Can you have the cert be generated on a server and then sync it to your hardware with scripts or ansible?
Self-Hosted Main
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
For Example
- Service: Dropbox - Alternative: Nextcloud
- Service: Google Reader - Alternative: Tiny Tiny RSS
- Service: Blogger - Alternative: WordPress
We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.
Useful Lists
- Awesome-Selfhosted List of Software
- Awesome-Sysadmin List of Software
having to manually update the certs every 90 days for devices that can't run cerbot is a hard pass
You automate the sh*t out of it ... or at least as much as reasonably feasible.
E.g. I've often done script/programs that will easily and automagically install certs across many servers/devices of lots of different types and configurations, with just a single command. If you can do it manually from CLI, you can automate it.
I've also very well automated obtaining certs - again, simple quick command.
Combine those things and some reasonable checks/monitors/reminders or whatever else, and you've got something that's fully automated to do it all ... or at least pretty darn close.
yeah, I had not really played much with racadm and so I didn't even consider the possibility of being able to update certs using it.. as soon as I made that discovery, my life has changed. lol
I would also like an answer to this.
My solution so far has been to just purchase full 1y certs and then it's a problem that I only need to look at once a year
Acme.sh can run a script after SSL cert updates. And it's nice since it's just bash.
Why can’t you have your TLS managed at the gateway, then reverse proxy based on subdomain to your various services?
the primary concern that I have with that model is that while traffic to the proxy is encrypted, ~everything behind the scenes is not (or, at least not in a trusted way).
this isn't so much an issue when it's in front of a docker network, but it is when it's connecting to actual devices/servers on the physical network, as a compromise of a user account on one machine could allow for mitm and lateral movement/PE/domain takeover.