this post was submitted on 25 Oct 2025
60 points (98.4% liked)

Selfhosted

52586 readers
485 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I'm going round in circles on this one.

What I want to do is:

  • serve up my self-hosted apps with https (to local clients only - nothing over the open web)
  • address them as 'app.server.lan' or 'sever.lan/app'
  • preferably host whatever is needed in docker

I think this is achievable with a reverse proxy, some kind of DNS server and self-signed certs. I'm not a complete noob but my knowledge in this area is lacking. I've done a fair bit of research but I'm probably not using the right terminology or whatever.

Would anyone have a link to a good guide that covers this?

you are viewing a single comment's thread
view the rest of the comments
[–] glitching@lemmy.ml 1 points 2 days ago (1 children)

Imma be the problemXY guy here - ditch the https part. without it, you don't gotta deal with certs, signing, shit that's outside your LAN, etc. it's your LAN, do you really need that level of security? who's gonna sniff packets and shit on your LAN?

now all you need is pihole where you set up your hostnames (jellyfin.lan, nextcloud.lan, etc.) and nginx proxy that maps e.g. jellyfin.lan to 192.168.0.123:8096. both of them run plenty fine in docker.

[–] Willdrick@lemmy.world 5 points 2 days ago (1 children)

You say that, but I've seen so many dodgy iot devices.... Specially deploying PiHole you start to see so much random traffic from stupid stuff like a smartplug or a TV box

[–] non_burglar@lemmy.world 1 points 2 days ago

If you're on the same subnet, no amount of reverse proxy will help with dodgy apps. It's more appropriate to put the dodgy iot in a DMZ to control what they can do.

Putting https on these is fine, but it's not a solution to isolating bad clients.