I ran this command: letsencrypt software for windows server
It produced this output:
My operating system is (include version): Windows Server 2012 R2 Standard
My web server is (include version): IIS 7
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don’t know): Yes
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
I renewed SSL for kundencenter.dynamic1001.eu from Windows Server 2012 R2 Standard and bound in IIS 7. After that I exported certificate to pfsense HAProxy and removed it from IIS. While exporting I got Certificate Key and Private Key which I imported in pfsense.
Everything was working fine but ssllabs shows Chain issues Incomplete
So what can be issue?
You know that pfSense has its own ACME package, right? That package can be used to obtain certs directly on the pfSense box, rather than needing to obtain them somewhere else and load them onto the box. I’m pretty sure it automatically installs the intermediate cert as well, which is what’s causing your present issue.
Client - ACME Client for Windows - letsencrypt-win-simple
Commands - I just unpack setup and run letsencrypt.exe, and follow the messages in the input prompt. In which I select my site for which I want to renew SSL.
After that SSL is generated in IIS, so then I export from server certificates in IIS to .pfx file.
After that I convert .pfx file to .pem file for importing in pfsense.
For that process I use OpenSSL software and run following command in cmd - openssl pkcs12 -in -out …\certificate.pem -nodes
Now I open .pem file in notepad++ and copy certificate data key and private key in pfsense
Hi Andrei
Thanks for your quick and great suggestion.
I clearly understood what @danb35 said, but here we don’t use ACME package in pfsense because our infra is little complicated so auto-renewal is not possible thats why we need to renew manually.
Now where should I paste intermediate certificate key, because website is configured in IIS and SSL is in pfsense.
It may be possible to paste both the end-entity and the intermediate certificate (one after another) in the “Certificate data” field. I give this about an 80% chance of working properly.
I don’t think that will work properly in pfSense, actually–even if it works for the pfSense web GUI, if you’re using the cert for other purposes (like for a VPN connection), pfSense is going to need to keep track of the intermediate cert separately.
I got success and also got A+ ranking in ssllabs.
But I used different method, I didn’t pasted CA certificate in pfsense CA tab,
What I did that I pasted X3 global key (https://letsencrypt.org/certs/lets-encrypt-x3-cross-signed.pem.txt) below certificate data key (which I got from IIS export) and pasted both keys in data tab and private key in its tab.