I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt.I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt.

Privacy for Subdomains: Here's What You Should Be Focusing On

Last week, I described a gloomy situation: all public TLS certificate providers log your requests. By browsing through the subdomains, one can get their respective IP addresses. If one of them points to your home route, they know your general location.

\ I analyzed several solutions and decided to use wildcard certificates, which don't leak subdomain information, while continuing to use Let's Encrypt. My solution caters to my Synology NAS, as it's the one I'm using.

Getting a Wildcard Certificate for Synology NAS

The Synology UI allows configuring Let's Encrypt for automated certificate renewal. But you can get wildcard certificates only for Synology subdomains:

\

\ It's time to become creative. The most widespread Let's Encrypt client is Certbot, but a surface search reveals it doesn't run on Synology. Underneath, Let's Encrypt delivers certificates via the Automatic Certificate Management Environment protocol. Lots of clients already implement the Automatic Certificate Management Environment (ACME) protocol. acme.sh looked like an interesting candidate:

\

\ Icing on the cake, acme.sh provides a Docker image. At the same time, Synology offers a Docker runtime. I thus decided to implement certificate renewal with the acme.sh Docker image. Here's how I proceeded.

\ Go to the Docker menu. In the opening window, click on Container, then Create. It opens a Create Container window. Click on Download and search for neilpang/acme.sh.

\ We will need to create two containers out of it: one for requesting a new certificate, and one for managing the update of the certificate on the NAS.

Prerequisites

Before we go further, we need:

  • To get a token with permissions to edit the DNS records:

    In my case, it's Cloudflare. You can check the process for other providers on the acme.sh wiki.

    \ Go to the Cloudflare UI. Create an API token with the template to Edit Zone DNS. Set a relevant name. Then, set the Zone Resources to the following:

    | Include | Specific zone | |

    \ Write down the token value in a secure place, as you won't be able to access it later!

    \

  • Prepare an account for the Synology:

    For security purposes, we want to run the containers with a dedicated account.

    \ Check the section Create a user in Synology DSM in this post and follow its instructions. It's what I did, and it worked exactly as described.

Requesting the Certificate

Go back to the Synology UI, more specifically, the Docker menu. Click on the Create button. It opens a wizard with several screens:

\

When you run the container, it will create the required files in the homes/certadmin folder.

ls -ltr /volume2/homes/certadmin 
total 8 drwxrwxrwx+ 1 root root 210 Jun 26 07:58 '*.frankel.ch_ecc' drwxrwxrwx+ 1 root root  56 Jun 26 08:38  ca -rwxrwxrwx+ 1 root root 494 Jul  5 14:30  http.header -rwxrwxrwx+ 1 root root 154 Jul  5 14:30  account.conf 

\ If it doesn't work, you can access the logs by selecting the image and clicking on the Details button. The log tab shows the logs, broken up by day. Here's a log sample of a successful run:

[Sat Jul  5 12:30:17 UTC 2025] Verification finished, beginning signing." [Sat Jul  5 12:30:17 UTC 2025] Let's finalize the order. [Sat Jul  5 12:30:17 UTC 2025] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/2489606761/402920873611' [Sat Jul  5 12:30:19 UTC 2025] Downloading cert. [Sat Jul  5 12:30:19 UTC 2025] Le_LinkCert='https://acme-v02.api.letsencrypt.org/acme/cert/05a220cfe82f0e3576f8230d7f62a58dd28b' [Sat Jul  5 12:30:19 UTC 2025] Cert success. -----BEGIN CERTIFICATE-----   REDACTED   REDACTED   REDACTED   REDACTED   REDACTED   REDACTED -----END CERTIFICATE----- [Sat Jul  5 12:30:19 UTC 2025] Your cert is in: /acme.sh/*.frankel.ch_ecc/*.frankel.ch.cer [Sat Jul  5 12:30:19 UTC 2025] Your cert key is in: /acme.sh/*.frankel.ch_ecc/*.frankel.ch.key [Sat Jul  5 12:30:20 UTC 2025] The intermediate CA cert is in: /acme.sh/*.frankel.ch_ecc/ca.cer [Sat Jul  5 12:30:20 UTC 2025] And the full-chain cert is in: /acme.sh/*.frankel.ch_ecc/fullchain.cer 

Deploying the Certificate

We will use the same image to deploy the certificate, albeit with a different configuration.

The image uses the files created by the previous image to update the TLS certificate used by the Synology web app.

Scheduling the Run of the Images

In an ideal world, you'd run the first image, and a successful run would trigger the run of the second image. Unfortunately, Synology doesn't lend itself to this, or to be precise, I didn't find a way to achieve it. Instead, I relied on a simple workaround: schedule the second image run one day after the first image run.

\ In the Synology UI, open the Control Panel and search for the Task Scheduler. Click on the Create button. Select Scheduled Task > User-defined script, as there's no dedicated Docker run item.

\ Here's how to configure it:

The script uses the synowebapi command. I stumbled upon the command; parameters are self-explanatory, but I didn't find the documentation. You need to create two scheduled tasks and change the task name as well as the image name in the command.

\ For scheduling, space out one day between getting a new certificate and deploying it. That should give enough time and doesn't change the result.

\ Note that because images run to completion, i.e., they don't loop, Synology will send a warning notification similar to the following, regardless of whether the run was successful or not:

\

\ After running the two Docker images in turn, your NAS will be using a joker certificate.

Summary

In this post, we implemented a solution to avoid leaking subdomain information when requesting a TLS certificate: requesting wildcard certificates with acme.sh from Synology. The solution isn't perfect: you can use wildcard certificates on any subdomains, but it represents a security risk if someone steals them.

\ Besides, I stored the secrets as environment variables for configuring Docker images. However, in my context, these are acceptable risks.

\ Note that this approach doesn't remove any previously logged requests. The only workaround is to move to another place, or, barring that, change your Internet Service Provider.

\ To go further:

  • Synology DSM 7 with Let's Encrypt and DNS Challenge
  • ACME.sh 3rd party deploy plugin for Synology DSM
  • How to issue Let's Encrypt wildcard certificate with acme.sh and Cloudflare DNS
  • How to use DNS API
  • Synology: Schedule Start & Stop For Docker Containers

Originally published at A Java Geek on September 28th, 2025

Piyasa Fırsatı
Salamanca Logosu
Salamanca Fiyatı(DON)
$0.0002854
$0.0002854$0.0002854
+1.09%
USD
Salamanca (DON) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

XRP may peak in 2026. How can I reliably earn 2000 XRP per da

XRP may peak in 2026. How can I reliably earn 2000 XRP per da

Steven McClurg, CEO of Canary Capital, stated that while Bitcoin may face correction pressure in the coming cycle, XRP is expected to reach a cyclical peak in 2026
Paylaş
AI Journal2026/01/02 19:33
How to earn from cloud mining: IeByte’s upgraded auto-cloud mining platform unlocks genuine passive earnings

How to earn from cloud mining: IeByte’s upgraded auto-cloud mining platform unlocks genuine passive earnings

The post How to earn from cloud mining: IeByte’s upgraded auto-cloud mining platform unlocks genuine passive earnings appeared on BitcoinEthereumNews.com. contributor Posted: September 17, 2025 As digital assets continue to reshape global finance, cloud mining has become one of the most effective ways for investors to generate stable passive income. Addressing the growing demand for simplicity, security, and profitability, IeByte has officially upgraded its fully automated cloud mining platform, empowering both beginners and experienced investors to earn Bitcoin, Dogecoin, and other mainstream cryptocurrencies without the need for hardware or technical expertise. Why cloud mining in 2025? Traditional crypto mining requires expensive hardware, high electricity costs, and constant maintenance. In 2025, with blockchain networks becoming more competitive, these barriers have grown even higher. Cloud mining solves this by allowing users to lease professional mining power remotely, eliminating the upfront costs and complexity. IeByte stands at the forefront of this transformation, offering investors a transparent and seamless path to daily earnings. IeByte’s upgraded auto-cloud mining platform With its latest upgrade, IeByte introduces: Full Automation: Mining contracts can be activated in just one click, with all processes handled by IeByte’s servers. Enhanced Security: Bank-grade encryption, cold wallets, and real-time monitoring protect every transaction. Scalable Options: From starter packages to high-level investment contracts, investors can choose the plan that matches their goals. Global Reach: Already trusted by users in over 100 countries. Mining contracts for 2025 IeByte offers a wide range of contracts tailored for every investor level. From entry-level plans with daily returns to premium high-yield packages, the platform ensures maximum accessibility. Contract Type Duration Price Daily Reward Total Earnings (Principal + Profit) Starter Contract 1 Day $200 $6 $200 + $6 + $10 bonus Bronze Basic Contract 2 Days $500 $13.5 $500 + $27 Bronze Basic Contract 3 Days $1,200 $36 $1,200 + $108 Silver Advanced Contract 1 Day $5,000 $175 $5,000 + $175 Silver Advanced Contract 2 Days $8,000 $320 $8,000 + $640 Silver…
Paylaş
BitcoinEthereumNews2025/09/17 23:48
Tokenized Assets Shift From Wrappers to Building Blocks in DeFi

Tokenized Assets Shift From Wrappers to Building Blocks in DeFi

The post Tokenized Assets Shift From Wrappers to Building Blocks in DeFi appeared on BitcoinEthereumNews.com. RWAs are rapidly moving on-chain, unlocking new opportunities for investors and DeFi protocols, according to a new report from Dune and RWAxyz. Tokenized real-world assets (RWAs) are moving beyond digital versions of traditional securities to become key building blocks of decentralized finance (DeFi), according to the 2025 RWA Report from Dune and RWAxyz. The report notes that Treasuries, bonds, credit, and equities are now being used in DeFi as collateral, trading instruments, and yield products. This marks tokenization’s “real breakthrough” – composability, or the ability to combine and reuse assets across different protocols. Projects are already showing how this works in practice. Asset manager Maple Finance’s syrupUSDC, for example, has grown to $2.5 billion, with more than 30% placed in DeFi apps like Spark ($570 million). Centrifuge’s new deJAAA token, a wrapper for Janus Henderson’s AAA CLO fund, is already trading on Aerodrome, Coinbase and other exchanges, with Stellar planned next. Meanwhile, Aave’s Horizon RWA Market now lets institutional users post tokenized Treasuries and CLOs as collateral. This trend underscores a bigger shift: RWAs are no longer just copies of traditional assets; instead, they are becoming core parts of on-chain finance, powering lending, liquidity, and yield, and helping to close the gap between traditional finance (TradFi) and DeFi. “RWAs have crossed the chasm from experimentation to execution,” Sid Powell, CEO of Maple Finance, says in the report. “Our growth to $3.5B AUM reflects a broader shift: traditional financial services are adopting crypto assets while institutions seek exposure to on-chain markets.” Investor demand for higher returns and more diversified options is mainly driving this growth. Tokenized Treasuries proved there is strong demand, with $7.3 billion issued by September 2025 – up 85% year-to-date. The growth was led by BlackRock, WisdomTree, Ondo, and Centrifuge’s JTRSY (Janus Henderson Anemoy Treasury Fund). Spark’s $1…
Paylaş
BitcoinEthereumNews2025/09/18 06:10