So I’ve spent the afternoon working with Plex Media server on my Qnap server trying to make custom certificates work. I am using lego which is a go based acme client. I have valid certificates that were issued by using DNS validation with Cloud Flare. I’ve tried everything I can imagine and the server refuses to even provide the certificates I have configured.
I’ve already validated the certificates 7 ways to Sunday but if someone wants to offer anther option let me know. I built and rebuilt the p12 file, I even manually downloaded the cross signed root which is absolutely not required and added that to the p12 file.
Every time I add and remove the certificate in debug mode I see what appears to be success but then it proceeds to load a new plex.direct DigiCert certificate.
I have configured the custom certificate domain, customer access urls, and disabled remote access all to no avail. I have removed my LAN subnet settings, removed view Wan as Lan for Bandwidth, etc. I’ve also tried blowing away the cache.
Note there are no errors in loading the cert and it’s performing stapling.
I use my own DNS at home with pi-hole and unbound. plex.direct urls are already marked as private domains and DNS rebind protection is not enabled. Internally the domain name of the cert resolves to the LAN IP. Externally it resolves to a public IP.
The server has 2 public addresses one which is a VPN tunnel and not used for server access and one which is bound to the fqdn of the cert. I cannot change this.
Server Version#: 1.18.3.2156
Dec 31, 2019 22:27:13.555 [0x7f068e999700] DEBUG - CERT: Installed certificate with fingerprint 00:c5:6e:eb:ec:e3:e6:f5:4a:ea:62:9f:bb:42:17:2a:76:bd:e3:ff.
Dec 31, 2019 22:27:13.555 [0x7f068e999700] DEBUG - CERT: Installed new private key.
Dec 31, 2019 22:27:13.555 [0x7f068e999700] DEBUG - CERT: Subject name is /C=US/ST=California/L=Los Gatos/O=Plex, Inc./CN=*.<uniq id>.plex.direct
Dec 31, 2019 22:27:13.556 [0x7f068e999700] DEBUG - CERT: OCSP requests for stapling will be made to 'http://ocspx.digicert.com/'.
Dec 31, 2019 22:27:13.556 [0x7f068e999700] INFO - OCSP: Successfully retrieved response from cache.
Dec 31, 2019 22:27:13.556 [0x7f068e999700] DEBUG - CERT: Installed intermediate certificate.
Dec 31, 2019 22:27:13.557 [0x7f068e999700] DEBUG - CERT: Loaded a user-provided certificate.
Dec 31, 2019 22:27:13.558 [0x7f068e999700] DEBUG - CERT: OCSP requests for stapling will be made to 'http://ocsp.int-x3.letsencrypt.org/'.
Dec 31, 2019 22:27:13.558 [0x7f068e999700] INFO - OCSP: Successfully retrieved response from cache.