Welcome to OStack Knowledge Sharing Community for programmer and developer-Open, Learning and Share
Welcome To Ask or Share your Answers For Others

Categories

0 votes
597 views
in Technique[技术] by (71.8m points)

https - Router delivering its own SSL certificates instead of my domain's to LAN hosts

I installed a nextcloud service on my NAS in a docker container and the service is reachable from the internet via a FQDN for which I generated wildcard Letsencrypt certificates. A reverse proxy (Traefik) is dispatching requests to the service and handles http/https.

Everything works fine while outside of my LAN but connecting to nextcloud from the local network gives certificate errors. For instance, trying to open the nextcloud home page from Firefox gives:

nextcloud.yourdomain.com uses an invalid security certificate.
The certificate is not trusted because it is self-signed.
Error code: MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT
View Certificate

Clicking on "View Certificate" actually shows the router's own certificate.

As an additional information, my nextcloud service FQDN is correctly resolved to my router's public IP address even from within the LAN, i.e.

ping nextcloud.yourdomain.com

correctly returns the public IP address of my router.

How can I avoid this? Why is the router using its own certificates for https traffic to hosts that are inside my LAN instead of my my domain's Letsencrypt certificates, exactly as it's happening from outside the LAN?

Evidently the reverse-proxy or the NAS are not to be blamed as https requests are not even reaching them.

Could you help me with some additional troubleshooting? Thanks PI

question from:https://stackoverflow.com/questions/65651740/router-delivering-its-own-ssl-certificates-instead-of-my-domains-to-lan-hosts

与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
Welcome To Ask or Share your Answers For Others

1 Answer

0 votes
by (71.8m points)

The external IP address you use is actually the IP address of your router. For traffic from outside (i.e. the internet) there is a port forwarding rule which forwards this traffic to the internal server. For traffic from inside this port forwarding will not be applied - this is how your specific router works. And since there is actually a service running on the same port (the admin interface of the router) and this is reachable from inside it will be used instead.

Note that this is how this particular router works. A different router might apply the port forwarding to both internal and external traffic. It would need to support NAT loopback too in this case though.

A workaround would be to use split DNS, i.e. access the nextcloud from outside by the public IP address and from inside by the internal IP address. If such a setup can be done with the systems you already have is unknown.


与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
Welcome to OStack Knowledge Sharing Community for programmer and developer-Open, Learning and Share
Click Here to Ask a Question

...