top | item 41912424

(no title)

xfer | 1 year ago

Or use a wildcard cert for all internal certs.

discuss

order

pridkett|1 year ago

This is exactly what I do. After seeing how much of my internal network was exposed in certificate transparency logs, I noped out and just do a DNS challenge for a wildcard for almost everything.

Now it’s have a nice script that distributes my key automatically to 20 or so hosts and apps and have a real SSL cert on everything from my UDM Pro to my Synology to random Raspberry Pis running containers. Most of which have domain names that only resolve on my local network.

This is made possible by a fairly robust DNS setup that consists of not only giving A records to all my hosts automatically, but also adding in CNAMEs for services and blocking almost all outbound DNS, DNS over TLS, DoH, etc.

dopp0|1 year ago

> fairly robust DNS setup that consists of not only giving A records to all my hosts

looks nice, can you give more details on this? tks!

ndsipa_pomu|1 year ago

That could be a good idea, though it means that the certificate/key has to be well guarded.

project2501a|1 year ago

Please don't. Technical debt accumulates by force of practice.

qwertox|1 year ago

It's working good for me. My technical debt is to always make sure that I'm able to renew a certificate and that the distribution occurs successfully.

I don't see how other solutions are less problematic.