Roland0 wrote: > Looks interesting, however seems to be mainly geared to exposing LAN > services to the Internet. Would need integrated DNS proxy / DHCP server > for the full package. > Might be an option for those brave enough to expose LMS to the outside > (as it seems to offer some sort of authentication mechanism) > > > The encryption part isn't that important to me (if there's someone > capable of reading traffic in my LAN, I have a much bigger problem than > someone playing music at my home), and even less so for audio data. > It's really more convenience / aesthetics (nice urls like > lms.domain.com, no browser warnings, able to use SSL everywhere etc.)
To use Letsencrypt you must own a public domain and whatever name you want a certificate for must be registered to that domain and reference a plain HTTP server to complete the challenge. Depending on what firewall you run in your main router you could also use your public IP to access the HTTPS proxy, but that will obviously also mean that this will be exposed to the entire internet (again depending on your firewall and its configuration). An alternative option is to create your own Certificate Authority (CA) and use that to sign certificates for e.g. lms.domain.local. This will however require you to import the public key of that `SnakeOil` CA on each device that you use to access LMS and may be something of an issue on some of them (I'm still trying to figure out how to import an X509 on an Android phone). ------------------------------------------------------------------------ gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050 View this thread: http://forums.slimdevices.com/showthread.php?t=115555 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/mailman/listinfo/discuss
