Server Certificates - Self Signed and LetsEncrypt Certificates for the LAN

  Рет қаралды 49,854

OneMarcFifty

OneMarcFifty

Күн бұрын

Пікірлер: 64
@BrianThomas
@BrianThomas Жыл бұрын
This should have a ton more likes than it does. Not many on KZbin have ever explained it like this before. Great job!
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi Brian, that’s very kind - thank you very much
@graceoverall
@graceoverall 6 ай бұрын
12:25 Brilliant!!! I didn't know about transparency laws requiring the disclosure of private certs. For me, that's a deal breaker for my (future) homelab.
@AlexCernat
@AlexCernat 2 жыл бұрын
congratulations for sharing info about certificate transparency program; many people are not aware about it, and some will have a big unpleasant surprise one day (hostnames disclosure, funny "test" dns names etc.)
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Alex, thank you very much - one could probably talk for hours about the impacts and side effects of certificates, TLS, trusts, chains and so on ;-) But when I read about the Cert Transparency, I thought - hmmm ... If you get a cert for host1, host2... then you probably have a host 3 ;-)
@alfonsofujita2592
@alfonsofujita2592 10 ай бұрын
Waoo. The first video that explains me how let’sencrypt ask DNS for verification. This video is for newest like me. Thanks
@rsmonteiro82
@rsmonteiro82 10 ай бұрын
Thanks Marc! The way you explain the thing is excellent!
@glitchy_weasel
@glitchy_weasel 2 жыл бұрын
Let's Encrypt is a fantastic project! It definitely makes the internet more accessible and secure for hobbyists webmasters. Very good explanation by the way!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Agreed - and many thanks ;-)
@pberto
@pberto 2 жыл бұрын
I can only confirm my comment on part 1. Good job, Marc.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
MAny thanks Gabriele ;-)
@yitspaerl7255
@yitspaerl7255 2 жыл бұрын
Very interesting. Especially using a free wildcard cert locally. Thanks a lot!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi, many thanks for the feedback ;-)
@Benemortasia666
@Benemortasia666 Жыл бұрын
That application/database program I am using ever since, its awesome. Thank you.
@pallzoltan
@pallzoltan Жыл бұрын
I love how well you explained everything. Thank you.
@affinitystablepeanuts
@affinitystablepeanuts Жыл бұрын
Very nice and very clear explanation around letsencrypt. Thank you. Deserves a lot more likes.
@AdityaTyagi-e6n
@AdityaTyagi-e6n Жыл бұрын
Very nicely explained. Thanks a lot for your efforts.
@rklauco
@rklauco 2 жыл бұрын
I did not realize you can use the wildcard certs like this in LAN. Good idea...
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Robert, yeah - I discovered that when I tried to segregate my VLANs using a reverse proxy ;-)
@_r00f
@_r00f 2 жыл бұрын
Thanx Marc! I personally found the best option to automate let's encrypt wildcard cers is to maintain your own dns servers. It allow you to make any number of subdomains with DNSSEC and all the stuff.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Sergey, that's definitely a good option.It does have side-effects though (such as opening access to port 53 and the like)
@_r00f
@_r00f 2 жыл бұрын
@@OneMarcFifty I have 1 master and 2 slave dns. Master local, slaves on external servers. In the domain zone NS servers - only slaves. The master dns has port 53 open only for the ip addresses of the slave dns servers.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Oh that makes total sense - perfect, thanks for sharing!
@killer2600
@killer2600 11 ай бұрын
@@_r00f I'd like to introduce you to cloudflare.
@samuraijaydee
@samuraijaydee Жыл бұрын
Thank you for this Marc. This is a big help for me :)
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Glad to hear that! Thank you!
@BobLoblaw_
@BobLoblaw_ 5 ай бұрын
Great explanation and great video (series)! Thanks!
@justpassing6776
@justpassing6776 6 ай бұрын
well served solutions for everyone. Great job!
@daniellukesmith
@daniellukesmith 9 ай бұрын
His explanations are the best
@guinadasilva33
@guinadasilva33 Ай бұрын
Very Well Explained.
@Avopeas
@Avopeas Жыл бұрын
Thank you very much for your great explanation.
@avgjoe3869
@avgjoe3869 4 ай бұрын
Underrated content!
@MrRastafisch
@MrRastafisch 10 күн бұрын
Hello and Thank you for the informativ video lessons. I have a strange issue with openssl signing my own intermediate certificate. The CN= in the subject comes at the end like this OU=, O=, C=, CN= but it needs to be CN=, OU=, O=, C= . My system is using additional parameter that is looking for this pattern before trusting the certificate. Why is openssl suddenly deciding to revers the order? Is there a flag or a parameter in the ca.conf that I can use to fix the order? Thank you.
@daxelai
@daxelai 6 ай бұрын
Excellent explanation. Actually I am using tomcat server on my LAN to deployed my application. In this video we downloaded two certificate and key can I use only key and ca certificate or key with certificate to configure https in tomcat.
@qamaranwar-ye8tp
@qamaranwar-ye8tp Жыл бұрын
GREAT Video, GREAT to say the least
@jogikuenstner7758
@jogikuenstner7758 11 ай бұрын
Interesting, great content! I happen to use the same webspace-provide like you, but I have enabled 2FA with an authenticator-app. Do you see any chance then still to do automation?
@robertschultheis1769
@robertschultheis1769 8 ай бұрын
Extremely helpful video series, thank you!
@BrunoCouleau
@BrunoCouleau 2 жыл бұрын
Very nice and idiot proof explanation. Thank you.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Bruno, thank you very much for your feedback!
@boubou40
@boubou40 2 жыл бұрын
Thank you for the video ! does the wildcard option allow me to use short names without a warning ? I'm using step-ca for my homelab to automatically provides certificates for my servers
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Vincent. No - you will still need FQDN with these.
@alexs5588
@alexs5588 2 жыл бұрын
Great video Marc, always extremely informative thank you!!! Would you ever consider revisiting the BATMAN protocol in depth? Such as with DSA architecture or APs with no built in switch?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Alex, many thanks. I am currently working on an episode on how to build a router with the Raspberry Pi - with regards to the question how to do VLANs without a switch. But your question inspires me to maybe do a separate episode altogether, as there are mutiple ways of doing VLANs on devices with or without switches. I might talk about BATMAN in those as well. Thanks again.
@mohammeddawwas3822
@mohammeddawwas3822 Жыл бұрын
do you have a video explains in details about wildcard certificate ?
@fef-e4k
@fef-e4k 6 ай бұрын
great video quality, great content, great tool and of course great explanation. I have downloaded the XCA software on my windows 10. I have a lil challenge: I am working with vs code and have accessed my server via it. I have also created my CA with XCA. the challenge i have now is copying my CA to the server just like you did. Any guide?
@fbifido2
@fbifido2 18 күн бұрын
can you show how to secure a network with cert? 1. Windows Server, Linux Server, SQL Server 2. Windows client, Mac client, Linux client
@der_imperator6907
@der_imperator6907 2 жыл бұрын
I'm really interested in your automation certbot script. How did you read the string for the txt record given by certbot?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
If you check github.com/onemarcfifty/cheat-sheets/blob/main/Certificates/ansible-playbooks/auth_hook.py then you can see that the value comes from the environment variables CERTBOT_VALIDATION and CERTBOT_DOMAIN which are set by the certbot command.
@zaxeer
@zaxeer 10 ай бұрын
So no way to get lets encrypt certificate for internal domain other than creating own CA?
@fabioamado6725
@fabioamado6725 Жыл бұрын
Thank you very much for this video. Is it possible to run this XCA program in Docker Container? What would be the best option, in terms of security?
@peterhaskew
@peterhaskew 6 ай бұрын
I have installed the XCA application locally, but host its database in a Docker container running MySQL instead of a local file. Does that help (a year later!)?
@fabioamado6725
@fabioamado6725 6 ай бұрын
@@peterhaskew Thank you for your answer. It always helps, at least for others. In the meantime, I went the route of using a reverse proxy (NGINX) signig the certificates via wild card certificate by Let's Encrypt. Is my option more or less secure than the one explained here? Thank you anyway :)
@jedd1
@jedd1 Жыл бұрын
Thanks!
@OneMarcFifty
@OneMarcFifty Жыл бұрын
You're welcome - thanks for he feedback!
@alexander5052
@alexander5052 Жыл бұрын
Great video!
@marvinma6887
@marvinma6887 2 жыл бұрын
very nice,thank you
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Thank you ;-)
@ATech-dg9lj
@ATech-dg9lj 8 ай бұрын
I agree with@BrianThomas - never seen anything like this before - well done sir. I wonder if you would be able to cover the X.509 certification in terms of STM32 Mbed RTOS terms of usage. I.e., would the xca tool be able to support the lwIP embedded server httpd deamon on STM32 processors. Also how can the x.509 certification be implemented on production runs of hundreds or thousands of boxes. Would every box require a seperate certificate etc. in case the vendor does not use a different private key for each product sold would the public key holders be able to hack other customers products. This is a very unclear area of discussion regarding this type of certification. Please give us your thoughts on this topic sir. Thanks
@itsm3dud39
@itsm3dud39 Жыл бұрын
can i share my x 509 .pem certificate to my teammate? what happens if .pem certificate is publicly exposed??
@oswaldomoraleshernandez4306
@oswaldomoraleshernandez4306 Жыл бұрын
Thanks! 👍
@seanmagee7339
@seanmagee7339 Жыл бұрын
Thank you. You explained that very well.
@Spyrofluff
@Spyrofluff 29 күн бұрын
Thanks!
Secure your Cloud Services with TLS X.509 Client Certificates
15:57
Certificates from Scratch - X.509 Certificates explained
21:50
OneMarcFifty
Рет қаралды 139 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Coding a Web Server in 25 Lines - Computerphile
17:49
Computerphile
Рет қаралды 362 М.
Quick and Easy Local SSL Certificates for Your Homelab!
12:08
Wolfgang's Channel
Рет қаралды 925 М.
Zabbix - Monitoring and Alerting with  @AwesomeOpenSource
18:23
OneMarcFifty
Рет қаралды 76 М.
Self-Hosted TRUST with your own Certificate Authority!
26:25
apalrd's adventures
Рет қаралды 39 М.
How to create a valid self signed SSL Certificate?
25:01
Christian Lempa
Рет қаралды 384 М.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 159 М.
How to Homelab: Considerations for adding a Domain to your Gear
29:10
Learn Linux TV
Рет қаралды 41 М.
This web UI for Ansible is so damn useful!
20:07
Christian Lempa
Рет қаралды 515 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН