←back to thread

238 points edent | 2 comments | | HN request time: 0.612s | source
Show context
meepmorp ◴[] No.29809113[source]
I've used https://smallstep.com/docs/step-ca/ as a CA internally, works well.
replies(4): >>29809289 #>>29809335 #>>29810148 #>>29811399 #
mojzu ◴[] No.29810148[source]
I've been using it too and it works well, particularly with Caddy to do automatic certificates with ACME where possible

Plus all my services go through Tailscale, so although I am leaking internal hostnames via DNS, all those records point to is 100.* addresses

replies(3): >>29810377 #>>29812881 #>>29821280 #
1. dolmen ◴[] No.29821280[source]
Tailscale+TLS: isn't it two strong layers of encryption?
replies(1): >>29822819 #
2. mojzu ◴[] No.29822819[source]
Yeah, it's probably overkill but I think the multiple layers would help in cases I misconfigured something or if an account someone uses to log into Tailscale was compromised. For example when I ran the containers on a linux host I discovered later docker was bypassing the firewall rules and allowing all connections, but it probably wasn't a big deal because of the MTLS (and the server was behind a NAT router anyway so it was only addressable within the local network)