How do I use HTTPS on a private LAN without self-signed certs?
from early_riser@lemmy.radio to selfhosted@lemmy.world on 05 Apr 04:48
https://lemmy.radio/post/6728964

Maybe this is more of a home lab question, but I’m utterly clueless regarding PKI and HTTPS certs, despite taking more than one class that goes into some detail about how the system works. I’ve tried finding guides on how to set up your own CA, but my eyes glaze over after the third or fourth certificate you have to generate.

Anyway, I know you need a public DNS record for HTTPS to work, and it struck me recently that I do in fact own a domain name that I currently use as my DNS suffix on my LAN. Is there a way I can get Let’s Encrypt to dole out a wildcard certificate I can use on the hosts in my LAN so I don’t have to fiddle with every machine that uses every service I’m hosting? If so, is there a guide for the brain dead one could point me to? Maybe doing this will help me grock the whole PKI thing.

UPDATE:

Here’s what I ended up doing:

  1. set up cloudflare as the DNS provider for my domain
  2. use certbot plus the cloudflare DNS plugin to create a wildcard cert. Because I want to use wildcard certs and because the web servers are on a NATed private LAN, HTTP-01 challenge cannot be used. Wildcard certs use a DNS challenge. From what I understand of the certbot docs, the HTTP challenge makes a certain HTTP resource available on the web server, then requests that resource, presumably via an external client, to verify that you own the domain. the DNS challenge works by temporarily placing a TXT record in your DNS server. This method requires your DNS provider to have an accessible API that allows the modification of resource records.
  3. Once the cert and key are generated, I place them on the servers I want to to make use of them and set up the web server accordingly.
  4. Visit the websites and confirm that HTTPS works.

There are some other hiccups that I’m guessing aren’t related to HTTPS. Per My earlier question about self hosting, I’m experimenting with NodeBB. I cannot get the two test instances to federate, which I initially assumed was an issue with HTTPS. That’s a question best asked elsewhere, though I thought it relevant to note because it was my initial purpose for setting up HTTPS.

#selfhosted

threaded - newest

neon_nova@lemmy.dbzer0.com on 05 Apr 04:54 next collapse

I wish you luck on this. I also would like to learn more about this, but it’s not a priority for me. I just got a cheap vps and will use that for testing 😂

bedlam@lemmy.world on 05 Apr 04:56 next collapse

I’m not sure about wildcard certs but I use this container to dole out letsencrypt certs for web services and it’s fairly straightforward compared to traefik or something: github.com/lucaslorentz/caddy-docker-proxy

Caddy docs: caddyserver.com/docs/quick-starts/reverse-proxy

ptz@dubvee.org on 05 Apr 04:56 next collapse

Is there a way I can get Let’s Encrypt to dole out a wildcard certificate

Yep. Just specify the domains yourdomain.com and *.yourdomain.com in the certbot request. Wildcard domains require the DNS-based challenge, but you’ve said you’re already good there. You don’t technically need the apex domain (yourdomain.com) but I always add it since I do have services running there.

Any subdomains under the wildcard can use internal DNS or internal IPs on the public DNS (I do the former, but the latter works too).

I used to run an internal CA, and it wasn’t too hard to setup a CA and distribute my root cert. Except on mobile devices. On Android it was easy, but there was a persistent warning that my network traffic could be intercepted (which is true when there’s a custom root cert installed), but it since it was my cert, it got annoying seeing that all the time. Not sure if Apple devices can even do that, but regardless, it wasn’t practical for friends who wanted to use my self-hosted services to install a custom cert when they were over.

early_riser@lemmy.radio on 05 Apr 05:09 collapse

Cool. Follow up question: Do I generate the cert once and distribute the same private key to all the servers I’m running? I’m guessing not, but does that mean I run the certbot command on every server?

ptz@dubvee.org on 05 Apr 05:17 collapse

I have a single Nginx setup which is the frontend for all my web services. So I only need to deploy it there (and to its HA partner). My renewal script just scp’s it to the secondary and does an nginx -s reload on both.

I do generate separate certs/keys for my non-web servers, but there’s only two of those.

You could also, if you wanted, just generate one cert and distribute it and its key to everything with a script or other automation tool (Ansible is what I used to use).

bravesilvernest@lemmy.ml on 05 Apr 04:58 next collapse

I have a script to self-sign 10 year certs on internal traffic only, and then added my public cert to devices needing it. I’m going to be really annoyed in a decade, but until then I’m having a ball 🙂

catloaf@lemm.ee on 05 Apr 04:59 next collapse

You don’t need public DNS. You can use whatever domain you want if you use your own DNS server (though you should use one you own, or something under the .internal TLD).

Likewise, you can issue whatever certs you want if you trust the CA.

But LE does support wildcard certs. You can get them with certbot or other tools.

Personally I use traefik, which has LE support built in. It automatically gets an individual cert for each service. If you use caddy, I’m sure it has something similar.

StrawberryPigtails@lemmy.sdf.org on 05 Apr 05:01 next collapse

I’ve never done it myself but this may be what you’re looking for.

mhzawadi@lemmy.horwood.cloud on 05 Apr 05:06 next collapse

If you have your own domain and your DNS provider has an API, you can get a certificate for anything in your domain

TedZanzibar@feddit.uk on 05 Apr 05:13 next collapse

If you own a domain, which you do, you can get wildcard certs from Let’s Encrypt using a DNS challenge. Most (all?) popular reverse proxies can do this either natively or via an addon/module, you just need to use a supported DNS provider.

towerful@programming.dev on 05 Apr 05:13 next collapse

You need to control a domain, so LE can verify you are the controller of the domain, then LE will issue you a certificate saying you are the controller of the domain.

For a wildcard LE cert, you need to use the DNS challenge method.
Essentially the ACME client (or certbot or whatever) will talk to LE and say “I want a DNS challenge for *.example.com”.
LE will reply “ok, your order number 69, and your challenge code is DEADBEEF”.
ACME then interacts with your public nameserver (or you have to do this manually) and add the challenge code as a txt record _acme-challenge.example.com. (I’ve been caught out by the fact LE uses Google DNS for resolution, and Google will only follow 1 level of NS records from the root authorative nameserver).
All the while, LE is checking for that record. When it finds the record, it mints a wildcard certificate.
ACME then periodically checks in with LE asking for order 69. Once LE has minted the cert, it will return it to acme.
And now you have a wildcard cert.

So, how to use it on a local domain?
Use a split horizon DNS method.
Ensure your DHCP is handing out a local DNS for resolving.
Configure that local DNS to then use 8.8.8.8 or whatever as it’s upstream.
Then load in static/override records to the local DNS.
Pihole can do this. OPNSense/pfSense can do this. Unifi can do some of this.

How does this work?
Any device on your network that wants to know the IP of example.example.com will ask it’s configured DNS - the local DNS that you have configured.
The local DNS will check it’s static assignments and go “yeh, example.example.com is 10.10.3.3”.
If you ask you local DNS for google.com, it won’t have a static assignment for it, so it will ask it’s upstream DNS, and return that result.
And it means you aren’t putting private IP spaces on public NS records.

Then you can load in your wildcard cert to 10.10.3.3, and you will have a trusted HTTPS connection.

Here is a list of LE clients that will automate LE certs.
letsencrypt.org/docs/client-options/

Have a read through and pick your desired flavour.
Dig into the docs of that flavour, and start playing around.

If it’s all HTTPS, consider using something like Nginx Proxy Manager (nginxproxymanager.com) as a reverse proxy in front of your services and for managing the LE cert.
It’s super easy to use, has a decent GUI, and then it’s only 1 IP to point all DNS records to.

mouse@midwest.social on 05 Apr 05:22 next collapse

I use Caddy for this. I’ll leave links to the documentation as well as a few examples.

Here’s the documentation for wildcard certs. caddyserver.com/docs/automatic-https#wildcard-cer…

Here’s how you add DNS providers to Caddy without Docker. caddy.community/t/…/8148

Here’s how you do it with Docker. github.com/docker-library/docs/tree/master/caddy#…

Look for the DNS provider in this repository first. github.com/caddy-dns

Here’s documentation about using environment variables. caddyserver.com/docs/caddyfile/concepts#environme…

Docker

A few examples of Dockerfiles. These will build Caddy with DNS support.

DuckDNS

FROM caddy:2-builder AS builder
RUN xcaddy build --with github.com/caddy-dns/duckdns

FROM caddy:2
COPY --from=builder /usr/bin/caddy /usr/bin/caddy

Cloudflare

FROM caddy:2-builder AS builder
RUN xcaddy build --with github.com/caddy-dns/cloudflare

FROM caddy:2
COPY --from=builder /usr/bin/caddy /usr/bin/caddy

Porkbun

FROM caddy:2-builder AS builder
RUN xcaddy build --with github.com/caddy-dns/porkbun

FROM caddy:2
COPY --from=builder /usr/bin/caddy /usr/bin/caddy

Configure DNS provider

This is what to add the the Caddyfile, I’ve used these in the examples that follow this section. You can look at the repository for the DNS provider to see how to configure it for example.

DuckDNS

github.com/caddy-dns/cloudflare?tab=readme-ov-fil…

tls {
	dns duckdns {env.DUCKDNS_API_TOKEN}
}

CloudFlare

github.com/caddy-dns/cloudflare?tab=readme-ov-fil… Dual-key

tls {
	dns cloudflare {
		zone_token {env.CF_ZONE_TOKEN}
		api_token {env.CF_API_TOKEN}
	}
}

Single-key

tls {
	dns cloudflare {env.CF_API_TOKEN}
}

PorkBun

github.com/caddy-dns/porkbun?tab=readme-ov-file#c… Global

{
        acme_dns porkbun {
                api_key {env.PORKBUN_API_KEY}
                api_secret_key {env.PORKBUN_API_SECRET_KEY}
        }
}

or per site

tls {
	dns porkbun {
			api_key {env.PORKBUN_API_KEY}
			api_secret_key {env.PORKBUN_API_SECRET_KEY}
	}
}

Caddyfile

And finally the Caddyfile examples.

DuckDNS

Here’s how you do it with DuckDNS.

*.example.org {
        tls {
                dns duckdns {$DUCKDNS_TOKEN}
        }
eneff@discuss.tchncs.de on 05 Apr 06:45 next collapse

thank you for providing such a thorough reply, good shit

theparadox@lemmy.world on 05 Apr 06:53 next collapse

Thanks for being so detailed!

I use caddy for straightforward https, but every time I try to use it for a service that isn’t just a reverse_proxy entry, I really struggle to find resources I understand… and most of the time the “solutions” I find are outdated and don’t seem to work. The most recent example of this for me would be Baikal.

Do you have any recommendations for where I might get good examples and learn more about how do troubleshoot and improve my Caddyfile entries?

Thanks!

mouse@midwest.social on 05 Apr 10:16 collapse

Unfortunately that’s one area I am bad with, I tend to use reverse_proxy for most such as Baikal running with the ckulka/baikal Docker image (which runs Nginx or Apache), otherwise I only static sites.

I’d start by looking at Baikal’s config for Apache and Nginx, sabre.io/baikal/install/ and comparing to the directives for Caddy, caddyserver.com/docs/caddyfile/directives and

Since it uses PHP, it will need that, caddyserver.com/docs/caddyfile/patterns#php

Upon my searches I came across this, it talks about running Baikal with Caddy specifically. github.com/caddyserver/caddy/issues/497

I hope that this provided some helpful directions.

conrad82@lemmy.world on 05 Apr 07:04 next collapse

I do the same!

I have a provider that is not supported by caddy, but I can still use it via duckdns delegation!

github.com/caddy-dns/duckdns?tab=readme-ov-file#c…

Challenge delegation

To obtain a certificate using ACME DNS challenges, you’d use this module as described above. But, if you have a different domain (say, my.example.com) CNAME’d to your Duck DNS domain, you have two options:

  1. Not use this module: Use a module matching the DNS provider for my.example.com.
  2. Delegate the challenge to Duck DNS.
Monument@lemmy.sdf.org on 05 Apr 15:09 collapse

The advice I needed and have not been able to find. I could kiss you. Or at least give you a fond nod.

Lemmchen@feddit.org on 05 Apr 05:25 next collapse

Some form of domain and a DNS server (router or Pi-Hole) in your LAN

suicidaleggroll@lemm.ee on 05 Apr 06:01 next collapse

Reverse proxy + DNS-challenge wildcard cert for your domain. The end. Super easy to set up and zero maintenance. Adding a new service is just a couple clicks in your reverse proxy and you’re done.

ZebraGoose@sh.itjust.works on 05 Apr 06:28 next collapse

I did follow this guide from Techno Tim, he uses cloudflare but you can go with Lets encrypt aswell

www.youtube.com/watch?v=liV3c9m_OX8

xrun_detected@programming.dev on 05 Apr 07:13 next collapse

+1 for the letsencrypt wildcard with DNS verification, been using this for years. with dehydrated (github.com/dehydrated-io/dehydrated) you can automate renewing the certs, pretty convenient.

One thing i didn’t see mentioned yet - you can also easily create a wildcard for a subdomain of your domain, e.g. *.local.example.com. Most DNS providers let you define something like _acme-challenge.local IN TXT … so you don’t even need to define an extra zone for local.example.com. Probably makes no big difference, but i like it ^^

4am@lemm.ee on 05 Apr 09:54 collapse

If you are really looking for hassle-free this is it. LetsEncrypt root certificates are already trusted by most devices so when your friends come over and wanna control the media library or whatever you don’t need to install your locally hosted CA’s self-signed certificates on their phone.

Also certbot and a cron or systemd timer is all you need; people have rolled all these fancy solutions but I say keep it simple.

IanTwenty@lemmy.world on 05 Apr 09:19 next collapse

I’ll mention this as no one has yet but you can be your own CA. Tools like mkcert make it easy

github.com/FiloSottile/mkcert

This is potentially more hassle (than using public DNS) as you have to get your CA certs onto every device. However it may be suitable depending on the situation.

False@lemmy.world on 05 Apr 20:03 collapse

Running your own CA is essentially still a form of self signed. Though it will work better for some use cases (at the cost of more complexity)

WhyJiffie@sh.itjust.works on 05 Apr 21:24 next collapse

browsers complain less, and some apps (like HomeAssistant Android) only accept that

False@lemmy.world on 05 Apr 21:54 collapse

Trust the self signed cert. Works similarly to trusting a CA.

WhyJiffie@sh.itjust.works on 05 Apr 22:00 collapse

for every single subdomain, on desktop. firefox mobile does not even remember the decision. HA Android straight out refuses it, and thats not a local problem but a relatively known one in the community

False@lemmy.world on 05 Apr 22:05 collapse

Import it into the trust store in the browser/OS. It should be the same (or very similar) operation for a self-signed cert and a CA that isn’t subordinate to the standard internet root CAs.

If you can’t import your own root CA cert then you’re probably screwed on both fronts and are going to have to use certs issued by a public CA that’s subordinate to a commonly trusted root CA.

My point here is that there’s little distinguishing a self-signed cert and a cert issued by your own private CA for most people that are self-hosting.

IanTwenty@lemmy.world on 06 Apr 00:45 collapse

I know what you mean but using real self-signed certificates (i.e. no CA at all) with modern browsers causes so many issues I find them unusable.

JakenVeina@lemm.ee on 05 Apr 10:09 next collapse

The most straightforward thing to do, on a private LAN, is to make all your own certs, from a custom root cert, and then manually install that cert as “trusted” on each machine. If none of the machines on this network need to accessed from outside the LAN, then you’re golden.

MangoPenguin@lemmy.blahaj.zone on 05 Apr 10:41 next collapse

LetsEncrypt.

offspec@lemmy.world on 05 Apr 11:00 next collapse

With certbot there’s probably a plugin to do it automatically, but if you just want to get something working right now you can run the following to manually run a dns challenge against your chosen domain names and get a cert for any specified. This will expire in ~3 months and you’ll need to do it again, so I’d recommend throwing it in a cron job and finding the applicable certbot-dns-dnsprovider plugin that will make it run without your input. Once you have it working you can extract the certs from /etc/letsencrypt/live on most systems. Just be aware that the files there are going to be symlinks so you’ll want to copy them before tarballing them to move other machines.

certbot --preferred-challenges dns --manual certonly -d *.mydomain.tld -d mydomain.tld -d *.local.mydomain.tld

douglasg14b@lemmy.world on 05 Apr 11:39 next collapse

I just:

  1. Have my router setup with DNS for domains I want to direct locally, and point them to:
  2. Have a reverse proxy that has auto- certbot behavior (caddy) connected to the cloud flair API. Anytime I add a new domain or subdomain for reverse proxine to a particular device on my network a valid certificate is automatically generated for me. They are also automatically renewed
  3. Navigation I do within my local network to these domains gives me real certificates.
Celestus@lemm.ee on 05 Apr 13:29 next collapse

FYI, all the certs you generate are public record, so it might be a good idea to use a wildcard route in Caddy. That will make it only generates one cert, so no one can find your internal domain names. Especially if your Caddy instance is accessible from the Internet, and you’re expecting external connections not to be able to access domains with only internal DNS records

LovableSidekick@lemmy.world on 05 Apr 15:13 collapse

When somebody says they “just” reverse the polarity of the navigational deflector array and channel power directly from the warp core.

I can’t even get host mapping to work on my Centurylink router - the name is defined for the IP address but nothing else on my network can browse to it by name, only by IP. - software dev who has never understood networking.

LodeMike@lemmy.today on 05 Apr 15:32 next collapse

Let’s encrypt has a DNS verification option.

False@lemmy.world on 05 Apr 20:02 next collapse

You don’t need a public DNS record for https to work. You can just use public external certs as long as it’s for a domain you own. You don’t need to setup the same domains externally.

If you want certs for a domain you own, then yeah you’re looking at self signed.

Bzdalderon@lemmy.ca on 05 Apr 20:23 collapse

I use Nginx and let’s encrypt. Works super easily and auto updates.