Securely Expose your Homelab Services with Mutual TLS - YouTube
-
I set my caddy reverse proxy to only accept request from localhost.
It is a bit more involved but you can actually get a proper cert for localhost stuff, with your domain pointing to an internal ip addr and not risk exposing your public ip and having to open a port.
Signed by a AC?
I had a lot of issues with some apps not allowing self-signed certificates and the app used their own list of allowed AC or something, I was unable to make it allow my own certificates even adding my own root certificate to Android.
-
Signed by a AC?
I had a lot of issues with some apps not allowing self-signed certificates and the app used their own list of allowed AC or something, I was unable to make it allow my own certificates even adding my own root certificate to Android.
No, signed by Let's Encrypt, a proper, real cert. https://gist.github.com/jkelin/fc04b081ed19910618770c6be998de0e
-
The whole point of mTLS is that you dont need to use a VPN to achieve that same security.
that's not that same security. an observer will still know that you are connecting over HTTPS to a particular doman/IP, maybe they can also deduce that you are using mTLS, and all your other traffic is not protected by it at all. all the while with wireguard, they can see that it's wireguard traffic, and where it goes, but anything inside is secret, plus if an app uses unencrypted traffic for some reason (smb, dns, custom and special protocols), wireguard will hide and protect that too.
-
mTLS is so cool, until you find out that almost no clients support it.
Immich supports it.