I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt.I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt.

Privacy for Subdomains: Here's What You Should Be Focusing On

Last week, I described a gloomy situation: all public TLS certificate providers log your requests. By browsing through the subdomains, one can get their respective IP addresses. If one of them points to your home route, they know your general location.

\ I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt. My solution caters to my Synology NAS, as it's the one I'm using.

Getting a Wildcard Certificate for Synology NAS

The Synology UI allows configuring Let's Encrypt for automated certificate renewal. But you can get wildcard certificates only for Synology subdomains:

\

\ It's time to become creative. The most widespread Let's Encrypt client is Certbot, but a surface search reveals it doesn't run on Synology. Underneath, Let's Encrypt delivers certificates via the Automatic Certificate Management Environment protocol. Lots of clients already implement the Automatic Certificate Management Environment (ACME) protocol. acme.sh looked like an interesting candidate:

\

\ Icing on the cake, acme.sh provides a Docker image. At the same time, Synology offers a Docker runtime. I thus decided to implement certificate renewal with the acme.sh Docker image. Here's how I proceeded.

\ Go to the Docker menu. In the opening window, click on Container, then Create. It opens a Create Container window. Click on Download and search for neilpang/acme.sh.

\ We will need to create two containers out of it: one for requesting a new certificate, and one for managing the update of the certificate on the NAS.

Prerequisites

Before we go further, we need:

  • To get a token with permissions to edit the DNS records:

    In my case, it's Cloudflare. You can check the process for other providers on the acme.sh wiki.

    \ Go to the Cloudflare UI. Create an API token with the template to Edit Zone DNS. Set a relevant name. Then, set the Zone Resources to the following:

    | Include | Specific zone | |

    \ Write down the token value in a secure place, as you won't be able to access it later!

    \

  • Prepare an account for the Synology:

    For security purposes, we want to run the containers with a dedicated account.

    \ Check the section Create a user in Synology DSM in this post and follow its instructions. It's what I did, and it worked exactly as described.

Requesting the Certificate

Go back to the Synology UI, more specifically, the Docker menu. Click on the Create button. It opens a wizard with several screens:

\

When you run the container, it will create the required files in the homes/certadmin folder.

ls -ltr /volume2/homes/certadmin 
total 8 drwxrwxrwx+ 1 root root 210 Jun 26 07:58 '*.frankel.ch_ecc' drwxrwxrwx+ 1 root root  56 Jun 26 08:38  ca -rwxrwxrwx+ 1 root root 494 Jul  5 14:30  http.header -rwxrwxrwx+ 1 root root 154 Jul  5 14:30  account.conf 

\ If it doesn't work, you can access the logs by selecting the image and clicking on the Details button. The log tab shows the logs, broken up by day. Here's a log sample of a successful run:

[Sat Jul  5 12:30:17 UTC 2025] Verification finished, beginning signing." [Sat Jul  5 12:30:17 UTC 2025] Let's finalize the order. [Sat Jul  5 12:30:17 UTC 2025] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/2489606761/402920873611' [Sat Jul  5 12:30:19 UTC 2025] Downloading cert. [Sat Jul  5 12:30:19 UTC 2025] Le_LinkCert='https://acme-v02.api.letsencrypt.org/acme/cert/05a220cfe82f0e3576f8230d7f62a58dd28b' [Sat Jul  5 12:30:19 UTC 2025] Cert success. -----BEGIN CERTIFICATE-----   REDACTED   REDACTED   REDACTED   REDACTED   REDACTED   REDACTED -----END CERTIFICATE----- [Sat Jul  5 12:30:19 UTC 2025] Your cert is in: /acme.sh/*.frankel.ch_ecc/*.frankel.ch.cer [Sat Jul  5 12:30:19 UTC 2025] Your cert key is in: /acme.sh/*.frankel.ch_ecc/*.frankel.ch.key [Sat Jul  5 12:30:20 UTC 2025] The intermediate CA cert is in: /acme.sh/*.frankel.ch_ecc/ca.cer [Sat Jul  5 12:30:20 UTC 2025] And the full-chain cert is in: /acme.sh/*.frankel.ch_ecc/fullchain.cer 

Deploying the Certificate

We will use the same image to deploy the certificate, albeit with a different configuration.

The image uses the files created by the previous image to update the TLS certificate used by the Synology web app.

Scheduling the Run of the Images

In an ideal world, you'd run the first image, and a successful run would trigger the run of the second image. Unfortunately, Synology doesn't lend itself to this, or to be precise, I didn't find a way to achieve it. Instead, I relied on a simple workaround: schedule the second image run one day after the first image run.

\ In the Synology UI, open the Control Panel and search for the Task Scheduler. Click on the Create button. Select Scheduled Task > User-defined script, as there's no dedicated Docker run item.

\ Here's how to configure it:

The script uses the synowebapi command. I stumbled upon the command; parameters are self-explanatory, but I didn't find the documentation. You need to create two scheduled tasks and change the task name as well as the image name in the command.

\ For scheduling, space out one day between getting a new certificate and deploying it. That should give enough time and doesn't change the result.

\ Note that because images run to completion, i.e., they don't loop, Synology will send a warning notification similar to the following, regardless of whether the run was successful or not:

\

\ After running the two Docker images in turn, your NAS will be using a joker certificate.

Summary

In this post, we implemented a solution to avoid leaking subdomain information when requesting a TLS certificate: requesting wildcard certificates with acme.sh from Synology. The solution isn't perfect: you can use wildcard certificates on any subdomains, but it represents a security risk if someone steals them.

\ Besides, I stored the secrets as environment variables for configuring Docker images. However, in my context, these are acceptable risks.

\ Note that this approach doesn't remove any previously logged requests. The only workaround is to move to another place, or, barring that, change your Internet Service Provider.

\ To go further:

  • Synology DSM 7 with Let's Encrypt and DNS Challenge
  • ACME.sh 3rd party deploy plugin for Synology DSM
  • How to issue Let's Encrypt wildcard certificate with acme.sh and Cloudflare DNS
  • How to use DNS API
  • Synology: Schedule Start & Stop For Docker Containers

Originally published at A Java Geek on September 28th, 2025

Market Opportunity
Salamanca Logo
Salamanca Price(DON)
$0.0002255
$0.0002255$0.0002255
+0.22%
USD
Salamanca (DON) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

UXLINK Approves Token Buyback with 100% Community Support

UXLINK Approves Token Buyback with 100% Community Support

The post UXLINK Approves Token Buyback with 100% Community Support appeared on BitcoinEthereumNews.com. Key Points: UXLINK community approves token buyback with
Share
BitcoinEthereumNews2025/12/28 06:51
Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

The post Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council appeared on BitcoinEthereumNews.com. Michael Saylor and a group of crypto executives met in Washington, D.C. yesterday to push for the Strategic Bitcoin Reserve Bill (the BITCOIN Act), which would see the U.S. acquire up to 1M $BTC over five years. With Bitcoin being positioned yet again as a cornerstone of national monetary policy, many investors are turning their eyes to projects that lean into this narrative – altcoins, meme coins, and presales that could ride on the same wave. Read on for three of the best crypto projects that seem especially well‐suited to benefit from this macro shift:  Bitcoin Hyper, Best Wallet Token, and Remittix. These projects stand out for having a strong use case and high adoption potential, especially given the push for a U.S. Bitcoin reserve.   Why the Bitcoin Reserve Bill Matters for Crypto Markets The strategic Bitcoin Reserve Bill could mark a turning point for the U.S. approach to digital assets. The proposal would see America build a long-term Bitcoin reserve by acquiring up to one million $BTC over five years. To make this happen, lawmakers are exploring creative funding methods such as revaluing old gold certificates. The plan also leans on confiscated Bitcoin already held by the government, worth an estimated $15–20B. This isn’t just a headline for policy wonks. It signals that Bitcoin is moving from the margins into the core of financial strategy. Industry figures like Michael Saylor, Senator Cynthia Lummis, and Marathon Digital’s Fred Thiel are all backing the bill. They see Bitcoin not just as an investment, but as a hedge against systemic risks. For the wider crypto market, this opens the door for projects tied to Bitcoin and the infrastructure that supports it. 1. Bitcoin Hyper ($HYPER) – Turning Bitcoin Into More Than Just Digital Gold The U.S. may soon treat Bitcoin as…
Share
BitcoinEthereumNews2025/09/18 00:27
Why We Need More Stablecoins

Why We Need More Stablecoins

The post Why We Need More Stablecoins appeared on BitcoinEthereumNews.com. Stablecoins are the real success story in crypto. In the past six years, Stablecoins have quietly become indispensable. Since 2019, people have used stablecoins to move $264.5 trillion across 18 billion in transactions. Why? Stablecoins let you hold money onchain without having to worry about volatility, making them the easiest way to store value and transact in the crypto economy. Total market cap of stablecoins is over $280 billion Source: Defillama Why are Stablecoins popular right now? We’re seeing a rush of companies launching stablecoins in the U.S. because issuers finally gained clarity with the passing of the GENIUS Act in July 2025. For the first time, the U.S. government clearly defined who can issue stablecoins, what counts as a “payment stablecoin,” and what obligations issuers have to consumers. Since the GENIUS Act passed, MetaMask rolled out mUSD, Stripe launched a payments-focused chain called Tempo, Circle announced their purpose-built stablecoin payments L1, Arc Network, and there’s been a spree of acquisitions. Stablecoin infrastructure companies like Iron are getting snapped up, and traditional finance firms like Stripe are spending heavily to buy crypto companies (Privy and Bridge) whose products they can fold into their existing offerings. In addition, chains are launching their own stablecoins as a way to capture more revenue from the yield they generate. MegaETH has its native stablecoin, USDm. Hyperliquid launched USDH, which sparked a bidding war with Paxos, Agora, Sky, and Frax all vying to get involved. At this rate, it’s easy to imagine a world where every serious company in crypto eventually issues its own stablecoin. Which raises the obvious question: do we need more? Why we need more Stablecoins: 1. Financial inclusion: Even as the number of unbanked people falls, over 1.3 billion remain without access to banking, mostly in places with unstable currencies. Stablecoins…
Share
BitcoinEthereumNews2025/09/18 20:54