Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. How do I use HTTPS on a private LAN without self-signed certs?

How do I use HTTPS on a private LAN without self-signed certs?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
51 Posts 37 Posters 196 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ? Guest

    Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

    Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

    O This user is from outside of this forum
    O This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #26

    With certbot there's probably a plugin to do it automatically, but if you just want to get something working right now you can run the following to manually run a dns challenge against your chosen domain names and get a cert for any specified. This will expire in ~3 months and you'll need to do it again, so I'd recommend throwing it in a cron job and finding the applicable certbot-dns-dnsprovider plugin that will make it run without your input. Once you have it working you can extract the certs from /etc/letsencrypt/live on most systems. Just be aware that the files there are going to be symlinks so you'll want to copy them before tarballing them to move other machines.

    certbot --preferred-challenges dns --manual certonly -d *.mydomain.tld -d mydomain.tld -d *.local.mydomain.tld

    1 Reply Last reply
    0
    • ? Guest

      Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

      Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

      douglasg14b@lemmy.worldD This user is from outside of this forum
      douglasg14b@lemmy.worldD This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #27

      I just:

      1. Have my router setup with DNS for domains I want to direct locally, and point them to:
      2. Have a reverse proxy that has auto- certbot behavior (caddy) connected to the cloud flair API
      3. Navigation I do within my local network to these domains gives me real certificates.
      C L 2 Replies Last reply
      0
      • douglasg14b@lemmy.worldD [email protected]

        I just:

        1. Have my router setup with DNS for domains I want to direct locally, and point them to:
        2. Have a reverse proxy that has auto- certbot behavior (caddy) connected to the cloud flair API
        3. Navigation I do within my local network to these domains gives me real certificates.
        C This user is from outside of this forum
        C This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #28

        FYI, all the certs you generate are public record, so it might be a good idea to use a wildcard route in Caddy. That will make it only generates one cert, so no one can find your internal domain names. Especially if your Caddy instance is accessible from the Internet, and you’re expecting external connections not to be able to access domains with only internal DNS records

        douglasg14b@lemmy.worldD 1 Reply Last reply
        0
        • mouse@midwest.socialM [email protected]

          I use Caddy for this. I'll leave links to the documentation as well as a few examples.

          Here's the documentation for wildcard certs.
          https://caddyserver.com/docs/automatic-https#wildcard-certificates

          Here's how you add DNS providers to Caddy without Docker.
          https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

          Here's how you do it with Docker.
          https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

          Look for the DNS provider in this repository first.
          https://github.com/caddy-dns

          Here's documentation about using environment variables.
          https://caddyserver.com/docs/caddyfile/concepts#environment-variables

          Docker

          A few examples of Dockerfiles. These will build Caddy with DNS support.

          DuckDNS

          FROM caddy:2-builder AS builder
          RUN xcaddy build --with github.com/caddy-dns/duckdns
          
          FROM caddy:2
          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
          

          Cloudflare

          FROM caddy:2-builder AS builder
          RUN xcaddy build --with github.com/caddy-dns/cloudflare
          
          FROM caddy:2
          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
          

          Porkbun

          FROM caddy:2-builder AS builder
          RUN xcaddy build --with github.com/caddy-dns/porkbun
          
          FROM caddy:2
          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
          

          Configure DNS provider

          This is what to add the the Caddyfile, I've used these in the examples that follow this section.
          You can look at the repository for the DNS provider to see how to configure it for example.

          DuckDNS

          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

          tls {
          	dns duckdns {env.DUCKDNS_API_TOKEN}
          }
          

          CloudFlare

          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
          Dual-key

          tls {
          	dns cloudflare {
          		zone_token {env.CF_ZONE_TOKEN}
          		api_token {env.CF_API_TOKEN}
          	}
          }
          

          Single-key

          tls {
          	dns cloudflare {env.CF_API_TOKEN}
          }
          

          PorkBun

          https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
          Global

          {
          	acme_dns porkbun {
          			api_key {env.PORKBUN_API_KEY}
          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
          	}
          }
          

          or per site

          tls {
          	dns porkbun {
          			api_key {env.PORKBUN_API_KEY}
          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
          	}
          }
          

          Caddyfile

          And finally the Caddyfile examples.

          DuckDNS

          Here's how you do it with DuckDNS.

          *.example.org {
                  tls {
                          dns duckdns {$DUCKDNS_TOKEN}
                  }
          
                  @hass host home-assistant.example.org
                  handle @hass {
                          reverse_proxy home-assistant:8123
                  }
          }
          

          Also you can use environment variables like this.

          *.{$DOMAIN} {
                  tls {
                          dns duckdns {$DUCKDNS_TOKEN}
                  }
          
                  @hass host home-assistant.{$DOMAIN}
                  handle @hass {
                          reverse_proxy home-assistant:8123
                  }
          }
          

          CloudFlare.

          *.{$DOMAIN} {
                  tls {
          	        dns cloudflare {env.CF_API_TOKEN}
                  }
          
                  @hass host home-assistant.{$DOMAIN}
                  handle @hass {
                          reverse_proxy home-assistant:8123
                  }
          }
          

          Porkbun

          *.{$DOMAIN} {
                  tls {
          	        dns porkbun {
          			api_key {env.PORKBUN_API_KEY}
          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
          	        }
                  }
          
                  @hass host home-assistant.{$DOMAIN}
                  handle @hass {
                          reverse_proxy home-assistant:8123
                  }
          }
          
          M This user is from outside of this forum
          M This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #29

          The advice I needed and have not been able to find. I could kiss you. Or at least give you a fond nod.

          1 Reply Last reply
          0
          • douglasg14b@lemmy.worldD [email protected]

            I just:

            1. Have my router setup with DNS for domains I want to direct locally, and point them to:
            2. Have a reverse proxy that has auto- certbot behavior (caddy) connected to the cloud flair API
            3. Navigation I do within my local network to these domains gives me real certificates.
            L This user is from outside of this forum
            L This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #30

            When somebody says they "just" reverse the polarity of the navigational deflector array and channel power directly from the warp core.

            douglasg14b@lemmy.worldD 1 Reply Last reply
            0
            • ? Guest

              Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

              Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

              L This user is from outside of this forum
              L This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #31

              Let's encrypt has a DNS verification option.

              1 Reply Last reply
              0
              • ? Guest

                Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                F This user is from outside of this forum
                F This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #32

                You don't need a public DNS record for https to work. You can just use public external certs as long as it's for a domain you own. You don't need to setup the same domains externally.

                If you want certs for a domain you own, then yeah you're looking at self signed.

                1 Reply Last reply
                0
                • I [email protected]

                  I'll mention this as no one has yet but you can be your own CA. Tools like mkcert make it easy

                  https://github.com/FiloSottile/mkcert

                  This is potentially more hassle (than using public DNS) as you have to get your CA certs onto every device. However it may be suitable depending on the situation.

                  F This user is from outside of this forum
                  F This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #33

                  Running your own CA is essentially still a form of self signed. Though it will work better for some use cases (at the cost of more complexity)

                  W I 2 Replies Last reply
                  0
                  • ? Guest

                    Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                    Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                    ? Offline
                    ? Offline
                    Guest
                    wrote on last edited by
                    #34

                    I use Nginx and let's encrypt. Works super easily and auto updates.

                    1 Reply Last reply
                    0
                    • F [email protected]

                      Running your own CA is essentially still a form of self signed. Though it will work better for some use cases (at the cost of more complexity)

                      W This user is from outside of this forum
                      W This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #35

                      browsers complain less, and some apps (like HomeAssistant Android) only accept that

                      F 1 Reply Last reply
                      0
                      • W [email protected]

                        browsers complain less, and some apps (like HomeAssistant Android) only accept that

                        F This user is from outside of this forum
                        F This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #36

                        Trust the self signed cert. Works similarly to trusting a CA.

                        W 1 Reply Last reply
                        0
                        • F [email protected]

                          Trust the self signed cert. Works similarly to trusting a CA.

                          W This user is from outside of this forum
                          W This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #37

                          for every single subdomain, on desktop. firefox mobile does not even remember the decision. HA Android straight out refuses it, and thats not a local problem but a relatively known problem in the community

                          F N 2 Replies Last reply
                          0
                          • W [email protected]

                            for every single subdomain, on desktop. firefox mobile does not even remember the decision. HA Android straight out refuses it, and thats not a local problem but a relatively known problem in the community

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #38

                            Import it into the trust store in the browser/OS. It should be the same operation for a self-signed cert and a CA that isn't subordinate to the standard internet root CAs.

                            If you can't import your own root CA cert then you're probably screwed on both fronts and are going to have to use a public CA that's subordinate to a commonly trusted root CA.

                            1 Reply Last reply
                            0
                            • F [email protected]

                              Running your own CA is essentially still a form of self signed. Though it will work better for some use cases (at the cost of more complexity)

                              I This user is from outside of this forum
                              I This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #39

                              I know what you mean but using real self-signed certificates (i.e. no CA at all) with modern browsers causes so many issues I find them unusable.

                              1 Reply Last reply
                              0
                              • W [email protected]

                                for every single subdomain, on desktop. firefox mobile does not even remember the decision. HA Android straight out refuses it, and thats not a local problem but a relatively known problem in the community

                                N This user is from outside of this forum
                                N This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #40

                                Just create a wildcard domain certificate !

                                I access all my services in my lan through https://servicename.home.lab/ I just had to add the rootCA certificat (actually the intermediate certificate) into my trust store on every device. That's what they actually do, just in automated way !

                                Never had an issue to access my services with my self-signed certs, neither on Android, iOS, windows, linux ! Everything served from my server via my reverse proxy of choice (Treafik).

                                However I do remember that there was something of importance to make my Android device accept the certificate (something in certificate itself and the extension).

                                If you're interested I can send you the snipped of a book to fully host your own CA :). It's a great read and easy to follow !

                                W 1 Reply Last reply
                                0
                                • C [email protected]

                                  FYI, all the certs you generate are public record, so it might be a good idea to use a wildcard route in Caddy. That will make it only generates one cert, so no one can find your internal domain names. Especially if your Caddy instance is accessible from the Internet, and you’re expecting external connections not to be able to access domains with only internal DNS records

                                  douglasg14b@lemmy.worldD This user is from outside of this forum
                                  douglasg14b@lemmy.worldD This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #41

                                  That's a good call out.

                                  There are a few things I do right now:

                                  1. All of my public DNS entries for the certs point at cloudflare, not my IP.
                                  2. My internal Network DNS resolver will resolve those domains to an internal address
                                  3. I drop all connections to those domains in cloudflare with rules
                                  4. In caddy, I drop all connections that come from a non-internal IP range for all internal services
                                  5. I use tailscale to avoid having to have routes from the Internet into my internal services for when I'm not at home.
                                  6. For externally accessible routes, I have entirely separate configurations that proxy access to them. And external DNS still points to cloudflare, which has very restrictive rules on allowable connections.
                                  1 Reply Last reply
                                  0
                                  • L [email protected]

                                    When somebody says they "just" reverse the polarity of the navigational deflector array and channel power directly from the warp core.

                                    douglasg14b@lemmy.worldD This user is from outside of this forum
                                    douglasg14b@lemmy.worldD This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #42

                                    In this case I run pfSense instead of my ISP provided router. This allows me to have my own DNS resolver, which I can then resolve various domains to internal addresses.

                                    All devices on my network point to my router for DNS allowing them to resolve internal addresses from all of these.

                                    L 1 Reply Last reply
                                    0
                                    • ? Guest

                                      Maybe this is more of a home lab question, but I'm utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I've tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

                                      Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let's Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don't have to fiddle with every machine that uses every service I'm hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

                                      R This user is from outside of this forum
                                      R This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #43

                                      Not sure if anyone else mentioned this, but you can just redirect traffic on your local LAN with an ad blocker like pihole ( I currently use adguardhome podman instance )

                                      Basically, it rewrites any calls to your outside domain from within your local network, back to your local web server. As long as the site is setup with the certificate there, you’re good.

                                      Then setup a Nina nginx reverse proxy and you’re golden. Regular site outside LAN, internal site inside LAN.

                                      1 Reply Last reply
                                      0
                                      • douglasg14b@lemmy.worldD [email protected]

                                        In this case I run pfSense instead of my ISP provided router. This allows me to have my own DNS resolver, which I can then resolve various domains to internal addresses.

                                        All devices on my network point to my router for DNS allowing them to resolve internal addresses from all of these.

                                        L This user is from outside of this forum
                                        L This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #44

                                        Thanks, I'll lookup pfSense. But straightforward host mapping has worked for me in the past with this router and others. It worked great on my old Cisco DSL router 25 years ago. So simple and straightforward, it should just freaking work. sigh

                                        1 Reply Last reply
                                        0
                                        • mouse@midwest.socialM [email protected]

                                          I use Caddy for this. I'll leave links to the documentation as well as a few examples.

                                          Here's the documentation for wildcard certs.
                                          https://caddyserver.com/docs/automatic-https#wildcard-certificates

                                          Here's how you add DNS providers to Caddy without Docker.
                                          https://caddy.community/t/how-to-use-dns-provider-modules-in-caddy-2/8148

                                          Here's how you do it with Docker.
                                          https://github.com/docker-library/docs/tree/master/caddy#adding-custom-caddy-modules

                                          Look for the DNS provider in this repository first.
                                          https://github.com/caddy-dns

                                          Here's documentation about using environment variables.
                                          https://caddyserver.com/docs/caddyfile/concepts#environment-variables

                                          Docker

                                          A few examples of Dockerfiles. These will build Caddy with DNS support.

                                          DuckDNS

                                          FROM caddy:2-builder AS builder
                                          RUN xcaddy build --with github.com/caddy-dns/duckdns
                                          
                                          FROM caddy:2
                                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                          

                                          Cloudflare

                                          FROM caddy:2-builder AS builder
                                          RUN xcaddy build --with github.com/caddy-dns/cloudflare
                                          
                                          FROM caddy:2
                                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                          

                                          Porkbun

                                          FROM caddy:2-builder AS builder
                                          RUN xcaddy build --with github.com/caddy-dns/porkbun
                                          
                                          FROM caddy:2
                                          COPY --from=builder /usr/bin/caddy /usr/bin/caddy
                                          

                                          Configure DNS provider

                                          This is what to add the the Caddyfile, I've used these in the examples that follow this section.
                                          You can look at the repository for the DNS provider to see how to configure it for example.

                                          DuckDNS

                                          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples

                                          tls {
                                          	dns duckdns {env.DUCKDNS_API_TOKEN}
                                          }
                                          

                                          CloudFlare

                                          https://github.com/caddy-dns/cloudflare?tab=readme-ov-file#caddyfile-examples
                                          Dual-key

                                          tls {
                                          	dns cloudflare {
                                          		zone_token {env.CF_ZONE_TOKEN}
                                          		api_token {env.CF_API_TOKEN}
                                          	}
                                          }
                                          

                                          Single-key

                                          tls {
                                          	dns cloudflare {env.CF_API_TOKEN}
                                          }
                                          

                                          PorkBun

                                          https://github.com/caddy-dns/porkbun?tab=readme-ov-file#config-examples
                                          Global

                                          {
                                          	acme_dns porkbun {
                                          			api_key {env.PORKBUN_API_KEY}
                                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                          	}
                                          }
                                          

                                          or per site

                                          tls {
                                          	dns porkbun {
                                          			api_key {env.PORKBUN_API_KEY}
                                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                          	}
                                          }
                                          

                                          Caddyfile

                                          And finally the Caddyfile examples.

                                          DuckDNS

                                          Here's how you do it with DuckDNS.

                                          *.example.org {
                                                  tls {
                                                          dns duckdns {$DUCKDNS_TOKEN}
                                                  }
                                          
                                                  @hass host home-assistant.example.org
                                                  handle @hass {
                                                          reverse_proxy home-assistant:8123
                                                  }
                                          }
                                          

                                          Also you can use environment variables like this.

                                          *.{$DOMAIN} {
                                                  tls {
                                                          dns duckdns {$DUCKDNS_TOKEN}
                                                  }
                                          
                                                  @hass host home-assistant.{$DOMAIN}
                                                  handle @hass {
                                                          reverse_proxy home-assistant:8123
                                                  }
                                          }
                                          

                                          CloudFlare.

                                          *.{$DOMAIN} {
                                                  tls {
                                          	        dns cloudflare {env.CF_API_TOKEN}
                                                  }
                                          
                                                  @hass host home-assistant.{$DOMAIN}
                                                  handle @hass {
                                                          reverse_proxy home-assistant:8123
                                                  }
                                          }
                                          

                                          Porkbun

                                          *.{$DOMAIN} {
                                                  tls {
                                          	        dns porkbun {
                                          			api_key {env.PORKBUN_API_KEY}
                                          			api_secret_key {env.PORKBUN_API_SECRET_KEY}
                                          	        }
                                                  }
                                          
                                                  @hass host home-assistant.{$DOMAIN}
                                                  handle @hass {
                                                          reverse_proxy home-assistant:8123
                                                  }
                                          }
                                          
                                          S This user is from outside of this forum
                                          S This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #45

                                          I did basically this w/ Cloudflare, and it worked perfectly. I used to do ACME requests, but this is simpler and doesn't require me to route traffic into my LAN. I now expose a handful of services, but I used to have to expose all services for TLS cert renewal to work.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups