<VirtualHost *:80>
ServerName pve.host.my.domain
ProxyPass / http://pve.host.my.domain/
ProxyPassReverse / http://pve.host.my.domain/
<Location "/.well-known/acme-challenge/">
Allow from All
</Location>
</VirtualHost>
Yes, and it is what I do now, but... this leaves door open for attack. The dns access key allows to ANY change in dns configuration. So compromised PVE node could lead to total disaster of everything in the domain. On the other hand acme http authorization leaves dns safe!Is your DNS provider listed in the available plugins for the DNS challenge? Validating the domain via a DNS challenge would be a bit easier in this situation
you can also use the cname alias support and handle ACME dns requests in a separate DNS server/zone that can cause no harm (other than ACME validation, but the same is true of the PVE host itself if it is reachable over a public domain )Yes, and it is what I do now, but... this leaves door open for attack. The dns access key allows to ANY change in dns configuration. So compromised PVE node could lead to total disaster of everything in the domain. On the other hand acme http authorization leaves dns safe!
Yes, but the point is to use http.you can also use the cname alias support and handle ACME dns requests in a separate DNS server/zone that can cause no harm (other than ACME validation, but the same is true of the PVE host itself if it is reachable over a public domain )
<VirtualHost *:80>
ServerName pve.node.dns.name
ErrorLog ${APACHE_LOG_DIR}/certbot_proxy-error.log
CustomLog ${APACHE_LOG_DIR}/certbot_proxy-access.log vhost_combined
SetEnv proxy-nokeepalive 1
ProxyPass /.well-known/acme-challenge/ http://pve.node.private.ip/.well-known/acme-challenge/
ProxyPassReverse /.well-known/acme-challenge/ http://pve.node.private.ip/.well-known/acme-challenge/
<Location "/">
AllowOverride None
Order Deny,Allow
Deny from All
</Location>
<Location "/.well-known/acme-challenge/">
Allow from All
</Location>
</VirtualHost>
a2enmod proxy_http
.