[GH-ISSUE #120] Cloudflare DNS Lets Encrypt #106

Closed
opened 2026-02-26 05:34:36 +03:00 by kerem · 16 comments
Owner

Originally created by @ikifar2012 on GitHub (Apr 18, 2019).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/120

Please add the ability to do a DNS challenge for lets encrypt

Originally created by @ikifar2012 on GitHub (Apr 18, 2019). Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/120 Please add the ability to do a DNS challenge for lets encrypt
kerem 2026-02-26 05:34:36 +03:00
Author
Owner

@rudyberkvens commented on GitHub (Apr 19, 2019):

I need this also. My ISP blocks port 80

<!-- gh-comment-id:485001301 --> @rudyberkvens commented on GitHub (Apr 19, 2019): I need this also. My ISP blocks port 80
Author
Owner

@ikifar2012 commented on GitHub (Apr 19, 2019):

What ISP is that?

<!-- gh-comment-id:485003316 --> @ikifar2012 commented on GitHub (Apr 19, 2019): What ISP is that?
Author
Owner

@rudyberkvens commented on GitHub (Apr 19, 2019):

SuddenLink
They also block 25 as well as others. They are not willing to unblock for me.

Thanks,

From: ikifar2012 notifications@github.com
Sent: Friday, April 19, 2019 3:15 PM
To: jc21/nginx-proxy-manager nginx-proxy-manager@noreply.github.com
Cc: rudyberkvens rudy@berkvens.us; Comment comment@noreply.github.com
Subject: Re: [jc21/nginx-proxy-manager] Cloudflare DNS Lets Encrypt (#120)

What ISP is that?


You are receiving this because you commented.
Reply to this email directly, view it on GitHubhttps://github.com/jc21/nginx-proxy-manager/issues/120#issuecomment-485003316, or mute the threadhttps://github.com/notifications/unsubscribe-auth/AF5DMUSGMFAFEXOFSFJSTL3PRIR43ANCNFSM4HGYXHMQ.

<!-- gh-comment-id:485003833 --> @rudyberkvens commented on GitHub (Apr 19, 2019): SuddenLink They also block 25 as well as others. They are not willing to unblock for me. Thanks, From: ikifar2012 <notifications@github.com> Sent: Friday, April 19, 2019 3:15 PM To: jc21/nginx-proxy-manager <nginx-proxy-manager@noreply.github.com> Cc: rudyberkvens <rudy@berkvens.us>; Comment <comment@noreply.github.com> Subject: Re: [jc21/nginx-proxy-manager] Cloudflare DNS Lets Encrypt (#120) What ISP is that? — You are receiving this because you commented. Reply to this email directly, view it on GitHub<https://github.com/jc21/nginx-proxy-manager/issues/120#issuecomment-485003316>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AF5DMUSGMFAFEXOFSFJSTL3PRIR43ANCNFSM4HGYXHMQ>.
Author
Owner

@jc21 commented on GitHub (Apr 23, 2019):

Time for a new ISP ;) Do they block 443 as well?

Check out #85 - it needs testing, you can pull the docker image for that PR and try

<!-- gh-comment-id:485980801 --> @jc21 commented on GitHub (Apr 23, 2019): Time for a new ISP ;) Do they block 443 as well? Check out #85 - it needs testing, you can pull the docker image for that PR and try
Author
Owner

@rudyberkvens commented on GitHub (Apr 23, 2019):

Seems to be very common among residential ISPs. I wish there were other for me to pic from. No fortunately they leave 443 alone.
For now I’m manually requesting from https://www.sslforfree.com/ and importing into the proxy manager UI. It woks but not ideal.

From: jc21 notifications@github.com
Sent: Tuesday, April 23, 2019 4:25 PM
To: jc21/nginx-proxy-manager nginx-proxy-manager@noreply.github.com
Cc: rudyberkvens rudy@berkvens.us; Comment comment@noreply.github.com
Subject: Re: [jc21/nginx-proxy-manager] Cloudflare DNS Lets Encrypt (#120)

Time for a new ISP ;) Do they block 443 as well?

Check out #85https://github.com/jc21/nginx-proxy-manager/pull/85 - it needs testing, you can pull the docker image for that PR and try


You are receiving this because you commented.
Reply to this email directly, view it on GitHubhttps://github.com/jc21/nginx-proxy-manager/issues/120#issuecomment-485980801, or mute the threadhttps://github.com/notifications/unsubscribe-auth/AF5DMUQYDHSPGDJDQAGOUFDPR55EJANCNFSM4HGYXHMQ.

<!-- gh-comment-id:486012370 --> @rudyberkvens commented on GitHub (Apr 23, 2019): Seems to be very common among residential ISPs. I wish there were other for me to pic from. No fortunately they leave 443 alone. For now I’m manually requesting from https://www.sslforfree.com/ and importing into the proxy manager UI. It woks but not ideal. From: jc21 <notifications@github.com> Sent: Tuesday, April 23, 2019 4:25 PM To: jc21/nginx-proxy-manager <nginx-proxy-manager@noreply.github.com> Cc: rudyberkvens <rudy@berkvens.us>; Comment <comment@noreply.github.com> Subject: Re: [jc21/nginx-proxy-manager] Cloudflare DNS Lets Encrypt (#120) Time for a new ISP ;) Do they block 443 as well? Check out #85<https://github.com/jc21/nginx-proxy-manager/pull/85> - it needs testing, you can pull the docker image for that PR and try — You are receiving this because you commented. Reply to this email directly, view it on GitHub<https://github.com/jc21/nginx-proxy-manager/issues/120#issuecomment-485980801>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AF5DMUQYDHSPGDJDQAGOUFDPR55EJANCNFSM4HGYXHMQ>.
Author
Owner

@Deanosim commented on GitHub (Apr 25, 2019):

Time for a new ISP ;) Do they block 443 as well?

Check out #85 - it needs testing, you can pull the docker image for that PR and try

How do I go about testing this? I've pulled it but I don't know where to enter the the info for setting up dns requests via the cloudflare plugin.

<!-- gh-comment-id:486722795 --> @Deanosim commented on GitHub (Apr 25, 2019): > Time for a new ISP ;) Do they block 443 as well? > > Check out #85 - it needs testing, you can pull the docker image for that PR and try How do I go about testing this? I've pulled it but I don't know where to enter the the info for setting up dns requests via the cloudflare plugin.
Author
Owner

@jc21 commented on GitHub (Apr 25, 2019):

According to the guy who wrote the PR, once you've pulled it you need to have your dns settings done and then go and add request a new LE cert from within the application. There's no new UI options.

<!-- gh-comment-id:486837191 --> @jc21 commented on GitHub (Apr 25, 2019): According to the guy who wrote the PR, once you've pulled it you need to have your dns settings done and then go and add request a new LE cert from within the application. There's no new UI options.
Author
Owner

@jc21 commented on GitHub (May 8, 2019):

Merged #85

<!-- gh-comment-id:490298826 --> @jc21 commented on GitHub (May 8, 2019): Merged #85
Author
Owner

@ikifar2012 commented on GitHub (May 9, 2019):

hey @jc21 hpw do I use the dns challange

<!-- gh-comment-id:491044444 --> @ikifar2012 commented on GitHub (May 9, 2019): hey @jc21 hpw do I use the dns challange
Author
Owner

@jc21 commented on GitHub (May 9, 2019):

The patch only tells letsencypt to search your dns settings for some authorization instead of inside the project via http. I personally don't use it but someone wanted it, made a PR, was told to test it and I didn't hear from them again so I merged it because it doesn't affect any pre-existing behavior.

<!-- gh-comment-id:491092884 --> @jc21 commented on GitHub (May 9, 2019): The patch only tells letsencypt to search your dns settings for some authorization instead of inside the project via http. I personally don't use it but someone wanted it, made a PR, was told to test it and I didn't hear from them again so I merged it because it doesn't affect any pre-existing behavior.
Author
Owner

@ikifar2012 commented on GitHub (May 9, 2019):

The patch only tells letsencypt to search your dns settings for some authorization instead of inside the project via http. I personally don't use it but someone wanted it, made a PR, was told to test it and I didn't hear from them again so I merged it because it doesn't affect any pre-existing behavior.

In order for Cloudflare to work you need a special package for certbot and it requires a cloudflare global API key

<!-- gh-comment-id:491094339 --> @ikifar2012 commented on GitHub (May 9, 2019): > The patch only tells letsencypt to search your dns settings for some authorization instead of inside the project via http. I personally don't use it but someone wanted it, made a PR, was told to test it and I didn't hear from them again so I merged it because it doesn't affect any pre-existing behavior. In order for Cloudflare to work you need a special package for certbot and it requires a cloudflare global API key
Author
Owner

@OhHeyAlan commented on GitHub (May 11, 2019):

@ikifar2012 I’ll work on this tonight and try to submit a PR for it. Currently I use Certbot to generate a wildcard and install it as a custom cert.

<!-- gh-comment-id:491537787 --> @OhHeyAlan commented on GitHub (May 11, 2019): @ikifar2012 I’ll work on this tonight and try to submit a PR for it. Currently I use Certbot to generate a wildcard and install it as a custom cert.
Author
Owner

@burkasaurusrex commented on GitHub (Jul 8, 2019):

FYI, it looks like Cloudflare posted a FAQ on this: https://support.cloudflare.com/hc/en-us/articles/214820528-Validating-a-Let-s-Encrypt-Certificate-on-a-Site-Already-Active-on-Cloudflare

<!-- gh-comment-id:509133293 --> @burkasaurusrex commented on GitHub (Jul 8, 2019): FYI, it looks like Cloudflare posted a FAQ on this: https://support.cloudflare.com/hc/en-us/articles/214820528-Validating-a-Let-s-Encrypt-Certificate-on-a-Site-Already-Active-on-Cloudflare
Author
Owner

@dcplaya commented on GitHub (Jan 10, 2020):

Is this working? I didnt see anything in the github wiki about it. I would love to use this but I need to have LetsEncrypt to auth with Cloudflare's DNS before I can switch over to it.

<!-- gh-comment-id:573031330 --> @dcplaya commented on GitHub (Jan 10, 2020): Is this working? I didnt see anything in the github wiki about it. I would love to use this but I need to have LetsEncrypt to auth with Cloudflare's DNS before I can switch over to it.
Author
Owner

@rudyberkvens commented on GitHub (Jan 10, 2020):

I switched to using Let's Encrypt and NGINX Home Assistant SSL proxy add-ins in Home Assistant. These two together are working fine for me. Of course this wont help you if you are using this for something other than HA.

<!-- gh-comment-id:573126543 --> @rudyberkvens commented on GitHub (Jan 10, 2020): I switched to using Let's Encrypt and NGINX Home Assistant SSL proxy add-ins in Home Assistant. These two together are working fine for me. Of course this wont help you if you are using this for something other than HA.
Author
Owner

@dcplaya commented on GitHub (Jan 10, 2020):

I use HA but I also have about 15 other services running through my proxy. But I currently am unable to use this anyway, most of my services' ports are only opened to localhost and as far as I can tell, there is no way to have Nginx look at localhost of the parent machine and not the docker instance. So for now, implementing this is on hold.

<!-- gh-comment-id:573171042 --> @dcplaya commented on GitHub (Jan 10, 2020): I use HA but I also have about 15 other services running through my proxy. But I currently am unable to use this anyway, most of my services' ports are only opened to localhost and as far as I can tell, there is no way to have Nginx look at localhost of the parent machine and not the docker instance. So for now, implementing this is on hold.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/nginx-proxy-manager-NginxProxyManager#106
No description provided.