How do I configure Webfig to use https? I turned on the ssl-http in IP/Services and installed a certificate but I still get SSL error when I try to access webfig throughhttps://192.168.88.1.
Thanks.
*) ssl - not finding CRL in local store for any certificate in trust chain will cause connection to fail;
# 1。添加创建CA证书的第一个:/证书name=my-rtr-ca common-name=my-rtr-ca key-usage=key-cert-sign,crl-sign #2. Sign the CA certificate: /certificate sign my-rtr-ca #3. Now create a regular certificate for HTTPS access: /certificate add name=my-rtr common-name=my-rtr #4. Sign it with CA from steps 1&2: /certificate sign ca=my-rtr-ca my-rtr #5. And finally, assign the new certificate to HTTPS service: /ip service set www-ssl certificate=my-rtr
Which RouterOS version?
6.34.3Which RouterOS version?
how have you done?I use:
http://www.selfsignedcertificate.com/
just create the certs .key and .csr, then import it on rOS. After that enable https with this certs
M.
~$ openssl pkcs12 -export -inkey mikrotik_example_com.key -in mikrotik_example_com.crt -certfile CAcert.org.crt -out mikrotik_example_com.p12 -name mikrotik.example.com
I'm usinghttps://www.startssl.com/to make cert. CA is fine as same thing for my synology nas works without error. So it must be a config problem of mikrotik...Mmmmh, no problems here since Jears with CaCert.org & ROS current.
Just switched to: 6.37rc27 -> https webfig login is fine as ever![]()
I've generated a .p12 file for import to my Tikl.
After import the Cert has (Status: KLT Key Size: 4096)Code:Select all~$ openssl pkcs12 -export -inkey mikrotik_example_com.key -in mikrotik_example_com.crt -certfile CAcert.org.crt -out mikrotik_example_com.p12 -name mikrotik.example.com
Don't forget CAcert Root & Class3 Cert in Your browser or system & android devices.
Yes, for me too (on 6.37.3) although I had to set key-usage=tls-server when creating the TLS certificate.
'Weak' cipher suites accepted by this service via the TLSv1.0 protocol: TLS_ECDHE_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 TLS_RSA_WITH_RC4_128_SHA 'Weak' cipher suites accepted by this service via the TLSv1.1 protocol: TLS_ECDHE_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 TLS_RSA_WITH_RC4_128_SHA 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol: TLS_ECDHE_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 TLS_RSA_WITH_RC4_128_SHA