Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. How do I use HTTPS on a private LAN without self-signed certs?

How do I use HTTPS on a private LAN without self-signed certs?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
51 Posts 37 Posters 196 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ? Guest

    Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

    Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

    N This user is from outside of this forum
    N This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #2

    I wish you luck on this. I also would like to learn more about this, but it’s not a priority for me. I just got a cheap vps and will use that for testing 😂

    1 Reply Last reply
    0
    • ? Guest

      Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

      Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

      ptz@dubvee.orgP This user is from outside of this forum
      ptz@dubvee.orgP This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #3

      Is there a way I can get Let's Encrypt to dole out a wildcard certificate

      Yep. Just specify the domains yourdomain.com and *.yourdomain.com in the certbot request. Wildcard domains require the DNS-based challenge, but you've said you're already good there.

      I used to run an internal CA, and it wasn't too hard to setup a CA and distribute my root cert. Except on mobile devices. On Android it was easy, but there was a persistent warning that my network traffic could be intercepted (which is true when there's a custom root cert installed), but it since it was my cert, it got annoying seeing that all the time. Not sure if Apple devices can even do that, but regardless, it wasn't practical for friends who wanted to use my self-hosted services to install a custom cert when they were over.

      ? 1 Reply Last reply
      0
      • ? Guest

        Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

        Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

        B This user is from outside of this forum
        B This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #4

        I'm not sure about wildcard certs but I use this container to dole out letsencrypt certs for web services and it's fairly straightforward compared to traefik or something:
        https://github.com/lucaslorentz/caddy-docker-proxy

        Caddy docs: https://caddyserver.com/docs/quick-starts/reverse-proxy

        1 Reply Last reply
        0
        • ? Guest

          Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

          Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

          bravesilvernest@lemmy.mlB This user is from outside of this forum
          bravesilvernest@lemmy.mlB This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #5

          I have a script to self-sign 10 year certs on internal traffic only, and then added my public cert to devices needing it. I'm going to be really annoyed in a decade, but until then I'm having a ball 🙂

          1 Reply Last reply
          0
          • ? Guest

            Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

            Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

            C This user is from outside of this forum
            C This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #6

            You don't need public DNS. You can use whatever domain you want if you use your own DNS server (though you should use one you own, or something under the .internal TLD).

            Likewise, you can issue whatever certs you want if you trust the CA.

            But LE does support wildcard certs. You can get them with certbot or other tools.

            Personally I use traefik, which has LE support built in. It automatically gets an individual cert for each service. If you use caddy, I'm sure it has something similar.

            1 Reply Last reply
            0
            • ? Guest

              Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

              Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #7

              I've never done it myself but this may be what you're looking for.

              1 Reply Last reply
              0
              • ? Guest

                Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                mhzawadi@lemmy.horwood.cloudM This user is from outside of this forum
                mhzawadi@lemmy.horwood.cloudM This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #8

                If you have your own domain and your DNS provider has an API, you can get a certificate for anything in your domain

                1 Reply Last reply
                0
                • ptz@dubvee.orgP [email protected]

                  Is there a way I can get Let's Encrypt to dole out a wildcard certificate

                  Yep. Just specify the domains yourdomain.com and *.yourdomain.com in the certbot request. Wildcard domains require the DNS-based challenge, but you've said you're already good there.

                  I used to run an internal CA, and it wasn't too hard to setup a CA and distribute my root cert. Except on mobile devices. On Android it was easy, but there was a persistent warning that my network traffic could be intercepted (which is true when there's a custom root cert installed), but it since it was my cert, it got annoying seeing that all the time. Not sure if Apple devices can even do that, but regardless, it wasn't practical for friends who wanted to use my self-hosted services to install a custom cert when they were over.

                  ? Offline
                  ? Offline
                  Guest
                  wrote on last edited by
                  #9

                  Cool. Follow up question: Do I generate the cert once and distribute the same private key to all the servers I'm running? I'm guessing not, but does that mean I run the certbot command on every server?

                  ptz@dubvee.orgP 1 Reply Last reply
                  0
                  • ? Guest

                    Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                    Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                    T This user is from outside of this forum
                    T This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #10

                    You need to control a domain, so LE can verify you are the controller of the domain, then LE will issue you a certificate saying you are the controller of the domain.

                    For a wildcard LE cert, you need to use the DNS challenge method.
                    Essentially the ACME client (or certbot or whatever) will talk to LE and say "I want a DNS challenge for *.example.com".
                    LE will reply "ok, your order number 69, and your challenge code is DEADBEEF".
                    ACME then interacts with your public nameserver (or you have to do this manually) and add the challenge code as a txt record _acme-challenge.example.com. (I've been caught out by the fact LE uses Google DNS for resolution, and Google will only follow 1 level of NS records from the root authorative nameserver).
                    All the while, LE is checking for that record. When it finds the record, it mints a wildcard certificate.
                    ACME then periodically checks in with LE asking for order 69. Once LE has minted the cert, it will return it to acme.
                    And now you have a wildcard cert.

                    So, how to use it on a local domain?
                    Use a split horizon DNS method.
                    Ensure your DHCP is handing out a local DNS for resolving.
                    Configure that local DNS to then use 8.8.8.8 or whatever as it's upstream.
                    Then load in static/override records to the local DNS.
                    Pihole can do this. OPNSense/pfSense can do this. Unifi can do some of this.

                    How does this work?
                    Any device on your network that wants to know the IP of example.example.com will ask it's configured DNS - the local DNS that you have configured.
                    The local DNS will check it's static assignments and go "yeh, example.example.com is 10.10.3.3".
                    If you ask you local DNS for google.com, it won't have a static assignment for it, so it will ask it's upstream DNS, and return that result.
                    And it means you aren't putting private IP spaces on public NS records.

                    Then you can load in your wildcard cert to 10.10.3.3, and you will have a trusted HTTPS connection.

                    Here is a list of LE clients that will automate LE certs.
                    https://letsencrypt.org/docs/client-options/

                    Have a read through and pick your desired flavour.
                    Dig into the docs of that flavour, and start playing around.

                    If it's all HTTPS, consider using something like Nginx Proxy Manager (https://nginxproxymanager.com/) as a reverse proxy in front of your services and for managing the LE cert.
                    It's super easy to use, has a decent GUI, and then it's only 1 IP to point all DNS records to.

                    1 Reply Last reply
                    0
                    • ? Guest

                      Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                      Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                      T This user is from outside of this forum
                      T This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #11

                      If you own a domain, which you do, you can get wildcard certs from Let's Encrypt using a DNS challenge. Most (all?) popular reverse proxies can do this either natively or via an addon/module, you just need to use a supported DNS provider.

                      1 Reply Last reply
                      0
                      • ? Guest

                        Cool. Follow up question: Do I generate the cert once and distribute the same private key to all the servers I'm running? I'm guessing not, but does that mean I run the certbot command on every server?

                        ptz@dubvee.orgP This user is from outside of this forum
                        ptz@dubvee.orgP This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #12

                        I have a single Nginx setup which is the frontend for all my web services. So I only need to deploy it there (and to its HA partner). My renewal script just scp's it to the secondary and does an nginx -s reload on both.

                        I do generate separate certs/keys for my non-web servers, but there's only two of those.

                        You could also, if you wanted, just generate one cert and distribute it and its key to everything with a script or other automation tool (Ansible is what I used to use).

                        1 Reply Last reply
                        0
                        • ? Guest

                          Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                          Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                          mouse@midwest.socialM This user is from outside of this forum
                          mouse@midwest.socialM This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #13

                          I use Caddy for this. I'll leave links to the documentation as well as a few examples.

                          Here's the documentation for wildcard certs.
                          https://caddyserver.com/docs/automatic-https#wildcard-certificates

                          Here's how you add DNS providers to Caddy without Docker.
                          https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

                          Here's how you do it with Docker.
                          https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

                          Look for the DNS provider in this repository first.
                          https://github.com/caddy-dns

                          Here's documentation about using environment variables.
                          https://caddyserver.com/docs/caddyfile/concepts#environment-variables

                          Docker

                          A few examples of Dockerfiles. These will build Caddy with DNS support.

                          DuckDNS

                          FROM caddy:2-builder AS builder
                          RUN xcaddy build --with github.com/caddy-dns/duckdns
                          
                          FROM caddy:2
                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                          

                          Cloudflare

                          FROM caddy:2-builder AS builder
                          RUN xcaddy build --with github.com/caddy-dns/cloudflare
                          
                          FROM caddy:2
                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                          

                          Porkbun

                          FROM caddy:2-builder AS builder
                          RUN xcaddy build --with github.com/caddy-dns/porkbun
                          
                          FROM caddy:2
                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                          

                          Configure DNS provider

                          This is what to add the the Caddyfile, I've used these in the examples that follow this section.
                          You can look at the repository for the DNS provider to see how to configure it for example.

                          DuckDNS

                          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

                          tls {
                          	dns duckdns {env.DUCKDNS_API_TOKEN}
                          }
                          

                          CloudFlare

                          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
                          Dual-key

                          tls {
                          	dns cloudflare {
                          		zone_token {env.CF_ZONE_TOKEN}
                          		api_token {env.CF_API_TOKEN}
                          	}
                          }
                          

                          Single-key

                          tls {
                          	dns cloudflare {env.CF_API_TOKEN}
                          }
                          

                          PorkBun

                          https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
                          Global

                          {
                          	acme_dns porkbun {
                          			api_key {env.PORKBUN_API_KEY}
                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                          	}
                          }
                          

                          or per site

                          tls {
                          	dns porkbun {
                          			api_key {env.PORKBUN_API_KEY}
                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                          	}
                          }
                          

                          Caddyfile

                          And finally the Caddyfile examples.

                          DuckDNS

                          Here's how you do it with DuckDNS.

                          *.example.org {
                                  tls {
                                          dns duckdns {$DUCKDNS_TOKEN}
                                  }
                          
                                  @hass host home-assistant.example.org
                                  handle @hass {
                                          reverse_proxy home-assistant:8123
                                  }
                          }
                          

                          Also you can use environment variables like this.

                          *.{$DOMAIN} {
                                  tls {
                                          dns duckdns {$DUCKDNS_TOKEN}
                                  }
                          
                                  @hass host home-assistant.{$DOMAIN}
                                  handle @hass {
                                          reverse_proxy home-assistant:8123
                                  }
                          }
                          

                          CloudFlare.

                          *.{$DOMAIN} {
                                  tls {
                          	        dns cloudflare {env.CF_API_TOKEN}
                                  }
                          
                                  @hass host home-assistant.{$DOMAIN}
                                  handle @hass {
                                          reverse_proxy home-assistant:8123
                                  }
                          }
                          

                          Porkbun

                          *.{$DOMAIN} {
                                  tls {
                          	        dns porkbun {
                          			api_key {env.PORKBUN_API_KEY}
                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                          	        }
                                  }
                          
                                  @hass host home-assistant.{$DOMAIN}
                                  handle @hass {
                                          reverse_proxy home-assistant:8123
                                  }
                          }
                          
                          E T C M S 5 Replies Last reply
                          0
                          • ? Guest

                            Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                            Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                            lemmchen@feddit.orgL This user is from outside of this forum
                            lemmchen@feddit.orgL This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #14

                            Some form of domain and a DNS server (router or Pi-Hole) in your LAN

                            1 Reply Last reply
                            0
                            • ? Guest

                              Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                              Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                              S This user is from outside of this forum
                              S This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #15

                              Reverse proxy + DNS-challenge wildcard cert for your domain. The end. Super easy to set up and zero maintenance. Adding a new service is just a couple clicks in your reverse proxy and you’re done.

                              1 Reply Last reply
                              0
                              • ? Guest

                                Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                                Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                                zebragoose@sh.itjust.worksZ This user is from outside of this forum
                                zebragoose@sh.itjust.worksZ This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #16

                                I did follow this guide from Techno Tim, he uses cloudflare but you can go with Lets encrypt aswell

                                https://www.youtube.com/watch?v=liV3c9m_OX8

                                1 Reply Last reply
                                0
                                • mouse@midwest.socialM [email protected]

                                  I use Caddy for this. I'll leave links to the documentation as well as a few examples.

                                  Here's the documentation for wildcard certs.
                                  https://caddyserver.com/docs/automatic-https#wildcard-certificates

                                  Here's how you add DNS providers to Caddy without Docker.
                                  https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

                                  Here's how you do it with Docker.
                                  https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

                                  Look for the DNS provider in this repository first.
                                  https://github.com/caddy-dns

                                  Here's documentation about using environment variables.
                                  https://caddyserver.com/docs/caddyfile/concepts#environment-variables

                                  Docker

                                  A few examples of Dockerfiles. These will build Caddy with DNS support.

                                  DuckDNS

                                  FROM caddy:2-builder AS builder
                                  RUN xcaddy build --with github.com/caddy-dns/duckdns
                                  
                                  FROM caddy:2
                                  COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                  

                                  Cloudflare

                                  FROM caddy:2-builder AS builder
                                  RUN xcaddy build --with github.com/caddy-dns/cloudflare
                                  
                                  FROM caddy:2
                                  COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                  

                                  Porkbun

                                  FROM caddy:2-builder AS builder
                                  RUN xcaddy build --with github.com/caddy-dns/porkbun
                                  
                                  FROM caddy:2
                                  COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                  

                                  Configure DNS provider

                                  This is what to add the the Caddyfile, I've used these in the examples that follow this section.
                                  You can look at the repository for the DNS provider to see how to configure it for example.

                                  DuckDNS

                                  https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

                                  tls {
                                  	dns duckdns {env.DUCKDNS_API_TOKEN}
                                  }
                                  

                                  CloudFlare

                                  https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
                                  Dual-key

                                  tls {
                                  	dns cloudflare {
                                  		zone_token {env.CF_ZONE_TOKEN}
                                  		api_token {env.CF_API_TOKEN}
                                  	}
                                  }
                                  

                                  Single-key

                                  tls {
                                  	dns cloudflare {env.CF_API_TOKEN}
                                  }
                                  

                                  PorkBun

                                  https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
                                  Global

                                  {
                                  	acme_dns porkbun {
                                  			api_key {env.PORKBUN_API_KEY}
                                  			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                  	}
                                  }
                                  

                                  or per site

                                  tls {
                                  	dns porkbun {
                                  			api_key {env.PORKBUN_API_KEY}
                                  			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                  	}
                                  }
                                  

                                  Caddyfile

                                  And finally the Caddyfile examples.

                                  DuckDNS

                                  Here's how you do it with DuckDNS.

                                  *.example.org {
                                          tls {
                                                  dns duckdns {$DUCKDNS_TOKEN}
                                          }
                                  
                                          @hass host home-assistant.example.org
                                          handle @hass {
                                                  reverse_proxy home-assistant:8123
                                          }
                                  }
                                  

                                  Also you can use environment variables like this.

                                  *.{$DOMAIN} {
                                          tls {
                                                  dns duckdns {$DUCKDNS_TOKEN}
                                          }
                                  
                                          @hass host home-assistant.{$DOMAIN}
                                          handle @hass {
                                                  reverse_proxy home-assistant:8123
                                          }
                                  }
                                  

                                  CloudFlare.

                                  *.{$DOMAIN} {
                                          tls {
                                  	        dns cloudflare {env.CF_API_TOKEN}
                                          }
                                  
                                          @hass host home-assistant.{$DOMAIN}
                                          handle @hass {
                                                  reverse_proxy home-assistant:8123
                                          }
                                  }
                                  

                                  Porkbun

                                  *.{$DOMAIN} {
                                          tls {
                                  	        dns porkbun {
                                  			api_key {env.PORKBUN_API_KEY}
                                  			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                  	        }
                                          }
                                  
                                          @hass host home-assistant.{$DOMAIN}
                                          handle @hass {
                                                  reverse_proxy home-assistant:8123
                                          }
                                  }
                                  
                                  E This user is from outside of this forum
                                  E This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #17

                                  thank you for providing such a thorough reply, good shit

                                  1 Reply Last reply
                                  0
                                  • mouse@midwest.socialM [email protected]

                                    I use Caddy for this. I'll leave links to the documentation as well as a few examples.

                                    Here's the documentation for wildcard certs.
                                    https://caddyserver.com/docs/automatic-https#wildcard-certificates

                                    Here's how you add DNS providers to Caddy without Docker.
                                    https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

                                    Here's how you do it with Docker.
                                    https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

                                    Look for the DNS provider in this repository first.
                                    https://github.com/caddy-dns

                                    Here's documentation about using environment variables.
                                    https://caddyserver.com/docs/caddyfile/concepts#environment-variables

                                    Docker

                                    A few examples of Dockerfiles. These will build Caddy with DNS support.

                                    DuckDNS

                                    FROM caddy:2-builder AS builder
                                    RUN xcaddy build --with github.com/caddy-dns/duckdns
                                    
                                    FROM caddy:2
                                    COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                    

                                    Cloudflare

                                    FROM caddy:2-builder AS builder
                                    RUN xcaddy build --with github.com/caddy-dns/cloudflare
                                    
                                    FROM caddy:2
                                    COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                    

                                    Porkbun

                                    FROM caddy:2-builder AS builder
                                    RUN xcaddy build --with github.com/caddy-dns/porkbun
                                    
                                    FROM caddy:2
                                    COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                    

                                    Configure DNS provider

                                    This is what to add the the Caddyfile, I've used these in the examples that follow this section.
                                    You can look at the repository for the DNS provider to see how to configure it for example.

                                    DuckDNS

                                    https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

                                    tls {
                                    	dns duckdns {env.DUCKDNS_API_TOKEN}
                                    }
                                    

                                    CloudFlare

                                    https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
                                    Dual-key

                                    tls {
                                    	dns cloudflare {
                                    		zone_token {env.CF_ZONE_TOKEN}
                                    		api_token {env.CF_API_TOKEN}
                                    	}
                                    }
                                    

                                    Single-key

                                    tls {
                                    	dns cloudflare {env.CF_API_TOKEN}
                                    }
                                    

                                    PorkBun

                                    https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
                                    Global

                                    {
                                    	acme_dns porkbun {
                                    			api_key {env.PORKBUN_API_KEY}
                                    			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                    	}
                                    }
                                    

                                    or per site

                                    tls {
                                    	dns porkbun {
                                    			api_key {env.PORKBUN_API_KEY}
                                    			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                    	}
                                    }
                                    

                                    Caddyfile

                                    And finally the Caddyfile examples.

                                    DuckDNS

                                    Here's how you do it with DuckDNS.

                                    *.example.org {
                                            tls {
                                                    dns duckdns {$DUCKDNS_TOKEN}
                                            }
                                    
                                            @hass host home-assistant.example.org
                                            handle @hass {
                                                    reverse_proxy home-assistant:8123
                                            }
                                    }
                                    

                                    Also you can use environment variables like this.

                                    *.{$DOMAIN} {
                                            tls {
                                                    dns duckdns {$DUCKDNS_TOKEN}
                                            }
                                    
                                            @hass host home-assistant.{$DOMAIN}
                                            handle @hass {
                                                    reverse_proxy home-assistant:8123
                                            }
                                    }
                                    

                                    CloudFlare.

                                    *.{$DOMAIN} {
                                            tls {
                                    	        dns cloudflare {env.CF_API_TOKEN}
                                            }
                                    
                                            @hass host home-assistant.{$DOMAIN}
                                            handle @hass {
                                                    reverse_proxy home-assistant:8123
                                            }
                                    }
                                    

                                    Porkbun

                                    *.{$DOMAIN} {
                                            tls {
                                    	        dns porkbun {
                                    			api_key {env.PORKBUN_API_KEY}
                                    			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                    	        }
                                            }
                                    
                                            @hass host home-assistant.{$DOMAIN}
                                            handle @hass {
                                                    reverse_proxy home-assistant:8123
                                            }
                                    }
                                    
                                    T This user is from outside of this forum
                                    T This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #18

                                    Thanks for being so detailed!

                                    I use caddy for straightforward https, but every time I try to use it for a service that isn't just a reverse_proxy entry, I really struggle to find resources I understand... and most of the time the "solutions" I find are outdated and don't seem to work. The most recent example of this for me would be Baikal.

                                    Do you have any recommendations for where I might get good examples and learn more about how do troubleshoot and improve my Caddyfile entries?

                                    Thanks!

                                    mouse@midwest.socialM S 2 Replies Last reply
                                    0
                                    • mouse@midwest.socialM [email protected]

                                      I use Caddy for this. I'll leave links to the documentation as well as a few examples.

                                      Here's the documentation for wildcard certs.
                                      https://caddyserver.com/docs/automatic-https#wildcard-certificates

                                      Here's how you add DNS providers to Caddy without Docker.
                                      https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

                                      Here's how you do it with Docker.
                                      https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

                                      Look for the DNS provider in this repository first.
                                      https://github.com/caddy-dns

                                      Here's documentation about using environment variables.
                                      https://caddyserver.com/docs/caddyfile/concepts#environment-variables

                                      Docker

                                      A few examples of Dockerfiles. These will build Caddy with DNS support.

                                      DuckDNS

                                      FROM caddy:2-builder AS builder
                                      RUN xcaddy build --with github.com/caddy-dns/duckdns
                                      
                                      FROM caddy:2
                                      COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                      

                                      Cloudflare

                                      FROM caddy:2-builder AS builder
                                      RUN xcaddy build --with github.com/caddy-dns/cloudflare
                                      
                                      FROM caddy:2
                                      COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                      

                                      Porkbun

                                      FROM caddy:2-builder AS builder
                                      RUN xcaddy build --with github.com/caddy-dns/porkbun
                                      
                                      FROM caddy:2
                                      COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                      

                                      Configure DNS provider

                                      This is what to add the the Caddyfile, I've used these in the examples that follow this section.
                                      You can look at the repository for the DNS provider to see how to configure it for example.

                                      DuckDNS

                                      https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

                                      tls {
                                      	dns duckdns {env.DUCKDNS_API_TOKEN}
                                      }
                                      

                                      CloudFlare

                                      https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
                                      Dual-key

                                      tls {
                                      	dns cloudflare {
                                      		zone_token {env.CF_ZONE_TOKEN}
                                      		api_token {env.CF_API_TOKEN}
                                      	}
                                      }
                                      

                                      Single-key

                                      tls {
                                      	dns cloudflare {env.CF_API_TOKEN}
                                      }
                                      

                                      PorkBun

                                      https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
                                      Global

                                      {
                                      	acme_dns porkbun {
                                      			api_key {env.PORKBUN_API_KEY}
                                      			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                      	}
                                      }
                                      

                                      or per site

                                      tls {
                                      	dns porkbun {
                                      			api_key {env.PORKBUN_API_KEY}
                                      			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                      	}
                                      }
                                      

                                      Caddyfile

                                      And finally the Caddyfile examples.

                                      DuckDNS

                                      Here's how you do it with DuckDNS.

                                      *.example.org {
                                              tls {
                                                      dns duckdns {$DUCKDNS_TOKEN}
                                              }
                                      
                                              @hass host home-assistant.example.org
                                              handle @hass {
                                                      reverse_proxy home-assistant:8123
                                              }
                                      }
                                      

                                      Also you can use environment variables like this.

                                      *.{$DOMAIN} {
                                              tls {
                                                      dns duckdns {$DUCKDNS_TOKEN}
                                              }
                                      
                                              @hass host home-assistant.{$DOMAIN}
                                              handle @hass {
                                                      reverse_proxy home-assistant:8123
                                              }
                                      }
                                      

                                      CloudFlare.

                                      *.{$DOMAIN} {
                                              tls {
                                      	        dns cloudflare {env.CF_API_TOKEN}
                                              }
                                      
                                              @hass host home-assistant.{$DOMAIN}
                                              handle @hass {
                                                      reverse_proxy home-assistant:8123
                                              }
                                      }
                                      

                                      Porkbun

                                      *.{$DOMAIN} {
                                              tls {
                                      	        dns porkbun {
                                      			api_key {env.PORKBUN_API_KEY}
                                      			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                      	        }
                                              }
                                      
                                              @hass host home-assistant.{$DOMAIN}
                                              handle @hass {
                                                      reverse_proxy home-assistant:8123
                                              }
                                      }
                                      
                                      C This user is from outside of this forum
                                      C This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #19

                                      I do the same!

                                      I have a provider that is not supported by caddy, but I can still use it via duckdns delegation!

                                      https://github.com/caddy-dns/duckdns?tab=readme-ov-file#challenge-delegation

                                      Challenge delegation

                                      To obtain a certificate using ACME DNS challenges, you'd use this module as described above. But, if you have a different domain (say, my.example.com) CNAME'd to your Duck DNS domain, you have two options:

                                      1. Not use this module: Use a module matching the DNS provider for my.example.com.
                                      2. Delegate the challenge to Duck DNS.
                                      1 Reply Last reply
                                      0
                                      • ? Guest

                                        Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                                        Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                                        ? Offline
                                        ? Offline
                                        Guest
                                        wrote on last edited by
                                        #20

                                        +1 for the letsencrypt wildcard with DNS verification, been using this for years. with dehydrated (https://github.com/dehydrated-io/dehydrated) you can automate renewing the certs, pretty convenient.

                                        One thing i didn't see mentioned yet - you can also easily create a wildcard for a subdomain of your domain, e.g. *.local.example.com.
                                        Most DNS providers let you define something like _acme-challenge.local IN TXT ... so you don't even need to define an extra zone for local.example.com.
                                        Probably makes no big difference, but i like it ^^

                                        4 1 Reply Last reply
                                        0
                                        • ? Guest

                                          Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                                          Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                                          I This user is from outside of this forum
                                          I This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #21

                                          I'll mention this as no one has yet but you can be your own CA. Tools like mkcert make it easy

                                          https://github.com/FiloSottile/mkcert

                                          This is potentially more hassle (than using public DNS) as you have to get your CA certs onto every device. However it may be suitable depending on the situation.

                                          F 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups