Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: eng.networktest.com
I ran this command:
NULL - I am posting a procedural question
It produced this output:
NULL - I am posting a procedural question
My web server is (include version):
Mix of apache24-2.4.33 and nginx-1.14.0,2
The operating system my web server runs on is (include version):
Mix of FreeBSD 11.1 and Debian 3.16.51-3+deb8u1
My hosting provider, if applicable, is:
Self-hosted
I can login to a root shell on my machine (yes or no, or I don't know):
yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
no
Greetings. I manage the DNS servers for networktest.com. Several subdomains (e.g., eng.networktest.com) are behind a NAT box and are not visible in the public DNS. Currently, internal hosts use an internal CA or self-signed certs.
About 15 months ago, someone else asked if it was possible to use Let's Encrypt in a similar scenario involving private domains:
At that time, the answer was no. My questions:
-
Is this still the case (i.e., does Let's Encrypt always require an IP address or DNS RR visible on the public Internet?)?
-
If Let's Encrypt now does support certs for private hosts and/or domains, is there documentation available for this? I did not see anything in the docs or on this forum but I may have missed it. I did find references to a TXT record using the DNS-01 challenge type to prove domain ownership, but I'm unclear if that applies to NAT'd hosts and domains.
Thanks in advance! This seems as though it's a pretty standard problem.