I've got this to work reliably.
The important thing is to not touch the certificates and keys in /etc/pve, especially not pve-root-ca.pem.
I simply copied my official purchased SSL certificate and intermediate certificate (I use RapidSSL), plus the certificate private key into the usual places, (/etc/ssl/certs and /etc/ssl/private respectively.
I then configured the files in /etc/apache2/sites-enabled (actually links to files in sites-available) pve.conf and pve-redirect.conf to use the SSL files in /etc/ssl instead of the files in /etc/pve:
SSLCertificateFile /etc/ssl/certs/server.example.com.pem
SSLCertificateKeyFile /etc/ssl/private/server.example.com.key
SSLCertificateChainFile /etc/ssl/certs/RapidSSL-intermediate-CA.pem
After reboot, I can connect to https://my-proxmox.example.com:8006 and see the correct official certificate.
When I use the console VNC java applet, I still get asked to accept the certificate and the fact that the applet has full access to my system and that I understand the risks (browser: Safari on Mac OS X Lion), but once I acquiesce, the VNC console works as expected.
This is where I found the key to this solution:
An email from Kurt Smolderen on the pve-devel list. Thanks Kurt!
The important thing is to not touch the certificates and keys in /etc/pve, especially not pve-root-ca.pem.
I simply copied my official purchased SSL certificate and intermediate certificate (I use RapidSSL), plus the certificate private key into the usual places, (/etc/ssl/certs and /etc/ssl/private respectively.
I then configured the files in /etc/apache2/sites-enabled (actually links to files in sites-available) pve.conf and pve-redirect.conf to use the SSL files in /etc/ssl instead of the files in /etc/pve:
SSLCertificateFile /etc/ssl/certs/server.example.com.pem
SSLCertificateKeyFile /etc/ssl/private/server.example.com.key
SSLCertificateChainFile /etc/ssl/certs/RapidSSL-intermediate-CA.pem
After reboot, I can connect to https://my-proxmox.example.com:8006 and see the correct official certificate.
When I use the console VNC java applet, I still get asked to accept the certificate and the fact that the applet has full access to my system and that I understand the risks (browser: Safari on Mac OS X Lion), but once I acquiesce, the VNC console works as expected.
This is where I found the key to this solution:
An email from Kurt Smolderen on the pve-devel list. Thanks Kurt!
Last edited: