• Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    10 months ago

    you don’t even need to think about letsencrypt

    Do you know if it’s just as friction-less to have a self signed cert up with Caddy for internal use? I was using Nginx PM recently and had the need to serve https but I can’t use letsencrypt because it’s not public-facing. Nginx PM only has letsencrypt as an option.

    I wish there was a checkbox that just deployed a self-signed cert without bothering with the details (it’s 2024 ffs, HTTPS should be 1 click away, whether that’s self-signed or not).

    • PlexSheep@feddit.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      I’m using a self signed CA for my home network with caddy. You just set it up to use a ca once and afterwards it just works. So yeah, really easy.

      Iirc you can upload your own certificates and keys in npm, you’ll just have to manage the CA manually or with some other tool.

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      10 months ago

      NPM also lets you use your own certificates. Pick the “Custom” option after you click “Add SSL certificate”.

      If your services are not public-facing and you can’t use the HTTP challenge you have the alternative to use a real domain name and to ask the bot to verify access to your DNS service through an API token. In NPM it’s called “DNS challenge” in the certificate options.

      So instead of using something like “service.local” as the domain you would use “service.local.realdomain.tld”, give the Let’s Encrypt bot a token to the DNS service that you use to manage realdomain.tld, and ask for a wildcard cert for *.local.realdomain.tld.

      Of course you will also need *.local.realdomain.tld to resolve to your server’s private LAN IP. Typically people prefer do this in their LAN DNS but if it doesn’t support that you can do it in the public DNS.