Roland0 wrote: 
> Looks interesting, however seems to be mainly geared to exposing LAN
> services to the Internet. Would need integrated DNS proxy / DHCP server
> for the full package.
> Might be an option for those brave enough to expose LMS to the outside
> (as it seems to offer some sort of authentication mechanism)
> 
> 
> The encryption part isn't that important to me (if there's someone
> capable of reading traffic in my LAN, I have a much bigger problem than
> someone playing music at my home), and even less so for audio data.
> It's really more convenience / aesthetics (nice urls like
> lms.domain.com, no browser warnings, able to use SSL everywhere etc.)

To use Letsencrypt you must own a public domain and whatever name you
want a certificate for must be registered to that domain and reference a
plain HTTP server to complete the challenge. Depending on what firewall
you run in your main router you could also use your public IP to access
the HTTPS proxy, but that will obviously also mean that this will be
exposed to the entire internet (again depending on your firewall and its
configuration).

An alternative option is to create your own Certificate Authority (CA)
and use that to sign certificates for e.g. lms.domain.local. This will
however require you to import the public key of that `SnakeOil` CA on
each device that you use to access LMS and may be something of an issue
on some of them (I'm still trying to figure out how to import an X509 on
an Android phone).


------------------------------------------------------------------------
gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115555

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/mailman/listinfo/discuss

Reply via email to