How do you manage the distribution of internal TLS network certificates? I’m using cert-manager to generate them, but the root self-signed certificate expires monthly which makes distribution to devices outside of K8s a challenge. It’s a PITA to keep doing this for the tablet, laptop and phones. I can bump the root cert to a year, but I’m concerned that the date will sneak up on me. Are there any automated solutions?

  • EskueroA
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 months ago

    I do the dns challenge with letsencrypt too but to not leak local dns names into the public I just run a pihole locally that can resolve those domains

    • skilltheamps@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      2 months ago

      The DNS server is only one thing you tell the domain, the other is the certificate authority. And those publish all issued certificates as part of certificate transparency. https://en.m.wikipedia.org/wiki/Certificate_Transparency

      To mitigate the amount of published information, you can request wildcard certs to keep the subdomains private.

      You can also use a wildcard cname entry to capture all subdomains and leave out the pihole faff, given that you use a reverse proxy that forwards to respective services by subdomain.

      • EskueroA
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        Yep I also run wildcard domains for simplicity