You left the domain un-redacted in the certificate screenshot btw
Since most users have a dynamic WAN IP, the IP isn't used in the certificate, only the DDNS hostname. If you want to access through the WAN, use the DDNS hostname instead. Otherwise, a new certificate would have to be created every time your WAN IP changed (which might be daily for some users).
Thanks for the answer, but it's not me who chooses what will be generated in the certificate, it was the system itself that defined that IP
How do I change the creation of the certificate to not be issued to the IP?
View attachment 18669
Any suggestion to fix?!
It's invalid because it's self-signed, as the error message indicates. This is perfectly normal. The only way to get rid of the error message is to manage your own CA. You could go with Let's Encrypt, but it's very unreliable on a router because of the large number of users within the asuscomm.com domain, causing renewals to randomly fail/be throttled.
Just ignore it. It's perfectly secure, your browser is simply telling you it doesn't recognize who emitted that certificate.
I still like the idea of using Let's Encrypt.It's invalid because it's self-signed, as the error message indicates. This is perfectly normal. The only way to get rid of the error message is to manage your own CA. You could go with Let's Encrypt, but it's very unreliable on a router because of the large number of users within the asuscomm.com domain, causing renewals to randomly fail/be throttled.
You could go with Let's Encrypt, but it's very unreliable on a router because of the large number of users within the asuscomm.com domain, causing renewals to randomly fail/be throttled.
What if one owns a domain and redirects router.domain.com to hostname.asuscomm.com, would that prevent throttling?
This is why I prefer to let Pixelserv generate the Cert.
I use Cloudflare's free DNS for my own domain (purchased), and use DDNS from the router to dns-o-matic to update the A record for it. Works quite nicely for my needs!As long the acme client requests for your own domain, you'd be fine. You could then create a CNAME within your domain that will point to the asuscomm DDNS entry - that is how I have things setup myself (but with a different DDNS provider than Asus).
That will require you to configure things manually tho, as the router client would request using the DDNS domain.
However, one still needs to enable web access from WAN to let either of those URLs actually open the router page?
I don't think I need that (when "manually" getting the Let's Encrypt certificates)?I don't know the details of Asus's implementation for validation, libletsencrypt is closed source.
I run LetsEncrypt in a Docker container and use DNS verification via the cloudflare plugin: https://hub.docker.com/r/linuxserver/letsencrypt/I don't think I need that (when "manually" getting the Let's Encrypt certificates)?
When I enable web access from WAN this setup actually works: a green lock when I surf to https://router.domain.com:8443; a secure connection verified by Let's Encrypt.
- A CNAME record in the DNS settings of my domain is set to redirect router.domain.com to hostname.asuscomm.com
- External traffic on port 80 of the router is forwarded to a Raspberry Pi (for certbot)
- On this Pi I run certbot ("standalone") to generate a certificate and key for router.domain.com
- I upload the generated certificate and key on the admin page of the router
However, I thought it was strongly discouraged to enable web access from WAN due to security concerns?
Do you guys really enable this, or do you use another way to get this to work? If so, how?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!