Omada v4.1.5 SSL issue

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

Omada v4.1.5 SSL issue

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
Omada v4.1.5 SSL issue
Omada v4.1.5 SSL issue
2020-07-26 18:39:53 - last edited 2020-07-28 16:28:24
Model: EAP245  
Hardware Version: V3
Firmware Version:

Hello All,

I installed Omada v4.1.5 and everything was working fine BUT after apply our CA SSL, I can't access the web-interface and getting this message:

This site can’t provide a secure connectionlocalhost uses an unsupported protocol.
ERR_SSL_VERSION_OR_CIPHER_MISMATCH

So, How can I revert back to the localhost SSL ?

Also, what is the best practics to apply a custom SSL ?

 

Thanks 

  0      
  0      
#1
Options
1 Accepted Solution
Re:Omada v4.1.5 SSL issue-Solution
2020-07-28 14:54:50 - last edited 2020-07-28 16:28:24

Dear all,

The soulation as follow:

first of all Omada ONLY supports JKS certificate files and no more files supported. So, If you upload a wrong certificate through the web interface, the web interface won't be lunched or working as I received an error message. to fix it you have to go the Omada directory C:\Users\YOURNAME\Omada Controller\data\cer then you will find a file called jetty.jks delete this file a creat a new JKS certificate through KeyStore Explorer Software

 

KeyStore Explorer Software:

1- file > New - JKS

2- tools > Generate key pair - RSA 4,096 - edit name - write down all information needed CN=(omada's FQDN)

3- enter password for that key pair

4- tools > import trusted certificate - you have to add the p12 file created by your CA

note: windows CA creats PFX file, just rename the extention to .p12

5- file > save as - save it as a JKS file and enter the same password for the key pair

6- lunch Omada and make sure that you delete the jetty.jks file.

7- login to Omada comtroller then setting > Controller - then upload the JKS certificate we made and put the password then everything will be fine

 

Thanks and hope that it's clear for everyone

Recommended Solution
  1  
  1  
#4
Options
8 Reply
Re:Omada v4.1.5 SSL issue
2020-07-27 12:30:25

it's solved by myself. Thanks you

  0  
  0  
#2
Options
Re:Omada v4.1.5 SSL issue
2020-07-28 01:43:09

@mohkhalifa 

 

Maybe you could post how you resolve it to help others.

  1  
  1  
#3
Options
Re:Omada v4.1.5 SSL issue-Solution
2020-07-28 14:54:50 - last edited 2020-07-28 16:28:24

Dear all,

The soulation as follow:

first of all Omada ONLY supports JKS certificate files and no more files supported. So, If you upload a wrong certificate through the web interface, the web interface won't be lunched or working as I received an error message. to fix it you have to go the Omada directory C:\Users\YOURNAME\Omada Controller\data\cer then you will find a file called jetty.jks delete this file a creat a new JKS certificate through KeyStore Explorer Software

 

KeyStore Explorer Software:

1- file > New - JKS

2- tools > Generate key pair - RSA 4,096 - edit name - write down all information needed CN=(omada's FQDN)

3- enter password for that key pair

4- tools > import trusted certificate - you have to add the p12 file created by your CA

note: windows CA creats PFX file, just rename the extention to .p12

5- file > save as - save it as a JKS file and enter the same password for the key pair

6- lunch Omada and make sure that you delete the jetty.jks file.

7- login to Omada comtroller then setting > Controller - then upload the JKS certificate we made and put the password then everything will be fine

 

Thanks and hope that it's clear for everyone

Recommended Solution
  1  
  1  
#4
Options
Re:Omada v4.1.5 SSL issue
2020-07-28 16:52:13 - last edited 2020-07-28 16:56:56

@mohkhalifa, note that the proprietary JKS format is deprecated. You can use PKCS12 format directly.

 

See this post how to import a certificate in PKCS12 format in Omada Controller. Albeit the post explains the steps necessary under Linux, you can apply them to Windows, too, if you have openssl and the JDK's keytool utility. Probably the web UI of SDN Controller also accepts PKCS12 format, didn't test this (yet).

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  0  
  0  
#5
Options
Re:Omada v4.1.5 SSL issue
2020-07-28 17:59:26

Dear @R1D2,

Please note while I'm try to upload any other format, I'm receving a message that "only JKS files are suppported". Also, Please don't forget that Omada v4.1.5 based on Java enviroment and not like old Omada.

I prefered my method and it's much easier than that article. KeyStore Explorer doing everything without keystore tool or openssl.

  0  
  0  
#6
Options
Re:Omada v4.1.5 SSL issue
2020-07-28 22:08:33 - last edited 2020-07-29 05:27:29

Hi mohkhalifa,

 

yes, as I wrote I didn't try uploading the cert through the web UI, but I checked: it indeed accepts only JKS format, which is bad.

 

Why is it bad? Because JKS certificates are based on an old, proprietary format (outdated since 2014), that is not easily extensible to new cryptographic algorithms. Old ones will still be supported in the future by the JDKs, but new cryptographic algorithms might not be supported at all, so the conversion of SSL certs to PKCS12 is just a matter of time when new cryptographic algorithms are used for the certs.

 

Anyway, the method to install a PKCS12 cert by manually copying it to the keystore still works fine with SDN Controller.

 

So, Omada SDN Controller does indeed accept PKCS12, which is no surprise because PKCS12 is supported by any JDK since JDK 8 released in 2014. It's just the SDN Controller's web UI which does not allow uploading PKCS12. I consider this a bug.

 

I prefer the openssl method b/c of several reasons, the most important one is that for certificates signed by a public or a private CA I have to generate a CSR using openssl anyway. So I convert the resulting certs into other formats also with openssl.

 

For systems in my LAN I do not buy certificates, but use self-signed certificates under my own Certificate Authority. By using a wildcard certificate with a subnet IP as SAN I can create and sign a single certificate for all local hostnames as well as for all local IPs of devices in my LAN, be it a router, a switch, a server or a service. And I just have to install the RootCA cert in a bowser's keychain once, not dozens of individual certificates for each host/service. Pretty easy.

 

But you are absolutely right that any certificate manager can be used for those who prefer a graphical UI. I fully agree with you in this point.

 

I just wanted to point out that using JKS format is deprecated for 6 years now and since you had to create a PKCS12 anyway with Keystore Explorer, you could have even saved one step in the conversion process. There is nothing wrong to use this fine software to convert and manage certs. See http://openjdk.java.net/jeps/229.

 

The only difference to use the PKCS12 format would be to not use the web UI for uploading, but to copy the file to the Omada SDN Controller home directory resp. the keystore in it, at least until this bug in the web UI of accepting only JKS format will have been fixed by TP-Link.

For OC200 HW Controller, unfortunately this is no option.

 

Installing the certificate in PKCS12 format manually into the keystore is just a matter of seconds. Creating the certificate can still be done in any way one likes.

 

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  2  
  2  
#7
Options
Re:Omada v4.1.5 SSL issue
2020-07-29 00:02:25

@R1D2 which means both methods are correct.

At the end I hope this discussion is helpful for others :)

  0  
  0  
#8
Options
Re:Omada v4.1.5 SSL issue
2020-07-29 01:27:37

mohkhalifa, Thank you for sharing this. And I've learned much from this discussion today.yes

  0  
  0  
#9
Options

Information

Helpful: 0

Views: 4312

Replies: 8

Related Articles