March 24, 2023, 1:25 p.m. | /u/Ditzah

Privacy & Freedom in the Information Age www.reddit.com

I have a small homelab environment, I host several services for which I get Let's Encrypt or ZeroSSL certs via acme.sh.

That's working fine, however, when I look at https://crt.sh, I can see the certs for myrouter.example.com, myserver.example.com, mypasswordmanager.example.com, mydocumentmanagement.example.com etc.

For example:

$ curl -sS "https://crt.sh?q=%.example.com&output=json" | jq -r '.[].name_value' | sort -u
myrouter.example.com
myserver.example.com
mypasswordmanager.example.com
mydocumentmanagement.example.com
...

These services are not exposed, I can only access them locally or via a wireguard tunnel. I know bad actors can't …

access acme bad bad actors big certificates encrypt environment exposed google homelab host infrastructure let's encrypt locally privacy private public reddit services tunnel wireguard

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC