this post was submitted on 07 Jun 2023
5 points (100.0% liked)
homelab
6580 readers
1 users here now
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
In home environement, it's not often that someone will try to snoop on the traffic, however, the risk 0 never exists, personnally, I've set up SSL using NGINX Proxy Manager and self-signed certificates signed with my own CA, I use a script to generate new certs if needed, so it's not too hard to do (It all uses openssl)
The only "issue" would be to put the CA on all your devices if you don't want the security warning.
Gotcha. NGINX is just for serving externally usually, right? I've heard about it, but never used it. Have you heard of certbot before? I may look into it, for practice if nothing else.
No, it can be used internally too, it's a reverse proxy, I didn't know anything about this until I tried it! it also allow you to your website without ports behing (for exemple video.lab.home instead of video.lab.home:8096 for jellyfin)
Also, certbots, if i'm not mistaken, is only used for public facing domains, for domains like .local and .home and anything that you use to resolve domains internally will not work.
Except maybe if you use a real domain to point to your internal local IP, which I find too weird but it works ahah
Oooo, I'm going to have to check out NGINX then! I was thinking of adding a custom DNS entry in PiHole so that I could talk to Jellyfin directly with a URL, but I would still need the ports since DNS doesn't care about/ handle port information. Thank you!
Yes, you'll learn a lot, like I did few months ago! Have fun :)
Edit: The software is "NGINX Proxy Manager", to have an All in one solution. if you just use NGINX it might be more complicated!