mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 15:05:57 +03:00
[GH-ISSUE #196] Internal server certs #2062
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#2062
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Uzzi on GitHub (Nov 30, 2020).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/196
HI, I wanto to deploy RMM into internal server, no external exposure, than install.sh notify me: The server will not issue certificates for the identifier :: Error creating new order :: Cannot issue for "*.DOMAIN.intranet": Domain name does not end with a valid public suffix (TLD)
How can I fix it?
Thank you
@Uzzi commented on GitHub (Nov 30, 2020):
I've created certs by: sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/selfsigned.key -out /etc/ssl/selfsigned.crt
I've edited install.sh and modifyed certs sections.
But now I cannot login. Error: Bad credentials
@wh1te909 commented on GitHub (Nov 30, 2020):
Hi, self signed certs will no longer work since we switched to NATS which is why I removed them from the install script.
You can still get a free let's encrypt cert for internal use, you don't need to open any ports. If you don't have a domain just get a free one from freenom.com
@meyerje commented on GitHub (Nov 30, 2020):
Does this remove support for an internal root CA as well?
On Mon, Nov 30, 2020 at 11:11 AM Tragic Bronson notifications@github.com
wrote:
@wh1te909 commented on GitHub (Nov 30, 2020):
@meyerje no that should still be fine cuz yours is a proper cert, NATS just doesn't like ghetto ones generated by openssl. Will DM you on discord cuz I need to you test.
@Uzzi commented on GitHub (Nov 30, 2020):
Can I configure Tactical to work only with interna domain and ask let's encrypt cert for other public domain?
I've let's encrypt certs for other public domain, can I use its?
@wh1te909 commented on GitHub (Nov 30, 2020):
@Uzzi yea so NATS needs a valid certificate, which doesn't necessarily have to be the same cert used for the rmm website so I guess you could use the self signed cert for everything except NATS, and then use a letsencrypt cert just for NATS.
I'll be releasing an update soon with that option, so I will follow up with you then with instructions.
@Uzzi commented on GitHub (Dec 1, 2020):
@wh1te909 during agents installation, I've certification x509 error.
@wh1te909 commented on GitHub (Dec 2, 2020):
@Uzzi im not familiar at all with certs but i think prolly you have to add the cert in the agent's trusted cert store or something. Which is why I recommend you just do letsencrypt or get a proper cert and you wont have any of these errors.
I did some optional settings in the latest release in 0.2.4 for using custom certs though if you want to try
you can add the 2 following variables to the bottom of
/rmm/api/tacticalrmm/tacticalrmm/local_settings.pythen do a
sudo systemctl restart rmmand from the web interface, go to Tools > Server Maintenance > Reload Natsthen check
sudo systemctl status natsand see if there are any certificate errors or just try installing an agent againNote that these custom certs are only for NATS, not for nginx. You can read more about the NATS cert requirements here: https://docs.nats.io/nats-server/configuration/securing_nats/tls#certificate-authorities
For nginx you should still be able to use a ghetto cert generated by openssl
edit: forgot to add make sure the path to those 2 certs are owned by whatever linux user you installed the rmm as or that they have at least read access so do a
chmod 755on them. do not edit or create anything as root, always from same user you installed rmm.