to add the **CA** certificate (e.g., `/etc/pihole/tls_ca.crt`) and not the server certificate (e.g., `/etc/pihole/tls.pem`). | ||
|
||
It is worth noting that the certificate is only valid for the domain that you had configured during certificate creation. If you access the Pi-hole web interface using a different domain, you will get a warning. This is because the certificate does not match the domain. You can either add the certificate for the other domain as well or you can create a new certificate for the other domain. You can easily create a new certificate by removing the old certificate and restarting `pihole-FTL` (e.g., `sudo rm /etc/pihole/tls* && sudo service pihole-FTL restart`). This will create a new certificate for the domain configured in `/etc/pihole/pihole.toml` (setting `webserver.domain`). | ||
|
||
<!-- markdownlint-disable code-block-style --> | ||
!!! warning "Security warning" | ||
If you add the CA to your browser, you will trust all certificates signed by this CA. By discarding the CA's private key after certificate creation, the risk of a compromised CA is minimized. However, this also means you need to create (and, in turn, add to your OS or browser) a new CA whenever you change the domain of your Pi-hole installation. | ||
|
||
If you want to revoke the CA certificate itself, you can simply delete it from either your operating system's trust store or the browsers you have added it to at any time. | ||
<!-- markdownlint-enable code-block-style --> | ||
|
||
### Firefox (tested with Firefox 121.0) | ||
|
||
Before | After | ||
:-----:|:-----: | ||
![Firefox Untrusted](../images/api/firefox-pihole-untrusted.png) | ![Firefox Trusted](../images/api/firefox-pihole-trusted.png) | ||
|
||
1. Open the settings page of Firefox at [about:preferences#privacy](about:preferences#privacy) | ||
2. Search for "Certificates" | ||
![Certificates in Firefox](../images/api/firefox-certificates.png) | ||
3. Click on "View Certificates" | ||
4. Select the "Authorities" tab | ||
5. Click on "Import" and select the **CA** certificate file (e.g., `/etc/pihole/tls_ca.crt`) | ||
6. Check "Trust this CA to identify websites" | ||
![Trust certificate in Firefox](../images/api/firefox-ca-trust.png) | ||
7. Click on "OK" | ||
8. Verify that the certificate has been imported correctly | ||
![Certificate added in Firefox](../images/api/firefox-ca-added.png) | ||
9. Verify that the Pi-hole web interface is now trusted (no warning, secure lock icon) | ||
|
||
If the last step did not work, make sure that you have generated the certificate correctly (you may have a mismatch between the configured domain and the domain used by Pi-hole during certificate creation). Also verify that you have imported the **CA** certificate (not the server certificate). | ||
|
||
### Chrome (tested with Chrome 120.0) | ||
|
||
Before | After | ||
:-----:|:-----: | ||
![Chrome Untrusted](../images/api/chrome-pihole-untrusted.png) | ![Chrome Trusted](../images/api/chrome-pihole-trusted.png) | ||
|
||
1. Open the settings page of Chrome at [chrome://settings/privacy](chrome://settings/privacy) | ||
2. Navigate to "Manage certificates" in the "Security" submenu of "Privacy and security" or use the search bar | ||
![Certificates in Chrome](../images/api/chrome-certificates.png) | ||
3. Click on "Authorities" tab | ||
4. Click on "Import" and select the **CA** certificate file (e.g., `/etc/pihole/tls_ca.crt`) | ||
5. Check "Trust this certificate for identifying websites" | ||
![Trust certificate in Chrome](../images/api/chrome-ca-trust.png) | ||
6. Click on "OK" | ||
7. Verify that the certificate has been imported correctly | ||
![Certificate added in Chrome](../images/api/chrome-ca-added.png) | ||
8. Verify that the Pi-hole web interface is now trusted (no warning, secure lock icon) | ||
|
||
If the last step did not work, see the remark below the Firefox instructions above. | ||
|
||
### Android (tested with Android 11 and Firefox Mobile 121.1.0) | ||
|
||
Before | After | ||
:-----:|:-----: | ||
![Android Firefox Untrusted](../images/api/android-pihole-untrusted.png) | ![Android Firefox Trusted](../images/api/android-pihole-trusted.png) | ||
![Android Chrome Untrusted](../images/api/android-chrome-untrusted.png) | ![Android Chrome Trusted](../images/api/android-chrome-trusted.png) | ||
|
||
1. Go to you device's settings | ||
2. Navigate to "System Security" or "Security & location" (depending on your device) | ||
3. Navigate to "Credential storage" or similar (depending on your device) | ||
|
||
![Android System Security menu](../images/api/android-system-security.png) | ||
|
||
4. Choose "Install certificates from storage" or similar (depending on your device) | ||
|
||
![Android Credential storage menu](../images/api/android-credential-storage.png) | ||
|
||
5. Select "User certificates" or similar (depending on your device) | ||
|
||
![Android Install certificates menu](../images/api/android-install-ca.png) | ||
|
||
6. Select the **CA** certificate file (e.g., `/etc/pihole/tls_ca.crt`) - you need to have the certificate file on your device (e.g., by copying it to your device via Bluetooth or other *secure* means) | ||
|
||
![Android Select certificate file](../images/api/android-ca-select.png) | ||
|
||
7. Confirm that you want to install the certificate despite the possible security implications mentioned above | ||
|
||
![Android Confirm certificate installation](../images/api/android-ca-security-warning.png) | ||
|
||
8. Give the certificate a meaningful name (e.g., "Pi-hole") | ||
|
||
![Android Name certificate](../images/api/android-ca-name.png) | ||
|
||
9. Verify that the certificate has been imported correctly by checking for a small success popup in the lower area of the screen | ||
|
||
![Android Certificate imported](../images/api/android-ca-success.png) | ||
|
||
10. Verify that the Pi-hole web interface is now trusted (no warning, secure lock icon) | ||
|
||
The certificate will be valid for all apps that use the Android certificate store. This includes the Firefox Mobile browser but also others such as Chrome. | ||
|
||
If the last step did not work, see the remark below the Firefox instructions above. | ||
|
||
## Using your own certificate | ||
|
||
If you want to use your own certificate, you can do so by placing the certificate and the private key in a location that can be read by user `pihole` (e.g., `/etc/pihole`) and, change the path in `/etc/pihole/pihole.toml` (setting `webserver.api.tls.cert`) and restart `pihole-FTL` (e.g., `sudo service pihole-FTL restart`). The certificate and the private key must be in PEM format (check automatically generated certificate for an example). |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters