Hey all,

So I’ve been playing with Nginx so that I can reference my self hosted services internally by hostname rather than by IP and port.

I set some custom entries in my pihole, setup the proxies on Nxing, and boom. All is working as expected. I can access Jellyfin via jellyfin.homelab, amp via amp.homelab, etc.

I wanted to have all of these internally facing, because I don’t really have a need for them outside of my network, and really just wanted the convenience of referencing them.

Question 1) If I wanted to add SSL certs to my made up homelab domain, how hard would that be?

Question 2) When accessing something like Jellyfin via jellyfin.homelab, all traffic is then going through my nginx VM, correct? Or is Nginx just acting as a sort of lookup which passes on the correct IP and port information?

  • dotslashme@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 years ago
    • in order to add certs you would need a certificate authority, capable of setting up a proper certificate chain. There are several, ranging from the super simple like mkcert to full scale management tools like openCA. The second step is harder and require your consuming apps (the devices and apps that connects to your jellyfin) to trust your CA. An alternative would be to have a proper domain and use LetsEncrypt to get a cert, then trust will work out of the box, but it might also leak information about your private infrastructure.

    • traffic will go through your proxy

    • root@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      Ah I see. I think I read somewhere that using your own cert requires you to add it to each device that will access said service, which for me is a bit of a deal breaker. I don’t think the rest of the family would be too thrilled; I have to make my projects somewhat transparent to them XD

      • untilyouarrived@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 years ago

        I use a real domain name, but only have them available internally (and use WireGuard to access them when out and about). You can use letsencrypt with them then because you can validate through DNS.

        • root@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          I see. I have a valid domain as well that I could use, which would make things easier. I guess after I set things up, I can lock down Nginx/ my home lab again, and the certs would still work. My biggest worry was exposing my internal systems to the world.

          • untilyouarrived@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            2 years ago

            Yeah. I don’t expose anything other than the WireGuard port.

            You can validate the wildcard certificate at your registrar, so you don’t need to open anything up to the world.

            • root@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 years ago

              Would you need to leave Nginx “online” after setting up the certs? I have mine so that it can’t reach out at all.

        • root@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          I have a couple domains as well, but was hoping to not rely on anything external for this setup. I’ll think about it. Would definitely make adding SSL a lot easier.

  • ellwoodb @feddit.de
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 years ago

    Hey there,

    I have somewhat of a similar setup. I use Nginx Proxy Manager and AdGuard Homes rewrites to do the same thing as you.

    As for Question 1: Creating self-signed certs is pretty straightforward. I followed this tutorial by Christian Lempa: https://youtu.be/VH4gXcvkmOY He also has a good writeup on his GitHub: https://github.com/ChristianLempa/cheat-sheets/blob/main/misc/ssl-certs.md How to import the certs into Nginx, I don’t know, but I think that’s easy to lookup online.

    Regarding Question 2: My understanding is that all traffic goes through the Reverse Proxy.

    I hope I could help, let me know if you have any more questions.

  • 0x0F@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    2 years ago

    1: not very hard actually, the hardest part is gettin the cert onto your other devices x3
    all you need to do is add each subdomain to the cert, add ssl_certificate and ssl_certificate_key to the http block, then enable ssl for each subdomain, like so:

    http {
        # cert
        ssl_certificate /etc/nginx/public.crt;
        ssl_certificate_key /etc/nginx/private.key;
        server {
            listen       12345:443 ssl;
            server_name  pi.hole;
    
            location / {
                    proxy_pass http://localhost:80;
            }
        }
        server {
            listen       12345:443 ssl;
            server_name  fox.hole;
    
            location / {
                    proxy_pass http://localhost:621;
            }
        }
    }
    

    2: correct, all traffic goes through nginx.