You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a feature request, an enhancement to mitigate blocked https pages browsers warnings for an untrusted certificate when adhomeguard block page is served.
Generate and expose private/public keys RootCA in AdGuardHome.yaml and web interface for easy installation in browsers and system root trust store to add trust for any certificate signed by AHG.
I don't know how the internal signing is working now, but it looks like when a blocked https page is visited AGH generates a self-signed spoofed certificate with the blocked domain name.
Instead, it can generate on the first run a self-signed RootCA pair that can be used for signing the spoofed blocked pages. The public rootCA certificate imported into the browser and the private key used to sign blocked pages certificate, this will eliminate browser warnings, and also additional user interactions.
The text was updated successfully, but these errors were encountered:
I would also like to see this feature implemented. Particularly because so much has moved to https these days.
An example would be kids iPads with AdGuard Parental Control feature. iOS makes it very difficult to ever get to the block page due to certificate errors. You have to click on 2-3 things each time to bypass the cert errors just to land on block page.
This is a feature request, an enhancement to mitigate blocked https pages browsers warnings for an untrusted certificate when adhomeguard block page is served.
Generate and expose private/public keys RootCA in AdGuardHome.yaml and web interface for easy installation in browsers and system root trust store to add trust for any certificate signed by AHG.
I don't know how the internal signing is working now, but it looks like when a blocked https page is visited AGH generates a self-signed spoofed certificate with the blocked domain name.
Instead, it can generate on the first run a self-signed RootCA pair that can be used for signing the spoofed blocked pages. The public rootCA certificate imported into the browser and the private key used to sign blocked pages certificate, this will eliminate browser warnings, and also additional user interactions.
The text was updated successfully, but these errors were encountered: