SSLLabs saying "This server's certificate chain is incomplete."

I did it on the server... oops

Well wouldn't that mean that I'd have to set that up on every device that I want to be able to go to that page from my LAN? Also what about mobile devices?

1 Like

Yes.

But as I mentioned before, there is another option [#3]:

[Option #1 was using hairpinning on the router]
[Option #2 was modifying the hosts file]

3 Likes

I think this is the method I need to be honest, I'm looking into PiHole for this, any other suggestions or ideas?

3 Likes

I doubt a Python script of 46 lines can really be called an "alternative". It's also deprecated and archived.

Also, what is generating the private key when using Porkbun? And where is it stored? Does Porkbun generate and store the private key, which is a really BIG NO NO when talking about the (web) PKI?

2 Likes

I mean, if it does what I want then it's fine? As far as where they are stored, it creates them and I have them in the directories that I specify in the config.json. I'm unsure of what exactly you mean by that, did you mean before it even gets to me if Porkbun is able to store somewhere where they can see it?

Also, I don't know of another way to get SSL using DNS-01 through Porkbun other than certbun. I believe I can manually do it though certbot, but that would be a bit annoying if I have to do that every so often.

If you're fine with others having access to the private key (which you shouldn't be), sure, why not :man_shrugging:t2:

I would personally avoid Porkbun as the plague in its totality, but that's just me.

1 Like

There is a 3rd party DNS Challenge plugin for Certbot here: GitHub - infinityofspace/certbot_dns_porkbun: Plugin for certbot to obtain certificates using a DNS TXT record for Porkbun domains

Other ACME Clients like acme.sh and lego have Porkbun support as well. See github for both

5 Likes

Supplemental information

3 Likes