• Lem453@lemmy.ca
    link
    fedilink
    English
    arrow-up
    9
    ·
    9 months ago

    CloudFlare is a good place for beginners to start. Setting up a reverse proxy can be daunting the first time. Certainly better than no reverse proxy.

    That being said, having your own reverse proxy is nice. Better security since the certificates are controlled by your server. Also complex stuff becomes possible.

    My traefik uses keys encrypt wild card domains to provide HTTPS for internal LAN only applications (vault warden) while providing external access for other things like seafile.

    I also use traefik with authentik for single sign on. Traefik allows me to secure apps like sonarr with single sign on from my authentik setup. So I login once on my browser and I can access many of my apps without any further passwords.

    Authentik also allows oAuth so I can use that for seafile, freshrss and immich. Authentik allows jellyfin login with LDAP. (This last paragraph could be setup with CloudFlare as well).

    • Maximilious@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      9 months ago

      This is the way. My setup is very similar except I only use authentik for Nextcloud. I don’t expose my “arr” services to the Internet so I don’t feel it necessary to put them behind authentik, although I could if I wanted.

      Using Duo’s free 10 personal licenses is also great as it can also plug into authentik for MFA through the solution.

      • Lem453@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        9 months ago

        The primary reason to put authentik in front of arrs is so I don’t have to keep putting in different password for each when logging in. I disable the authentication for each of them in the app itself and then disable the exposed docker port as well so the only way to access it it via traefik + authentik. It has local access only so isn’t directly exposed to the internet.

        10 free accounts on duo is very nice but I hate being locked into things (not self hosted). An open source or self hosted alternative to duo would be great.

    • Throw a Foxtrot@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      How do you get certs for internal applications?

      I use caddy and it does everything for me, but my limited understanding is that the dns entry for which the certs are requested must point to the ip address at which caddy is listening. So if I have a DNS entry like internal.domain.com which resolves to 10.0.0.123 and caddy is listening on that address I can get a http connection, but not an https connection, because letsencrypt can’t verify that 10.0.0.123 is actually under my control.

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        There is an alternate verification method using an API key to your DNS provider, if it’s a supported one. That method doesn’t need any IP to be assigned (doesn’t care if there are A/AAAA records or where they point because it can verify the domain directly).

        deSEC.io is a good example of a good, reputable and free DNS provider that additionally allows you to manage API keys. The catch is that they require you to enable DNSSEC (their mission is similar to Let’s Encrypt, but for DNS).

      • Lem453@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        9 months ago

        You are completely correct…for normal certs. Internal domains require a wild card cert with DNS challenge.

        This video explains how to set it up with traefik

        https://youtu.be/liV3c9m_OX8

        I’d bet caddy can do something similar.

        Basically you have:

        1. Seafile.domain.com -> has it’s own cert
        2. *.local.domain.com -> has its own cert but the * can be anything and the same cert can be used for anything in place of the star as many times as you want and therefore doesn’t need to be internet accessible to verify. That way vaultwarden.local.domain.com remains local only.