I have a domain that requires HSTS preload. I want to self host a few things using that domain (and subdomains), like nextcloud, pihole, and vaultwarden. How much of an issue is HSTS preload going to be if I do that? Will I need to set up a wildcard cert for everything? Or will it just work™️ because it’s internal or traffic is through a VPN?

I can’t find much about this so any help would be appreciated!

  • BakedCatboy@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    20 hours ago

    I use a .dev and it just works with letsencrypt. I don’t do anything special with wildcards, I just let traefik request a cert for every subdomain I use and it works. I use the tls challenge which works on port 443, so I don’t think HSTS or port 80 matters, but I still forwarded port 80 it so I can serve an http->https redirect since stuff like curl and probably other tools might not know about HSTS.

  • just_another_person@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    21 hours ago

    Required? That’s quite a commitment. Is this a Cloudflare thing?

    All it really means is that you have to advertise some metadata about your max-age and (sub)domains associated with whatever the domain is. If you’re only planning to serve over HTTPS, and you have a bulletproof refresh workflow for your certs, it’s not going to be a huge issue. Clients need to respect HSTS first, so if your clients don’t check, it’ll still function.

    If you’re just using internal or VPN traffic, there’s literally no point in using it EXCEPT to satisfy client requirements.

    Can you expound a bit more on this requirement btw? Now I’m curious.

        • wraith@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          20 hours ago

          I will need it to be available via a VPN or other means, but it’s not going to be any more public-facing than it has to be.

          • just_another_person@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            20 hours ago

            Right, so if it’s going to JUST be available over VPN, you don’t need to use a public TLD, DNS, or HSTS at all. Why use the public TLD with these requirements and expose private IP address space over public DNS if it’s sole purpose isn’t going to be consuming it publicly?

            • wraith@lemmy.caOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              20 hours ago

              So I should just host it with an IP address instead of using the domain?

              I hadn’t thought to do that, at least not for anything other than short lived internal-network-only projects and tests. An IT guy in the company I work for advised me to just get a domain and host with it/subdomains to make it easier to manage if I wanted to host multiple services.

              • just_another_person@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                20 hours ago

                Well, that’s the simplest way in practice, but not usability. Let me explain:

                You control the IP address space once you’re connected to your VPN, and you control the various settings that connection makes, including DNS.

                You have a network already, and a VPN of some sort, so that means you have a network device that is terminating that VPN. Is that a router you’re familiar with, or a box on your network?

                • wraith@lemmy.caOP
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  20 hours ago

                  I haven’t set up the VPN yet. I am getting as much info as I can before I start any work. For the sake of this discussion, it would be a box on my network.

    • wraith@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      21 hours ago

      Google is the registry that owns the rights to the TLD. They require all of the domains they control to have HSTS preload enabled.

      • wildbus8979@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        21 hours ago

        Then yeah, VPN or not, you’re going to need to enable TLS. What’s the issue with giving your subdomains a certificate?

        • wraith@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          21 hours ago

          I am fairly new to self hosting and just wanted to know if this was a big enough deal that I should just get a domain that doesn’t require HSTS preload. It’s one thing to tinker with an IP address on a local network for some unimportant project; it’s just intimidating to try it for real using a domain and hosting my own data.

          I’m just a little nervous tbh. Thanks for the help!

          • wildbus8979@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            20 hours ago

            Not much to be nervous about, you can’t fuck it up anymore than it already is since the HSTS is preloaded ;) ACME/Let’sEncrypt is pretty easy to setup