this post was submitted on 25 Jan 2025
19 points (95.2% liked)

Selfhosted

41459 readers
644 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Title says it - I want a simple CA that doesn't overcomplicate things (looking at you, EJBCA). I need it to serve at least CRLs or better OCSP automatically for the certs it manages. If it comes with a Web GUI, all the better, but doesn't need to. Docker deployment would be sweet.

Currently handling this on an OPNSense I happen to be running, but that thing is also serving stuff to the public 'net, so I'd rather not have my crown jewels on there.

top 10 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 6 hours ago

Nobody needs ocsp or clr in their homelab. And if they’re a trained netsec professional they know that its far better with short-lived certs than any revocation model. Both zerossl and letsencrypt are easy to use - and works flawlessly with something like caddy on a wildcard domain, or an acme proxy. Openssl is easy, and you can clr with that or even use their ocsp for homelab.

[–] [email protected] 8 points 2 days ago* (last edited 2 days ago) (2 children)

https://smallstep.com/docs/step-ca/index.html

There's basically two executables involved:

  • step is the CLI app used to request certificates
  • step-ca is the server process the step client connects to

I've got the CA portion bundled into Docker. It can also run as an ACME server (and is compatible with certbot).

[–] [email protected] 1 points 1 day ago* (last edited 1 day ago)

step-ca does not currently support active revocation mechanisms like a Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP).

Meh. Doesn't do what I need it to. :/

Does seem like automatic CRL/OCSP is something you only get for free with EJBCA. Frustrating, that.

[–] [email protected] 2 points 2 days ago

This is exactly what i wanted to say :)

[–] [email protected] 5 points 2 days ago

This entire question has oxymorons all over it, but...

  • EasyRSA - simple and well-known CLI implementation that is used almost everywhere for OpenVPN
  • Step - newer on the block, but seems extremely well documented and fairly well used
  • XCA - old-school, but still actively developed. May not even work on more modern machines
[–] [email protected] 3 points 2 days ago

If overcomplicating things is a concern for you, then just use let's encrypt. Running your own ca is a pain in the ass and probably decreases security for most people due to the difficulty of doing it correctly.

[–] [email protected] 3 points 2 days ago
[–] [email protected] 3 points 2 days ago (2 children)

Sadly, most of the ones I've found are too complicated, and getting all devices to accept the CA is more hassle than it's worth for self hosting. I've given up and just buy my wildcard cert for 60$/yr and just put it on everything.

[–] [email protected] 8 points 2 days ago

fyi you can get a wildcard from letsencrypt for free

[–] [email protected] 1 points 1 day ago

I'm a trained netsec professional so handling keys and such is not really a hassle for me. What is a hassle IMO is having to manually do more things than hitting the "revoke" button to fully properly revoke a certificate, so that's where the CRL/OCSP req comes from.

Looks like that part is something you really only get for free with EJBCA, which I've tried and found very exhausting to use for my home network. If I had to pick one for work I'd probably go with EJBCA though, seems worth the effort if you're doing more complex things.