Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Setting up a Homelab: Part 1 Proxmox and LetsEncrypt

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Setting up a Homelab: Part 1 Proxmox and LetsEncrypt


๐Ÿ’ก Newskategorie: Programmierung
๐Ÿ”— Quelle: dev.to

As someone who likes to tinker around with stuff, I tend to break my system quite often. For a long time, I have wanted to allow myself to test applications and operating systems without breaking my ongoing OS install.

One way to test application is by using virtual machines or docker. While I use docker quite a lot for testing and for production workloads, testing an entire operating system on docker is not feasible. For this reason, I wanted to use virtual machines. But I also did not want to run Virtual Machines on my laptop, as I do not like my laptop getting hot everytime I want to test something new. Recently, I got my hands on a used desktop, a decent machine on which I could start building my home lab.

As I wanted to run a bunch of Virtual Machines and containers on the server, Proxmox seemed to be a good fit as it supports both VMs and Containers using KVM and LXC.

P.S. This is not supposed to be a tutorial. I only wrote this piece so that I can look back on it after a year and hopefully remember how I did stuff.

Installation

To install Proxmox VE, I just followed the documentation on the Proxmox website and completed a standard installation. As the installer is straightforward, the installation itself was quite easy.

Configuration

Right after I installed Proxmox, I tried logging into the web console, and I saw this.

Insecure Connection: Invalid Common Name Warning

A self-signed certificate was generated and used by Proxmox which will always generate a warning on the browser. I did not like seeing this when trying to work on my home lab. So, I started looking for ways to put a valid SSL certificate in Proxmox.

During my research, I found that Proxmox could be made to integrate with acme.sh; a free SSL certificate generator powered by ACME(Let's Encrypt).

Generate and Apply SSL Certificate

Docs: https://pve.proxmox.com/wiki/Certificate_Management

After skimming through the documentation, I thought that the integration would be quite easy, and indeed it was, after a couple of failed attempts.

You can register and deactivate ACME accounts over the web interface Datacenter -> ACME or using the pvenode command-line tool.

Following this excerpt from the documentation, I went to Datacenter -> ACME -> Accounts -> Add, and registered an account with Lets Encrypt V2.

Add ACME Account

Since The Proxmox instance was not accessible directly from the public internet, I proceeded to add the plugin for DNS challenge based verification.

To add a Challenge Plugin:

  1. In the challenge plugins section, click on Add.
  2. In the popup that appears, give a name to the plugin that you will create in the Plugin ID section. Remember this value as the PLUGIN_NAME.
  3. Set the DNS API option to DNS provider, and fill in the generated form as required. Then clock on save.

In my case, I am using Cloudflare, so I filled in the CF_Account_ID, CF_Email, CF_Token and CF_Zone_ID fields.

Challenge Plugin

You might only need the CF_TOKEN but the process failed due to some reason when only the CF_TOKEN was used. So I filled in all the applicable fields.

Now, to generate the certificated for a node, you need to go to the Datacenter -> NODE_NAME -> System -> Certificates to generate/setup the certificate.

  1. In the ACME Section, Click on Add.
  2. In the popup that appears, select challenge type as DNS, and the Plugin type as the name that you used when creating the DNS plugin (PLUGIN_NAME).
  3. In the domain field, fill in the domain name that you want to generate the SSL certificate for. Now click on apply.

SSL Certificate Creation

  1. The certificate should be generated and applied. Proxmox will restart the webproxy to apply the new certificate.

SSL Certificate Description

...



๐Ÿ“Œ Setting up a Homelab: Part 1 Proxmox and LetsEncrypt


๐Ÿ“ˆ 89.15 Punkte

๐Ÿ“Œ How to Add and Enable Proxmox Community Package Repositories on Proxmox VE 8 Server


๐Ÿ“ˆ 33.96 Punkte

๐Ÿ“Œ CVE-2023-46854 | Proxmox proxmox-widget-toolkit up to 4.0.8 Edit Notes cross site scripting


๐Ÿ“ˆ 32.19 Punkte

๐Ÿ“Œ How to Generate LetsEncrypt SSL Certificate using CloudFlare DNS-01 Challenge and Use it on Synology NAS


๐Ÿ“ˆ 31.71 Punkte

๐Ÿ“Œ Cloud native homelab, Part 2: Kubernetes + Ceph


๐Ÿ“ˆ 31.17 Punkte

๐Ÿ“Œ Letsencrypt sperrt TLS-SNI Domainvalidierung


๐Ÿ“ˆ 29.94 Punkte

๐Ÿ“Œ Letsencrypt sperrt TLS-SNI Domainvalidierung


๐Ÿ“ˆ 29.94 Punkte

๐Ÿ“Œ Letsencrypt certificates for nginx running on docker


๐Ÿ“ˆ 29.94 Punkte

๐Ÿ“Œ Letsencrypt is revoking certificates on March 4


๐Ÿ“ˆ 29.94 Punkte

๐Ÿ“Œ Seamlessly Setting Up Server Infrastructure for RKE2 with Semaphore UI(SemUI) and Ansible on Proxmox -- QM Commands!


๐Ÿ“ˆ 28.04 Punkte

๐Ÿ“Œ Building a totally distributed homelab cluster with Nomad, Consul, Vault, GlusterFS, and Traefik on cheap single-board ARM computers


๐Ÿ“ˆ 26.05 Punkte

๐Ÿ“Œ CP /r/homelab - I made a docker-compose to monitor power use and weather conditions. I think it's pretty neat.


๐Ÿ“ˆ 26.05 Punkte

๐Ÿ“Œ Troubleshooting Linux performance, building a golden image for your RHEL homelab, and more tips for sysadmins


๐Ÿ“ˆ 26.05 Punkte

๐Ÿ“Œ Automate homelab microK8s cluster provisioning with Vagrant and Ansible


๐Ÿ“ˆ 26.05 Punkte

๐Ÿ“Œ FOSS Weekly #24.14: Homelab Special Edition (and Discussing XZ Backdoor in Linux)


๐Ÿ“ˆ 26.05 Punkte

๐Ÿ“Œ Why do I need a server vs. a desktop when building a homelab for Security learning purposes?


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Advice for Security/Pentest Homelab Setup


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Avocent IP KVMs hacking - or how I got cables from any vendor to work on my Dell 1082DS (x-post from /r/homelab)


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ My Homelab


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ How I built a homelab with Red Hat Enterprise Linux (RHEL)


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Build a golden image for your RHEL homelab with Image Builder


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ ZimaBoard Makes Owning a Homelab Super Easy


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Advice for Security/Pentest Homelab Setup


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Expand Promox storage with external enclosures in a homelab environment


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Hosting for Web Apps: Cloud vs. Homelab vs. Hybrid โ€“ Which Saves You Money?


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Homelab Adventures: Crafting a Personal Tech Playground


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ The Ultimate NixOS Homelab Guide - The Install


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ Creating my own homelab


๐Ÿ“ˆ 24.28 Punkte

๐Ÿ“Œ How we are migrating (many of) our servers from Linux to FreeBSD - Part 3 - Proxmox to FreeBSD


๐Ÿ“ˆ 22.99 Punkte

๐Ÿ“Œ POSCMS 3.2.10 Setting.php index $cache['setting']['ucssocfg'] privilege escalation


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ CVE-2023-27229 | TOTOLINK A7100RU 7.4cu.2313_B20191024 Setting /setting/setWanIeCfg upBw command injection


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ CVE-2023-26978 | TOTOLINK A7100RU 7.4cu.2313_B20191024 Setting /setting/setWanIeCfg pppoeAcName command injection


๐Ÿ“ˆ 20.35 Punkte

๐Ÿ“Œ How Debuggers Work: Getting and Setting x86 Registers, Part 2: XSAVE


๐Ÿ“ˆ 18.84 Punkte

๐Ÿ“Œ Become an Animation Master with Anime.js - Part 1: Setting up the Environment and Basic Animations


๐Ÿ“ˆ 18.84 Punkte











matomo