dizhn 12 hours ago

Looks good. I am using Cert Warden for similar purposes, though admittedly only a few certificates. Most of my minimal needs are taken care of properly by Caddy which is already the front end proxy for the same services.

https://www.certwarden.com/

haddonist a day ago

This may be good for the selfhoster who is running more an a couple of sites.

But a GUI to manage enterprise-level SSL fleets? Doubtful.

Not when a change/configuration management system (Puppet, Chef, Ansible etc etc..) driven by git commits enables single-source-of-truth, peer-review, and automatic creation/monitoring/renewal of certificates.

  • weddpros 15 hours ago

    You're absolutely right, at the enterprise level, managing an SSL fleet goes far beyond just issuance, and you can't assume the certificates you're issuing are the only ones that exist.

    Shameless plug: if you need to cut through the noise of thousands of certs across thousands of hosts, there's https://sslboard.com

    • indigodaddy 11 hours ago

      Shame this isn't open source or some open source equivalent

      • fab_space 5 hours ago

        Helo and thank you to point out this tool I ignored before.

        There is an opportunity to improve the tool then I added this feature as wanted feature in the plan as certmate dev :)

      • weddpros 11 hours ago

        To be honest, it's rather difficult and costly to run, with a 1.5B rows database of indexed unexpired certificates and a scanning job that took weeks from dozens of IPs.

  • PeterStuer 14 hours ago

    Most "homelabs", self hosters or small outfits would already use something like Traefik or Cloudflare tunnels with auto cert management.

    Their main concerns are getting browser "unsafe" warnings disappear and keep it so. They want nothing to do with cert issuance or renewal.

woleium 20 hours ago

SSL officially became TLS in 1999 when the Internet Engineering Task Force published TLS 1.0 as RFC 2246. TLS 1.0 was designed as an upgrade to SSL 3.0, addressing security vulnerabilities and making several improvements, but the changes were significant enough to prevent interoperability between SSL 3.0 and TLS 1.0

It seems a bit silly to call a new tool an SSL manager?

  • browningstreet 20 hours ago

    You can’t fight mindshare. Naming is branding, not a ruleset.

    Maybe think of it as “SSL certs” the thing uses TLS x.0 standard.

    Too many people will say “what?” if you call it TLS cert management. Or worse, they will ignore it because it doesn’t trip the synapses.

  • vivzkestrel 18 hours ago

    unfortunately outside tech circles, most people still refer to it as SSL or HTTPS. They dont know about the intricacies of the changes involved

    • fab_space 14 hours ago

      certmate dev here :)

      I came from a decade of certificate management in multiple work contexts and YES, all the people refer to them as SSL and not TLS, while TLS 1.2 is the minimum de facto standard nowadays.

      The point of certmate is to have a simple url like https://certmate/domain/tls to grab a valid cert from wherever I am, any time. This because I focused on DNS challenge only.

      A good feat btw is the deploymenet check, where the app verify if the cert issued is the same deployed on public FQDN.

      Of course some more interesting additional features will be added soon like:

      - multiple cloud accounts support - deploy to remote nodes - vault integration/support

      Enjoy and contribute!

jamespo 6 hours ago

A feature I'd like would be creating & managing your own private CA in addition to using letsencrypt for public CAs.

  • fab_space 5 hours ago

    suggestion noted and added to the upcoming major release :)

ozim a day ago

I like how docker and kubernetes were supposed to solve dependency problems.

But then I read:

Prerequisites Docker 20.10+ Docker Compose 2.0+.

So now if I have app that can run on v19 I need docker for dockers :) to use CertMate because if I upgrade my other apps might be messed up.

  • meepmorp a day ago

    Yeah, nobody should ever employ features that only work on newer versions of software because then someone somewhere might not be able to make use of them.

    But less snarkily, maybe put in the work to hack up their dockerfiles if you want to do something they don't directly support.

schwingy a day ago

Sounds cool, but what if you don't use one of the listed DNS providers, but rather run your own DNS? I didn't see an option that would let you do that.

  • CaliforniaKarl a day ago

    RFC2136 would let you do that, though setting it up is “an exercise left up to the reader”. My suggestion would be to get RFC2136 working with certbot first.

    • fab_space 13 hours ago

      hello, certmate dev here :)

      Custom DNS servers are already supported via certbot-dns-rfc2136 plugin as you suggested!

orangebread 4 hours ago

My guy made this with AI -- not a bad thing, just an observation.

nodesocket 19 hours ago

So this just writes the certificates to disk and you still have to manage binding certificates to services? I’m using Caddy in-front of containers using Cloudflare DNS and it works amazingly. Zero configuration.