Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] [1.4.7-alpha] Secure HTTPS Certificate Issuance for BliKVM Behind NAT Using WireGuard and NGINX Proxy #198

Open
m50S79sM6SRNp8Jn opened this issue Oct 13, 2024 · 0 comments

Comments

@m50S79sM6SRNp8Jn
Copy link
Collaborator

Problem
BliKVM devices often run in environments without a public IP address (e.g., behind a NAT or firewall), making it impossible to complete Let's Encrypt ACME challenges required for HTTPS certificates. Exposing the BliKVM directly to the public internet is not ideal due to security concerns, such as leaking API keys or exposing sensitive infrastructure.

Proposed Solution
To securely obtain HTTPS certificates for a BliKVM that lacks a public IP address, we can set up a WireGuard VPN tunnel to a publicly accessible VPS and use an NGINX reverse proxy on the VPS to forward Let's Encrypt ACME challenges over the WireGuard tunnel. This allows the BliKVM to appear publicly reachable to Let's Encrypt while remaining safely hidden behind a firewall.

@m50S79sM6SRNp8Jn m50S79sM6SRNp8Jn changed the title [Feature] Secure HTTPS Certificate Issuance for BliKVM Behind NAT Using WireGuard and NGINX Proxy [Feature] [1.4.7-alpha] Secure HTTPS Certificate Issuance for BliKVM Behind NAT Using WireGuard and NGINX Proxy Oct 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants