Any of yinz got ACME running inside your home network? I'm thinking about it but not really sure if it's really that worth it.
Yes via cert-manager running in Kubernetes.
Showed it in action here a bit: https://www.youtube.com/live/Hi__SsHcjEc?feature=shared
I got a public domain and have a local pihole to resolve DNS entries. I don't want to run my homelab with open ports, so I use the ACME dns challenge. Works fine with traefik on k3s and on proxmox, homeassistant and synology.
I ended up pulling off some crazy shenanigans with a public domain using Cloudflare for public DNS, a tool called acme-dns (https://github.com/joohoi/acme-dns) that I learned about from an EFF blog article (https://www.eff.org/de/deeplinks/2018/02/technical-deep-dive-securing-automation-acme-dns-challenge-validation), and then set up PowerDNS as my local DNS resolver and split authoritative server for the same public domain on my LAN. I have acme-dns running on a tiny VM in GCP hosting a separate DNS sub domain zone of the public domain and it has an HTTP API I can hit from my anything in my home lab. I set up a bash script to help with registering a new record with acme-dns, then use that to set up a CNAME record as a magic subdomain (_acme-challenge.*) in Cloudflare pointing to the address registered with the zone operated by acme-dns. Once that's all in place I use certbot on any system in my home lab to request a cert for the domain it has set up with acme-dns. Certbot has support for working with acme-dns (--manual-auth-hook 'acme-dns-client'
) so it authenticated with the acme-dns HTTP API and sets the verification value in the DNS record for DNS verification of the certificate without having to reach into my home lab.
Ya know typing all that out makes me realize I need a better way of describing all the pieces involved here, it's a bit much. I don't think about it much anymore since I have all the pieces automated with some Terraform and Ansible pieces to automatically do all the work on any system I spin up in my home lab.
The end result is that there is no public access into my home lab, I have publicly valid certificates that I can create and have individual machines in my home lab manage independently using certbot on each system isolating one system from another. My public DNS just has a bunch of those magic sub domain CNAME records pointing to some other DNS zone that just has a bunch of random records that were used for cert validation with Let's Encrypt. All the IP addresses of the systems in my home lab are all local and managed by PowerDNS within my home lab.
Thanks for that guide, Matt.
The biggest roadblock for me is not having a public IP. My ISP uses CGNAT and so far, I haven't found a way to figure out accessing my homelab securely without using a 3rd party like Tailscale. I have a wireguard "server" running on a VPS through which I'm routing the connections, but obviously latency becomes a problem in this case.
I'd love to know if anyone has figured out a neat way to get https access to a homelab behind CGNAT.
@Siddhartha Golu not sure if I fully understand your use case, but isn't the CGNAT problem unrelated to running tls in your homelab?
I mean if you run acme DNS challenges and a local dns server, you don't need to expose any ports from your LAN publicly.
I typically use tailscale for setting up external access, but this is just a plus and not a must.
If I am at home, I can just connect to wifi and resolve my services with valid tls certs.
Also, you can run tailscale on a public vps and redirect traffic from there to your local system via a reverse proxy. Caddy is quite easy to setup for that.
Alternatively, you can also go with your own CA, the downside is you need to import the root CA cert on any of your clients. I used that before, but let's encrypt is much more convenient in comparison.
You're right @Konrad in that TLS and external access are two different problems. I guess I was looking for an easy way to 1) get access to things running in my homelab behind CGNAT 2) with https 3) without relying on any external services like Tailscale.
I think what I'm wishing for is simply not possible without a public IP.
Sometimes, you get a range of ipv6 addresses that might be routable. If that's the case, you could at least reach your services in networks that support ipv6. But yeah... I prefer vpn anyways, tailscale is great, but getting a cheap vps and put some flavor of wireguard should work as well.
Last updated: Apr 04 2025 at 01:15 UTC