Network Management Platform
- NGINX
- dnsmasq
- Conntrack
- iptables
- iptables-save
- Manages DNS records in dnsmasq
- Creates Root CAs, Service Certificates & Client Certificates
- Creates NGINX mTLS-ready configurations with http -> https redirects & CRLs
- Manages iptables routing rules for a variety of redirects
include /opt/Dynamo/ssl/server/<service name>/nginx-redirect.conf;
server {
include /opt/Dynamo/ssl/server/<service name>/nginx-mtls.conf;
location / {
proxy_pass http://127.0.0.1:8080;
}
}Include looks something like this:
listen 443 ssl;
server_name <service name>;
ssl_certificate /opt/Dynamo/ssl/server/<service name>/<service name>.crt;
ssl_certificate_key /opt/Dynamo/ssl/server/<service name>/<service name>.key;
ssl_client_certificate /opt/Dynamo/ssl/root/elitedesk/elitedesk.crt;
ssl_verify_client on;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;/etc/dnsmasq.conf must contain a bare minimum of the following:
# Port 54 doesn't conflict with systemd-resolved
port=54
# Upstream DNS servers for public domains (you can also use your server's existing DNS resolver, or AdGuard for example)
server=1.1.1.1
server=1.0.0.1
# Adds the directory that contains Dynamo's DNS config file
conf-dir=/etc/dnsmasq.dHint: don't use port 53 as this will conflict with your server's built-in DNS. Use a different port, then use a Dynamo circuit to redirect inbound traffic from port 53 to your chosen dnsmasq port.
{ "serverBind": "127.0.0.1:6789", // Bind address and port are mandatory. If using Dynamo "certsDir": "/etc/Dynamo/ssl", // Where to store SSL certs "dnsmasqConfigFile": "/etc/dnsmasq.d/dynamo.conf", // Absolute path to dnsmasq config file (NOT the main config file!) "dataDirectory": "/etc/Dynamo/data" // Where to store other data files }