2025-01-05
- PorkBun have a (n archived) [GitHub repo] (https://github.com/porkbundomains/certbun) with a few examples. I've forked it and I'll look around.
- I've downloaded the cert/key, and pfsense is now using it. I've got static DNS entries for now.
- First few attempts were rejected – pfsense has a detection for DNS rebinding attacks. I hadn't configured pfsense's hostname (forgot exactly where it's done) to be pfsense.blip.zip. I'm guessing that the Host header in the request was checked, didn't match, and it spat out the DNS rebinding warning.
- TODO – Go and read up on DNS rebinding. Not an attack vector I know much about.
- Took the cert/key, stored it on the Raspberry Pi that's my monitoring server, and configured Prometheus to use it. It's now alive and listening on the WireGuard WG110 network.
- Others to do: deluge/nginx, alertmanager, the blog this eventually ends up using.