This webpage provides instructions for using the acme-dns DNS challenge method with various ACME clients to obtain HTTPS certificates for private networks. Caddy, Traefik, cert-manager, acme.sh, LEGO and Certify The Web are listed as ACME clients that support acme-dns. For each client, configuration examples are provided that show how to set API credentials and other settings to use the acme-dns service at https://api.getlocalcert.net/api/v1/acme-dns-compat to obtain certificates. Interesting that so many ACME clients support the acme-dns service, providing an easy way to obtain HTTPS certificates for private networks.

HN https://news.ycombinator.com/item?id=36674224

seiferteric: Proposes an idea for automatically creating trusted certificates for new devices on a private network.

hartmel: Mentions SCEP which allows automatic certificate enrollment for network devices.

mananaysiempre: Thinks using EJBCA for this, as hartmel suggested, adds unnecessary complexity.

8organicbits: Describes a solution using getlocalcert which issues certificates for anonymous domain names.

austin-cheney: Has a solution using TypeScript that checks for existing certificates and creates them if needed, installing them in the OS and browser.

bruce511: Says automating the process is possible.

lolinder: Mentions Caddy will automatically create and manage certificates for local domains.

frfl: Uses Lego to get a Let’s Encrypt certificate for a local network website using the DNS challenge.

donselaar: Recommends DANE which works well for private networks without a public CA, but lacks browser support.

  • pe1uca@lemmy.pe1uca.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Yep, caddy was as easy as to use xcaddy with the module of my DNS, configure the key and run caddy, that’s it xD.

    For what lolinder mentioned in the news link you need to have port 80 open.
    If you don’t want that you could configure local authority, but that’ll give the warning of a selfsigned certificate.

  • thedaly@reseed.it
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Big fan of letsencrypt’s certbot with the nginx and cloudflare (or other dns providers) plugins.

    Is there any reason to use caddy or traefik over nginx?

    • LedgeDrop@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      I found traefik to be a more feature rich, load balancer when used in kubernetes environments. Other than use in kubernetes, I’d say if you’re happy with nginx, keep using nginx :)

    • steltek@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      I haven’t tried it yet but I vaguely recall traefik had a better proxy-auth setup while nginx locked it away behind their freemium plan.

    • lchapman@programming.dev
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Caddy takes almost all of the nginx boilerplate and handles it for you.

      If you’re doing something simple in nginx, it’s far simpler with Caddy.

  • xthexder@l.sw0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Personally I use dnsrobocert with my own domains. I’ve got a few subdomains that point to a Wireguard subnet IP for private network apps (so it resolves to nothing if you’re not on VPN). Having a real valid SSL cert is really nice vs self signing, and it keeps my browser with HTTPS-Everywhere happy.