this post was submitted on 06 Jul 2025
469 points (99.2% liked)

Selfhosted

49204 readers
523 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Who benefits from this? Even though Let’s Encrypt stresses that most site operators will do fine sticking with ordinary domain certificates, there are still scenarios where a numeric identifier is the only practical choice:

Infrastructure services such as DNS-over-HTTPS (DoH) – where clients may pin a literal IP address for performance or censorship-evasion reasons.
IoT and home-lab devices – think network-attached storage boxes, for example, living behind static WAN addresses.
Ephemeral cloud workloads – short-lived back-end servers that spin up with public IPs faster than DNS records can propagate.
top 50 comments
sorted by: hot top controversial new old
[–] jaggedrobotpubes@lemmy.world 2 points 5 hours ago (1 children)

I would read layman discussions about why this (by context?) is good.

[–] 3abas@lemmy.world 4 points 3 hours ago

Domains need to be registered annually and DNS servers are needed to route traffic to them. But using an IP directly, you don't need to worry about domain registration issues that can brick your systems, and you don't have to worry about DNS providers knowing about your traffic (or maintaining your own private dns).

If it's not a user trying in a memorable domain, an IP serves much better.

[–] surph_ninja@lemmy.world 8 points 15 hours ago* (last edited 15 hours ago)

This could go a long way towards fighting online censorship. One less issue when an authoritarian overreach gets your domain seized. Pretty awesome.

[–] Allero@lemmy.today 16 points 1 day ago (7 children)

F I N A L L Y

Now tell me it supports IPv6 and I'll be the happiest man alive

load more comments (7 replies)
[–] comrade_twisty@feddit.org 119 points 1 day ago (5 children)

Can I get a cert for 127.0.0.1 ? /s

[–] Lifter@discuss.tchncs.de 1 points 6 hours ago

This would actually be useful for local testing of software during development.

[–] jj4211@lemmy.world 12 points 1 day ago (1 children)

If you can get their servers to connect to that IP under your control, you've earned it

[–] comrade_twisty@feddit.org 4 points 1 day ago

Nothing a ski mask and a little mission impossible can’t fix :)

[–] howrar@lemmy.ca 104 points 1 day ago (2 children)

How many bits is a /s mask?

[–] lando55@lemmy.world 20 points 1 day ago (1 children)
[–] Cyber@feddit.uk 4 points 1 day ago

Is that the same i as the squareroot of -1?

[–] Bort@hilariouschaos.com 7 points 1 day ago

Is /s more or less IPs than /24? I need lots of IPs in case I want to expand

[–] unexposedhazard@discuss.tchncs.de 45 points 1 day ago (6 children)

The down votes are from people who work in IT support that have to deal with idiots that play with things they dont understand.

[–] kautau@lemmy.world 20 points 1 day ago (2 children)

It’s unfortunate they don’t know what /s means

It obviously means "secure"

load more comments (1 replies)
[–] Gonzako@lemmy.world 2 points 1 day ago (1 children)

nah, I was once an idiot who didn't understand so idgaf

Yeah, the unfortunate part about internet security is that everyone has to start somewhere. And that means there’s always a newbie making dumb mistakes that they don’t even realize are dumb. It’s not a personal failing, unless they fail to learn from it.

load more comments (4 replies)
[–] AliasVortex@lemmy.world 54 points 1 day ago (3 children)

That's kind of awesome! I have a bunch of home lab stuff, but have been putting off buying a domain (I was a broke college student when I started my lab and half the point was avoiding recurring costs- plus I already run the DNS, as far as the WAN is concerned, I have whatever domain I want). My loose plan was to stand up a certificate authority and push the root public key out with active directory, but being able to certify things against Let's Encrypt might make things significantly easier.

[–] qaz@lemmy.world 19 points 1 day ago (3 children)

FYI you can get a numeric xyz domain for 1$ a year

load more comments (3 replies)
[–] fmstrat@lemmy.nowsci.com 8 points 1 day ago (1 children)

I use a domain, but for homelab I eventually switched to my own internal CA.

Instead of having to do service.domain.tld it's nice to do service.lan.

[–] martin@lemmy.caliban.io 4 points 1 day ago (2 children)

Any good instructions you would recommend for doing this?

[–] fmstrat@lemmy.nowsci.com 3 points 1 day ago

I just use openssl"s built in management. I have scripts that set it up and generate a .lan domain, and instructions for adding it to clients. I could make a repo and writeup if you would like?

As the other commenter pointed out, .lan is not officially sanctioned for local use, but it is not used publicly and is a common choice. However you could use whatever you want.

[–] eneff@discuss.tchncs.de 3 points 1 day ago (1 children)

use the official home.arpa as specified in RFC 8375

[–] fmstrat@lemmy.nowsci.com 4 points 1 day ago (1 children)

No thanks. I get some people agreed to this, but I'm going to continue to use .lan, like so many others. If they ever register .lan for public use, there will be a lot of people pissed off.

IMO, the only reason not to assign a top-level domain in the RFC is so that some company can make money on it. The authors were from Cisco and Nominum, a DNS company purchased by Akamai, but that doesnt appear to be the reason why. .home and .homenet were proposed, but this is from the mailing list:

  1. we cannot be sure that using .home is consistent with the existing (ab)use
  2. ICANN is in receipt of about a dozen applications for ".home", and some of those applicants no doubt have deeper pockets than the IETF does should they decide to litigate

https://mailarchive.ietf.org/arch/msg/homenet/PWl6CANKKAeeMs1kgBP5YPtiCWg/

So, corporate fear.

[–] lars@lemmy.sdf.org 1 points 14 hours ago

But home.arpa’s top-level domain is .arpa?

[–] oasis@piefed.social 15 points 1 day ago (1 children)

Setting up a root and a immediate CA is significantly more fun though ;) It's also teaches you more about PKI which is a good skill to have.

load more comments (1 replies)
[–] bjoern_tantau@swg-empire.de 3 points 1 day ago (1 children)

I never understood why we don't use IP certificates to encrypt the domain with SNI.

[–] dariusj18@lemmy.world 3 points 1 day ago (2 children)
[–] Zagorath@aussie.zone 9 points 1 day ago (2 children)

In much simpler terms:

Think of an IP address like a street address. 192 My Street.

There might be multiple businesses at one street address. In real life we address them with things like 1/192 My Street and 2/192 My Street, but there's no direct parallel to that in computer networks. Instead, what we do is more like directing your letter to say "Business A c/o 192 My Street". That's what SNI does.

Because we have to write all of that on the outside of the envelope, everyone gets to see that we're communicating with Business A. But what if one of the businesses at 192 My Street is highly sensitive and we'd rather people didn't know we were communicating with them? @bjoern_tantau@swg-empire.de's proposal is basically like if you put the "Business A" part inside the envelope, so the mailman (and anyone who sees the letter on the way) only see that it's going to 192 My Street. Then the front room at that address could open the envelope and see that the ultimate destination is Business A, and pass it along to them.

[–] AnUnusualRelic@lemmy.world 5 points 1 day ago

There's Encrypted Client Hello, supported by major browsers that does the SNI encryption. It's starting to be fairly widely supported.

[–] Vinstaal0 1 points 1 day ago

192 My Street

Except that with street addresses there is such a lack of inconsistency on how they work and are written that it is funny

[–] bjoern_tantau@swg-empire.de 5 points 1 day ago

Currently before establishing an encrypted connection to a webserver the domain is sent to the webserver unencrypted so that the server can choose the appropriate certificate to use for encryption. That is called SNI, Server Name Indication.

Of course that's a privacy risk. There are finally protocols to fix this but they aren't very widespread and depend on DNS over HTTPS.

I think issuing certificates based on the IP and sending the domain name encrypted based on that certificate could have fixed this issue ages ago.

[–] avidamoeba@lemmy.ca 7 points 1 day ago (1 children)

Would this work with a public dynamic DNS?

[–] SteveTech@programming.dev 12 points 1 day ago

With dynamic DNS? Yeah it always has, as long as you can host a http server.

With a dynamic IP? It should do, the certs are only valid for 6 days for that reason.

[–] thann@lemmy.dbzer0.com 15 points 1 day ago (1 children)

Its like self signed certs with the convience of a third party

[–] AHemlocksLie@lemmy.zip 3 points 1 day ago

Maybe kinda, but it's also a third party whose certificates are almost if not entirely universally trusted. Self-signed certs cause software to complain unless you also spread a root certificate to be trusted to any machine that might use one of your self-signed certs.

load more comments
view more: next ›